SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Preventing Fraud-Lesson I
CA Sailesh Cousik
The Need of the Hour
Identifying Potential Threats
Fraudster Profiles
Fraudster Motivators
Vulnerabilities by Industry
Plugging controls
Creating Awareness
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Agenda
• Keys to Fraud Prevention
• What is Fraud and understanding a Fraudster
• Concept of Red Flags and Green Flags-
• Understand Fraud Vulnerabilities
• Preventive Controls
• People
• Information Assets and Processes
• Case Study
• Organizational Risk and Governance
• Reporting and Continuous Monitoring and Reassessment
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
“QUALITY IN A SERVICE OR PRODUCT IS
NOT WHAT YOU PUT INTO IT.
IT IS WHAT THE CLIENT OR CUSTOMER
GETS OUT OF IT.”
- PETER DRUCKER
QUALITY MEANS DOING IT RIGHT
WHEN NOBODY IS LOOKING
HENRY FORD
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
What is Fraud• Black’s Law Dictionary
• Fraud consists of some deceitful practice or willful device, resorted to with intent to deprive
another of his right, or in some manner to do him an injury. As distinguished from negligence, it is
always positive, intentional.
• Indian Company’s Act
• Explains fraud as: “fraud” in relation to affairs of a company or any body corporate and includes:
any act, omission, concealment of any fact or abuse of position committed by any person or any
other person with the connivance in any manner, with intent to deceive to gain undue advantage
from or to injure the interests of, the company or its shareholders or its creditors or any other
person, whether or not there is any wrongful gain or wrongful loss.”
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Five Reasons -Why People commit Fraud
F – Fun
R – Revenge (an Eye for an Eye)
A – Anger (Taking it out on society)
U – Unethical Behaviour- (bad person)
D – Destiny ( Born for the profession )
1. Employees commit 42% of Frauds and take 12 median months to detect
2. Managers 36% and take 18 median months to detect
3. Owners 19% and take 24 median months to detect
The ACFE report to the nations provides an interesting sidelight is that the older the fraudster the higher the
fraud-Fraudster> 60 Value=.5 million USD
Fraudsters don’t come with a label
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Use of Flags in Fraud Prevention
Behaviour and Incidents
Trends or Outlier triggers suspicion/prevention
• Earnings downturn
• Flashy Lifestyle or change in spend patterns
Unusual Activities with a possible normal explanation
• Credit Card transactions with abnormal value or from a different location
• Sudden change in behaviour
Too Good to be true
• Unusually High Growth
• Lack of anything unusual
6
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Industry Wise Fraud Vulnerability
Industry No. Of Cases % of Cases Median Loss (USD)
Banking & Financials 244 17.8% 200,000
Government and Public Admin 141 10.3 % 64,000
Manufacturing 116 8.5% 250,000
Health Care 100 7.3% 175,000
Oil And Gas 49 3.6% 450,000
Transportation & Warehousing 48 3.5% 202,000
Construction 43 3.1% 245,000
Technology 39 2.9% 250,000
Wholesale Trade 31 2.3% 375,000
Real Estate 24 1.8% 555,000
Mining 13 1.0% 900,000
Source: ACFE Report to the Nations on Organizational Fraud-2014
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Fraudsters and their Gullible Targets
Victims, Accomplices and Fraudsters have similar characteristics

1. Looking Lost and in need of help
2. Overconfident and Arrogant
3. Life and routine are structured and predictable
4. Eagerness to make a quick buck
5. Flamboyant Lifestyle and known
Vices/Weaknesses
6. In positions of power or in financial crisis
7. Disgruntled employees/those with personal
problems
8. Dreamers who seek to escape reality
9. Aggressive style which spawns enemies
10. Financial Crisis
11. Available of personal information
1. Credit Card spend trends
2. Cab Booking
3. Social Media-Status , Updates & Blogs
4. Travel Sites
5. Casual Conversation- Social Engineering
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
“Fraud Periods”
What to do when Vulnerability and Risk Increase
1. Disaster and Crisis Situations
2. Long week ends-Christmas/Diwali
3. New Government Schemes- Free Laptops/TVs
4. Charity and Religious Funds with little regulatory
control and where sources are not known
5. Corporate Pressure Situations
1. Shareholder pressure
2. Earnings pressure
3. Time to market pressure
4. Timeline pressure
5. Peer pressure- No Promotions
6. Change of key legislation and tax/duty rate
structures
7. Knowledge of Valuable proprietary, trademark
information prior to registration of
copyright/trademark or patent
8. Election Time
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Preventive Controls
Recruitment/Vendor Selection
Background Check
Education/Criminality/Employment/ Drugs/Health
Compensation to be Comparable with Industry norms
In line with authority and responsibility
Continuous Training and Performance Monitoring
Counselling and clearly defined processes and policies
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Preventive Controls
System and Application Access
Physical Security
CCTV
Access Control Card
Hardware USB Access
Network Access
Application Access
System Logs
Network Logs
Printer Logs
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Keys to
Fraud Prevention
• Understand the information you have
• Logs of access both systems and applications
• Physical access logs
• Transactional records and audit trails
• Data which can be used to discover trends
• Analytical and Monitoring Tools
• Mobile Records and CCTV Footage
• Behavioral and Cultural Patterns
• Interview Techniques
• Forensic Data and Tools for data extraction
• Types of data
• Relational databases
• XML
• Meta Data
• Big Data- Images, Videos
• Case studies
• Past experiences and learnings
• Self
• Organizational
• Know what is to be used, where and in what context
Phone: +91-9029026718
Email : info@saileshcousik.co.in
THANK YOU
FOR WATCHING
ANY
QUESTIONS ?
Monday, 17 July 2017 13

Weitere ähnliche Inhalte

Ähnlich wie Preventing fraud Lesson-I

2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...Ron Steinkamp
 
Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Accounting_Whitepapers
 
Public Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGAPublic Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGARon Steinkamp
 
Public Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIAPublic Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIARon Steinkamp
 
ACC-IIA Singapore Seminar 2015 Part 4 Prevention and Detection
ACC-IIA Singapore Seminar 2015 Part 4 Prevention and DetectionACC-IIA Singapore Seminar 2015 Part 4 Prevention and Detection
ACC-IIA Singapore Seminar 2015 Part 4 Prevention and DetectionBillyCheuk
 
Internal Control and Fraud Prevention
Internal Control and Fraud PreventionInternal Control and Fraud Prevention
Internal Control and Fraud PreventionTommy Seah
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 
Financial Statement Fraud training by Tommy SEAH
Financial Statement Fraud training by Tommy SEAHFinancial Statement Fraud training by Tommy SEAH
Financial Statement Fraud training by Tommy SEAHTommy Seah
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abusesharing notes123
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseSharing Slides Training
 
AML Meets ABC Webinar Deck 2-19-14
AML Meets ABC Webinar Deck 2-19-14AML Meets ABC Webinar Deck 2-19-14
AML Meets ABC Webinar Deck 2-19-14ACFCS
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and ReportingBrown Smith Wallace
 

Ähnlich wie Preventing fraud Lesson-I (20)

2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
 
Ocupacional Fraud.pptx
Ocupacional Fraud.pptxOcupacional Fraud.pptx
Ocupacional Fraud.pptx
 
Michael Herndon - 2014 Symposium on Financial Education in Korea
Michael Herndon - 2014 Symposium on Financial Education in KoreaMichael Herndon - 2014 Symposium on Financial Education in Korea
Michael Herndon - 2014 Symposium on Financial Education in Korea
 
Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6
 
Public Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGAPublic Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGA
 
Public Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIAPublic Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIA
 
Risk in the changing world – Opportunity or threat
Risk in the changing world – Opportunity or threatRisk in the changing world – Opportunity or threat
Risk in the changing world – Opportunity or threat
 
ACC-IIA Singapore Seminar 2015 Part 4 Prevention and Detection
ACC-IIA Singapore Seminar 2015 Part 4 Prevention and DetectionACC-IIA Singapore Seminar 2015 Part 4 Prevention and Detection
ACC-IIA Singapore Seminar 2015 Part 4 Prevention and Detection
 
Internal Control and Fraud Prevention
Internal Control and Fraud PreventionInternal Control and Fraud Prevention
Internal Control and Fraud Prevention
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Whistle blowing
Whistle blowingWhistle blowing
Whistle blowing
 
Financial Statement Fraud training by Tommy SEAH
Financial Statement Fraud training by Tommy SEAHFinancial Statement Fraud training by Tommy SEAH
Financial Statement Fraud training by Tommy SEAH
 
Summary presentation Highliths
Summary presentation HighlithsSummary presentation Highliths
Summary presentation Highliths
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
It52015 slides
It52015 slidesIt52015 slides
It52015 slides
 
Kenya AMC Presentation 1
Kenya AMC Presentation 1Kenya AMC Presentation 1
Kenya AMC Presentation 1
 
AML Meets ABC Webinar Deck 2-19-14
AML Meets ABC Webinar Deck 2-19-14AML Meets ABC Webinar Deck 2-19-14
AML Meets ABC Webinar Deck 2-19-14
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting
 

KĂźrzlich hochgeladen

W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxalwaysnagaraju26
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto GonzĂĄlez Trastoy
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfWilly Marroquin (WillyDevNET)
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456KiaraTiradoMicha
 

KĂźrzlich hochgeladen (20)

W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 

Preventing fraud Lesson-I

  • 1. Preventing Fraud-Lesson I CA Sailesh Cousik The Need of the Hour Identifying Potential Threats Fraudster Profiles Fraudster Motivators Vulnerabilities by Industry Plugging controls Creating Awareness
  • 2. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Agenda • Keys to Fraud Prevention • What is Fraud and understanding a Fraudster • Concept of Red Flags and Green Flags- • Understand Fraud Vulnerabilities • Preventive Controls • People • Information Assets and Processes • Case Study • Organizational Risk and Governance • Reporting and Continuous Monitoring and Reassessment
  • 3. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization “QUALITY IN A SERVICE OR PRODUCT IS NOT WHAT YOU PUT INTO IT. IT IS WHAT THE CLIENT OR CUSTOMER GETS OUT OF IT.” - PETER DRUCKER QUALITY MEANS DOING IT RIGHT WHEN NOBODY IS LOOKING HENRY FORD
  • 4. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization What is Fraud• Black’s Law Dictionary • Fraud consists of some deceitful practice or willful device, resorted to with intent to deprive another of his right, or in some manner to do him an injury. As distinguished from negligence, it is always positive, intentional. • Indian Company’s Act • Explains fraud as: “fraud” in relation to affairs of a company or any body corporate and includes: any act, omission, concealment of any fact or abuse of position committed by any person or any other person with the connivance in any manner, with intent to deceive to gain undue advantage from or to injure the interests of, the company or its shareholders or its creditors or any other person, whether or not there is any wrongful gain or wrongful loss.”
  • 5. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Five Reasons -Why People commit Fraud F – Fun R – Revenge (an Eye for an Eye) A – Anger (Taking it out on society) U – Unethical Behaviour- (bad person) D – Destiny ( Born for the profession ) 1. Employees commit 42% of Frauds and take 12 median months to detect 2. Managers 36% and take 18 median months to detect 3. Owners 19% and take 24 median months to detect The ACFE report to the nations provides an interesting sidelight is that the older the fraudster the higher the fraud-Fraudster> 60 Value=.5 million USD Fraudsters don’t come with a label
  • 6. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Use of Flags in Fraud Prevention Behaviour and Incidents Trends or Outlier triggers suspicion/prevention • Earnings downturn • Flashy Lifestyle or change in spend patterns Unusual Activities with a possible normal explanation • Credit Card transactions with abnormal value or from a different location • Sudden change in behaviour Too Good to be true • Unusually High Growth • Lack of anything unusual 6
  • 7. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Industry Wise Fraud Vulnerability Industry No. Of Cases % of Cases Median Loss (USD) Banking & Financials 244 17.8% 200,000 Government and Public Admin 141 10.3 % 64,000 Manufacturing 116 8.5% 250,000 Health Care 100 7.3% 175,000 Oil And Gas 49 3.6% 450,000 Transportation & Warehousing 48 3.5% 202,000 Construction 43 3.1% 245,000 Technology 39 2.9% 250,000 Wholesale Trade 31 2.3% 375,000 Real Estate 24 1.8% 555,000 Mining 13 1.0% 900,000 Source: ACFE Report to the Nations on Organizational Fraud-2014
  • 8. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Fraudsters and their Gullible Targets Victims, Accomplices and Fraudsters have similar characteristics  1. Looking Lost and in need of help 2. Overconfident and Arrogant 3. Life and routine are structured and predictable 4. Eagerness to make a quick buck 5. Flamboyant Lifestyle and known Vices/Weaknesses 6. In positions of power or in financial crisis 7. Disgruntled employees/those with personal problems 8. Dreamers who seek to escape reality 9. Aggressive style which spawns enemies 10. Financial Crisis 11. Available of personal information 1. Credit Card spend trends 2. Cab Booking 3. Social Media-Status , Updates & Blogs 4. Travel Sites 5. Casual Conversation- Social Engineering
  • 9. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization “Fraud Periods” What to do when Vulnerability and Risk Increase 1. Disaster and Crisis Situations 2. Long week ends-Christmas/Diwali 3. New Government Schemes- Free Laptops/TVs 4. Charity and Religious Funds with little regulatory control and where sources are not known 5. Corporate Pressure Situations 1. Shareholder pressure 2. Earnings pressure 3. Time to market pressure 4. Timeline pressure 5. Peer pressure- No Promotions 6. Change of key legislation and tax/duty rate structures 7. Knowledge of Valuable proprietary, trademark information prior to registration of copyright/trademark or patent 8. Election Time
  • 10. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Preventive Controls Recruitment/Vendor Selection Background Check Education/Criminality/Employment/ Drugs/Health Compensation to be Comparable with Industry norms In line with authority and responsibility Continuous Training and Performance Monitoring Counselling and clearly defined processes and policies
  • 11. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Preventive Controls System and Application Access Physical Security CCTV Access Control Card Hardware USB Access Network Access Application Access System Logs Network Logs Printer Logs
  • 12. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Keys to Fraud Prevention • Understand the information you have • Logs of access both systems and applications • Physical access logs • Transactional records and audit trails • Data which can be used to discover trends • Analytical and Monitoring Tools • Mobile Records and CCTV Footage • Behavioral and Cultural Patterns • Interview Techniques • Forensic Data and Tools for data extraction • Types of data • Relational databases • XML • Meta Data • Big Data- Images, Videos • Case studies • Past experiences and learnings • Self • Organizational • Know what is to be used, where and in what context
  • 13. Phone: +91-9029026718 Email : info@saileshcousik.co.in THANK YOU FOR WATCHING ANY QUESTIONS ? Monday, 17 July 2017 13