SlideShare a Scribd company logo
1 of 79
E
M
A
C
Fraud Risk Management
www.elsamconsult.com 1
Part II
ADVANCED RISK MANAGEMENT
WORKSHOP
STELLA MARIS HOSTEL
Bagamoyo
9TH -11TH April,2014
E
M
A
C
Operational Risk
Nature of fraud risk- Operational Risks
What is fraud and fraud risk?
Necessity of anti-fraud training
Fraud risk factors
Group exercise: fraud risk factors or 3 Cs
www.elsamconsult.com 2
Coverage
E
M
A
C
• Operational risk attaches itself to people, systems
and process
• Operational risk is the risk of loss resulting from
inadequate or failed internal processes, people
and systems or from external events.
• It includes other risks such as legal risks, physical
risks, political risks and environmental risks
• Fraud is part of operational risk in any
organization
Internal fraud such as tax evasion, assets
misappropriation, bribery, corruption and larceny
External fraud such as theft, forgery, hacking and
information theft
www.elsamconsult.com 3
Introduction
E
M
A
C
Credit
Risk
Market
Risk
Operation
al Risk
Complianc
e Risk
Informati
on Risk
Data Risk Other Risk
Basic Strategic ERM Integrated
www.elsamconsult.com 4
Evolution of Operational Risk
E
M
A
C
• Joint McKinsey finds have shown that risk
management has not been able to prove its value
to organization
• Operational risk is seen as immature discipline that
has often not proven its value to organization
• There is evidence that operational risk can be
destructive as market loose faith in management
and control following large events (Enron Case)
• The discipline is focused more on measurement
than on management
www.elsamconsult.com 5
Perception on operational Risk
E
M
A
C
“obtaining a comprehensive measure of fraud’s
financial impact is challenging, if not impossible
due to the fact that fraud inherently involves
efforts at concealment. Many fraud cases will
never be detected, and of those that are, the full
amount of losses might never be determined or
reported. Consequently, any attempt to quantify
the extent of all fraud losses will be, at best, an
estimate”
www.elsamconsult.com 6
Why is Fraud a Major Operational
Risk
E
M
A
C
www.elsamconsult.com 7
The Cost of Fraud & Corruption
E
M
A
C
• Fraud is a broad legal concept that generally
refers to an intentional act committed to
secure an unfair or unlawful gain.
• Misconduct is also a broad concept, generally
referring to violations of laws, regulations,
internal policies, and market expectations of
ethical business conduct.
• It is an intentional act by one or more
individuals among management , those
charged with governance, employee or third
parties involving the use of deception to obtain
an unjust or illegal advantage
www.elsamconsult.com 8
What is fraud?
E
M
A
C
Fraud is any intentional act or omission
designed to deceive others, resulting in the
victim suffering loss and/ or the perpetrator
achieving a gain. ACFE
Corruption is the abuse of public or private
office for personal gain. It includes acts of
bribery, embezzlement, nepotism or state
capture. It is often associated with and
reinforced by other illegal practices such as bid
rigging, fraud or money laundering. OECDwww.elsamconsult.com 9
What is fraud? Perspectives ..
E
M
A
C
Fraud is …. Fraud is not …..
Intentional Taken by physical force
To trick or deceive
someone out of his/her
assets
Victimless
Theft Insignificant because no
one is hurt
A crime Acceptable or justifiable
www.elsamconsult.com 10
Characteristics of Fraud
E
M
A
C
Fraud commonly includes activities
such as theft, corruption,
conspiracy, embezzlement, money
laundering, bribery and extortion.
It involves using deception to
dishonestly make a personal gain
for oneself and / or create a loss for
another.
www.elsamconsult.com 11
Scope of Fraud
E
M
A
C
• Pressure on employee to misappropriate
cash or organizational assets
• Employees/people committing fraud are
not career criminals, they are trusted
employees
• Dr. Donald Cressey, a criminologist
developed a model to get reasons for why
people in trust commit fraud (Case Study II)
• Model is referred as fraud triangle
www.elsamconsult.com 12
Why people commit fraud?
E
M
A
C
• Most of fraudsters are first time offenders with
no criminal past and therefore don’t view
themselves as criminals (See Arthur Andersen
case)
• They must always justify the crime in a way that
makes it an acceptable and justifiable act
(rationalization) e.g. I was underpaid, my
employer cheated me, my employer is
dishonest, I was entitled to the money or I was
only borrowing money.
www.elsamconsult.com 13
Causes of Fraud - Rationalization
E
M
A
C
Fraud
Pressure
or
Incentive
Rationalizati
on
Opportunity
www.elsamconsult.com 14
What causes fraud?- Fraud Triangle
All the three factors must be present for fraud to occur, if any one of the
three is missing, fraud will not occur
E
M
A
C
www.elsamconsult.com 15
Why fraud happens?
Fraud Need/
Rationalization
•Every one
Does it
•Simply borrow
-money
Pressure
Unrealistic
Corporate
Target can
Force
Employees to
Commit fraud
Opportunity- due to weak
And override of controls
E
M
A
C
• It is a perceived non-sharable financial pressure
• Non-Shareable involves some sort of embarrassment,
shame or disgrace
• It is the first motivation for crime
• A person may have financial problem that cannot be solved
through legitimate means
Consideration for illegal acts such as stealing cash or falsifying a
financial statement as a way to solve problem
It can be deep personal debt or a job/business is in jeopardy e.g.
Desire for status symbol eg. Big house, nicer car; need to meet
productivity targets; drug or gambling addition or inability to
pay bills ( See the Enron Case Study)
It can sexual addiction and importance of status
www.elsamconsult.com 16
Causes of Fraud (Pressure/Incentive)
E
M
A
C
• It is a perceived opportunity defining method by
which crime can be committed
• Involves uses of position of trust to solve financial
problems
• It is critical that the fraudster be able to solve
problem in secret since motivation is over the
status
• Always the fraudster will act in secret e.g. forcing
bank reconciliation to balance if he had paid a
cheque to oneself ( See a case of TV show)
www.elsamconsult.com 17
Causes of fraud (Opportunity)
E
M
A
C
• Not applicable to professional fraudsters or
predatory employees ( employees taking job
with intent to stealing from the employer)
• Rationalization is only necessary for first
commitment of fraud and afterwards it is
abandoned
www.elsamconsult.com 18
Fraud Triangle - Limitations
E
M
A
C
• Reduce pressures on employees that might push
them to committing fraud
• Reduced perceived opportunities to commit fraud
• Dispel rationalization for engaging in fraudulent
conduct
• Sanctions does not work, why
Fraudsters never think that they can be caught in a
perceived opportunity
Fraudsters always rationalize their conduct
Sanctions are only secondary consideration
www.elsamconsult.com 19
Fraud Triangle-Deterrence measures
E
M
A
C
20
Types of fraud
Fraudulent
Financial
Reporting
Asset
Misappropriation
Other
Questionable
or Improper
Business
Practices
 Manipulation, falsification/alteration of records
or documents
 Misappropriation of assets
 Suppression or omission of the effect of
transaction from records or documents
 Recording transaction without substance
 Misapplication of accounting principles
 These can be elaborated on this
presentation
E
M
A
C
www.elsamconsult.com 21
Types of Internal Fraud
E
M
A
C
• Aggressive application of accounting codes
• Information provided unwillingly or after unreasonable
delay
• Unsupported transactions
• Fewer confirmation responses
• Evidence of unduly lifestyle by officers or employees
• Long outstanding imprest balances
• Poor documentation
• False & improper entries in records
• Unauthorized payments
• Unauthorized use of corporate assets
• Misapplication of funds
www.elsamconsult.com 22
Fraud Indicators (Red Flags)
E
M
A
C
Undue secrecy
• Questionable practices
• Significant manager or director transactions
• Drop of sales or earnings
• Aggressive accounting treatment
• Posting of transactions to headquarters
• Receipt of poor quality goods
• Related party arrangements
• Weak security checks for employees
• Delay in submission of reports
www.elsamconsult.com 23
Fraud Indicators (Red Flags)
E
M
A
C
• Flouting directives and regulations
• Personal interest
• Uncorrected entries and stock adjustments
• High fly management decisions
• Incompatible functions done by one person
• Misuse of computer for private business
• Frequent use of allocated issue voucher even
when the system is available
• Questionable system adjustments
www.elsamconsult.com 24
Fraud indicators (Red flags)
E
M
A
C
• Unauthorized transactions
• Cash shortages
• Unexplained variation in prices
• Missing documentation
• Excessive refunds
• Living beyond ones means
• Drug and alcoholic abuse
• High personal debt/loses
• Compulsive gambling/stock speculation
• Risk of increase IT, increases the risk of
manipulation, access control
www.elsamconsult.com 25
Fraud Indicators
E
M
A
C
• Management Environment
Pressure
Management style and attitude
• Competitive and business environment
e.g. technology
• Employee relationship ( spouse
receiving non competitive contract)
• Attractive assets
• Internal controls
• Lack of separation of duties
• Too much trust placed on few
employees
www.elsamconsult.com 26
Fraud Indicators
E
M
A
C
www.elsamconsult.com 27
Fraud Risk Indicators
E
M
A
C
www.elsamconsult.com 28
Common Red-Flags
E
M
A
C
www.elsamconsult.com 29
Red Flags Data
E
M
A
C
• Although the level of fraud risk at an
organisation may be assessed as low,
individuals in the business can have a
personal motivation to commit fraud
– Personal pressures
– Individual performance targets
– Infiltration by organised crime
• Controls may be overridden or ignored
by certain individuals:
– Powerful (overrides controls, staff intimidated)
– Successful (not to be bothered, too busy earning money)
– Trusted (responsibility has moved beyond their job description)
www.elsamconsult.com 30
Personal Fraud indicators
E
M
A
C
www.elsamconsult.com 31
Managing Fraud -Forces
Entity Governance and Responsibility
Code of
Ethics
Staff Regulations
Director &
Officer
Liability
Internal
Audit
Risk
Management
Business Plan
and Budget Procurement
and Finance Acts
Customer
Service
Surveys
Stakeholders
pressures
Reputation
and
Credibility
E
M
A
C
• Rapid increase of activities Weak competition
• Rapidly growing sales
• Relatively high profitability
• ….. In such an environment, effective anti-fraud
measures can be ascribed low priority or be
undetected because the current level of profitability
allows for fraud losses to be absorbed within existing
profit margins.
• …. Consider tough times ahead…. More competition,
changing government regulations?
www.elsamconsult.com 32
Business environment
E
M
A
C
Elements of Fraudster
 Makes false representation or willful omission
regarding a material fact.
 The fraudster knew the representation was false.
 The target relied on this misappropriation.
 The victim suffered damages or incurred a loss
E
M
A
C
Fraudster
The analysis of the constantly changing nature of
fraudster can held organizations stiffen their
defenses against fraud
A typical fraudster is 35 to 45 years of age
Employed in an executive
Finance operations
Sales and marketing
Six years of employment
Intelligent and passionate of work
E
M
A
C
Characteristics of a Fraudster
 Likely to be married.
 Member of a church or mosque
 Educated beyond high school.
 No arrest record.
 Age range from teens to over 60.
 Socially conforming.
 Employment tenure from 1 to 20 years.
 Acts alone 70% of the time.
 Growing use of technology
E
M
A
C
Characteristics of a Fraudster
 First-time offenders.
 Losses from fraud caused by managers and executives
were 3.5 times greater than those caused by non-
managerial employees.
 Losses caused by men were 3 times those caused by
women. [53% males; 47% females]
 Losses caused by perpetrators 60 and older were 27 times
those caused by perpetrators 25 or younger.
 Losses caused by perpetrators with post-graduate
degrees were more than 3.5 times greater than those
caused by high school graduates.
E
M
A
C
Characteristics of a Fraudster
Yesterday, today and tomorrow Egotistical
 Risk taker
 Hard Worker
 Greedy
 Disgruntled or a
complainer
 Overwhelming desire
for personal gain
 Pressured to perform
Management frequently regards fraud risk as a single dot on the risk matrix,
not always fully appreciating its real nature and extent
E
M
A
C
Characteristics of Fraudster
E
M
A
C
Characteristics of Fraudster
Impact of collusion
It account 29% of known fraud
It is insiders who take the lead, since they tend to identify the
opportunity and to know the soft spots of the company’s
defense
More than 42% of fraudsters had worked with the company
more than six years
Collusion cannot be present when people act alone
Most detection is mostly from informal tip off by 22% and
formal whistle blowing by 19%
Cyber fraud is mostly perpetrated by collusion
We expect employees and managers managing fraud opportunities to continue to
threaten companies future
E
M
A
C
www.elsamconsult.com 40
Where the fraudster works?
E
M
A
C
www.elsamconsult.com 41
Which source of fraud type?
E
M
A
C
June 2013, Corruption swallows 25% of Africa GDP
according to World Bank survey. Africa loses $148
billion annually because of corruption, a survey
by World Bank has indicated
Corruption to increase costs of achieving the UN
millennium Development Goals on water and
sanitation by US $148 billion
www.elsamconsult.com 42
Astonishing facts
E
M
A
C
Tips for fraud Specialist
“Finding fraud is like trying to load frogs on to a
wheelbarrow.”
To be a forensic auditor, you have to have a knowledge of fraud,
what fraud looks like, how it works, and how and why people
steal. Source: Robert J. Lindquist
"Finding fraud is like using a metal detector at a city dump to
find rare coins. You're going to have a lot of false hits."
- D. Larry Crumbley
“Fraud can be best prevented by good people asking the right
questions at the right time.”
- Michael J. Comer
E
M
A
C
Tips for Fraud Specialists
Changing techniques
1. Tips from employees (26.3%).
2. By accident (18.8%).
3. Internal audit (18.6%).
4. Internal controls (15.4%).
5. External audits (11.5%).
6. Tips from customers (8.6%).
7. Anonymous tips (6.2%).
8. Tips from vendors (5.1%).
Therefore, 46.2% from tips.
E
M
A
C
Tips for Fraud Specialist
1. Strong Internal Controls (1.62)
2. Background checks of new employees (3.70)
3. Regular fraud audit (3.97)
4. Established fraud policies (4.08)
5. Willingness of companies to prosecute (4.47)
6. Ethical training for employees (4.86)
7. Anonymous fraud reporting mechanisms (5.02)
8. Workplace surveillance (6.07)
1 = Most effective
8 = Least effective
Source: 2002 Wells Report
E
M
A
C
Tips for Fraud Specialist
 Assume there may be wrong doing.
 The person may not be truthful.
 The document may be altered.
 The document may be a forgery.
 Officers may override internal
controls.
 Try to think like a crook.
 Think outside the box.
E
M
A
C
Tips for Fraud Specialist
According to KPMG, typically, a fraudster
is perceived as someone who is greed and
deceitful by nature. However, as this
analysis reveals, many fraudsters work
within entities for several years without
committing any fraud, before an
influencing factor-financial worries, job
dissatisfaction, aggressive targets, or
simply an opportunity to commit fraud-
tips the balance
E
M
A
C
What are they?
1. Reviewed and Strengthening of internal controls
2. Periodic compliance audit
3. Employee hotline
4. Appointed compliance personnel
5. Establish and implement code of conduct for all
employees
6. Conducted background check for hires with budgetary
responsibility
7. Instituted fraud awareness training
8. Tied employee evaluations to ethics or compliance
objectives
What is your answer on the above from 0-10
www.elsamconsult.com 48
Do we have any fraud mitigation?
E
M
A
C
Iceberg Theory of Fraud
EMAC 49
Covert Aspects
Attitudes
Feelings (Fear, Anger, etc.)
Values
Norms
Interaction
Supportiveness
Satisfaction
Overt Aspects
Hierarchy
Financial Resources
Goals of the Organization
Skills and Abilities of Personnel
Technological State
Performance Measurement
Behavioral
Considerations
Water line
Structural
Considerations
The Iceberg Theory of Fraud
E
M
A
C
www.elsamconsult.com 50
Fraud Risk Management Techniques
Management
Internal Audit Internal Controls Whistle-blowing
Reliance
?
E
M
A
C
Fraud risk identification
Fraud risk assessment
Similar Procedures used in the
ERM process discussed
previously
www.elsamconsult.com 51
Fraud Risk Identification and
Assessment process
E
M
A
C
www.elsamconsult.com 52
What is fraud risk identification
E
M
A
C
www.elsamconsult.com 53
What is fraud risk assessment
E
M
A
C
www.elsamconsult.com 54
Fraud Risk Assessment
E
M
A
C
www.elsamconsult.com 55
Source of Date to Assess Fraud Risks
E
M
A
C
www.elsamconsult.com 56
Anti Fraud Programs
E
M
A
C
www.elsamconsult.com 57
Building blocks in Fraud Management
E
M
A
C
• Good controls on paper are not strictly
followed in practice
• Grey areas in the rules – open to
interpretation
• Lack of segregation of duties
• Collusion
• Management override
• Failure of senior management to lead by
example
• Bureaucracy &/or formulaic compliance
• Failure to share knowledge of fraud
experience, control weaknesses and
control improvements
• Clash of cultures
www.elsamconsult.com 58
Controls Barriers
E
M
A
C
www.elsamconsult.com 59
Objectives of Fraud Risk
Management
Prevention
Detection
Response
controls designed
to reduce the risk of
fraud and
misconduct from
occurring in the first
place
controls
designed to
discover fraud
and misconduct
when it occurs
controls
designed to take
corrective action
and remedy the
harm
caused by fraud
or misconduct
appropria
tely if
discovere
d
occurrence
fraud and
misconduct
Fraud Risks Management - Measures
www.elsamconsult.com 60
Detect
Respond
Prevent
Fraud Risk Management - components
www.elsamconsult.com 61
E
M
A
C
• Before an organisation can develop an effective program to
prevent and detect fraud, it must first understand the types of
fraud risk, including specific types of frauds and schemes, to
which it may be vulnerable.
www.elsamconsult.com 62
Fraud risk assessment
Likelihood
Significance/Impact
Qualitative factors in the assessment include:
• the accounting system
• complexity, volume and nature of
transactions
• internal controls in place
• compliance, training and monitoring
Incorporates the views of:
• management;
• control functions;
• line employees
Management are then able to:
• Prioritise identified risks and evaluate the existing controls
• Link each risk to specific controls and commit resources to implement
any enhancements
E
M
A
C
Surveys suggest that:
1. Over 50% of frauds are discovered as a result
of information provided by staff
2. Losses after an introduction of a whistle-
blowing hotline can be reduced by up to 60%.
3. Staff prefer the following reporting channels:
 57%: a telephone hotline;
 20%: conventional mail; and
 16%: e-mail.
www.elsamconsult.com 63
Fraud Risk Management Experiences
Source: 2006 ACFE Report to the Nation on Occupational Fraud & Abuse
E
M
A
C
www.elsamconsult.com 64
FRM – Hotline best practices
Confidentiality
Anonymity
Availability
Assistance –
Real Time
Procedures
Classify & Notify
Communicate
All matters treated confidentially; reported on a need
to know basis
Process should allow for anonymous submission &
resolution
Should be available in remote outposts, not just head
office
A ‘live’ response – operators need to be qualified,
trained & able to provide advice
Consistent protocols to gather information and manage
the call
Qualified staff assess the allegation; protocols establish
basis for escalation & investigation
Publicise the hotline prominently; commit to, & test for,
non-retaliation
E
M
A
C
www.elsamconsult.com 65
FRM - Response
• Objective is to take corrective action & remedy the
harm caused by fraud or misconduct:
• Examine the primary cause of the control
breakdown, ensuring that risk is mitigated and controls
are strengthened.
• Discipline those involved in the inappropriate
actions, as well as those in management positions
who failed to detect or prevent such events.
• Communicate to the wider population of employees
that management took appropriate, responsive
action.
E
M
A
C
Consideration should be
given to:
• Data and information gathering;
• Interviewing techniques;
• Appropriate resource;
• Analytical tools such as data mining; and
• Organisation intelligence information.
• My first fraud investigation Video
www.elsamconsult.com 66
FRM - Basis of Investigation
E
M
A
C
• Once the symptoms of fraud are found
and additional tests have indicated that
there is a strong possibility of fraud, the
review enters the formal investigation
phase
• Investigator must know;
Results of investigation can be used later
as an educational tools for auditors,
fraud investigators and other employees
(See a Case of Forensic Accountant)
www.elsamconsult.com 67
Fraud investigation
E
M
A
C
• Briefing management, followed by terms of reference
detailing the initial scope of work
• Communication with parties involved e.g. Internal
audit, audit committee and accounting staff
• Determining the extent of fraud
• Interviewing the defrauder ( only if fraud is known
with certainty)
• Investigating the known area with detailed audit test.
E.g. Procurement tendering, wages, cash debtors and
stock, payroll
• Report to the management on the findings, with
copies to interested parties e.g. Internal auditor, audit
committee.
www.elsamconsult.com 68
Fraud investigation- stages
E
M
A
C
• Circumstances which led to
investigation
• Fraud discovered and their extent
• Identity of the defrauder
• Effects on the reported profit of the
past period
• Effects on f/s of current periods
www.elsamconsult.com 69
Investigation – details of report
E
M
A
C
• IC weakness which allowed the fraud
and recommendations for eliminating
them
• Report of any interviewing with the
defrauder, including offers of restitution
etc, which may be relevant to
management in deciding what action, if
any they should take against him/her
• If there is any suggestion that the
internal auditors has been negligent the
extent of claim against him.
www.elsamconsult.com 70
Investigation – details of report
E
M
A
C
Investigator should
Consider the potential effects in F/s
Where the fraud is material the
auditor should modify the audit
procedures so as to perform
procedures appropriate to
circumstances depending on the type
of the fraud/error suspected, the
likelihood of their occurrence and
extent of damage in the F/swww.elsamconsult.com 71
Action upon proof of fraud or error
E
M
A
C
• If some proof of fraud exists,
management has several options
Cause a deeper audit to be done if
amount of loss appears substantial
Terminate employee responsible if loss
is minimal
File a claim to recover a loss from
clients fidelity insurance agent
Arrange with law enforcement agents
to probe into the matter
www.elsamconsult.com 72
Action upon proof of fraud or
error
E
M
A
C
• If some proof of fraud exists, management has
several options
Engage a private investigator to probe
into the loss and document it for claim
purpose/prosecution
Disregard losses if minimal and tighten
controls
Alert the directors, audit committees or
the Board
www.elsamconsult.com 73
Action upon proof of fraud or
error
E
M
A
C
• Strong internal Control System is not a
warrant from fraud
Entityshould have an effective anti-fraud and
corruption strategy which is aimed at
encouraging prevention, promote early
detection and respond to concern raised
Awareness programs to employees
Screening job applicants
Sound corporate policy on fraud
AVOID atmosphere of distrust and paranoia
by over-emphasising fraud deterrence
measures.www.elsamconsult.com 74
Fraud deterrence measures
E
M
A
C
• Management should ensure enforcement of
compliance with operations SOPs
• Risk management function should be embedded in
business activities
• Internal audit should be proactively risk based
www.elsamconsult.com 75
Fraud Deterrence –three lines of defense
E
M
A
C
• It is important to stick to facts, and
to discount hearsay, rumour, or
opinion and record what is relevant
to the cause of the incident and its
effect
• Audit reports on fraud and other
improprieties should be addressed to
the right person who can take action
www.elsamconsult.com 76
Fraud Risk Reporting
E
M
A
C
Report must contain all details of fraud
Must provide framework to analyse the fraud case
Must enable the user to develop improved
management and security policies and detect and
prevent fraud.
Investigation and reporting should proceed in such
a way that the outcome will be litigated. Recording
exact times, data, names of person and specific;
description of evidence are critical in civil or
criminal investigation or litigation
www.elsamconsult.com 77
Fraud reporting
E
M
A
C
Managing Fraud is
Your professional Responsibility
Management Commitment
Recognize Relevant Fraud Schemes
Identify High Key Risk indicators
Establish Prevention/Detection /Responsive Measures
www.elsamconsult.com 78
Conclusion
E
M
A
C
PRMIA
GARP
IRM
PERI
www.elsamconsult.com 79
Sources of Learning

More Related Content

What's hot

Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeArianto Muditomo
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in bankssathyananda prabhu
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managersrickycfe
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Tahir Abbas
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiEMAC Consulting Group
 
Anti Money Laundering Presentation
Anti Money Laundering PresentationAnti Money Laundering Presentation
Anti Money Laundering PresentationAudrius Sapola
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud InvestigationSalih Islam
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...Eneni Oduwole
 
Anti Money Laundering
Anti Money LaunderingAnti Money Laundering
Anti Money LaunderingTaha Khan
 
7 keys to fraud prevention
7 keys to fraud prevention7 keys to fraud prevention
7 keys to fraud preventionRon Steinkamp
 
Types of fraud in Accounting
Types of fraud in AccountingTypes of fraud in Accounting
Types of fraud in AccountingMuhammad Qasim
 
Chapter 8 aml and ctf
Chapter 8   aml and ctfChapter 8   aml and ctf
Chapter 8 aml and ctfQuan Risk
 
Chapter 2 internal control
Chapter 2 internal controlChapter 2 internal control
Chapter 2 internal controlDr Manu H Natesh
 
operations risk management power point presentation.
operations risk management power point presentation.operations risk management power point presentation.
operations risk management power point presentation.Miyelani Shibambo
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingCase IQ
 

What's hot (20)

Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good Practice
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud Prevention
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in banks
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managers
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2,
 
Financial Statement Fraud
Financial Statement FraudFinancial Statement Fraud
Financial Statement Fraud
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part ii
 
Anti Money Laundering Presentation
Anti Money Laundering PresentationAnti Money Laundering Presentation
Anti Money Laundering Presentation
 
Aml cft training programme
Aml cft training programmeAml cft training programme
Aml cft training programme
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud Investigation
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...
 
Anti Money Laundering
Anti Money LaunderingAnti Money Laundering
Anti Money Laundering
 
Red flags fraud
Red flags fraudRed flags fraud
Red flags fraud
 
Money laundering
Money launderingMoney laundering
Money laundering
 
7 keys to fraud prevention
7 keys to fraud prevention7 keys to fraud prevention
7 keys to fraud prevention
 
Types of fraud in Accounting
Types of fraud in AccountingTypes of fraud in Accounting
Types of fraud in Accounting
 
Chapter 8 aml and ctf
Chapter 8   aml and ctfChapter 8   aml and ctf
Chapter 8 aml and ctf
 
Chapter 2 internal control
Chapter 2 internal controlChapter 2 internal control
Chapter 2 internal control
 
operations risk management power point presentation.
operations risk management power point presentation.operations risk management power point presentation.
operations risk management power point presentation.
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
 

Viewers also liked

The Five Graphs of Finance - Philip Rathle and Emil Eifrem @ GraphConnect NY ...
The Five Graphs of Finance - Philip Rathle and Emil Eifrem @ GraphConnect NY ...The Five Graphs of Finance - Philip Rathle and Emil Eifrem @ GraphConnect NY ...
The Five Graphs of Finance - Philip Rathle and Emil Eifrem @ GraphConnect NY ...Neo4j
 
Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update WebinarcVidya Networks
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...Stefano Maria De' Rossi
 
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"Vivastream
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abusesharing notes123
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...FT Partners / Financial Technology Partners
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Accounting information system
Accounting information systemAccounting information system
Accounting information systemVivek K. Singh
 
Swift Programming Language
Swift Programming LanguageSwift Programming Language
Swift Programming LanguageGiuseppe Arici
 

Viewers also liked (19)

The Five Graphs of Finance - Philip Rathle and Emil Eifrem @ GraphConnect NY ...
The Five Graphs of Finance - Philip Rathle and Emil Eifrem @ GraphConnect NY ...The Five Graphs of Finance - Philip Rathle and Emil Eifrem @ GraphConnect NY ...
The Five Graphs of Finance - Philip Rathle and Emil Eifrem @ GraphConnect NY ...
 
Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update Webinar
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
 
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
 
E Fraud
E FraudE Fraud
E Fraud
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
2g scam ppt
2g scam ppt2g scam ppt
2g scam ppt
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Accounting information system
Accounting information systemAccounting information system
Accounting information system
 
Swift Programming Language
Swift Programming LanguageSwift Programming Language
Swift Programming Language
 

Similar to Fraud risk management training - Elsam Management Consultants

Fraud Management ppt.pptx
Fraud Management ppt.pptxFraud Management ppt.pptx
Fraud Management ppt.pptxjaramulat
 
09/16/2009 Meeting - Fraud In A Downturn
09/16/2009 Meeting - Fraud In A Downturn09/16/2009 Meeting - Fraud In A Downturn
09/16/2009 Meeting - Fraud In A Downturnacfesj
 
"Lucky 13" Fraud Prevention Considerations
"Lucky 13" Fraud Prevention Considerations"Lucky 13" Fraud Prevention Considerations
"Lucky 13" Fraud Prevention ConsiderationsSkoda Minotti
 
Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionZeeshan Shahid
 
McKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's MissMcKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's MissMcKonly & Asbury, LLP
 
AML Meets ABC Webinar Deck 2-19-14
AML Meets ABC Webinar Deck 2-19-14AML Meets ABC Webinar Deck 2-19-14
AML Meets ABC Webinar Deck 2-19-14ACFCS
 
What You Need to Know About Occupational Fraud in Government - 2014
What You Need to Know About Occupational Fraud in Government - 2014What You Need to Know About Occupational Fraud in Government - 2014
What You Need to Know About Occupational Fraud in Government - 2014Ron Steinkamp
 
Fraud Protection Final 2 hour CPE- Hazan 122815
Fraud Protection Final 2 hour CPE- Hazan 122815 Fraud Protection Final 2 hour CPE- Hazan 122815
Fraud Protection Final 2 hour CPE- Hazan 122815 Steve Hazan
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...Ron Steinkamp
 
Understanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskUnderstanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskSantosh Pande
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
Workshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTXWorkshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTXshwetadarak
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010annmarieboyd
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010annmarieboyd
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and ReportingBrown Smith Wallace
 
New age of risk for contractors slide presentation
New age of risk for contractors slide presentationNew age of risk for contractors slide presentation
New age of risk for contractors slide presentation1paramount
 
Public Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIAPublic Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIARon Steinkamp
 
Public Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGAPublic Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGARon Steinkamp
 

Similar to Fraud risk management training - Elsam Management Consultants (20)

Fraud Management ppt.pptx
Fraud Management ppt.pptxFraud Management ppt.pptx
Fraud Management ppt.pptx
 
09/16/2009 Meeting - Fraud In A Downturn
09/16/2009 Meeting - Fraud In A Downturn09/16/2009 Meeting - Fraud In A Downturn
09/16/2009 Meeting - Fraud In A Downturn
 
"Lucky 13" Fraud Prevention Considerations
"Lucky 13" Fraud Prevention Considerations"Lucky 13" Fraud Prevention Considerations
"Lucky 13" Fraud Prevention Considerations
 
Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
 
Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detection
 
McKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's MissMcKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's Miss
 
AML Meets ABC Webinar Deck 2-19-14
AML Meets ABC Webinar Deck 2-19-14AML Meets ABC Webinar Deck 2-19-14
AML Meets ABC Webinar Deck 2-19-14
 
What You Need to Know About Occupational Fraud in Government - 2014
What You Need to Know About Occupational Fraud in Government - 2014What You Need to Know About Occupational Fraud in Government - 2014
What You Need to Know About Occupational Fraud in Government - 2014
 
Fraud Protection Final 2 hour CPE- Hazan 122815
Fraud Protection Final 2 hour CPE- Hazan 122815 Fraud Protection Final 2 hour CPE- Hazan 122815
Fraud Protection Final 2 hour CPE- Hazan 122815
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
 
Ocupacional Fraud.pptx
Ocupacional Fraud.pptxOcupacional Fraud.pptx
Ocupacional Fraud.pptx
 
Understanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskUnderstanding & Managing Fraud Rrisk
Understanding & Managing Fraud Rrisk
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Workshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTXWorkshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTX
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting
 
New age of risk for contractors slide presentation
New age of risk for contractors slide presentationNew age of risk for contractors slide presentation
New age of risk for contractors slide presentation
 
Public Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIAPublic Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIA
 
Public Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGAPublic Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGA
 

More from EMAC Consulting Group

Project risk management notes bagamoyo 12.10.2017 final v1
Project risk management  notes bagamoyo 12.10.2017 final v1Project risk management  notes bagamoyo 12.10.2017 final v1
Project risk management notes bagamoyo 12.10.2017 final v1EMAC Consulting Group
 
Contracts risk management notes bagamoyo 2.12.2017 final v1
Contracts risk management  notes bagamoyo 2.12.2017 final v1Contracts risk management  notes bagamoyo 2.12.2017 final v1
Contracts risk management notes bagamoyo 2.12.2017 final v1EMAC Consulting Group
 
Comprehensive audit committee training emac
Comprehensive audit committee training emacComprehensive audit committee training emac
Comprehensive audit committee training emacEMAC Consulting Group
 
Advanced Risk Management - Elsam Management Consultants
Advanced Risk Management - Elsam Management ConsultantsAdvanced Risk Management - Elsam Management Consultants
Advanced Risk Management - Elsam Management ConsultantsEMAC Consulting Group
 
Ipsas training part ii differences btn ipsas and ifrs
Ipsas training part ii differences btn ipsas and ifrsIpsas training part ii differences btn ipsas and ifrs
Ipsas training part ii differences btn ipsas and ifrsEMAC Consulting Group
 
Assurance engagement and prospective financial information 2
Assurance engagement and prospective financial information 2Assurance engagement and prospective financial information 2
Assurance engagement and prospective financial information 2EMAC Consulting Group
 
Financial markets and financial instruments
Financial markets and financial instrumentsFinancial markets and financial instruments
Financial markets and financial instrumentsEMAC Consulting Group
 
Analyitical review procedures and going concern
Analyitical review procedures and going concernAnalyitical review procedures and going concern
Analyitical review procedures and going concernEMAC Consulting Group
 
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDITFRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDITEMAC Consulting Group
 
Audit Question And Answer Book 2008 3
Audit Question And Answer Book 2008 3Audit Question And Answer Book 2008 3
Audit Question And Answer Book 2008 3EMAC Consulting Group
 

More from EMAC Consulting Group (20)

Project risk management notes bagamoyo 12.10.2017 final v1
Project risk management  notes bagamoyo 12.10.2017 final v1Project risk management  notes bagamoyo 12.10.2017 final v1
Project risk management notes bagamoyo 12.10.2017 final v1
 
Contracts risk management notes bagamoyo 2.12.2017 final v1
Contracts risk management  notes bagamoyo 2.12.2017 final v1Contracts risk management  notes bagamoyo 2.12.2017 final v1
Contracts risk management notes bagamoyo 2.12.2017 final v1
 
Talent Management
Talent ManagementTalent Management
Talent Management
 
Comprehensive audit committee training emac
Comprehensive audit committee training emacComprehensive audit committee training emac
Comprehensive audit committee training emac
 
Ifrs for pensions schemes emac
Ifrs for pensions schemes emacIfrs for pensions schemes emac
Ifrs for pensions schemes emac
 
Advanced Risk Management - Elsam Management Consultants
Advanced Risk Management - Elsam Management ConsultantsAdvanced Risk Management - Elsam Management Consultants
Advanced Risk Management - Elsam Management Consultants
 
Ipsas training part iii final
Ipsas training part iii  finalIpsas training part iii  final
Ipsas training part iii final
 
Ipsas training part ii differences btn ipsas and ifrs
Ipsas training part ii differences btn ipsas and ifrsIpsas training part ii differences btn ipsas and ifrs
Ipsas training part ii differences btn ipsas and ifrs
 
Ipsas training part i overview
Ipsas training part i   overviewIpsas training part i   overview
Ipsas training part i overview
 
Fraud risk management
Fraud risk management Fraud risk management
Fraud risk management
 
Assurance engagement and prospective financial information 2
Assurance engagement and prospective financial information 2Assurance engagement and prospective financial information 2
Assurance engagement and prospective financial information 2
 
Management audit sako
Management audit sakoManagement audit sako
Management audit sako
 
Financial markets and financial instruments
Financial markets and financial instrumentsFinancial markets and financial instruments
Financial markets and financial instruments
 
Analyitical review procedures and going concern
Analyitical review procedures and going concernAnalyitical review procedures and going concern
Analyitical review procedures and going concern
 
Audit of contracts version 2
Audit of contracts version 2Audit of contracts version 2
Audit of contracts version 2
 
Contract audit
Contract auditContract audit
Contract audit
 
Value for money audit
Value for money auditValue for money audit
Value for money audit
 
Financial audit
Financial auditFinancial audit
Financial audit
 
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDITFRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
 
Audit Question And Answer Book 2008 3
Audit Question And Answer Book 2008 3Audit Question And Answer Book 2008 3
Audit Question And Answer Book 2008 3
 

Recently uploaded

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Fraud risk management training - Elsam Management Consultants

  • 1. E M A C Fraud Risk Management www.elsamconsult.com 1 Part II ADVANCED RISK MANAGEMENT WORKSHOP STELLA MARIS HOSTEL Bagamoyo 9TH -11TH April,2014
  • 2. E M A C Operational Risk Nature of fraud risk- Operational Risks What is fraud and fraud risk? Necessity of anti-fraud training Fraud risk factors Group exercise: fraud risk factors or 3 Cs www.elsamconsult.com 2 Coverage
  • 3. E M A C • Operational risk attaches itself to people, systems and process • Operational risk is the risk of loss resulting from inadequate or failed internal processes, people and systems or from external events. • It includes other risks such as legal risks, physical risks, political risks and environmental risks • Fraud is part of operational risk in any organization Internal fraud such as tax evasion, assets misappropriation, bribery, corruption and larceny External fraud such as theft, forgery, hacking and information theft www.elsamconsult.com 3 Introduction
  • 4. E M A C Credit Risk Market Risk Operation al Risk Complianc e Risk Informati on Risk Data Risk Other Risk Basic Strategic ERM Integrated www.elsamconsult.com 4 Evolution of Operational Risk
  • 5. E M A C • Joint McKinsey finds have shown that risk management has not been able to prove its value to organization • Operational risk is seen as immature discipline that has often not proven its value to organization • There is evidence that operational risk can be destructive as market loose faith in management and control following large events (Enron Case) • The discipline is focused more on measurement than on management www.elsamconsult.com 5 Perception on operational Risk
  • 6. E M A C “obtaining a comprehensive measure of fraud’s financial impact is challenging, if not impossible due to the fact that fraud inherently involves efforts at concealment. Many fraud cases will never be detected, and of those that are, the full amount of losses might never be determined or reported. Consequently, any attempt to quantify the extent of all fraud losses will be, at best, an estimate” www.elsamconsult.com 6 Why is Fraud a Major Operational Risk
  • 8. E M A C • Fraud is a broad legal concept that generally refers to an intentional act committed to secure an unfair or unlawful gain. • Misconduct is also a broad concept, generally referring to violations of laws, regulations, internal policies, and market expectations of ethical business conduct. • It is an intentional act by one or more individuals among management , those charged with governance, employee or third parties involving the use of deception to obtain an unjust or illegal advantage www.elsamconsult.com 8 What is fraud?
  • 9. E M A C Fraud is any intentional act or omission designed to deceive others, resulting in the victim suffering loss and/ or the perpetrator achieving a gain. ACFE Corruption is the abuse of public or private office for personal gain. It includes acts of bribery, embezzlement, nepotism or state capture. It is often associated with and reinforced by other illegal practices such as bid rigging, fraud or money laundering. OECDwww.elsamconsult.com 9 What is fraud? Perspectives ..
  • 10. E M A C Fraud is …. Fraud is not ….. Intentional Taken by physical force To trick or deceive someone out of his/her assets Victimless Theft Insignificant because no one is hurt A crime Acceptable or justifiable www.elsamconsult.com 10 Characteristics of Fraud
  • 11. E M A C Fraud commonly includes activities such as theft, corruption, conspiracy, embezzlement, money laundering, bribery and extortion. It involves using deception to dishonestly make a personal gain for oneself and / or create a loss for another. www.elsamconsult.com 11 Scope of Fraud
  • 12. E M A C • Pressure on employee to misappropriate cash or organizational assets • Employees/people committing fraud are not career criminals, they are trusted employees • Dr. Donald Cressey, a criminologist developed a model to get reasons for why people in trust commit fraud (Case Study II) • Model is referred as fraud triangle www.elsamconsult.com 12 Why people commit fraud?
  • 13. E M A C • Most of fraudsters are first time offenders with no criminal past and therefore don’t view themselves as criminals (See Arthur Andersen case) • They must always justify the crime in a way that makes it an acceptable and justifiable act (rationalization) e.g. I was underpaid, my employer cheated me, my employer is dishonest, I was entitled to the money or I was only borrowing money. www.elsamconsult.com 13 Causes of Fraud - Rationalization
  • 14. E M A C Fraud Pressure or Incentive Rationalizati on Opportunity www.elsamconsult.com 14 What causes fraud?- Fraud Triangle All the three factors must be present for fraud to occur, if any one of the three is missing, fraud will not occur
  • 15. E M A C www.elsamconsult.com 15 Why fraud happens? Fraud Need/ Rationalization •Every one Does it •Simply borrow -money Pressure Unrealistic Corporate Target can Force Employees to Commit fraud Opportunity- due to weak And override of controls
  • 16. E M A C • It is a perceived non-sharable financial pressure • Non-Shareable involves some sort of embarrassment, shame or disgrace • It is the first motivation for crime • A person may have financial problem that cannot be solved through legitimate means Consideration for illegal acts such as stealing cash or falsifying a financial statement as a way to solve problem It can be deep personal debt or a job/business is in jeopardy e.g. Desire for status symbol eg. Big house, nicer car; need to meet productivity targets; drug or gambling addition or inability to pay bills ( See the Enron Case Study) It can sexual addiction and importance of status www.elsamconsult.com 16 Causes of Fraud (Pressure/Incentive)
  • 17. E M A C • It is a perceived opportunity defining method by which crime can be committed • Involves uses of position of trust to solve financial problems • It is critical that the fraudster be able to solve problem in secret since motivation is over the status • Always the fraudster will act in secret e.g. forcing bank reconciliation to balance if he had paid a cheque to oneself ( See a case of TV show) www.elsamconsult.com 17 Causes of fraud (Opportunity)
  • 18. E M A C • Not applicable to professional fraudsters or predatory employees ( employees taking job with intent to stealing from the employer) • Rationalization is only necessary for first commitment of fraud and afterwards it is abandoned www.elsamconsult.com 18 Fraud Triangle - Limitations
  • 19. E M A C • Reduce pressures on employees that might push them to committing fraud • Reduced perceived opportunities to commit fraud • Dispel rationalization for engaging in fraudulent conduct • Sanctions does not work, why Fraudsters never think that they can be caught in a perceived opportunity Fraudsters always rationalize their conduct Sanctions are only secondary consideration www.elsamconsult.com 19 Fraud Triangle-Deterrence measures
  • 20. E M A C 20 Types of fraud Fraudulent Financial Reporting Asset Misappropriation Other Questionable or Improper Business Practices  Manipulation, falsification/alteration of records or documents  Misappropriation of assets  Suppression or omission of the effect of transaction from records or documents  Recording transaction without substance  Misapplication of accounting principles  These can be elaborated on this presentation
  • 22. E M A C • Aggressive application of accounting codes • Information provided unwillingly or after unreasonable delay • Unsupported transactions • Fewer confirmation responses • Evidence of unduly lifestyle by officers or employees • Long outstanding imprest balances • Poor documentation • False & improper entries in records • Unauthorized payments • Unauthorized use of corporate assets • Misapplication of funds www.elsamconsult.com 22 Fraud Indicators (Red Flags)
  • 23. E M A C Undue secrecy • Questionable practices • Significant manager or director transactions • Drop of sales or earnings • Aggressive accounting treatment • Posting of transactions to headquarters • Receipt of poor quality goods • Related party arrangements • Weak security checks for employees • Delay in submission of reports www.elsamconsult.com 23 Fraud Indicators (Red Flags)
  • 24. E M A C • Flouting directives and regulations • Personal interest • Uncorrected entries and stock adjustments • High fly management decisions • Incompatible functions done by one person • Misuse of computer for private business • Frequent use of allocated issue voucher even when the system is available • Questionable system adjustments www.elsamconsult.com 24 Fraud indicators (Red flags)
  • 25. E M A C • Unauthorized transactions • Cash shortages • Unexplained variation in prices • Missing documentation • Excessive refunds • Living beyond ones means • Drug and alcoholic abuse • High personal debt/loses • Compulsive gambling/stock speculation • Risk of increase IT, increases the risk of manipulation, access control www.elsamconsult.com 25 Fraud Indicators
  • 26. E M A C • Management Environment Pressure Management style and attitude • Competitive and business environment e.g. technology • Employee relationship ( spouse receiving non competitive contract) • Attractive assets • Internal controls • Lack of separation of duties • Too much trust placed on few employees www.elsamconsult.com 26 Fraud Indicators
  • 30. E M A C • Although the level of fraud risk at an organisation may be assessed as low, individuals in the business can have a personal motivation to commit fraud – Personal pressures – Individual performance targets – Infiltration by organised crime • Controls may be overridden or ignored by certain individuals: – Powerful (overrides controls, staff intimidated) – Successful (not to be bothered, too busy earning money) – Trusted (responsibility has moved beyond their job description) www.elsamconsult.com 30 Personal Fraud indicators
  • 31. E M A C www.elsamconsult.com 31 Managing Fraud -Forces Entity Governance and Responsibility Code of Ethics Staff Regulations Director & Officer Liability Internal Audit Risk Management Business Plan and Budget Procurement and Finance Acts Customer Service Surveys Stakeholders pressures Reputation and Credibility
  • 32. E M A C • Rapid increase of activities Weak competition • Rapidly growing sales • Relatively high profitability • ….. In such an environment, effective anti-fraud measures can be ascribed low priority or be undetected because the current level of profitability allows for fraud losses to be absorbed within existing profit margins. • …. Consider tough times ahead…. More competition, changing government regulations? www.elsamconsult.com 32 Business environment
  • 33. E M A C Elements of Fraudster  Makes false representation or willful omission regarding a material fact.  The fraudster knew the representation was false.  The target relied on this misappropriation.  The victim suffered damages or incurred a loss
  • 34. E M A C Fraudster The analysis of the constantly changing nature of fraudster can held organizations stiffen their defenses against fraud A typical fraudster is 35 to 45 years of age Employed in an executive Finance operations Sales and marketing Six years of employment Intelligent and passionate of work
  • 35. E M A C Characteristics of a Fraudster  Likely to be married.  Member of a church or mosque  Educated beyond high school.  No arrest record.  Age range from teens to over 60.  Socially conforming.  Employment tenure from 1 to 20 years.  Acts alone 70% of the time.  Growing use of technology
  • 36. E M A C Characteristics of a Fraudster  First-time offenders.  Losses from fraud caused by managers and executives were 3.5 times greater than those caused by non- managerial employees.  Losses caused by men were 3 times those caused by women. [53% males; 47% females]  Losses caused by perpetrators 60 and older were 27 times those caused by perpetrators 25 or younger.  Losses caused by perpetrators with post-graduate degrees were more than 3.5 times greater than those caused by high school graduates.
  • 37. E M A C Characteristics of a Fraudster Yesterday, today and tomorrow Egotistical  Risk taker  Hard Worker  Greedy  Disgruntled or a complainer  Overwhelming desire for personal gain  Pressured to perform Management frequently regards fraud risk as a single dot on the risk matrix, not always fully appreciating its real nature and extent
  • 39. E M A C Characteristics of Fraudster Impact of collusion It account 29% of known fraud It is insiders who take the lead, since they tend to identify the opportunity and to know the soft spots of the company’s defense More than 42% of fraudsters had worked with the company more than six years Collusion cannot be present when people act alone Most detection is mostly from informal tip off by 22% and formal whistle blowing by 19% Cyber fraud is mostly perpetrated by collusion We expect employees and managers managing fraud opportunities to continue to threaten companies future
  • 42. E M A C June 2013, Corruption swallows 25% of Africa GDP according to World Bank survey. Africa loses $148 billion annually because of corruption, a survey by World Bank has indicated Corruption to increase costs of achieving the UN millennium Development Goals on water and sanitation by US $148 billion www.elsamconsult.com 42 Astonishing facts
  • 43. E M A C Tips for fraud Specialist “Finding fraud is like trying to load frogs on to a wheelbarrow.” To be a forensic auditor, you have to have a knowledge of fraud, what fraud looks like, how it works, and how and why people steal. Source: Robert J. Lindquist "Finding fraud is like using a metal detector at a city dump to find rare coins. You're going to have a lot of false hits." - D. Larry Crumbley “Fraud can be best prevented by good people asking the right questions at the right time.” - Michael J. Comer
  • 44. E M A C Tips for Fraud Specialists Changing techniques 1. Tips from employees (26.3%). 2. By accident (18.8%). 3. Internal audit (18.6%). 4. Internal controls (15.4%). 5. External audits (11.5%). 6. Tips from customers (8.6%). 7. Anonymous tips (6.2%). 8. Tips from vendors (5.1%). Therefore, 46.2% from tips.
  • 45. E M A C Tips for Fraud Specialist 1. Strong Internal Controls (1.62) 2. Background checks of new employees (3.70) 3. Regular fraud audit (3.97) 4. Established fraud policies (4.08) 5. Willingness of companies to prosecute (4.47) 6. Ethical training for employees (4.86) 7. Anonymous fraud reporting mechanisms (5.02) 8. Workplace surveillance (6.07) 1 = Most effective 8 = Least effective Source: 2002 Wells Report
  • 46. E M A C Tips for Fraud Specialist  Assume there may be wrong doing.  The person may not be truthful.  The document may be altered.  The document may be a forgery.  Officers may override internal controls.  Try to think like a crook.  Think outside the box.
  • 47. E M A C Tips for Fraud Specialist According to KPMG, typically, a fraudster is perceived as someone who is greed and deceitful by nature. However, as this analysis reveals, many fraudsters work within entities for several years without committing any fraud, before an influencing factor-financial worries, job dissatisfaction, aggressive targets, or simply an opportunity to commit fraud- tips the balance
  • 48. E M A C What are they? 1. Reviewed and Strengthening of internal controls 2. Periodic compliance audit 3. Employee hotline 4. Appointed compliance personnel 5. Establish and implement code of conduct for all employees 6. Conducted background check for hires with budgetary responsibility 7. Instituted fraud awareness training 8. Tied employee evaluations to ethics or compliance objectives What is your answer on the above from 0-10 www.elsamconsult.com 48 Do we have any fraud mitigation?
  • 49. E M A C Iceberg Theory of Fraud EMAC 49 Covert Aspects Attitudes Feelings (Fear, Anger, etc.) Values Norms Interaction Supportiveness Satisfaction Overt Aspects Hierarchy Financial Resources Goals of the Organization Skills and Abilities of Personnel Technological State Performance Measurement Behavioral Considerations Water line Structural Considerations The Iceberg Theory of Fraud
  • 50. E M A C www.elsamconsult.com 50 Fraud Risk Management Techniques Management Internal Audit Internal Controls Whistle-blowing Reliance ?
  • 51. E M A C Fraud risk identification Fraud risk assessment Similar Procedures used in the ERM process discussed previously www.elsamconsult.com 51 Fraud Risk Identification and Assessment process
  • 52. E M A C www.elsamconsult.com 52 What is fraud risk identification
  • 55. E M A C www.elsamconsult.com 55 Source of Date to Assess Fraud Risks
  • 58. E M A C • Good controls on paper are not strictly followed in practice • Grey areas in the rules – open to interpretation • Lack of segregation of duties • Collusion • Management override • Failure of senior management to lead by example • Bureaucracy &/or formulaic compliance • Failure to share knowledge of fraud experience, control weaknesses and control improvements • Clash of cultures www.elsamconsult.com 58 Controls Barriers
  • 59. E M A C www.elsamconsult.com 59 Objectives of Fraud Risk Management Prevention Detection Response controls designed to reduce the risk of fraud and misconduct from occurring in the first place controls designed to discover fraud and misconduct when it occurs controls designed to take corrective action and remedy the harm caused by fraud or misconduct
  • 60. appropria tely if discovere d occurrence fraud and misconduct Fraud Risks Management - Measures www.elsamconsult.com 60 Detect Respond Prevent
  • 61. Fraud Risk Management - components www.elsamconsult.com 61
  • 62. E M A C • Before an organisation can develop an effective program to prevent and detect fraud, it must first understand the types of fraud risk, including specific types of frauds and schemes, to which it may be vulnerable. www.elsamconsult.com 62 Fraud risk assessment Likelihood Significance/Impact Qualitative factors in the assessment include: • the accounting system • complexity, volume and nature of transactions • internal controls in place • compliance, training and monitoring Incorporates the views of: • management; • control functions; • line employees Management are then able to: • Prioritise identified risks and evaluate the existing controls • Link each risk to specific controls and commit resources to implement any enhancements
  • 63. E M A C Surveys suggest that: 1. Over 50% of frauds are discovered as a result of information provided by staff 2. Losses after an introduction of a whistle- blowing hotline can be reduced by up to 60%. 3. Staff prefer the following reporting channels:  57%: a telephone hotline;  20%: conventional mail; and  16%: e-mail. www.elsamconsult.com 63 Fraud Risk Management Experiences Source: 2006 ACFE Report to the Nation on Occupational Fraud & Abuse
  • 64. E M A C www.elsamconsult.com 64 FRM – Hotline best practices Confidentiality Anonymity Availability Assistance – Real Time Procedures Classify & Notify Communicate All matters treated confidentially; reported on a need to know basis Process should allow for anonymous submission & resolution Should be available in remote outposts, not just head office A ‘live’ response – operators need to be qualified, trained & able to provide advice Consistent protocols to gather information and manage the call Qualified staff assess the allegation; protocols establish basis for escalation & investigation Publicise the hotline prominently; commit to, & test for, non-retaliation
  • 65. E M A C www.elsamconsult.com 65 FRM - Response • Objective is to take corrective action & remedy the harm caused by fraud or misconduct: • Examine the primary cause of the control breakdown, ensuring that risk is mitigated and controls are strengthened. • Discipline those involved in the inappropriate actions, as well as those in management positions who failed to detect or prevent such events. • Communicate to the wider population of employees that management took appropriate, responsive action.
  • 66. E M A C Consideration should be given to: • Data and information gathering; • Interviewing techniques; • Appropriate resource; • Analytical tools such as data mining; and • Organisation intelligence information. • My first fraud investigation Video www.elsamconsult.com 66 FRM - Basis of Investigation
  • 67. E M A C • Once the symptoms of fraud are found and additional tests have indicated that there is a strong possibility of fraud, the review enters the formal investigation phase • Investigator must know; Results of investigation can be used later as an educational tools for auditors, fraud investigators and other employees (See a Case of Forensic Accountant) www.elsamconsult.com 67 Fraud investigation
  • 68. E M A C • Briefing management, followed by terms of reference detailing the initial scope of work • Communication with parties involved e.g. Internal audit, audit committee and accounting staff • Determining the extent of fraud • Interviewing the defrauder ( only if fraud is known with certainty) • Investigating the known area with detailed audit test. E.g. Procurement tendering, wages, cash debtors and stock, payroll • Report to the management on the findings, with copies to interested parties e.g. Internal auditor, audit committee. www.elsamconsult.com 68 Fraud investigation- stages
  • 69. E M A C • Circumstances which led to investigation • Fraud discovered and their extent • Identity of the defrauder • Effects on the reported profit of the past period • Effects on f/s of current periods www.elsamconsult.com 69 Investigation – details of report
  • 70. E M A C • IC weakness which allowed the fraud and recommendations for eliminating them • Report of any interviewing with the defrauder, including offers of restitution etc, which may be relevant to management in deciding what action, if any they should take against him/her • If there is any suggestion that the internal auditors has been negligent the extent of claim against him. www.elsamconsult.com 70 Investigation – details of report
  • 71. E M A C Investigator should Consider the potential effects in F/s Where the fraud is material the auditor should modify the audit procedures so as to perform procedures appropriate to circumstances depending on the type of the fraud/error suspected, the likelihood of their occurrence and extent of damage in the F/swww.elsamconsult.com 71 Action upon proof of fraud or error
  • 72. E M A C • If some proof of fraud exists, management has several options Cause a deeper audit to be done if amount of loss appears substantial Terminate employee responsible if loss is minimal File a claim to recover a loss from clients fidelity insurance agent Arrange with law enforcement agents to probe into the matter www.elsamconsult.com 72 Action upon proof of fraud or error
  • 73. E M A C • If some proof of fraud exists, management has several options Engage a private investigator to probe into the loss and document it for claim purpose/prosecution Disregard losses if minimal and tighten controls Alert the directors, audit committees or the Board www.elsamconsult.com 73 Action upon proof of fraud or error
  • 74. E M A C • Strong internal Control System is not a warrant from fraud Entityshould have an effective anti-fraud and corruption strategy which is aimed at encouraging prevention, promote early detection and respond to concern raised Awareness programs to employees Screening job applicants Sound corporate policy on fraud AVOID atmosphere of distrust and paranoia by over-emphasising fraud deterrence measures.www.elsamconsult.com 74 Fraud deterrence measures
  • 75. E M A C • Management should ensure enforcement of compliance with operations SOPs • Risk management function should be embedded in business activities • Internal audit should be proactively risk based www.elsamconsult.com 75 Fraud Deterrence –three lines of defense
  • 76. E M A C • It is important to stick to facts, and to discount hearsay, rumour, or opinion and record what is relevant to the cause of the incident and its effect • Audit reports on fraud and other improprieties should be addressed to the right person who can take action www.elsamconsult.com 76 Fraud Risk Reporting
  • 77. E M A C Report must contain all details of fraud Must provide framework to analyse the fraud case Must enable the user to develop improved management and security policies and detect and prevent fraud. Investigation and reporting should proceed in such a way that the outcome will be litigated. Recording exact times, data, names of person and specific; description of evidence are critical in civil or criminal investigation or litigation www.elsamconsult.com 77 Fraud reporting
  • 78. E M A C Managing Fraud is Your professional Responsibility Management Commitment Recognize Relevant Fraud Schemes Identify High Key Risk indicators Establish Prevention/Detection /Responsive Measures www.elsamconsult.com 78 Conclusion

Editor's Notes

  1. Basel II components
  2. The pressure here is not financial pressure but non-shareable financial pressure because every body has financial pressure, but not everybody commits fraud