SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
3/19/2014
1
Copyright © FraudResourceNet LLC
How to Use Data Analytics to
Expose Fixed Asset and Inventory
Fraudsters
Special Guest Presenter:
Stefan Davis, TopCAATs
March 19, 2014
Copyright © FraudResourceNet LLC
About Jim Kaplan, MSc, CIA,
CFE
• President and Founder of AuditNet®, the global
resource for auditors (now available on Apple and
Android devices)
• Auditor, Web Site Guru,
• Internet for Auditors Pioneer
• Recipient of the IIA’s 2007 Bradford Cadmus
Memorial Award.
• Author of “The Auditor’s Guide to Internet
Resources” 2nd Edition
3/19/2014
2
Copyright © FraudResourceNet LLC
President and Founder of White Collar Crime 101
• Publisher of White-Collar Crime Fighter
• Developer of FraudAware® Anti-Fraud Training
• Monthly Columnist, The Fraud Examiner, ACFE
Newsletter
Member of Editorial Advisory Board, ACFE
Author of “Fraud in the Markets”
• Explains how fraud fueled the financial crisis.
About Peter Goldmann, MSc., CFE
Copyright © FraudResourceNet LLC
About Stefan Davis, MEng, MBA
• Director at Reinvent Data
• Former Big-4 Auditor and Consultant
• Co-developer of TopCAATs, an Excel based CAATs
package
• Writer of numerous eBooks and whitepapers on
CAATs and data analytics for Auditors
3/19/2014
3
Copyright © FraudResourceNet LLC
This webinar and its material are the property of FraudResourceNet LLC. Unauthorized
usage or recording of this webinar or any of its material is strictly forbidden. We are
recording the webinar and you will be provided with a link access to that recording as
detailed below. Downloading or otherwise duplicating the webinar recording is expressly
prohibited.
Webinar recording link will be sent via email within 5-7 business days.
NASBA rules require us to ask polling questions during the Webinar and CPE certificates
will be sent via email to those who answer ALL the polling questions
The CPE certificates and link to the recording will be sent to the email address you
registered with in GTW. We are not responsible for delivery problems due to spam
filters, attachment restrictions or other controls in place for your email client.
Submit questions via the chat box on your screen and we will answer them either during
or at the conclusion.
After the Webinar is over you will have an opportunity to provide feedback. Please
complete the feedback questionnaire to help us continuously improve our Webinars
If GTW stops working you may need to close and restart. You can always dial in and
listen and follow along with the handout.
Webinar Housekeeping
Copyright © FraudResourceNet LLC
The views expressed by the presenters do not necessarily represent
the views, positions, or opinions of FraudResourceNet LLC (FRN) or
the presenters’ respective organizations. These materials, and the oral
presentation accompanying them, are for educational purposes only
and do not constitute accounting or legal advice or create an
accountant-client relationship.
While FRN makes every effort to ensure information is accurate and
complete, FRN makes no representations, guarantees, or warranties as
to the accuracy or completeness of the information provided via this
presentation. FRN specifically disclaims all liability for any claims or
damages that may result from the information contained in this
presentation, including any websites maintained by third parties and
linked to the FRN website
Any mention of commercial products is for information only; it does not
imply recommendation or endorsement by FraudResourceNet LLC
6
Disclaimers
3/19/2014
4
Copyright © FraudResourceNet LLC
 Phantom inventory: How to know what’s really in your
warehouses and what’s not
 How managers conceal inventory and capital asset theft
by reporting fraudulently inflated values
 Case studies of inventory / fixed asset theft and
concealment
 Effective data analytics tests revealing red flags of
inventory theft and asset value misstatement
 What to do after data analytics has uncovered signs of
asset fraud / misstatement
Learning Objectives
Copyright © FraudResourceNet LLC
 Introduction
 In the news: Costliest forms of fixed asset and inventory
fraud
 Fixed asset and inventory fraudsters
 AssetCo case
 Planning for fixed asset and/or inventory fraud
engagements
 Data gathering and software introduction
 Discovery with data analysis: Is there fraud at AssetCo
 Red flag detection and collusion
 Finding fixed asset and inventory fraud and next steps
Agenda
3/19/2014
5
Copyright © FraudResourceNet LLC
According to ACFE's "Report to the
Nations on Occupational Fraud and
Abuse”:
 > 7% of Fraud Cases in Financial
Statement Fraud with < 99
Employees
 > 15% of Fraud Cases in Non-Cash
Schemes (i.e. financial statement
manipulation)
 Private Companies at 39%+ of 2012
Fraud, $200k+ per Incident
 Banking & Financial Services,
Government, and Manufacturing—
Highest Fraud %
Costliest forms of fixed asset
and inventory fraud
Example fixed asset cycle
Source: rksolution.co.in
Copyright © FraudResourceNet LLC
Fixed Assets
 Booking fictitious assets
 Misrepresenting asset valuation
 Improper capitalization
 Asset theft
Inventory
 Stealing inventory
 Diverting inventory in transit
 Manipulating inventory quantities on hand / creating phantom
inventory
 Inflating inventory costs
 Misrepresenting inventory valuation
 Reversing inventory adjustments at period-end
Fraud schemes
3/19/2014
6
Copyright © FraudResourceNet LLC
What percentage of all frauds are non-cash schemes
(e.g. financial statement frauds)?
A 5%
B 10%
C 15%
D 25%
Polling Question 1
Copyright © FraudResourceNet LLC
Description: The perpetrator and his companies were the guarantors of several
large loans related to entertainment contracts. The loans were participation loans
with several foreign banks. Fraud began with failure to record or disclose a liability
caused by a failed loan.
Perpetrator’s internal accountants relayed that the bankers had requested that the
loss be kept off financial statements and that the external CPAs did not know about
it. The fraud grew to include overstatement of assets and understatement of
liabilities to keep the businesses functioning.
Dollar loss: $236 million.
What was done to conceal the fraud: Extensive internal collusion helped to hide
the fraud.
“Audit evidence” provided to external CPAs included
falsified contracts and invoices that presented certain
assets as company- owned.
Assets that were sold were not removed from the books,
assets that were borrowed were presented as owned, and
certain guarantees of loans were not disclosed.
How the scheme was detected: A whistleblower tipped off
authorities to the fraud.
AICPA Fraud Task Force &
Six Men & $4bn in Fraud
It all started with a loan failure…
3/19/2014
7
Copyright © FraudResourceNet LLC
Perpetrators of fraud
Copyright © FraudResourceNet LLC
Data analytics software
Couple of TOPCAATS selling points
Benefits Data analytics Traditional audit techniques
Save time • Identify red flags quickly
• Computerised procedures
• Delays in identifying red flags
• Manual procedures
Reduce risk • Test entire populations
• Perform continuous analysis
• Test a sample from the population
• Not feasible to perform continuous
analysis
Add value • Identify every individual anomaly
• Determine trends
• Identify large or ongoing anomalies
• Difficult to determine trends
Create
opportunities
• Handle huge amounts of data • Handle limited amounts of data
3/19/2014
8
Copyright © FraudResourceNet LLC
 Using set rules to identify transactions
of higher risk
 Every company is different, has a
different environment, different systems,
different risks, etc.
 Need to use judgment to select testing
 Need to use judgment to evaluate
results
 Just because a transaction matches a
red flag doesn’t mean fraud is present
 Using data analytics does not guarantee
finding fraud or finding all fraud!
Principles of Using Data Analytics
to Detect Fraud
Copyright © FraudResourceNet LLC
The Data Analysis Cycle
Plan your 
testing
Request 
Data
Obtain and 
Clean Data
Carry out 
testing
Evaluate and 
Follow up
Review
Continuous
Learning
3/19/2014
9
Copyright © FraudResourceNet LLC
1. Open / import data file
2. Cleanse data (if necessary)
3. Check column statistics (check-totals)
TopCAATs - Getting Started
Copyright © FraudResourceNet LLC
Ima Tipster calls AssetCo’s
whistleblowers hotline with
anonymous tip that:
 There is massive theft going on in
the warehouse
 They think assets are being
overstated to meet loan covenants
 They have general concerns about
fixed asset and inventory fraud
 They’re scared to come forward or
raise anything with management
AssetCo Case Study: First Contact
3/19/2014
10
Copyright © FraudResourceNet LLC
 1000+ assets with no physical review (maybe
this wasn’t a material site?)
 Profits are increasing but cash flow is negative
 Haven’t performed a comparison of sales price
vs. book value for inventory
 Caught Operations Manager stealing stock via
CCTV
 Tight loan covenants, EBITDA close to
breaching covenants every quarter
 Two people are responsible for fixed assets and
inventory but they are centralized (Corporate)
 All inventory-holding locations are decentralized
AssetCo: Interview Findings
Copyright © FraudResourceNet LLC
Choose all of the following that are components of the
data analytics cycle:
A Request data
B Clean data
C Conduct testing
D Review
E All of the above
Polling Question 2
3/19/2014
11
Copyright © FraudResourceNet LLC
Operations Manager
 Assumed CCTV cameras were not working
 Thought he would never get caught
 Hadn’t had a raise in over 3 years
 Worked at AssetCo for 10 years
 Claims he had not stolen anything before
 Needed the extra money to pay the rent
Fixed Asset Clerk
 Reviewed CCTV tapes and notified management
 Told by manager that it’s okay not to do physical counts
AssetCo: Interview Findings
Copyright © FraudResourceNet LLC
• Walk through processes
 Asset additions, disposal and transfer
 Inventory booking in and out
 Purchase to Pay (P2P) cycle and CoGS transfer
• Understand key controls in place and gaps
 e.g. Inventory counts, fixed asset verification
 Ensure you include those operated both locally and centrally
• Understand relevant and notable history
 Process changes, significant acquisitions, inventory transfers, etc.
• Develop hypotheses
• Develop plan to test hypotheses incorporating data
analysis
Planning
3/19/2014
12
Copyright © FraudResourceNet LLC
When considering financial statement fraud…
 Completeness – are there any assets off-balance sheet?
 Existence – are these assets actually there?
 Accuracy – are the costs of these assets correct?
 Valuation – are the values of these assets appropriate?
 Ownership – does the company have rights to the assets?
 Presentation – are the assets correctly classified?
Assertion Risks
Copyright © FraudResourceNet LLC
Which three of these would normally be the primary
focus when looking for inventory asset fraud using
data analysis?
A Completeness
B Existence
C Accuracy
D Valuation
E Ownership
F Presentation
Polling Question 3
3/19/2014
13
Copyright © FraudResourceNet LLC
 No asset revaluation other than write-up with
acquisitions
 No policy in relation to capital vs expense items and no
review
 No recalculation of depreciation (should have a system
control but someone could get around it).
 No capital or inventory budgetary review
 No oversight of transfer of inventory to CoGS
 Monthly inventory values are submitted by each site (no
corporate-wide inventory system)
 Inventory transfer in from another site before year-end
 Recurring negative cash flows
AssetCo: Planning observations
Copyright © FraudResourceNet LLC
Fixed Assets
 Compare asset register totals to ledgers
 Recalculate depreciation
 Review asset lives for each category
 Identify duplicate assets
 Review for incorrectly capitalized assets
 Review significant additions
Initial Test Plan
3/19/2014
14
Copyright © FraudResourceNet LLC
Inventory
 Check totals to corporate submissions
 Join for Stock, Sales and Purchase data sources
 Test stock against Benford’s Law
 Compare stock value to purchase prices
 Review for aged / obsolete inventory
 Compare stock value to sales prices
 Review for purchase of obsolete inventory
 Check CoGS transfer dates
 Compare dispatched vs received for inter-site transfer
Also consider tests with sales, accounts payable, closing
entries
Initial Test Plan
Copyright © FraudResourceNet LLC
Request all data fields and files in line with desired tests
Data gathering
Inventory
 Part number
 Part description
 Unit cost
 Quantity
 Total value
 Part status (e.g. current, obsolete)
Inventory purchases
 GRN date
 GRN quantity
 Unit cost
 Vendor ID, name, address
 Purchase order number
 Posted by and approved by ID
 Budgets by vendor or product
 Comments
Sales
 Sold quantity
 Sales price
 Transfer to COGS
 Customer ID, name, address
 Date of sale
 Date of transfer to CoGS
3/19/2014
15
Copyright © FraudResourceNet LLC
Request all data fields and files in line with desired tests
Data gathering (cont’d)
Fixed assets
 Asset ID
 Depreciation for period
 Accumulated depreciation
 Net book value
 Asset description
 Date of purchase
 Date of sale
 Date of disposal
 Loss / Gain on Sale
 Acquisition revaluations and dates
Copyright © FraudResourceNet LLC
Which of the following are useful tests for inventory
manipulation?
A. Test stock against Benford’s Law
B. Compare stock value to purchase prices
C. Review for aged / obsolete inventory
D. None of the above
E. All of the above
Polling Question 4
3/19/2014
16
Copyright © FraudResourceNet LLC
 Speak to IT departments not just process owners
 Flat files (e.g. “.csv”) are best
 Be specific– the more information you can provide the
better
 Use a data request template
Getting the data
You can find an example data request template at
www.topcaats.com/datarequestform
Copyright © FraudResourceNet LLC
1. Assets under-depreciated
2. Various lives within an asset category
Assets - Red flags
3/19/2014
17
Copyright © FraudResourceNet LLC
3. Duplicated assets
4. Repairs and maintenance capitalized
Assets - Red flags
Copyright © FraudResourceNet LLC
5. Low value items capitalized
6. Significant additions
Assets - Red flags
3/19/2014
18
Copyright © FraudResourceNet LLC
1. Stock listing totals not agreeing to ledger (E)
2. Receipt of obsolete inventory (E/V)
Inventory - Red flags
Copyright © FraudResourceNet LLC
3. Inventory site transfer received ≠ despatched (E)
Inventory - Red flags
Add screenshot
3/19/2014
19
Copyright © FraudResourceNet LLC
4. CoGS transfer in period after sale made (E)
5. Stock value much greater than last purchase prices
Inventory - Red flags
Copyright © FraudResourceNet LLC
6. Stock value not between max/min purchase prices
7. Values not conforming to Benford’s law
Inventory - Red flags
3/19/2014
20
Copyright © FraudResourceNet LLC
8. Sales prices lower than cost held in stock
9. Aged inventory
Inventory - Red flags
Copyright © FraudResourceNet LLC
Sales prices that are lower than cost held in stock is a
red flag of inventory fraud
A True
B. False
Polling Question 5
3/19/2014
21
Copyright © FraudResourceNet LLC
1. Compile a summary of data used and findings in each area
2. Determine any additional tests required and perform
3. Discuss initial findings with CEO and recommend follow-up steps
4. Conduct follow-up interviews with employees
5. Review control gaps and deficiencies and make recommendations
6. Recommend management develop a business case and implement
ASAP
7. Determine if client has fraud insurance rider, recommend consideration
8. Contact insurer (if applicable) and begin claim process
9. Contact the authorities and file a report
10. Determine if prosecution is viable
11. Complete report (see ACFE.com)
12. Compile required supporting documentation for insurer and authorities
Next steps
Copyright © FraudResourceNet LLC
Fixed Assets
 Implement capital vs expense items policy
 Add review controls for capitalization of assets over $X
 Add system controls to prevent capitalization of assets under $X
 Default depreciation calculation based on asset category
 Add test of comparison of anticipated value to book value
 Implement capital and inventory budgetary review
 Add surprise physical verification of assets
 Obtain expected industry valuation and decline by year for significant assets
Inventory
 Add control at month-end over CoGS transfer period
 Add system controls over price and quantity adjustments
 Implement provisioning policy for aged / obsolete stock
 Perform audited counts of all inventory of high volume sites (PI or annual)
 Corporate oversight of significant transfers between sites
 Implement inventory budgetary review
Fraud prevention
3/19/2014
22
Copyright © FraudResourceNet LLC
Continuous Monitoring
 Complete risk assessment and develop annual audit plan
 Determine monthly and quarterly testing by priority
 Implement data analysis testing and incorporate into annual audit
plan
 Perform and complete ongoing control assessments
Fraud prevention
Copyright © FraudResourceNet LLC
Questions?
3/19/2014
23
Copyright © FraudResourceNet LLC
Peter Goldmann
FraudResourceNet LLC
800-440-2261
www.fraudresourcenet.com
pgoldmann@fraudresourcenet.com
Jim Kaplan
FraudResourceNet LLC
800-385-1625
www.fraudresourcenet.com
jkaplan@fraudresourcenet.com
Stefan Davis
Reinvent Data Ltd
www.topcaats.com
stefan.davis@reinventdata.com
Thank You!
Copyright © FraudResourceNet LLC
Coming Up
Upcoming March Anti-Fraud
Webinar…
 "Background Checks: Best
Practices for Reducing Employee
Fraud”, April 17, 2014
 "Effective General Ledger and
Journal Entry Fraud Testing Using
Data Analytics”, April 23, 2014
 Sign up at:
http://www.fraudresourcenet.com

Más contenido relacionado

Destacado

Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisFraudBusters
 
Forensic Accounting – How To Uncover Fraud Jan 2012
Forensic Accounting – How To Uncover Fraud Jan 2012Forensic Accounting – How To Uncover Fraud Jan 2012
Forensic Accounting – How To Uncover Fraud Jan 2012Hermerding
 
BHARTI AIRTEL PROJECT CVV - Nirupam Varma
BHARTI AIRTEL PROJECT CVV - Nirupam VarmaBHARTI AIRTEL PROJECT CVV - Nirupam Varma
BHARTI AIRTEL PROJECT CVV - Nirupam VarmaBhupathi Raju Varma
 
Forensic Accounting
Forensic AccountingForensic Accounting
Forensic AccountingNabendu Maji
 
Forensic accounting ppt (2)
Forensic accounting ppt (2)Forensic accounting ppt (2)
Forensic accounting ppt (2)Shriya Gupta
 
SAP - FIXED ASSETS ACCOUNTING
SAP - FIXED ASSETS ACCOUNTINGSAP - FIXED ASSETS ACCOUNTING
SAP - FIXED ASSETS ACCOUNTINGsaiprasadbagrecha
 

Destacado (8)

Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
 
Forensic Accounting – How To Uncover Fraud Jan 2012
Forensic Accounting – How To Uncover Fraud Jan 2012Forensic Accounting – How To Uncover Fraud Jan 2012
Forensic Accounting – How To Uncover Fraud Jan 2012
 
Forensic audit
Forensic auditForensic audit
Forensic audit
 
BHARTI AIRTEL PROJECT CVV - Nirupam Varma
BHARTI AIRTEL PROJECT CVV - Nirupam VarmaBHARTI AIRTEL PROJECT CVV - Nirupam Varma
BHARTI AIRTEL PROJECT CVV - Nirupam Varma
 
Forensic Accounting
Forensic AccountingForensic Accounting
Forensic Accounting
 
Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
 
Forensic accounting ppt (2)
Forensic accounting ppt (2)Forensic accounting ppt (2)
Forensic accounting ppt (2)
 
SAP - FIXED ASSETS ACCOUNTING
SAP - FIXED ASSETS ACCOUNTINGSAP - FIXED ASSETS ACCOUNTING
SAP - FIXED ASSETS ACCOUNTING
 

Similar a Here are the steps I would take to plan the fixed asset and inventory fraud engagement at AssetCo:1. Request relevant data files from AssetCo such as fixed assets, inventory, purchases, sales, general ledger, etc. spanning the last few years. 2. Interview key personnel involved in fixed assets and inventory processes to understand controls and responsibilities. 3. Document the key processes for fixed assets and inventory including additions, disposals, transfers, purchases and sales. 4. Review internal audit reports, external audit management letters, loan documents for any previous issues.5. Based on initial interviews and document review, develop a risk-based testing approach focusing on higher risk areas. 6. Obtain required

Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudFraudBusters
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisFraudBusters
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditFraudBusters
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning EssentialsFraudBusters
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsFraudBusters
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudFraudBusters
 
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...FraudBusters
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudFraudBusters
 
Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataFraudBusters
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
idBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules OverviewidBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules OverviewSteven Lane
 
How to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewHow to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewJim Kaplan CIA CFE
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudFraudBusters
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraudBusters
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsFraudBusters
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For AmlKartik Mehta
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyFraudBusters
 

Similar a Here are the steps I would take to plan the fixed asset and inventory fraud engagement at AssetCo:1. Request relevant data files from AssetCo such as fixed assets, inventory, purchases, sales, general ledger, etc. spanning the last few years. 2. Interview key personnel involved in fixed assets and inventory processes to understand controls and responsibilities. 3. Document the key processes for fixed assets and inventory including additions, disposals, transfers, purchases and sales. 4. Review internal audit reports, external audit management letters, loan documents for any previous issues.5. Based on initial interviews and document review, develop a risk-based testing approach focusing on higher risk areas. 6. Obtain required (20)

Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning Essentials
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay Fraud
 
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
 
Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial Data
 
Kenya AMC Presentation 2
Kenya AMC Presentation 2Kenya AMC Presentation 2
Kenya AMC Presentation 2
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
idBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules OverviewidBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules Overview
 
How to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewHow to prepare for your first anti fraud review
How to prepare for your first anti fraud review
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data Analytics
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud Policy
 

Más de FraudBusters

Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics FraudBusters
 
Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterFraudBusters
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsFraudBusters
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud DetectionFraudBusters
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFraudBusters
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudFraudBusters
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best PracticesFraudBusters
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsFraudBusters
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisFraudBusters
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraudBusters
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsFraudBusters
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsFraudBusters
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisFraudBusters
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisFraudBusters
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial IntegrityFraudBusters
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudBusters
 

Más de FraudBusters (17)

Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
 
Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a Fraudster
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data Analytics
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit Software
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding Fraud
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best Practices
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your Audits
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data Analysis
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
 

Último

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Último (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Here are the steps I would take to plan the fixed asset and inventory fraud engagement at AssetCo:1. Request relevant data files from AssetCo such as fixed assets, inventory, purchases, sales, general ledger, etc. spanning the last few years. 2. Interview key personnel involved in fixed assets and inventory processes to understand controls and responsibilities. 3. Document the key processes for fixed assets and inventory including additions, disposals, transfers, purchases and sales. 4. Review internal audit reports, external audit management letters, loan documents for any previous issues.5. Based on initial interviews and document review, develop a risk-based testing approach focusing on higher risk areas. 6. Obtain required

  • 1. 3/19/2014 1 Copyright © FraudResourceNet LLC How to Use Data Analytics to Expose Fixed Asset and Inventory Fraudsters Special Guest Presenter: Stefan Davis, TopCAATs March 19, 2014 Copyright © FraudResourceNet LLC About Jim Kaplan, MSc, CIA, CFE • President and Founder of AuditNet®, the global resource for auditors (now available on Apple and Android devices) • Auditor, Web Site Guru, • Internet for Auditors Pioneer • Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award. • Author of “The Auditor’s Guide to Internet Resources” 2nd Edition
  • 2. 3/19/2014 2 Copyright © FraudResourceNet LLC President and Founder of White Collar Crime 101 • Publisher of White-Collar Crime Fighter • Developer of FraudAware® Anti-Fraud Training • Monthly Columnist, The Fraud Examiner, ACFE Newsletter Member of Editorial Advisory Board, ACFE Author of “Fraud in the Markets” • Explains how fraud fueled the financial crisis. About Peter Goldmann, MSc., CFE Copyright © FraudResourceNet LLC About Stefan Davis, MEng, MBA • Director at Reinvent Data • Former Big-4 Auditor and Consultant • Co-developer of TopCAATs, an Excel based CAATs package • Writer of numerous eBooks and whitepapers on CAATs and data analytics for Auditors
  • 3. 3/19/2014 3 Copyright © FraudResourceNet LLC This webinar and its material are the property of FraudResourceNet LLC. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden. We are recording the webinar and you will be provided with a link access to that recording as detailed below. Downloading or otherwise duplicating the webinar recording is expressly prohibited. Webinar recording link will be sent via email within 5-7 business days. NASBA rules require us to ask polling questions during the Webinar and CPE certificates will be sent via email to those who answer ALL the polling questions The CPE certificates and link to the recording will be sent to the email address you registered with in GTW. We are not responsible for delivery problems due to spam filters, attachment restrictions or other controls in place for your email client. Submit questions via the chat box on your screen and we will answer them either during or at the conclusion. After the Webinar is over you will have an opportunity to provide feedback. Please complete the feedback questionnaire to help us continuously improve our Webinars If GTW stops working you may need to close and restart. You can always dial in and listen and follow along with the handout. Webinar Housekeeping Copyright © FraudResourceNet LLC The views expressed by the presenters do not necessarily represent the views, positions, or opinions of FraudResourceNet LLC (FRN) or the presenters’ respective organizations. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client relationship. While FRN makes every effort to ensure information is accurate and complete, FRN makes no representations, guarantees, or warranties as to the accuracy or completeness of the information provided via this presentation. FRN specifically disclaims all liability for any claims or damages that may result from the information contained in this presentation, including any websites maintained by third parties and linked to the FRN website Any mention of commercial products is for information only; it does not imply recommendation or endorsement by FraudResourceNet LLC 6 Disclaimers
  • 4. 3/19/2014 4 Copyright © FraudResourceNet LLC  Phantom inventory: How to know what’s really in your warehouses and what’s not  How managers conceal inventory and capital asset theft by reporting fraudulently inflated values  Case studies of inventory / fixed asset theft and concealment  Effective data analytics tests revealing red flags of inventory theft and asset value misstatement  What to do after data analytics has uncovered signs of asset fraud / misstatement Learning Objectives Copyright © FraudResourceNet LLC  Introduction  In the news: Costliest forms of fixed asset and inventory fraud  Fixed asset and inventory fraudsters  AssetCo case  Planning for fixed asset and/or inventory fraud engagements  Data gathering and software introduction  Discovery with data analysis: Is there fraud at AssetCo  Red flag detection and collusion  Finding fixed asset and inventory fraud and next steps Agenda
  • 5. 3/19/2014 5 Copyright © FraudResourceNet LLC According to ACFE's "Report to the Nations on Occupational Fraud and Abuse”:  > 7% of Fraud Cases in Financial Statement Fraud with < 99 Employees  > 15% of Fraud Cases in Non-Cash Schemes (i.e. financial statement manipulation)  Private Companies at 39%+ of 2012 Fraud, $200k+ per Incident  Banking & Financial Services, Government, and Manufacturing— Highest Fraud % Costliest forms of fixed asset and inventory fraud Example fixed asset cycle Source: rksolution.co.in Copyright © FraudResourceNet LLC Fixed Assets  Booking fictitious assets  Misrepresenting asset valuation  Improper capitalization  Asset theft Inventory  Stealing inventory  Diverting inventory in transit  Manipulating inventory quantities on hand / creating phantom inventory  Inflating inventory costs  Misrepresenting inventory valuation  Reversing inventory adjustments at period-end Fraud schemes
  • 6. 3/19/2014 6 Copyright © FraudResourceNet LLC What percentage of all frauds are non-cash schemes (e.g. financial statement frauds)? A 5% B 10% C 15% D 25% Polling Question 1 Copyright © FraudResourceNet LLC Description: The perpetrator and his companies were the guarantors of several large loans related to entertainment contracts. The loans were participation loans with several foreign banks. Fraud began with failure to record or disclose a liability caused by a failed loan. Perpetrator’s internal accountants relayed that the bankers had requested that the loss be kept off financial statements and that the external CPAs did not know about it. The fraud grew to include overstatement of assets and understatement of liabilities to keep the businesses functioning. Dollar loss: $236 million. What was done to conceal the fraud: Extensive internal collusion helped to hide the fraud. “Audit evidence” provided to external CPAs included falsified contracts and invoices that presented certain assets as company- owned. Assets that were sold were not removed from the books, assets that were borrowed were presented as owned, and certain guarantees of loans were not disclosed. How the scheme was detected: A whistleblower tipped off authorities to the fraud. AICPA Fraud Task Force & Six Men & $4bn in Fraud It all started with a loan failure…
  • 7. 3/19/2014 7 Copyright © FraudResourceNet LLC Perpetrators of fraud Copyright © FraudResourceNet LLC Data analytics software Couple of TOPCAATS selling points Benefits Data analytics Traditional audit techniques Save time • Identify red flags quickly • Computerised procedures • Delays in identifying red flags • Manual procedures Reduce risk • Test entire populations • Perform continuous analysis • Test a sample from the population • Not feasible to perform continuous analysis Add value • Identify every individual anomaly • Determine trends • Identify large or ongoing anomalies • Difficult to determine trends Create opportunities • Handle huge amounts of data • Handle limited amounts of data
  • 8. 3/19/2014 8 Copyright © FraudResourceNet LLC  Using set rules to identify transactions of higher risk  Every company is different, has a different environment, different systems, different risks, etc.  Need to use judgment to select testing  Need to use judgment to evaluate results  Just because a transaction matches a red flag doesn’t mean fraud is present  Using data analytics does not guarantee finding fraud or finding all fraud! Principles of Using Data Analytics to Detect Fraud Copyright © FraudResourceNet LLC The Data Analysis Cycle Plan your  testing Request  Data Obtain and  Clean Data Carry out  testing Evaluate and  Follow up Review Continuous Learning
  • 9. 3/19/2014 9 Copyright © FraudResourceNet LLC 1. Open / import data file 2. Cleanse data (if necessary) 3. Check column statistics (check-totals) TopCAATs - Getting Started Copyright © FraudResourceNet LLC Ima Tipster calls AssetCo’s whistleblowers hotline with anonymous tip that:  There is massive theft going on in the warehouse  They think assets are being overstated to meet loan covenants  They have general concerns about fixed asset and inventory fraud  They’re scared to come forward or raise anything with management AssetCo Case Study: First Contact
  • 10. 3/19/2014 10 Copyright © FraudResourceNet LLC  1000+ assets with no physical review (maybe this wasn’t a material site?)  Profits are increasing but cash flow is negative  Haven’t performed a comparison of sales price vs. book value for inventory  Caught Operations Manager stealing stock via CCTV  Tight loan covenants, EBITDA close to breaching covenants every quarter  Two people are responsible for fixed assets and inventory but they are centralized (Corporate)  All inventory-holding locations are decentralized AssetCo: Interview Findings Copyright © FraudResourceNet LLC Choose all of the following that are components of the data analytics cycle: A Request data B Clean data C Conduct testing D Review E All of the above Polling Question 2
  • 11. 3/19/2014 11 Copyright © FraudResourceNet LLC Operations Manager  Assumed CCTV cameras were not working  Thought he would never get caught  Hadn’t had a raise in over 3 years  Worked at AssetCo for 10 years  Claims he had not stolen anything before  Needed the extra money to pay the rent Fixed Asset Clerk  Reviewed CCTV tapes and notified management  Told by manager that it’s okay not to do physical counts AssetCo: Interview Findings Copyright © FraudResourceNet LLC • Walk through processes  Asset additions, disposal and transfer  Inventory booking in and out  Purchase to Pay (P2P) cycle and CoGS transfer • Understand key controls in place and gaps  e.g. Inventory counts, fixed asset verification  Ensure you include those operated both locally and centrally • Understand relevant and notable history  Process changes, significant acquisitions, inventory transfers, etc. • Develop hypotheses • Develop plan to test hypotheses incorporating data analysis Planning
  • 12. 3/19/2014 12 Copyright © FraudResourceNet LLC When considering financial statement fraud…  Completeness – are there any assets off-balance sheet?  Existence – are these assets actually there?  Accuracy – are the costs of these assets correct?  Valuation – are the values of these assets appropriate?  Ownership – does the company have rights to the assets?  Presentation – are the assets correctly classified? Assertion Risks Copyright © FraudResourceNet LLC Which three of these would normally be the primary focus when looking for inventory asset fraud using data analysis? A Completeness B Existence C Accuracy D Valuation E Ownership F Presentation Polling Question 3
  • 13. 3/19/2014 13 Copyright © FraudResourceNet LLC  No asset revaluation other than write-up with acquisitions  No policy in relation to capital vs expense items and no review  No recalculation of depreciation (should have a system control but someone could get around it).  No capital or inventory budgetary review  No oversight of transfer of inventory to CoGS  Monthly inventory values are submitted by each site (no corporate-wide inventory system)  Inventory transfer in from another site before year-end  Recurring negative cash flows AssetCo: Planning observations Copyright © FraudResourceNet LLC Fixed Assets  Compare asset register totals to ledgers  Recalculate depreciation  Review asset lives for each category  Identify duplicate assets  Review for incorrectly capitalized assets  Review significant additions Initial Test Plan
  • 14. 3/19/2014 14 Copyright © FraudResourceNet LLC Inventory  Check totals to corporate submissions  Join for Stock, Sales and Purchase data sources  Test stock against Benford’s Law  Compare stock value to purchase prices  Review for aged / obsolete inventory  Compare stock value to sales prices  Review for purchase of obsolete inventory  Check CoGS transfer dates  Compare dispatched vs received for inter-site transfer Also consider tests with sales, accounts payable, closing entries Initial Test Plan Copyright © FraudResourceNet LLC Request all data fields and files in line with desired tests Data gathering Inventory  Part number  Part description  Unit cost  Quantity  Total value  Part status (e.g. current, obsolete) Inventory purchases  GRN date  GRN quantity  Unit cost  Vendor ID, name, address  Purchase order number  Posted by and approved by ID  Budgets by vendor or product  Comments Sales  Sold quantity  Sales price  Transfer to COGS  Customer ID, name, address  Date of sale  Date of transfer to CoGS
  • 15. 3/19/2014 15 Copyright © FraudResourceNet LLC Request all data fields and files in line with desired tests Data gathering (cont’d) Fixed assets  Asset ID  Depreciation for period  Accumulated depreciation  Net book value  Asset description  Date of purchase  Date of sale  Date of disposal  Loss / Gain on Sale  Acquisition revaluations and dates Copyright © FraudResourceNet LLC Which of the following are useful tests for inventory manipulation? A. Test stock against Benford’s Law B. Compare stock value to purchase prices C. Review for aged / obsolete inventory D. None of the above E. All of the above Polling Question 4
  • 16. 3/19/2014 16 Copyright © FraudResourceNet LLC  Speak to IT departments not just process owners  Flat files (e.g. “.csv”) are best  Be specific– the more information you can provide the better  Use a data request template Getting the data You can find an example data request template at www.topcaats.com/datarequestform Copyright © FraudResourceNet LLC 1. Assets under-depreciated 2. Various lives within an asset category Assets - Red flags
  • 17. 3/19/2014 17 Copyright © FraudResourceNet LLC 3. Duplicated assets 4. Repairs and maintenance capitalized Assets - Red flags Copyright © FraudResourceNet LLC 5. Low value items capitalized 6. Significant additions Assets - Red flags
  • 18. 3/19/2014 18 Copyright © FraudResourceNet LLC 1. Stock listing totals not agreeing to ledger (E) 2. Receipt of obsolete inventory (E/V) Inventory - Red flags Copyright © FraudResourceNet LLC 3. Inventory site transfer received ≠ despatched (E) Inventory - Red flags Add screenshot
  • 19. 3/19/2014 19 Copyright © FraudResourceNet LLC 4. CoGS transfer in period after sale made (E) 5. Stock value much greater than last purchase prices Inventory - Red flags Copyright © FraudResourceNet LLC 6. Stock value not between max/min purchase prices 7. Values not conforming to Benford’s law Inventory - Red flags
  • 20. 3/19/2014 20 Copyright © FraudResourceNet LLC 8. Sales prices lower than cost held in stock 9. Aged inventory Inventory - Red flags Copyright © FraudResourceNet LLC Sales prices that are lower than cost held in stock is a red flag of inventory fraud A True B. False Polling Question 5
  • 21. 3/19/2014 21 Copyright © FraudResourceNet LLC 1. Compile a summary of data used and findings in each area 2. Determine any additional tests required and perform 3. Discuss initial findings with CEO and recommend follow-up steps 4. Conduct follow-up interviews with employees 5. Review control gaps and deficiencies and make recommendations 6. Recommend management develop a business case and implement ASAP 7. Determine if client has fraud insurance rider, recommend consideration 8. Contact insurer (if applicable) and begin claim process 9. Contact the authorities and file a report 10. Determine if prosecution is viable 11. Complete report (see ACFE.com) 12. Compile required supporting documentation for insurer and authorities Next steps Copyright © FraudResourceNet LLC Fixed Assets  Implement capital vs expense items policy  Add review controls for capitalization of assets over $X  Add system controls to prevent capitalization of assets under $X  Default depreciation calculation based on asset category  Add test of comparison of anticipated value to book value  Implement capital and inventory budgetary review  Add surprise physical verification of assets  Obtain expected industry valuation and decline by year for significant assets Inventory  Add control at month-end over CoGS transfer period  Add system controls over price and quantity adjustments  Implement provisioning policy for aged / obsolete stock  Perform audited counts of all inventory of high volume sites (PI or annual)  Corporate oversight of significant transfers between sites  Implement inventory budgetary review Fraud prevention
  • 22. 3/19/2014 22 Copyright © FraudResourceNet LLC Continuous Monitoring  Complete risk assessment and develop annual audit plan  Determine monthly and quarterly testing by priority  Implement data analysis testing and incorporate into annual audit plan  Perform and complete ongoing control assessments Fraud prevention Copyright © FraudResourceNet LLC Questions?
  • 23. 3/19/2014 23 Copyright © FraudResourceNet LLC Peter Goldmann FraudResourceNet LLC 800-440-2261 www.fraudresourcenet.com pgoldmann@fraudresourcenet.com Jim Kaplan FraudResourceNet LLC 800-385-1625 www.fraudresourcenet.com jkaplan@fraudresourcenet.com Stefan Davis Reinvent Data Ltd www.topcaats.com stefan.davis@reinventdata.com Thank You! Copyright © FraudResourceNet LLC Coming Up Upcoming March Anti-Fraud Webinar…  "Background Checks: Best Practices for Reducing Employee Fraud”, April 17, 2014  "Effective General Ledger and Journal Entry Fraud Testing Using Data Analytics”, April 23, 2014  Sign up at: http://www.fraudresourcenet.com