SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
Super-Data Charging Your
Corruption Reviews with
Integrated Analytics
About Jim Kaplan, CIA, CFE
 President and Founder of AuditNet®,
the global resource for auditors
(available on iOS, Android and
Windows devices)
 Auditor, Web Site Guru,
 Internet for Auditors Pioneer
 IIA Bradford Cadmus Memorial
Award Recipient
 Local Government Auditor’s Lifetime
Award
 Author of “The Auditor’s Guide to
Internet Resources” 2nd Edition
Slide 1
About AuditNet® LLC
• AuditNet®, the global resource for auditors, serves the global audit
community as the primary resource for Web-based auditing content. As the first online
audit portal, AuditNet® has been at the forefront of websites dedicated to promoting the
use of audit technology.
• Available on the Web, iPad, iPhone, Windows and Android devices and
features:
• Over 2,900 Reusable Templates, Audit Programs, Questionnaires, and
Control Matrices
• Webinars focusing on fraud, data analytics, IT audit, and internal audit
with free CPE for subscribers and site license users.
• Audit guides, manuals, and books on audit basics and using audit
technology
• LinkedIn Networking Groups
• Monthly Newsletters with Expert Guest Columnists
• Surveys on timely topics for internal auditors
Introductions
Slide 2
The views expressed by the presenters do not necessarily represent the views,
positions, or opinions of AuditNet® LLC. These materials, and the oral
presentation accompanying them, are for educational purposes only and do not
constitute accounting or legal advice or create an accountant-client relationship.
While AuditNet® makes every effort to ensure information is accurate and
complete, AuditNet® makes no representations, guarantees, or warranties as to
the accuracy or completeness of the information provided via this presentation.
AuditNet® specifically disclaims all liability for any claims or damages that may
result from the information contained in this presentation, including any websites
maintained by third parties and linked to the AuditNet® website.
Any mention of commercial products is for information only; it does not imply
recommendation or endorsement by AuditNet® LLC
Slide 3
AuditNet® and cRisk Academy
If you would like forever access
to this webinar recording
If you are watching the
recording, and would like to
obtain CPE credit for this
webinar
Previous AuditNet® webinars
are also available on-demand for
CPE credit
http://criskacademy.com
http://ondemand.criskacademy.com
Use coupon code: 50OFF for a
discount on this webinar for one week
Slide 4
Richard B. Lanza, CPA, CFE, CGMA
• Director of Audit Data Analytics for Grant Thornton, LLP
• Over 25 years of ACL, Excel and other software usage
• Received the outstanding achievement in business award by the
Association of Certified Fraud Examiners for developing the publication
Proactively Detecting Fraud Using Computer Audit Reports as a
research project for the IIA
• Recently was a contributing author of:
• Detecting Corruption with Analytics: A Roadmap – The
International Institute for Analytics
• Global Technology Audit Guide (GTAG #13) Fraud In An
Automated World – Institute Of Internal Auditors.
• Cost Recovery – Turning Your Accounts Payable Department
Into A Profit Center – Wiley And Sons.
• Data Analytics: A Roadmap for Expanding Capabilities
(published 2018 in partnership with the IIA's Internal Audit
Foundation)
• In 2015, discovered a new textual analytic technique using letters
called the Lanza Approach to Letter Analytics (LALA)TM
Slide 5
The views expressed by the
presenters do not necessarily
represent the views, positions, or
opinions of Grant Thornton, LLP.
These materials, and the oral
presentation accompanyingthem,
are for educational purposes only
and do not constitute accounting
or legal advice or create an
accountant-client relationship.
rich.lanza@us.gt.com
Today’s Agenda
Explore the top internal and external data sources to
interrogate for corruption schemes.
Be able to identify the key red flags leading to corrupt
behavior and how they present themselves in data.
Learn to bolster any compliance program with data-driven
prediction and decision making analytics.
Complete a who, what, when, and where set of analytics to
hone in on the specific corruption and bribery within your
business processes.
Understand the benefits of integrating and managing a
continuous review of data sets to identify corrupt behavior.
Page 6
Defining Corruption and Associated Red Flags
What Are We Looking For?
Bribery – To influence a decision
Illegal Gratuities – To reward a decision
Economic Extortion – To coerce a decision
Conflicts of Interest – To take one's interests in a decision
8
Fraud Frequency By Type
9
©2018, Association of Certified Fraud Examiners. All rights reserved. Used by permission.
Corruption Compared to
Misappropriations
©2018, Association of Certified Fraud Examiners. All rights reserved. Used by permission.
Forget the Charts
Corruption By the Numbers
83.5% of reporting companies had an asset misappropriation
 However, this is allocated to nine misappropriation schemes
 The top scheme's frequency was 21% vs. corruption at 38%
 Some countries report corruption frequency as high as 62%
Median fraud $ for asset misappropriation - $114,000
 Corruption average was $250,000
Transparency International – Perception Index
 Nearly two-thirds fall below the midpoint of their "clean" scale
 Peter Eigen – Chairman TED Talk at https://youtu.be/XkiXXP_hycA
Forbes (http://reut.rs/2lStjHH) reported 2016 FCPA fines of $2.6B,
2nd only to the record amount collected in 2008
11
Why Is Corruption So Elusive?
Misappropriation is the taking of tangible goods
Corruption rather lives within the intangible
Influencing decisions is mostly within one's mind
Most value is transferred outside of accounting records
However, there are usually notable trails left behind
12
The Elusive Red Flags
Buyer's Perspective
Consistent winning bids to a vendor
Other vendors issuing bids later than the submission date
Over-priced / Over-purchased goods and services
Matching vendor to employee record
Low quality product or services
Non receipt of goods or services
Obsolete goods
13
How It Is Hidden - Examples
Buyer's Perspective
Solicit bids from known high-bidder entities (false competition)
Don't issue a purchase order
Split purchases among various orders to avoid PO limits
Seller allowed to update bid after review of other bidders
Purposely provide short-time frames to vendors submitting bids
Self-approve the purchase order
Approve delivery as if it occurred
14
The Elusive Red Flags
Seller's Perspective
Over-priced or unusual increases in sales
Inflated hours for service
Petty cash usage for influence payment
Gifts and entertainment to influence sales
Consulting payments made to sales facilitation organizations
Payments to customer politically exposed person (“PEP”)
Receipt of inside information
15
How It Is Hidden - Examples
Seller's Perspective
Communications among partners uses non-company based devices
Self-approve the sales order / Collusion among the sales ordering
and approving parties
Forge petty cash or gift payment request form for other purpose
General ledger adjustments to spread payment or hide it in an
unreconciled ledger account
 Consulting expenses are adjusted to other benign accounts to avoid concern
16
Data Sources To Base Analytics
The Population of Data Type
18
Structured Data
 Accounting records
 Sub ledger details
 Monthly performance
measures
Unstructured Data
 Documents (Excel, PDF,
Word)
 Emails
 Network Logs
External Data
 Geomap Service
 OFAC, SAM.Gov Watch Lists
 IRS Tax ID Match
Buyer Perspective Key Sources
Contract Management System
Purchase Order
Vendor Invoice Header
Vendor Invoice Distribution
Employee and Vendor Masterfiles
General / Nominal Ledger
Conflict of Interest Form Management
Email Server
Web Traffic Log
Meeting Room Request System
Related Party List
19
Seller Perspective Key Sources
Contract Management System
Sales Order
Approved Contract Price List
Sales Invoice Header
Sales Invoice Distribution
General / Nominal Ledger
Petty Cash Log
Travel & Entertainment System
Procurement Card History
Email Server
Web Traffic Log
Meeting Room Request System
Related Party List
20
External Data Sources To Aid Analytics
Search Anything Corporate
Page 22
Specific Business Partner
Information
Yellow Pages
 http://www.yellowpages.com/
 http://www.bbb.org/
 http://www.linkedin.com
 http://glassdoor.com
IP Address Lookup
 www.iplocation.net for Email and reverse DNS lookup
State Websites
 Business Listings and Incorporation Documents
 Unclaimed Property
 http://www.statelocalgov.net/
23
Wayback Machine
https://archive.org/web/
24
Are Vendors On a Watch List
Sam.Gov
Page 25
CIA Chiefs of State
https://www.cia.gov/library/publications/world-leaders-1/
Page 26
Power Map for Excel 2013
Page 27
Proactively Detecting Corruption
Why Proactively Review?
Fraud losses can be reduced by 65% in relation to
a management tip
Given elusive nature disparate data sets can
correlate wrongdoing
Start to build predictive models based on the past
29
Common Proactive Analysis
Employee to Vendor Testing
Politically Exposed Person Search
Key Word Searches – T&E Expenses
Travel and Entertainment Analysis
Petty Cash Testing
30
Uncommon Proactive Analysis
Key Word and Word Summary Searches
 Contracts, Emails, Meeting Rooms and Web Traffic
Obsolete inventory and adjustments
Purchase and sales process mapping
Vendor and purchase ledger change log review
31
Employee to Vendor
The Basic Match
Obtain vendor and employee masters
Create "related field" in each table
 LEFT, RIGHT and MID functions
Relate tables using the VLOOKUP function
Filter for any matches
32
Enterer and Approver Analysis
PivotTable the enterers (rows) and approvers (columns)
 Consider both as rows for a "lined up" match
Calculate a % of transaction count
 Identify high % and low % (outliers)
Identify matched approver and enterers
33
Under The Radar - Approval Limits
Apply a stratification table on approval limits
Filter items within approval limit ranges
Pivot results by vendor
34
Trend Analysis
Find The Unexpected
35
Buyer Enterer Date/Time
Where – GeoCode/Zip Supplier Department
Textual Analytics Digital Analysis Value Stratification
Making Best Use of
Purchase Ledgers
Accounts that are sole sourced
Accounts that have too many vendors
Categories that map to the “recovery list”
Assess to industry cost category benchmarks
Top 100 vendors
Trend analysis over time
Trend analysis by vendor (scatter graph)
36
Distribution Analysis
Remove subtotals for improved visibility
Focus on sole source and multi source
vendors
Scroll out and drill to details as needed
37
Textual and Letter Analytics
Lessons from
WorldCom/ MCI
The fraud was accomplished primarily in
two ways:
1.Booking "line costs" (interconnection
expenses with other telecommunication
companies) as capital expenditures on
the balance sheet instead of expenses.
2.Inflating revenues with bogus
accounting entries from "corporate
unallocated revenue accounts".
In 2002, a small team of internal
auditors at WorldCom worked together,
often at night and secretly, to investigate
and reveal $3.8 billion worth of fraud….
Per Wikipedia – MCI Inc.
Page 39
Fraud Red Flag
Word Searches
 What You Need
 Word Search Table
 Table Being Searched
 How You Do It
 SPLIT the field to be searched into words
 Convert data to be the same format
 Lookup to the word lookup list using Vlookup
Page 40
***AuditNet® Key Words Survey***
http://www.auditnet.org/key-word-analytics
Word Summary Analysis
Split account or journal description field
Copy and paste each column to the end
Add a type (or few type) fields
Pivot table on the combined list of words
by types
41
Can You Read This?
It deosn't mttaer in waht oredr
the ltteers in a wrod are, the
olny iprmoetnt tihng is taht the
frist and lsat ltteer be at the rghit
pclae.
42
43
A Benford’s Law For Words
Useful Links on LALA
 http://bit.ly/1jFD87b - Blog announcing the discovery of letter analytics.
 http://bit.ly/1RZpolz - Research Paper #1 – Focused on explaining the
letter analytic concept with reference to a benchmark for the English
Language and an analysis of British song titles from 1960 to 1999.
 http://bit.ly/1QebYkL - Research Paper #2 – Provides a more in-depth
analysis of the population of text data and how letters can explain text
variations over time more quickly than word summaries
 http://bit.ly/1W0CAZO - Predictive Analytics Times article on how Word
clouds analysis could improved with letter analytic visualizations
 http://bit.ly/1TGwvPS and http://bit.ly/21mEbsU - ACFE Fraud
Magazine articles on “The Benford’s Law of Words – Parts 1 and 2”
 http://bit.ly/2di87aH - ACL Blog on using ACL to calculate LALA
 http://bit.ly/2oCtRlx - How to Win at Wheel of Fortune Using Letter
Analytics
44
Questions?
Any Questions?
Don’t be Shy!
Page 45
AuditNet® and cRisk Academy
If you would like forever access
to this webinar recording
If you are watching the
recording, and would like to
obtain CPE credit for this
webinar
Previous AuditNet® webinars
are also available on-demand for
CPE credit
http://criskacademy.com
http://ondemand.criskacademy.com
Use coupon code: 50OFF for a
discount on this webinar for one week
Slide 46
AuditSoftwareVideos.com
Now Free (But Not for Long!)
70+ Hours of videos accessible for FREE subscriptions
Repeat video and text instruction as much as you need
Sample files, scripts, and macros in ACL™, Excel™, etc.
available for purchase
Bite-size video format (3 to 10 minutes)
>> Professionally
produced videos by
instructors with over 20
years experience in
ACL™, Excel™ , and
more
Slide 47
Thank You!
Jim Kaplan
AuditNet® LLC
1-800-385-1625
Email: webinars@auditnet.org
www.auditnet.org
Richard B. Lanza, CPA, CFE, CGMA
Contact Information
D: +1 732 516 5527
M: +1 732 331 3494
Email: rich.lanza@us.gt.com
Slide 48

Weitere ähnliche Inhalte

Was ist angesagt?

Ibm financial crime management solution 3
Ibm financial crime management solution 3Ibm financial crime management solution 3
Ibm financial crime management solution 3Sunny Fei
 
CaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 ReleaseCaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 ReleaseAlessa
 
Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)Alessa
 
The Enemy at the Gates: Payments Fraud Is a Symptom
The Enemy at the Gates: Payments Fraud Is a SymptomThe Enemy at the Gates: Payments Fraud Is a Symptom
The Enemy at the Gates: Payments Fraud Is a Symptommercatoradvisory
 
Falcon debit credit_2909_ps
Falcon debit credit_2909_psFalcon debit credit_2909_ps
Falcon debit credit_2909_pskazemita
 
Writing Effective Suspicious Activity Reports (SARs): Start with WHY
Writing Effective Suspicious Activity Reports (SARs): Start with WHYWriting Effective Suspicious Activity Reports (SARs): Start with WHY
Writing Effective Suspicious Activity Reports (SARs): Start with WHYAlessa
 
Elements of Customer Risk: Profiles and Relationships
Elements of Customer Risk: Profiles and RelationshipsElements of Customer Risk: Profiles and Relationships
Elements of Customer Risk: Profiles and RelationshipsAlessa
 
Synthetic Identities and AML
Synthetic Identities and AMLSynthetic Identities and AML
Synthetic Identities and AMLdoylebc
 
Quick look at the business equivalency rate
Quick look at the business equivalency rateQuick look at the business equivalency rate
Quick look at the business equivalency rateGrant Thornton LLP
 
ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseLaurent Pacalin
 

Was ist angesagt? (12)

Ibm financial crime management solution 3
Ibm financial crime management solution 3Ibm financial crime management solution 3
Ibm financial crime management solution 3
 
CaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 ReleaseCaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 Release
 
Key Insights from the 2021 Legal Trends Report
Key Insights from the 2021 Legal Trends ReportKey Insights from the 2021 Legal Trends Report
Key Insights from the 2021 Legal Trends Report
 
Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)
 
The Enemy at the Gates: Payments Fraud Is a Symptom
The Enemy at the Gates: Payments Fraud Is a SymptomThe Enemy at the Gates: Payments Fraud Is a Symptom
The Enemy at the Gates: Payments Fraud Is a Symptom
 
Law Firm Payments Masterclass with LawPay
Law Firm Payments Masterclass with LawPayLaw Firm Payments Masterclass with LawPay
Law Firm Payments Masterclass with LawPay
 
Falcon debit credit_2909_ps
Falcon debit credit_2909_psFalcon debit credit_2909_ps
Falcon debit credit_2909_ps
 
Writing Effective Suspicious Activity Reports (SARs): Start with WHY
Writing Effective Suspicious Activity Reports (SARs): Start with WHYWriting Effective Suspicious Activity Reports (SARs): Start with WHY
Writing Effective Suspicious Activity Reports (SARs): Start with WHY
 
Elements of Customer Risk: Profiles and Relationships
Elements of Customer Risk: Profiles and RelationshipsElements of Customer Risk: Profiles and Relationships
Elements of Customer Risk: Profiles and Relationships
 
Synthetic Identities and AML
Synthetic Identities and AMLSynthetic Identities and AML
Synthetic Identities and AML
 
Quick look at the business equivalency rate
Quick look at the business equivalency rateQuick look at the business equivalency rate
Quick look at the business equivalency rate
 
ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email Compromise
 

Ähnlich wie Super data-charging your corruption reviews with integrated analytics

20150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv220150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv2Jim Kaplan CIA CFE
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdfWilson Kao
 
Know Your Market - Know Your Customer: What Web Data Reveals if You Know Wher...
Know Your Market - Know Your Customer: What Web Data Reveals if You Know Wher...Know Your Market - Know Your Customer: What Web Data Reveals if You Know Wher...
Know Your Market - Know Your Customer: What Web Data Reveals if You Know Wher...Connotate
 
The Motif Difference2009
The Motif Difference2009The Motif Difference2009
The Motif Difference2009Steve Kuntz
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsFraudBusters
 
Market Research-ppt
Market Research-pptMarket Research-ppt
Market Research-pptAnkit Sinha
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsFraudBusters
 
Legal Tech Innovators Showcase @ ABA TECHSHOW
Legal Tech Innovators Showcase @ ABA TECHSHOWLegal Tech Innovators Showcase @ ABA TECHSHOW
Legal Tech Innovators Showcase @ ABA TECHSHOWEvolve Law
 
ValiDeck Slide Deck
ValiDeck Slide DeckValiDeck Slide Deck
ValiDeck Slide DeckAlok Narula
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Jim Kaplan CIA CFE
 
Ten Tips to Ensue that Your Suppliers are Real
Ten Tips to Ensue that Your Suppliers are RealTen Tips to Ensue that Your Suppliers are Real
Ten Tips to Ensue that Your Suppliers are RealTradeshift
 
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Oracle
 
Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques Jim Kaplan CIA CFE
 
How to data mine your print reports
How to data mine your print reports How to data mine your print reports
How to data mine your print reports Jim Kaplan CIA CFE
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For AmlKartik Mehta
 

Ähnlich wie Super data-charging your corruption reviews with integrated analytics (20)

20150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv220150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv2
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdf
 
Big data research
Big data researchBig data research
Big data research
 
Know Your Market - Know Your Customer: What Web Data Reveals if You Know Wher...
Know Your Market - Know Your Customer: What Web Data Reveals if You Know Wher...Know Your Market - Know Your Customer: What Web Data Reveals if You Know Wher...
Know Your Market - Know Your Customer: What Web Data Reveals if You Know Wher...
 
The Motif Difference2009
The Motif Difference2009The Motif Difference2009
The Motif Difference2009
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your Audits
 
Market Research-ppt
Market Research-pptMarket Research-ppt
Market Research-ppt
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
 
Future audit analytics
Future audit analyticsFuture audit analytics
Future audit analytics
 
Legal Tech Innovators Showcase @ ABA TECHSHOW
Legal Tech Innovators Showcase @ ABA TECHSHOWLegal Tech Innovators Showcase @ ABA TECHSHOW
Legal Tech Innovators Showcase @ ABA TECHSHOW
 
ValiDeck Slide Deck
ValiDeck Slide DeckValiDeck Slide Deck
ValiDeck Slide Deck
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10)
 
Ten Tips to Ensue that Your Suppliers are Real
Ten Tips to Ensue that Your Suppliers are RealTen Tips to Ensue that Your Suppliers are Real
Ten Tips to Ensue that Your Suppliers are Real
 
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
 
Google Analytics
Google AnalyticsGoogle Analytics
Google Analytics
 
Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques
 
How to data mine your print reports
How to data mine your print reports How to data mine your print reports
How to data mine your print reports
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
Big Data? Big Deal, Barclaycard
Big Data? Big Deal, Barclaycard Big Data? Big Deal, Barclaycard
Big Data? Big Deal, Barclaycard
 

Mehr von Jim Kaplan CIA CFE

Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsJim Kaplan CIA CFE
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) Jim Kaplan CIA CFE
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Jim Kaplan CIA CFE
 
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Jim Kaplan CIA CFE
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel Jim Kaplan CIA CFE
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationJim Kaplan CIA CFE
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudJim Kaplan CIA CFE
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 Jim Kaplan CIA CFE
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analyticsJim Kaplan CIA CFE
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10Jim Kaplan CIA CFE
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal AuditorJim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling Jim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingJim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Jim Kaplan CIA CFE
 

Mehr von Jim Kaplan CIA CFE (20)

Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analytics
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10)
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
 
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel
 
Tracking down outliers
Tracking down outliersTracking down outliers
Tracking down outliers
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal Auditor
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 
Ethics for internal auditors
Ethics for internal auditorsEthics for internal auditors
Ethics for internal auditors
 

Kürzlich hochgeladen

B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 

Kürzlich hochgeladen (20)

B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 

Super data-charging your corruption reviews with integrated analytics

  • 1. Super-Data Charging Your Corruption Reviews with Integrated Analytics About Jim Kaplan, CIA, CFE  President and Founder of AuditNet®, the global resource for auditors (available on iOS, Android and Windows devices)  Auditor, Web Site Guru,  Internet for Auditors Pioneer  IIA Bradford Cadmus Memorial Award Recipient  Local Government Auditor’s Lifetime Award  Author of “The Auditor’s Guide to Internet Resources” 2nd Edition Slide 1
  • 2. About AuditNet® LLC • AuditNet®, the global resource for auditors, serves the global audit community as the primary resource for Web-based auditing content. As the first online audit portal, AuditNet® has been at the forefront of websites dedicated to promoting the use of audit technology. • Available on the Web, iPad, iPhone, Windows and Android devices and features: • Over 2,900 Reusable Templates, Audit Programs, Questionnaires, and Control Matrices • Webinars focusing on fraud, data analytics, IT audit, and internal audit with free CPE for subscribers and site license users. • Audit guides, manuals, and books on audit basics and using audit technology • LinkedIn Networking Groups • Monthly Newsletters with Expert Guest Columnists • Surveys on timely topics for internal auditors Introductions Slide 2 The views expressed by the presenters do not necessarily represent the views, positions, or opinions of AuditNet® LLC. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client relationship. While AuditNet® makes every effort to ensure information is accurate and complete, AuditNet® makes no representations, guarantees, or warranties as to the accuracy or completeness of the information provided via this presentation. AuditNet® specifically disclaims all liability for any claims or damages that may result from the information contained in this presentation, including any websites maintained by third parties and linked to the AuditNet® website. Any mention of commercial products is for information only; it does not imply recommendation or endorsement by AuditNet® LLC Slide 3
  • 3. AuditNet® and cRisk Academy If you would like forever access to this webinar recording If you are watching the recording, and would like to obtain CPE credit for this webinar Previous AuditNet® webinars are also available on-demand for CPE credit http://criskacademy.com http://ondemand.criskacademy.com Use coupon code: 50OFF for a discount on this webinar for one week Slide 4 Richard B. Lanza, CPA, CFE, CGMA • Director of Audit Data Analytics for Grant Thornton, LLP • Over 25 years of ACL, Excel and other software usage • Received the outstanding achievement in business award by the Association of Certified Fraud Examiners for developing the publication Proactively Detecting Fraud Using Computer Audit Reports as a research project for the IIA • Recently was a contributing author of: • Detecting Corruption with Analytics: A Roadmap – The International Institute for Analytics • Global Technology Audit Guide (GTAG #13) Fraud In An Automated World – Institute Of Internal Auditors. • Cost Recovery – Turning Your Accounts Payable Department Into A Profit Center – Wiley And Sons. • Data Analytics: A Roadmap for Expanding Capabilities (published 2018 in partnership with the IIA's Internal Audit Foundation) • In 2015, discovered a new textual analytic technique using letters called the Lanza Approach to Letter Analytics (LALA)TM Slide 5 The views expressed by the presenters do not necessarily represent the views, positions, or opinions of Grant Thornton, LLP. These materials, and the oral presentation accompanyingthem, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client relationship. rich.lanza@us.gt.com
  • 4. Today’s Agenda Explore the top internal and external data sources to interrogate for corruption schemes. Be able to identify the key red flags leading to corrupt behavior and how they present themselves in data. Learn to bolster any compliance program with data-driven prediction and decision making analytics. Complete a who, what, when, and where set of analytics to hone in on the specific corruption and bribery within your business processes. Understand the benefits of integrating and managing a continuous review of data sets to identify corrupt behavior. Page 6 Defining Corruption and Associated Red Flags
  • 5. What Are We Looking For? Bribery – To influence a decision Illegal Gratuities – To reward a decision Economic Extortion – To coerce a decision Conflicts of Interest – To take one's interests in a decision 8 Fraud Frequency By Type 9 ©2018, Association of Certified Fraud Examiners. All rights reserved. Used by permission.
  • 6. Corruption Compared to Misappropriations ©2018, Association of Certified Fraud Examiners. All rights reserved. Used by permission. Forget the Charts Corruption By the Numbers 83.5% of reporting companies had an asset misappropriation  However, this is allocated to nine misappropriation schemes  The top scheme's frequency was 21% vs. corruption at 38%  Some countries report corruption frequency as high as 62% Median fraud $ for asset misappropriation - $114,000  Corruption average was $250,000 Transparency International – Perception Index  Nearly two-thirds fall below the midpoint of their "clean" scale  Peter Eigen – Chairman TED Talk at https://youtu.be/XkiXXP_hycA Forbes (http://reut.rs/2lStjHH) reported 2016 FCPA fines of $2.6B, 2nd only to the record amount collected in 2008 11
  • 7. Why Is Corruption So Elusive? Misappropriation is the taking of tangible goods Corruption rather lives within the intangible Influencing decisions is mostly within one's mind Most value is transferred outside of accounting records However, there are usually notable trails left behind 12 The Elusive Red Flags Buyer's Perspective Consistent winning bids to a vendor Other vendors issuing bids later than the submission date Over-priced / Over-purchased goods and services Matching vendor to employee record Low quality product or services Non receipt of goods or services Obsolete goods 13
  • 8. How It Is Hidden - Examples Buyer's Perspective Solicit bids from known high-bidder entities (false competition) Don't issue a purchase order Split purchases among various orders to avoid PO limits Seller allowed to update bid after review of other bidders Purposely provide short-time frames to vendors submitting bids Self-approve the purchase order Approve delivery as if it occurred 14 The Elusive Red Flags Seller's Perspective Over-priced or unusual increases in sales Inflated hours for service Petty cash usage for influence payment Gifts and entertainment to influence sales Consulting payments made to sales facilitation organizations Payments to customer politically exposed person (“PEP”) Receipt of inside information 15
  • 9. How It Is Hidden - Examples Seller's Perspective Communications among partners uses non-company based devices Self-approve the sales order / Collusion among the sales ordering and approving parties Forge petty cash or gift payment request form for other purpose General ledger adjustments to spread payment or hide it in an unreconciled ledger account  Consulting expenses are adjusted to other benign accounts to avoid concern 16 Data Sources To Base Analytics
  • 10. The Population of Data Type 18 Structured Data  Accounting records  Sub ledger details  Monthly performance measures Unstructured Data  Documents (Excel, PDF, Word)  Emails  Network Logs External Data  Geomap Service  OFAC, SAM.Gov Watch Lists  IRS Tax ID Match Buyer Perspective Key Sources Contract Management System Purchase Order Vendor Invoice Header Vendor Invoice Distribution Employee and Vendor Masterfiles General / Nominal Ledger Conflict of Interest Form Management Email Server Web Traffic Log Meeting Room Request System Related Party List 19
  • 11. Seller Perspective Key Sources Contract Management System Sales Order Approved Contract Price List Sales Invoice Header Sales Invoice Distribution General / Nominal Ledger Petty Cash Log Travel & Entertainment System Procurement Card History Email Server Web Traffic Log Meeting Room Request System Related Party List 20 External Data Sources To Aid Analytics
  • 12. Search Anything Corporate Page 22 Specific Business Partner Information Yellow Pages  http://www.yellowpages.com/  http://www.bbb.org/  http://www.linkedin.com  http://glassdoor.com IP Address Lookup  www.iplocation.net for Email and reverse DNS lookup State Websites  Business Listings and Incorporation Documents  Unclaimed Property  http://www.statelocalgov.net/ 23
  • 14. CIA Chiefs of State https://www.cia.gov/library/publications/world-leaders-1/ Page 26 Power Map for Excel 2013 Page 27
  • 15. Proactively Detecting Corruption Why Proactively Review? Fraud losses can be reduced by 65% in relation to a management tip Given elusive nature disparate data sets can correlate wrongdoing Start to build predictive models based on the past 29
  • 16. Common Proactive Analysis Employee to Vendor Testing Politically Exposed Person Search Key Word Searches – T&E Expenses Travel and Entertainment Analysis Petty Cash Testing 30 Uncommon Proactive Analysis Key Word and Word Summary Searches  Contracts, Emails, Meeting Rooms and Web Traffic Obsolete inventory and adjustments Purchase and sales process mapping Vendor and purchase ledger change log review 31
  • 17. Employee to Vendor The Basic Match Obtain vendor and employee masters Create "related field" in each table  LEFT, RIGHT and MID functions Relate tables using the VLOOKUP function Filter for any matches 32 Enterer and Approver Analysis PivotTable the enterers (rows) and approvers (columns)  Consider both as rows for a "lined up" match Calculate a % of transaction count  Identify high % and low % (outliers) Identify matched approver and enterers 33
  • 18. Under The Radar - Approval Limits Apply a stratification table on approval limits Filter items within approval limit ranges Pivot results by vendor 34 Trend Analysis Find The Unexpected 35 Buyer Enterer Date/Time Where – GeoCode/Zip Supplier Department Textual Analytics Digital Analysis Value Stratification
  • 19. Making Best Use of Purchase Ledgers Accounts that are sole sourced Accounts that have too many vendors Categories that map to the “recovery list” Assess to industry cost category benchmarks Top 100 vendors Trend analysis over time Trend analysis by vendor (scatter graph) 36 Distribution Analysis Remove subtotals for improved visibility Focus on sole source and multi source vendors Scroll out and drill to details as needed 37
  • 20. Textual and Letter Analytics Lessons from WorldCom/ MCI The fraud was accomplished primarily in two ways: 1.Booking "line costs" (interconnection expenses with other telecommunication companies) as capital expenditures on the balance sheet instead of expenses. 2.Inflating revenues with bogus accounting entries from "corporate unallocated revenue accounts". In 2002, a small team of internal auditors at WorldCom worked together, often at night and secretly, to investigate and reveal $3.8 billion worth of fraud…. Per Wikipedia – MCI Inc. Page 39
  • 21. Fraud Red Flag Word Searches  What You Need  Word Search Table  Table Being Searched  How You Do It  SPLIT the field to be searched into words  Convert data to be the same format  Lookup to the word lookup list using Vlookup Page 40 ***AuditNet® Key Words Survey*** http://www.auditnet.org/key-word-analytics Word Summary Analysis Split account or journal description field Copy and paste each column to the end Add a type (or few type) fields Pivot table on the combined list of words by types 41
  • 22. Can You Read This? It deosn't mttaer in waht oredr the ltteers in a wrod are, the olny iprmoetnt tihng is taht the frist and lsat ltteer be at the rghit pclae. 42 43 A Benford’s Law For Words
  • 23. Useful Links on LALA  http://bit.ly/1jFD87b - Blog announcing the discovery of letter analytics.  http://bit.ly/1RZpolz - Research Paper #1 – Focused on explaining the letter analytic concept with reference to a benchmark for the English Language and an analysis of British song titles from 1960 to 1999.  http://bit.ly/1QebYkL - Research Paper #2 – Provides a more in-depth analysis of the population of text data and how letters can explain text variations over time more quickly than word summaries  http://bit.ly/1W0CAZO - Predictive Analytics Times article on how Word clouds analysis could improved with letter analytic visualizations  http://bit.ly/1TGwvPS and http://bit.ly/21mEbsU - ACFE Fraud Magazine articles on “The Benford’s Law of Words – Parts 1 and 2”  http://bit.ly/2di87aH - ACL Blog on using ACL to calculate LALA  http://bit.ly/2oCtRlx - How to Win at Wheel of Fortune Using Letter Analytics 44 Questions? Any Questions? Don’t be Shy! Page 45
  • 24. AuditNet® and cRisk Academy If you would like forever access to this webinar recording If you are watching the recording, and would like to obtain CPE credit for this webinar Previous AuditNet® webinars are also available on-demand for CPE credit http://criskacademy.com http://ondemand.criskacademy.com Use coupon code: 50OFF for a discount on this webinar for one week Slide 46 AuditSoftwareVideos.com Now Free (But Not for Long!) 70+ Hours of videos accessible for FREE subscriptions Repeat video and text instruction as much as you need Sample files, scripts, and macros in ACL™, Excel™, etc. available for purchase Bite-size video format (3 to 10 minutes) >> Professionally produced videos by instructors with over 20 years experience in ACL™, Excel™ , and more Slide 47
  • 25. Thank You! Jim Kaplan AuditNet® LLC 1-800-385-1625 Email: webinars@auditnet.org www.auditnet.org Richard B. Lanza, CPA, CFE, CGMA Contact Information D: +1 732 516 5527 M: +1 732 331 3494 Email: rich.lanza@us.gt.com Slide 48