SlideShare a Scribd company logo
1 of 21
Download to read offline
Best Practices in Detecting 
Accounts Payable Fraud 
Using Data Analysis
August 21, 2013
Special Guest Presenter:
Katrina Kiselinchev, CIA, CPA, CFE

Copyright © 2013 FraudResourceNet™ LLC

About Peter Goldmann, MSc., CFE



President and Founder of White Collar Crime 101

Publisher of White-Collar Crime Fighter
Developer of FraudAware® Anti-Fraud Training
Monthly Columnist, The Fraud Examiner,
ACFE Newsletter

 Member of Editorial Advisory Board, ACFE
 Author of “Fraud in the Markets”
Explains how fraud fueled the financial crisis.

Copyright © 2013 FraudResourceNet™ LLC
About Jim Kaplan, MSc, CIA, CFE
 President and Founder of
AuditNet®, the global resource
for auditors
 Auditor, Web Site Guru,
Internet for Auditors Pioneer
Recipient of the IIA’s 2007
Bradford Cadmus Memorial
Award.
 Author of “The Auditor’s
Guide to Internet Resources”
2nd Edition
Copyright © 2013 FraudResourceNet™ LLC

About Katrina Kiselinchev, CPA, CIA, CFE, CFF








President of Inclusivitie, We Do “SMART”
Integration Partner with IDEA
Experience across industries, audit, fraud, and value
Achieved Value of $5+ Million & ROI of 2000+%, which 
included using IDEA’s SMART Analyzer .
Instructor with AICPA & ACFE 
Specific Frauds in Accounts Payable: Duplicates, P‐Card, Travel

Copyright © 2013 FraudResourceNet™ LLC
Webinar Housekeeping
This webinar and its contents are the property of FraudResourceNet™
LLC. Unauthorized usage or recording of this webinar or any of its material
is strictly forbidden.
We will be recording the webinar and you will be provided access to that
recording within five-seven business days. Downloading or otherwise
duplicating the webinar recording is expressly prohibited.
You must answer the polling questions to qualify for CPE per NASBA
unless you are viewing the Webinar with a group on a single screen.
Please complete the evaluation to help us continuously improve our
Webinars.
Submit questions via the chat box on your screen and we will answer
them either during or at the conclusion.
If GTW stops working you may need to close and restart. You can always
dial in and listen and follow along with the handout.
Copyright © 2013 FraudResourceNet™ LLC
CS

Disclaimers


The views expressed by the presenters do not necessarily represent the
views, positions, or opinions of FraudResourceNet LLC (FRN) or the
presenters’ respective organizations. These materials, and the oral
presentation accompanying them, are for educational purposes only and do
not constitute accounting or legal advice or create an accountant-client
relationship.
While FRN makes every effort to ensure information is accurate and
complete, FRN makes no representations, guarantees, or warranties as to
the accuracy or completeness of the information provided via this
presentation. FRN specifically disclaims all liability for any claims or
damages that may result from the information contained in this
presentation, including any websites maintained by third parties and linked
to the FRN website
Any mention of commercial products is for information only; it does not
imply recommendation or endorsement by FraudResourceNet LLC
Copyright © 2013 FraudResourceNet™ LLC

5
Agenda






Introduction
Standards & Anti‐Fraud Essentials Auditors
Fraud State of the Union
Accounts Payable Background
Accounts Payable Fraud
 Overview
 Schemes
 Red Flags

 Aiding Discovery of Fraud: Industry & Risks & Operations 
 Data Mining for AP Fraud: Analytics & Testing Methods
 Case Studies & Practice in Data Analytics
Copyright © 2013 FraudResourceNet™ LLC

6

The Auditor’s Role

IPPF Standard 1210.A3
 Internal auditors must have sufficient 
knowledge of…available technology 
based audit techniques   to perform their 
assigned work

Copyright © 2013 FraudResourceNet™ LLC
IIA Guidance – GTAG 13
Internal auditors require appropriate skills 
and should use available technological 
tools to help them maintain a successful 
fraud management program that covers 
prevention, detection, and investigation. 
As such, all audit professionals — not just 
IT audit specialists — are expected to be 
increasingly proficient in areas such as 
data analysis and the use of technology to 
help them meet the demands of the job.

Copyright © 2013 FraudResourceNet™ LLC

Professional Guidance

Copyright © 2013 FraudResourceNet™ LLC
Workplace Fraud

Copyright © 2013 FraudResourceNet™ LLC

Fraud State of the Union

Source: 2012 ACFE Report to the 
Nations

Copyright © 2013 FraudResourceNet™ LLC
Fraud State of the Union

Source: 2012 ACFE Report to the 
Copyright © 2013 FraudResourceNet™ LLC
Nations

Learning Objectives






Uncover Check Fraud in Accounts Payable
Detect Duplicate Billing Schemes
Detect & Prevent Expense Reimbursement Scams
Flag Bogus Invoices
Identify Purchasing Card & Other Expense Scams & Schemes

Copyright © 2013 FraudResourceNet™ LLC

13
Dishonest AP Fraudsters
What They Do:
 Create Fake Vendors, Expenses, Receipts, Invoices
 Collude and Create Kickback Schemes
 Misclassify Expenses 
 Understate Liabilities
 Forge, intercept, alter and counterfeit checks 
 Take Advantage of Multiple Decentralized Policies
 Preferred Vendor / Travel / Card/ P‐Card

Copyright © 2013 FraudResourceNet™ LLC

Accounts Payable Fraud:
Schemes
1) External Accounts Payable Fraud:
 Sham Vendors
 Vendor Billing Scams/Double billing 
 Customer/Client Fraud
 External Hacking of Customer/Vendor Data
2) Internal Accounts Payable Fraud:
 Shell Company Schemes
 Internal Billing Schemes
 Vendor Master File 
 Check Tampering
 Travel & Entertainment
 Payroll Fraud 

Copyright © 2013 FraudResourceNet™ LLC

Continued…
Accounts Payable Fraud:
Schemes

3) Collusion:
 Bid‐Rigging
 Invoice Billing Collusion
 Bribery & Kickbacks
 Pricing Schemes
 Payroll Schemes 

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 1
Which One of the Following is a Type of 
Fraudulent Disbursement Scheme?
A.
B.
C.
D.

Asset Req & Transfers
Unrecorded Sales
Write‐Off Schemes
Shell Company

Copyright © 2013 FraudResourceNet™ LLC
Accounts Payable Fails…
Business Fails
How a company manages its Accounts Payable process 
affects two very important areas of an organization’s 
business: Cash Flow and Supplier Relationships
Fraud Impacting One or Both of These Areas is Detrimental. 
Period.
Internal Controls, Fraud Assessments, and Periodic Audits 
are Very Important to Discover Issues Sooner Rather than 
Later.

Copyright © 2013 FraudResourceNet™ LLC

Prevention of
Common Schemes
Prevention:









Periodically Review Vendor Listings
Block Fake Receipt Sites
Block Vendors Not on Approved Listings
Block Certain Types of Vendors (P‐Cards)
Disallow Acceptance of Non‐Itemized Receipts
Implement Proper Segregation of Duties
Implement Automated Controls
Implement Budgets

Copyright © 2013 FraudResourceNet™ LLC
Accounts Payables
Data Analysis Techniques
 Payments
 Name, Address, Phone = Employees
 Unusual Patterns in Check Amounts
 Only P.O. Box Addresses Available
 Improper Locations 
 Over & Under 
 Duplicates, Gaps
 False
 By Vendor
 Inconsistent Price Fluctuations
 Excessive Purchases > Budget
 Unusual Billing Trends
 By Accounts & Department 
 Unexpected Trends or Rates
 Gross Profit
 Price Adjustments

Copyright © 2013 FraudResourceNet™ LLC

20

Detection of Common Schemes
 Continuous Monitoring Through Data Analysis
 Compare Vendor Invoice Numbers 
 Compare Vendor Spend v. Budget
 Compare Vendor Overall Spend Trends & Approvals
 Review Dates on Expenses Submitted for Non‐Working Days
 Review for Proper Approver
 Review for Expenses in Round Dollars
 Review Top 80% Spend by Individual, Vendor, Type
 Compare Submission to Prior Two Expense Reports for Fraud
 Request Travel Confirmations
 Review Monthly & Annual Mileage for Driving Validity & Reasonableness 
 Periodically Analyze & Review Gaps

Copyright © 2013 FraudResourceNet™ LLC
Data Analytics for Fraud:
Tools You Can Use
Data Analytics







Traditional Auditing

Large Amounts of Data 
Identify Red Flags Faster
Increased Coverage
Determine Trends
Continuous Analysis
Process Improvement






Small Amounts of Data
Delay in Identifying Red Flags
Decreased Coverage
Harder to ID Trends

Show First View of IDEA

Copyright © 2013 FraudResourceNet™ LLC

22

Polling Question #2
Which of the following is one of the Collusion 
Schemes?
A. Vendor Master File Tampering
B. External Hacking of Accounts Payable
C. Check Tampering
D. Invoice Billing 

Copyright © 2013 FraudResourceNet™ LLC

23
Case Study:
IM A COLLUDING
Initial Contact:
You get an urgent call from someone in AP.  They have 
reviewed accounts payable records, and found some 
alarming red flags. 
“Concerns about Fictitious Vendors”
“Concerns about Vendors with Triple Spend Over Budget”
“We Need a Data Analysis Expert… .. Massive Data”

Copyright © 2013 FraudResourceNet™ LLC

IM A Colluding







No Master Vendor Review 3+ Years
No Duplicate Spend Review 5+ Years
No Segregation of Duties Between Approving & Paying
No Review of Proper Approver 
No Budget v. Actual Review
No Vendor Spend Trend Analysis

.

Copyright © 2013 FraudResourceNet™ LLC
Software Overview & Introduction

 Set Working Folder
 Import Data
 Check Control Totals

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 3
Which Preventative Control is IMA Colluding Lacking In?
A.
B.
C.
D.

Master Vendor Review
Budget v. Actual
Vendor Spend Trend Analysis
Duplicate Spend Review

Copyright © 2013 FraudResourceNet™ LLC
Auditee Communication:
Planning for Accounts Payable Fraud
 Walk‐through of Approvals, Approvers, Policy 
 Procure‐to‐Pay Cycle 
 Complete Audit Plan with Data Analysis Incorporated
 Include  Different Types Alongside Consideration of Fraud

Copyright © 2013 FraudResourceNet™ LLC

Data Gathering for Data Analysis
Request All Meta Data Fields  & Files
Employee ID, Type of Spend, $ Amount, 
Budget

Copyright © 2013 FraudResourceNet™ LLC
Discovery with DA: Spend
Audits to Perform:
 Approver Submissions
 Vendor Spend Trends
 Duplicates
 Budget v Actual
 Address v. Employee Address
 Approver Submissions
Summarize by Employee

Red Flag #1: Approved 
Purchase Orders Entered

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 4
Name a Test That IMA Should Run Initially 
to Identify Red Flags?
A.
B.
C.
D.

Depreciation Calculation
Inventory
Expenses Submitted v. Co. Card
Vendor Budget v. Actual

Copyright © 2013 FraudResourceNet™ LLC
Discovery with DA: Duplicates

Red Flag 1 & 2: Numerous Duplicates, Odd 
Amounts & Quantities 

Copyright © 2013 FraudResourceNet™ LLC

Discovery with DA:
Expense v. Card, Expense v. Budget, Type

Red Flag #3:
Spend Trends

Red Flag 4:
Duplicates

Red Flag 5:
Budget v Actual
Copyright © 2013 FraudResourceNet™ LLC
Polling Question 5
Name the Red Flags Found
A.
B.
C.
D.

Spend Trends and Duplicates
Inventory Obsolescence
Expenses Submitted v. Co. Card
Contract Overages

Copyright © 2013 FraudResourceNet™ LLC

Finding Fraud & Next Steps
1)  Complete Summary of Data & Findings
a) Total by Each Type of Discrepancy
b) Aggregate Discrepancy
2)    Determine Additional Tests to Run & Perform
3) Discuss Findings with Owner Initially & Recommendations
4) Complete Interviews with Employees 
5) Review Gaps & Control Deficiencies & Provide Recommendations 
6) Recommend Management Review for Cost v Benefit & Implement ASAP
7) Determine if Client has Fraud Insurance Rider.  If not, recommend.
8) Contact Insurance Carrier (if applicable) & Begin Claim Process.
9) Contact Authorities & File Report.
10) Determine if Prosecution is Advisable e.g. Dollar Amount, Management, etc.
11) Complete Report (See ACFE.com) 
12) Complete Supporting Doc for Insurance Co. & Authorities

Copyright © 2013 FraudResourceNet™ LLC
Formulating Anti-Fraud Policy
 Policy Statement: To Prevent & Detect Fraud… and No 
Tolerance
 Definition of Fraud: Intent to Defraud & Personal Gain
 Reporting Responsibilities: By Staff Level
 Reporting Suspicions: Process & Avenues
 Fraud Response Plan: Process Once Potential Investigation is 
Warranted
 Policy Communication: Avenues & Frequency

Copyright © 2013 FraudResourceNet™ LLC

Proactive Data Analysis
Combining Audits &
Data Analysis for Fraud
Discovery

Accounts Payable:

Maintenance

Per Diem & Petty Cash
Bulk Fuel & Fuel Cards

Supplier Contracts
Travel & Entertainment

Copyright © 2013 FraudResourceNet™ LLC
Accounts Payables
Data Analysis Techniques
 Payments
 Name, Address, Phone = Employees
 Unusual Patterns in Check Amounts
 Only P.O. Box Addresses Available
 Improper Locations 
 Over & Under 
 Duplicates, Gaps
 False
 By Vendor
 Inconsistent Price Fluctuations
 Excessive Purchases > Budget
 Unusual Billing Trends
 By Accounts & Department 
 Unexpected Trends or Rates
 Gross Profit
 Price Adjustments

Copyright © 2013 FraudResourceNet™ LLC

38

Questions?
 Questions?

Copyright © 2013 FraudResourceNet™ LLC
Thank You!
Website: http://www.fraudresourcenet.com
Jim Kaplan
FraudResourceNet™
800-385-1625
jkaplan@fraudresourcenet.com
Peter Goldmann
FraudResourceNet™
800-440-2261
pgoldmann@fraudresourcenet.com
Katrina Kiselinchev
Inclusivitie, LLC
832-236-4778
Email: katrina@inclusivitie.com
http://www.inclusivitie.com
Copyright © 2013 FraudResourceNet™ LLC

Coming Up This Month
 “Continuous Controls Monitoring
(Putting Controls in Place Is Not
Enough)” (Sept. 11)
 “Protecting Your Organization from the
Growing Threat of Cyber Fraud” (Sept.
18)
 “A Primer on Social Networking and
Fraud Risk—What you Don’t Know
Can Cost You” (Sept 25)
Copyright © 2013 FraudResourceNet™ LLC

More Related Content

What's hot

What's hot (12)

Bribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowBribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to Know
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH Fraud
 
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
 
AC 465 Entire Course New
AC 465 Entire Course NewAC 465 Entire Course New
AC 465 Entire Course New
 
How your vendor master file is critical to governance, risk management and co...
How your vendor master file is critical to governance, risk management and co...How your vendor master file is critical to governance, risk management and co...
How your vendor master file is critical to governance, risk management and co...
 
SIC PP Final
SIC PP FinalSIC PP Final
SIC PP Final
 
Questions Of Integrity
Questions Of IntegrityQuestions Of Integrity
Questions Of Integrity
 

Viewers also liked

Purchase ledger clerk perfomance appraisal 2
Purchase ledger clerk perfomance appraisal 2Purchase ledger clerk perfomance appraisal 2
Purchase ledger clerk perfomance appraisal 2
tonychoper2204
 

Viewers also liked (7)

[Webinar] A More Efficient Accounts Payable Function: Implement These Simple ...
[Webinar] A More Efficient Accounts Payable Function: Implement These Simple ...[Webinar] A More Efficient Accounts Payable Function: Implement These Simple ...
[Webinar] A More Efficient Accounts Payable Function: Implement These Simple ...
 
Accounts payable and Best Practice Principles Automation - Sydney 2016
Accounts payable and Best Practice Principles Automation - Sydney 2016Accounts payable and Best Practice Principles Automation - Sydney 2016
Accounts payable and Best Practice Principles Automation - Sydney 2016
 
Reviewing Your Accounts Payable Processes
Reviewing Your Accounts Payable ProcessesReviewing Your Accounts Payable Processes
Reviewing Your Accounts Payable Processes
 
Accounts Payable: Best-in-Class Strategies for Reducing Invoice Processing Co...
Accounts Payable: Best-in-Class Strategies for Reducing Invoice Processing Co...Accounts Payable: Best-in-Class Strategies for Reducing Invoice Processing Co...
Accounts Payable: Best-in-Class Strategies for Reducing Invoice Processing Co...
 
Accounts project on Ledger and Trial Balance
Accounts project on Ledger and Trial BalanceAccounts project on Ledger and Trial Balance
Accounts project on Ledger and Trial Balance
 
Applications of IDEA - payroll
Applications of IDEA - payrollApplications of IDEA - payroll
Applications of IDEA - payroll
 
Purchase ledger clerk perfomance appraisal 2
Purchase ledger clerk perfomance appraisal 2Purchase ledger clerk perfomance appraisal 2
Purchase ledger clerk perfomance appraisal 2
 

Similar to Best Practices in Detecting Payable Fraud Using Data Analytics

How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
FraudBusters
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning Essentials
FraudBusters
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
FraudBusters
 

Similar to Best Practices in Detecting Payable Fraud Using Data Analytics (20)

Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud Policy
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay Fraud
 
Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial Data
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Summary presentation Highliths
Summary presentation HighlithsSummary presentation Highliths
Summary presentation Highliths
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning Essentials
 
Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6
 
Anti-Fraud Professional’s Guide to Building an Anti- Fraud Culture
Anti-Fraud Professional’s Guide to Building an Anti- Fraud CultureAnti-Fraud Professional’s Guide to Building an Anti- Fraud Culture
Anti-Fraud Professional’s Guide to Building an Anti- Fraud Culture
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data Analysis
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010
 
Fraud management - eCommerce fraud explained
Fraud management - eCommerce fraud explainedFraud management - eCommerce fraud explained
Fraud management - eCommerce fraud explained
 

Recently uploaded

Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Bhubaneswar🌹Ravi Tailkes ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ...
Bhubaneswar🌹Ravi Tailkes  ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ...Bhubaneswar🌹Ravi Tailkes  ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ...
Bhubaneswar🌹Ravi Tailkes ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ...
 
falcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunitiesfalcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunities
 
Pension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdfPension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdf
 
logistics industry development power point ppt.pdf
logistics industry development power point ppt.pdflogistics industry development power point ppt.pdf
logistics industry development power point ppt.pdf
 
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsMahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
CBD Belapur((Thane)) Charming Call Girls📞❤9833754194 Kamothe Beautiful Call G...
CBD Belapur((Thane)) Charming Call Girls📞❤9833754194 Kamothe Beautiful Call G...CBD Belapur((Thane)) Charming Call Girls📞❤9833754194 Kamothe Beautiful Call G...
CBD Belapur((Thane)) Charming Call Girls📞❤9833754194 Kamothe Beautiful Call G...
 
Kopar Khairane Cheapest Call Girls✔✔✔9833754194 Nerul Premium Call Girls-Navi...
Kopar Khairane Cheapest Call Girls✔✔✔9833754194 Nerul Premium Call Girls-Navi...Kopar Khairane Cheapest Call Girls✔✔✔9833754194 Nerul Premium Call Girls-Navi...
Kopar Khairane Cheapest Call Girls✔✔✔9833754194 Nerul Premium Call Girls-Navi...
 
Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024
 
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai MultipleDubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
 
Kurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
Kurla Capable Call Girls ,07506202331, Sion Affordable Call GirlsKurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
Kurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
 
Toronto dominion bank investor presentation.pdf
Toronto dominion bank investor presentation.pdfToronto dominion bank investor presentation.pdf
Toronto dominion bank investor presentation.pdf
 
Test bank for advanced assessment interpreting findings and formulating diffe...
Test bank for advanced assessment interpreting findings and formulating diffe...Test bank for advanced assessment interpreting findings and formulating diffe...
Test bank for advanced assessment interpreting findings and formulating diffe...
 
cost-volume-profit analysis.ppt(managerial accounting).pptx
cost-volume-profit analysis.ppt(managerial accounting).pptxcost-volume-profit analysis.ppt(managerial accounting).pptx
cost-volume-profit analysis.ppt(managerial accounting).pptx
 
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
 
Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...
Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...
Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...
 
Thane Call Girls , 07506202331 Kalyan Call Girls
Thane Call Girls , 07506202331 Kalyan Call GirlsThane Call Girls , 07506202331 Kalyan Call Girls
Thane Call Girls , 07506202331 Kalyan Call Girls
 
Significant AI Trends for the Financial Industry in 2024 and How to Utilize Them
Significant AI Trends for the Financial Industry in 2024 and How to Utilize ThemSignificant AI Trends for the Financial Industry in 2024 and How to Utilize Them
Significant AI Trends for the Financial Industry in 2024 and How to Utilize Them
 
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
 
Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
 

Best Practices in Detecting Payable Fraud Using Data Analytics

  • 1. Best Practices in Detecting  Accounts Payable Fraud  Using Data Analysis August 21, 2013 Special Guest Presenter: Katrina Kiselinchev, CIA, CPA, CFE Copyright © 2013 FraudResourceNet™ LLC About Peter Goldmann, MSc., CFE  President and Founder of White Collar Crime 101 Publisher of White-Collar Crime Fighter Developer of FraudAware® Anti-Fraud Training Monthly Columnist, The Fraud Examiner, ACFE Newsletter  Member of Editorial Advisory Board, ACFE  Author of “Fraud in the Markets” Explains how fraud fueled the financial crisis. Copyright © 2013 FraudResourceNet™ LLC
  • 2. About Jim Kaplan, MSc, CIA, CFE  President and Founder of AuditNet®, the global resource for auditors  Auditor, Web Site Guru, Internet for Auditors Pioneer Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award.  Author of “The Auditor’s Guide to Internet Resources” 2nd Edition Copyright © 2013 FraudResourceNet™ LLC About Katrina Kiselinchev, CPA, CIA, CFE, CFF        President of Inclusivitie, We Do “SMART” Integration Partner with IDEA Experience across industries, audit, fraud, and value Achieved Value of $5+ Million & ROI of 2000+%, which  included using IDEA’s SMART Analyzer . Instructor with AICPA & ACFE  Specific Frauds in Accounts Payable: Duplicates, P‐Card, Travel Copyright © 2013 FraudResourceNet™ LLC
  • 3. Webinar Housekeeping This webinar and its contents are the property of FraudResourceNet™ LLC. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden. We will be recording the webinar and you will be provided access to that recording within five-seven business days. Downloading or otherwise duplicating the webinar recording is expressly prohibited. You must answer the polling questions to qualify for CPE per NASBA unless you are viewing the Webinar with a group on a single screen. Please complete the evaluation to help us continuously improve our Webinars. Submit questions via the chat box on your screen and we will answer them either during or at the conclusion. If GTW stops working you may need to close and restart. You can always dial in and listen and follow along with the handout. Copyright © 2013 FraudResourceNet™ LLC CS Disclaimers  The views expressed by the presenters do not necessarily represent the views, positions, or opinions of FraudResourceNet LLC (FRN) or the presenters’ respective organizations. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client relationship. While FRN makes every effort to ensure information is accurate and complete, FRN makes no representations, guarantees, or warranties as to the accuracy or completeness of the information provided via this presentation. FRN specifically disclaims all liability for any claims or damages that may result from the information contained in this presentation, including any websites maintained by third parties and linked to the FRN website Any mention of commercial products is for information only; it does not imply recommendation or endorsement by FraudResourceNet LLC Copyright © 2013 FraudResourceNet™ LLC 5
  • 4. Agenda      Introduction Standards & Anti‐Fraud Essentials Auditors Fraud State of the Union Accounts Payable Background Accounts Payable Fraud  Overview  Schemes  Red Flags  Aiding Discovery of Fraud: Industry & Risks & Operations   Data Mining for AP Fraud: Analytics & Testing Methods  Case Studies & Practice in Data Analytics Copyright © 2013 FraudResourceNet™ LLC 6 The Auditor’s Role IPPF Standard 1210.A3  Internal auditors must have sufficient  knowledge of…available technology  based audit techniques   to perform their  assigned work Copyright © 2013 FraudResourceNet™ LLC
  • 5. IIA Guidance – GTAG 13 Internal auditors require appropriate skills  and should use available technological  tools to help them maintain a successful  fraud management program that covers  prevention, detection, and investigation.  As such, all audit professionals — not just  IT audit specialists — are expected to be  increasingly proficient in areas such as  data analysis and the use of technology to  help them meet the demands of the job. Copyright © 2013 FraudResourceNet™ LLC Professional Guidance Copyright © 2013 FraudResourceNet™ LLC
  • 6. Workplace Fraud Copyright © 2013 FraudResourceNet™ LLC Fraud State of the Union Source: 2012 ACFE Report to the  Nations Copyright © 2013 FraudResourceNet™ LLC
  • 7. Fraud State of the Union Source: 2012 ACFE Report to the  Copyright © 2013 FraudResourceNet™ LLC Nations Learning Objectives      Uncover Check Fraud in Accounts Payable Detect Duplicate Billing Schemes Detect & Prevent Expense Reimbursement Scams Flag Bogus Invoices Identify Purchasing Card & Other Expense Scams & Schemes Copyright © 2013 FraudResourceNet™ LLC 13
  • 8. Dishonest AP Fraudsters What They Do:  Create Fake Vendors, Expenses, Receipts, Invoices  Collude and Create Kickback Schemes  Misclassify Expenses   Understate Liabilities  Forge, intercept, alter and counterfeit checks   Take Advantage of Multiple Decentralized Policies  Preferred Vendor / Travel / Card/ P‐Card Copyright © 2013 FraudResourceNet™ LLC Accounts Payable Fraud: Schemes 1) External Accounts Payable Fraud:  Sham Vendors  Vendor Billing Scams/Double billing   Customer/Client Fraud  External Hacking of Customer/Vendor Data 2) Internal Accounts Payable Fraud:  Shell Company Schemes  Internal Billing Schemes  Vendor Master File   Check Tampering  Travel & Entertainment  Payroll Fraud  Copyright © 2013 FraudResourceNet™ LLC Continued…
  • 9. Accounts Payable Fraud: Schemes 3) Collusion:  Bid‐Rigging  Invoice Billing Collusion  Bribery & Kickbacks  Pricing Schemes  Payroll Schemes  Copyright © 2013 FraudResourceNet™ LLC Polling Question 1 Which One of the Following is a Type of  Fraudulent Disbursement Scheme? A. B. C. D. Asset Req & Transfers Unrecorded Sales Write‐Off Schemes Shell Company Copyright © 2013 FraudResourceNet™ LLC
  • 10. Accounts Payable Fails… Business Fails How a company manages its Accounts Payable process  affects two very important areas of an organization’s  business: Cash Flow and Supplier Relationships Fraud Impacting One or Both of These Areas is Detrimental.  Period. Internal Controls, Fraud Assessments, and Periodic Audits  are Very Important to Discover Issues Sooner Rather than  Later. Copyright © 2013 FraudResourceNet™ LLC Prevention of Common Schemes Prevention:         Periodically Review Vendor Listings Block Fake Receipt Sites Block Vendors Not on Approved Listings Block Certain Types of Vendors (P‐Cards) Disallow Acceptance of Non‐Itemized Receipts Implement Proper Segregation of Duties Implement Automated Controls Implement Budgets Copyright © 2013 FraudResourceNet™ LLC
  • 11. Accounts Payables Data Analysis Techniques  Payments  Name, Address, Phone = Employees  Unusual Patterns in Check Amounts  Only P.O. Box Addresses Available  Improper Locations   Over & Under   Duplicates, Gaps  False  By Vendor  Inconsistent Price Fluctuations  Excessive Purchases > Budget  Unusual Billing Trends  By Accounts & Department   Unexpected Trends or Rates  Gross Profit  Price Adjustments Copyright © 2013 FraudResourceNet™ LLC 20 Detection of Common Schemes  Continuous Monitoring Through Data Analysis  Compare Vendor Invoice Numbers   Compare Vendor Spend v. Budget  Compare Vendor Overall Spend Trends & Approvals  Review Dates on Expenses Submitted for Non‐Working Days  Review for Proper Approver  Review for Expenses in Round Dollars  Review Top 80% Spend by Individual, Vendor, Type  Compare Submission to Prior Two Expense Reports for Fraud  Request Travel Confirmations  Review Monthly & Annual Mileage for Driving Validity & Reasonableness   Periodically Analyze & Review Gaps Copyright © 2013 FraudResourceNet™ LLC
  • 12. Data Analytics for Fraud: Tools You Can Use Data Analytics       Traditional Auditing Large Amounts of Data  Identify Red Flags Faster Increased Coverage Determine Trends Continuous Analysis Process Improvement     Small Amounts of Data Delay in Identifying Red Flags Decreased Coverage Harder to ID Trends Show First View of IDEA Copyright © 2013 FraudResourceNet™ LLC 22 Polling Question #2 Which of the following is one of the Collusion  Schemes? A. Vendor Master File Tampering B. External Hacking of Accounts Payable C. Check Tampering D. Invoice Billing  Copyright © 2013 FraudResourceNet™ LLC 23
  • 13. Case Study: IM A COLLUDING Initial Contact: You get an urgent call from someone in AP.  They have  reviewed accounts payable records, and found some  alarming red flags.  “Concerns about Fictitious Vendors” “Concerns about Vendors with Triple Spend Over Budget” “We Need a Data Analysis Expert… .. Massive Data” Copyright © 2013 FraudResourceNet™ LLC IM A Colluding       No Master Vendor Review 3+ Years No Duplicate Spend Review 5+ Years No Segregation of Duties Between Approving & Paying No Review of Proper Approver  No Budget v. Actual Review No Vendor Spend Trend Analysis . Copyright © 2013 FraudResourceNet™ LLC
  • 14. Software Overview & Introduction  Set Working Folder  Import Data  Check Control Totals Copyright © 2013 FraudResourceNet™ LLC Polling Question 3 Which Preventative Control is IMA Colluding Lacking In? A. B. C. D. Master Vendor Review Budget v. Actual Vendor Spend Trend Analysis Duplicate Spend Review Copyright © 2013 FraudResourceNet™ LLC
  • 15. Auditee Communication: Planning for Accounts Payable Fraud  Walk‐through of Approvals, Approvers, Policy   Procure‐to‐Pay Cycle   Complete Audit Plan with Data Analysis Incorporated  Include  Different Types Alongside Consideration of Fraud Copyright © 2013 FraudResourceNet™ LLC Data Gathering for Data Analysis Request All Meta Data Fields  & Files Employee ID, Type of Spend, $ Amount,  Budget Copyright © 2013 FraudResourceNet™ LLC
  • 16. Discovery with DA: Spend Audits to Perform:  Approver Submissions  Vendor Spend Trends  Duplicates  Budget v Actual  Address v. Employee Address  Approver Submissions Summarize by Employee Red Flag #1: Approved  Purchase Orders Entered Copyright © 2013 FraudResourceNet™ LLC Polling Question 4 Name a Test That IMA Should Run Initially  to Identify Red Flags? A. B. C. D. Depreciation Calculation Inventory Expenses Submitted v. Co. Card Vendor Budget v. Actual Copyright © 2013 FraudResourceNet™ LLC
  • 17. Discovery with DA: Duplicates Red Flag 1 & 2: Numerous Duplicates, Odd  Amounts & Quantities  Copyright © 2013 FraudResourceNet™ LLC Discovery with DA: Expense v. Card, Expense v. Budget, Type Red Flag #3: Spend Trends Red Flag 4: Duplicates Red Flag 5: Budget v Actual Copyright © 2013 FraudResourceNet™ LLC
  • 18. Polling Question 5 Name the Red Flags Found A. B. C. D. Spend Trends and Duplicates Inventory Obsolescence Expenses Submitted v. Co. Card Contract Overages Copyright © 2013 FraudResourceNet™ LLC Finding Fraud & Next Steps 1)  Complete Summary of Data & Findings a) Total by Each Type of Discrepancy b) Aggregate Discrepancy 2)    Determine Additional Tests to Run & Perform 3) Discuss Findings with Owner Initially & Recommendations 4) Complete Interviews with Employees  5) Review Gaps & Control Deficiencies & Provide Recommendations  6) Recommend Management Review for Cost v Benefit & Implement ASAP 7) Determine if Client has Fraud Insurance Rider.  If not, recommend. 8) Contact Insurance Carrier (if applicable) & Begin Claim Process. 9) Contact Authorities & File Report. 10) Determine if Prosecution is Advisable e.g. Dollar Amount, Management, etc. 11) Complete Report (See ACFE.com)  12) Complete Supporting Doc for Insurance Co. & Authorities Copyright © 2013 FraudResourceNet™ LLC
  • 19. Formulating Anti-Fraud Policy  Policy Statement: To Prevent & Detect Fraud… and No  Tolerance  Definition of Fraud: Intent to Defraud & Personal Gain  Reporting Responsibilities: By Staff Level  Reporting Suspicions: Process & Avenues  Fraud Response Plan: Process Once Potential Investigation is  Warranted  Policy Communication: Avenues & Frequency Copyright © 2013 FraudResourceNet™ LLC Proactive Data Analysis Combining Audits & Data Analysis for Fraud Discovery Accounts Payable: Maintenance Per Diem & Petty Cash Bulk Fuel & Fuel Cards Supplier Contracts Travel & Entertainment Copyright © 2013 FraudResourceNet™ LLC
  • 20. Accounts Payables Data Analysis Techniques  Payments  Name, Address, Phone = Employees  Unusual Patterns in Check Amounts  Only P.O. Box Addresses Available  Improper Locations   Over & Under   Duplicates, Gaps  False  By Vendor  Inconsistent Price Fluctuations  Excessive Purchases > Budget  Unusual Billing Trends  By Accounts & Department   Unexpected Trends or Rates  Gross Profit  Price Adjustments Copyright © 2013 FraudResourceNet™ LLC 38 Questions?  Questions? Copyright © 2013 FraudResourceNet™ LLC
  • 21. Thank You! Website: http://www.fraudresourcenet.com Jim Kaplan FraudResourceNet™ 800-385-1625 jkaplan@fraudresourcenet.com Peter Goldmann FraudResourceNet™ 800-440-2261 pgoldmann@fraudresourcenet.com Katrina Kiselinchev Inclusivitie, LLC 832-236-4778 Email: katrina@inclusivitie.com http://www.inclusivitie.com Copyright © 2013 FraudResourceNet™ LLC Coming Up This Month  “Continuous Controls Monitoring (Putting Controls in Place Is Not Enough)” (Sept. 11)  “Protecting Your Organization from the Growing Threat of Cyber Fraud” (Sept. 18)  “A Primer on Social Networking and Fraud Risk—What you Don’t Know Can Cost You” (Sept 25) Copyright © 2013 FraudResourceNet™ LLC