SlideShare ist ein Scribd-Unternehmen logo
1 von 12
By
3 Instances Where E-Mail Mining
For Fraud Detection…
Could’ve Prevented Financial Loss
Do You Recognize Any Of These
Corporate Fraud Headlines?
Breaking News
It’s ok if you don’t
remember…
because we’ll give you all of the details!
The databahn Times
Mike Kail
Senior Netflix executive receives bribesCase # 1:
• Mike Kail was the former VP of Information
Technology Operations
• Kail made a deal with IT service providers to receive
bribes of 12% - 15% of the total deal value
• Kail earned $490,000 in kickbacks
• Netflix uncovered the fraud after Kail left
• Netflix uncovered e-mails discussing “referral fees”
• Kail got away with the crime because he was an
upper-level employee
The databahn Times
British software company, Autonomy,
falsifies numbers
Case # 2:
• HP acquired Autonomy for $11.1 billion in 2012
• HP discovered Autonomy misrepresented its
finances – by $5.55 billion
• HP filed a $5.1 billion lawsuit against Autonomy
• E-mails were discovered between the former CFO
and founder
• Included the phrases “covered up” and
“imaginary deals”
• E-mails were checked and the truth was discovered
after the deal had gone through
The databahn Times
Former law partner shares private
information with opposing attorney
Case # 3:
• A former law partner at Willkie Farr & Gallagher, Keila
Ravelo, had suspicious communications with the
opposing counsel
• Ravelo had an established friendship with the opposing
counselor
• The law firm found e-mails and attachments concerning
the American Express litigation
• The opposing counselor sent Ravelo documents secured
under the American Express litigation protective order
What These Headlines Have In Common…
Besides Fraud
FRAUD
!
?
Proof of Fraud:
Autonomy E-mail
From The Telegraph
E-Mail conversation between the CFO and founder
E-mail Mining Would Have Saved…
Time
Money
Median fraud duration in 2014 was 18 months
Median loss in 2014 was $145,000
*stats from Association of Certified Fraud Examiners’ Report to Nations
Reputation
Your reputation is immeasurable
Internal Fraud Can Happen To Any
Company
Small Company Large Company
You need to implement a proactive approach!
You’ve Seen Enough Fraud In The
News...
YOU
Don’t become the next headline!
For more information, check out our blog at
www.databahn.com/blog
@844databahn
Databahn
databahn

Weitere ähnliche Inhalte

Was ist angesagt?

Legal and ethical issues in web design
Legal and ethical issues in web designLegal and ethical issues in web design
Legal and ethical issues in web designMike Cummins
 
Investigating & proving cybercrime
Investigating & proving cybercrimeInvestigating & proving cybercrime
Investigating & proving cybercrimeJenny Reid
 
Cyber Security Awareness Survey: India
Cyber Security Awareness Survey: IndiaCyber Security Awareness Survey: India
Cyber Security Awareness Survey: IndiaUjjwal Singh
 
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Adler Law Group
 
Electronic Communications Act (2000)
Electronic Communications Act (2000)Electronic Communications Act (2000)
Electronic Communications Act (2000)Ed Dickinson
 
What is data protection and why it is important for business
What is data protection and why it is important for businessWhat is data protection and why it is important for business
What is data protection and why it is important for businessSameerShaik43
 
CASL Compliant: It's All About Consent
CASL Compliant: It's All About ConsentCASL Compliant: It's All About Consent
CASL Compliant: It's All About ConsentSparkPost
 
Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)John Nicholson
 
What Is E Commerce
What Is E CommerceWhat Is E Commerce
What Is E CommerceEd Dickinson
 
Websites: 10 Things to Consider to Avoid Litigation 3-5
Websites: 10 Things to Consider to Avoid Litigation 3-5Websites: 10 Things to Consider to Avoid Litigation 3-5
Websites: 10 Things to Consider to Avoid Litigation 3-5accessnowinc
 
Your privacy online: Health information at serious risk of abuse, researchers...
Your privacy online: Health information at serious risk of abuse, researchers...Your privacy online: Health information at serious risk of abuse, researchers...
Your privacy online: Health information at serious risk of abuse, researchers...impartialnewsle68
 
How the FTC Wants You to Change Your Shopping App to be Legal
How the FTC Wants You to Change Your Shopping App to be LegalHow the FTC Wants You to Change Your Shopping App to be Legal
How the FTC Wants You to Change Your Shopping App to be LegalBrian Heidelberger
 

Was ist angesagt? (13)

Legal and ethical issues in web design
Legal and ethical issues in web designLegal and ethical issues in web design
Legal and ethical issues in web design
 
Investigating & proving cybercrime
Investigating & proving cybercrimeInvestigating & proving cybercrime
Investigating & proving cybercrime
 
Cyber Security Awareness Survey: India
Cyber Security Awareness Survey: IndiaCyber Security Awareness Survey: India
Cyber Security Awareness Survey: India
 
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
 
Electronic Communications Act (2000)
Electronic Communications Act (2000)Electronic Communications Act (2000)
Electronic Communications Act (2000)
 
What is data protection and why it is important for business
What is data protection and why it is important for businessWhat is data protection and why it is important for business
What is data protection and why it is important for business
 
CASL Compliant: It's All About Consent
CASL Compliant: It's All About ConsentCASL Compliant: It's All About Consent
CASL Compliant: It's All About Consent
 
Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)
 
What Is E Commerce
What Is E CommerceWhat Is E Commerce
What Is E Commerce
 
Websites: 10 Things to Consider to Avoid Litigation 3-5
Websites: 10 Things to Consider to Avoid Litigation 3-5Websites: 10 Things to Consider to Avoid Litigation 3-5
Websites: 10 Things to Consider to Avoid Litigation 3-5
 
Your privacy online: Health information at serious risk of abuse, researchers...
Your privacy online: Health information at serious risk of abuse, researchers...Your privacy online: Health information at serious risk of abuse, researchers...
Your privacy online: Health information at serious risk of abuse, researchers...
 
How the FTC Wants You to Change Your Shopping App to be Legal
How the FTC Wants You to Change Your Shopping App to be LegalHow the FTC Wants You to Change Your Shopping App to be Legal
How the FTC Wants You to Change Your Shopping App to be Legal
 
Ppt by
Ppt by Ppt by
Ppt by
 

Ähnlich wie 3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financial Loss

FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraudtomciolkosz
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!tomciolkosz
 
ETHICS03 - Equity Funding Scandal - Case Study
ETHICS03 - Equity Funding Scandal - Case StudyETHICS03 - Equity Funding Scandal - Case Study
ETHICS03 - Equity Funding Scandal - Case StudyMichael Heron
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise ScamGuardian Analytics
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxAbdullaFatiya3
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft AndCorey Quinn
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.jatharrison
 
Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...
Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...
Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...Clio - Cloud-Based Legal Technology
 
Armour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explainedArmour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explainedHelena Martin
 
Business Law Training: Effectively Handling Internal Investigations
Business Law Training: Effectively Handling Internal InvestigationsBusiness Law Training: Effectively Handling Internal Investigations
Business Law Training: Effectively Handling Internal InvestigationsQuarles & Brady
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Cybercrime: A Primer
Cybercrime:  A PrimerCybercrime:  A Primer
Cybercrime: A Primerfwscholl
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen- Mark - Fullbright
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
GDPR by Identity Methods
GDPR by Identity MethodsGDPR by Identity Methods
GDPR by Identity MethodsEduard Lazar
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryProtected Harbor
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Management Insights LLC
 

Ähnlich wie 3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financial Loss (20)

FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
ETHICS03 - Equity Funding Scandal - Case Study
ETHICS03 - Equity Funding Scandal - Case StudyETHICS03 - Equity Funding Scandal - Case Study
ETHICS03 - Equity Funding Scandal - Case Study
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft And
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.
 
Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...
Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...
Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...
 
Armour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explainedArmour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explained
 
Business Law Training: Effectively Handling Internal Investigations
Business Law Training: Effectively Handling Internal InvestigationsBusiness Law Training: Effectively Handling Internal Investigations
Business Law Training: Effectively Handling Internal Investigations
 
Not "If" but "When"
Not "If" but "When"Not "If" but "When"
Not "If" but "When"
 
BBB October 2018 Market Monitor
BBB October 2018 Market Monitor BBB October 2018 Market Monitor
BBB October 2018 Market Monitor
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Cybercrime: A Primer
Cybercrime:  A PrimerCybercrime:  A Primer
Cybercrime: A Primer
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
GDPR by Identity Methods
GDPR by Identity MethodsGDPR by Identity Methods
GDPR by Identity Methods
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout History
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2
 

Mehr von databahn

Manulife Org Chart & Sales Intelligence Presentation.pptx
Manulife Org Chart & Sales Intelligence Presentation.pptxManulife Org Chart & Sales Intelligence Presentation.pptx
Manulife Org Chart & Sales Intelligence Presentation.pptxdatabahn
 
2020 Fortune 1000 list factoids and findings
2020 Fortune 1000 list factoids and findings2020 Fortune 1000 list factoids and findings
2020 Fortune 1000 list factoids and findingsdatabahn
 
Fortune 1000 companies' response to covid 19
Fortune 1000 companies' response to covid 19Fortune 1000 companies' response to covid 19
Fortune 1000 companies' response to covid 19databahn
 
Industries and Fortune 1000 companies thriving during the global pandemic
Industries and Fortune 1000 companies thriving during the global pandemicIndustries and Fortune 1000 companies thriving during the global pandemic
Industries and Fortune 1000 companies thriving during the global pandemicdatabahn
 
7 keys to open doors at Cigna
7 keys to open doors at Cigna7 keys to open doors at Cigna
7 keys to open doors at Cignadatabahn
 
7 keys to open doors at Goldman Sachs
7 keys to open doors at Goldman Sachs7 keys to open doors at Goldman Sachs
7 keys to open doors at Goldman Sachsdatabahn
 
7 keys to open doors at Pfizer
7 keys to open doors at Pfizer7 keys to open doors at Pfizer
7 keys to open doors at Pfizerdatabahn
 
7 keys to open doors at Sysco
7 keys to open doors at Sysco7 keys to open doors at Sysco
7 keys to open doors at Syscodatabahn
 
7 keys to open doors at Caterpillar
7 keys to open doors at Caterpillar7 keys to open doors at Caterpillar
7 keys to open doors at Caterpillardatabahn
 
7 keys to open doors at Walt Disney
7 keys to open doors at Walt Disney7 keys to open doors at Walt Disney
7 keys to open doors at Walt Disneydatabahn
 
7 keys to open doors at PepsiCo
7 keys to open doors at PepsiCo7 keys to open doors at PepsiCo
7 keys to open doors at PepsiCodatabahn
 
7 keys to open doors at FedEx
7 keys to open doors at FedEx7 keys to open doors at FedEx
7 keys to open doors at FedExdatabahn
 
7 keys to open doors at Procter & Gamble
7 keys to open doors at Procter & Gamble7 keys to open doors at Procter & Gamble
7 keys to open doors at Procter & Gambledatabahn
 
7 keys to open doors at MetLife
7 keys to open doors at MetLife7 keys to open doors at MetLife
7 keys to open doors at MetLifedatabahn
 
7 keys to open doors at Lowe's
7 keys to open doors at Lowe's7 keys to open doors at Lowe's
7 keys to open doors at Lowe'sdatabahn
 
7 keys to open doors at UPS
7 keys to open doors at UPS7 keys to open doors at UPS
7 keys to open doors at UPSdatabahn
 
7 keys to open doors at Wells Fargo
7 keys to open doors at Wells Fargo7 keys to open doors at Wells Fargo
7 keys to open doors at Wells Fargodatabahn
 
7 keys to open doors at Microsoft
7 keys to open doors at Microsoft7 keys to open doors at Microsoft
7 keys to open doors at Microsoftdatabahn
 
7 keys to open doors at Johnson & Johnson
7 keys to open doors at Johnson & Johnson7 keys to open doors at Johnson & Johnson
7 keys to open doors at Johnson & Johnsondatabahn
 
7 keys to open doors at Starbucks
7 keys to open doors at Starbucks7 keys to open doors at Starbucks
7 keys to open doors at Starbucksdatabahn
 

Mehr von databahn (20)

Manulife Org Chart & Sales Intelligence Presentation.pptx
Manulife Org Chart & Sales Intelligence Presentation.pptxManulife Org Chart & Sales Intelligence Presentation.pptx
Manulife Org Chart & Sales Intelligence Presentation.pptx
 
2020 Fortune 1000 list factoids and findings
2020 Fortune 1000 list factoids and findings2020 Fortune 1000 list factoids and findings
2020 Fortune 1000 list factoids and findings
 
Fortune 1000 companies' response to covid 19
Fortune 1000 companies' response to covid 19Fortune 1000 companies' response to covid 19
Fortune 1000 companies' response to covid 19
 
Industries and Fortune 1000 companies thriving during the global pandemic
Industries and Fortune 1000 companies thriving during the global pandemicIndustries and Fortune 1000 companies thriving during the global pandemic
Industries and Fortune 1000 companies thriving during the global pandemic
 
7 keys to open doors at Cigna
7 keys to open doors at Cigna7 keys to open doors at Cigna
7 keys to open doors at Cigna
 
7 keys to open doors at Goldman Sachs
7 keys to open doors at Goldman Sachs7 keys to open doors at Goldman Sachs
7 keys to open doors at Goldman Sachs
 
7 keys to open doors at Pfizer
7 keys to open doors at Pfizer7 keys to open doors at Pfizer
7 keys to open doors at Pfizer
 
7 keys to open doors at Sysco
7 keys to open doors at Sysco7 keys to open doors at Sysco
7 keys to open doors at Sysco
 
7 keys to open doors at Caterpillar
7 keys to open doors at Caterpillar7 keys to open doors at Caterpillar
7 keys to open doors at Caterpillar
 
7 keys to open doors at Walt Disney
7 keys to open doors at Walt Disney7 keys to open doors at Walt Disney
7 keys to open doors at Walt Disney
 
7 keys to open doors at PepsiCo
7 keys to open doors at PepsiCo7 keys to open doors at PepsiCo
7 keys to open doors at PepsiCo
 
7 keys to open doors at FedEx
7 keys to open doors at FedEx7 keys to open doors at FedEx
7 keys to open doors at FedEx
 
7 keys to open doors at Procter & Gamble
7 keys to open doors at Procter & Gamble7 keys to open doors at Procter & Gamble
7 keys to open doors at Procter & Gamble
 
7 keys to open doors at MetLife
7 keys to open doors at MetLife7 keys to open doors at MetLife
7 keys to open doors at MetLife
 
7 keys to open doors at Lowe's
7 keys to open doors at Lowe's7 keys to open doors at Lowe's
7 keys to open doors at Lowe's
 
7 keys to open doors at UPS
7 keys to open doors at UPS7 keys to open doors at UPS
7 keys to open doors at UPS
 
7 keys to open doors at Wells Fargo
7 keys to open doors at Wells Fargo7 keys to open doors at Wells Fargo
7 keys to open doors at Wells Fargo
 
7 keys to open doors at Microsoft
7 keys to open doors at Microsoft7 keys to open doors at Microsoft
7 keys to open doors at Microsoft
 
7 keys to open doors at Johnson & Johnson
7 keys to open doors at Johnson & Johnson7 keys to open doors at Johnson & Johnson
7 keys to open doors at Johnson & Johnson
 
7 keys to open doors at Starbucks
7 keys to open doors at Starbucks7 keys to open doors at Starbucks
7 keys to open doors at Starbucks
 

Kürzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financial Loss

  • 1. By 3 Instances Where E-Mail Mining For Fraud Detection… Could’ve Prevented Financial Loss
  • 2. Do You Recognize Any Of These Corporate Fraud Headlines? Breaking News
  • 3. It’s ok if you don’t remember… because we’ll give you all of the details!
  • 4. The databahn Times Mike Kail Senior Netflix executive receives bribesCase # 1: • Mike Kail was the former VP of Information Technology Operations • Kail made a deal with IT service providers to receive bribes of 12% - 15% of the total deal value • Kail earned $490,000 in kickbacks • Netflix uncovered the fraud after Kail left • Netflix uncovered e-mails discussing “referral fees” • Kail got away with the crime because he was an upper-level employee
  • 5. The databahn Times British software company, Autonomy, falsifies numbers Case # 2: • HP acquired Autonomy for $11.1 billion in 2012 • HP discovered Autonomy misrepresented its finances – by $5.55 billion • HP filed a $5.1 billion lawsuit against Autonomy • E-mails were discovered between the former CFO and founder • Included the phrases “covered up” and “imaginary deals” • E-mails were checked and the truth was discovered after the deal had gone through
  • 6. The databahn Times Former law partner shares private information with opposing attorney Case # 3: • A former law partner at Willkie Farr & Gallagher, Keila Ravelo, had suspicious communications with the opposing counsel • Ravelo had an established friendship with the opposing counselor • The law firm found e-mails and attachments concerning the American Express litigation • The opposing counselor sent Ravelo documents secured under the American Express litigation protective order
  • 7. What These Headlines Have In Common… Besides Fraud FRAUD ! ?
  • 8. Proof of Fraud: Autonomy E-mail From The Telegraph E-Mail conversation between the CFO and founder
  • 9. E-mail Mining Would Have Saved… Time Money Median fraud duration in 2014 was 18 months Median loss in 2014 was $145,000 *stats from Association of Certified Fraud Examiners’ Report to Nations Reputation Your reputation is immeasurable
  • 10. Internal Fraud Can Happen To Any Company Small Company Large Company You need to implement a proactive approach!
  • 11. You’ve Seen Enough Fraud In The News... YOU Don’t become the next headline!
  • 12. For more information, check out our blog at www.databahn.com/blog @844databahn Databahn databahn