SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
3/5/2014
1
Copyright © FraudResourceNet LLC
The	Power	of	Benford's	Law	
in	Finding	Fraud
Special Guest Presenter:
Donald E. Sparks, CIA, CISA, CRMA
March 5, 2014
Copyright © FraudResourceNet LLC
About Peter Goldmann, MSc., CFE
• President and Founder of White Collar Crime 101
• Publisher of White-Collar Crime Fighter
• Developer of FraudAware® Anti-Fraud Training
• Monthly Columnist, The Fraud Examiner, ACFE
Newsletter
• Member of Editorial Advisory Board, ACFE
• Author of “Fraud in the Markets”
• Explains how fraud fueled the financial crisis.
3/5/2014
2
Copyright © FraudResourceNet LLC
About Jim Kaplan, MSc, CIA, CFE
• President and Founder of
AuditNet®, the global resource for
auditors (now available on Apple
and Android devices)
• Auditor, Web Site Guru,
• Internet for Auditors Pioneer
• Recipient of the IIA’s 2007
Bradford Cadmus Memorial
Award.
• Author of “The Auditor’s Guide to
Internet Resources” 2nd Edition
Copyright © FraudResourceNet LLC
About Don Sparks, CIA, CISA, CRMA, 
CRMA, ARM
• Vice President Industry Relations -
Audimation Services, Inc.
• Property/casualty insurance internal
audit experience (12 yrs. as CAE)
• Risk Services firms
• The IIA – eLearning: GAIN, Flash
Surveys, & Role of Audit in SOX 2002
monthly 2 hour web tv broadcasts
• NAIC IT Working Papers Committee
• Co-Author of GTAG 13 & GTAG 16
• June 2011, Creator & Programmer
Auditchannel.tv
Don Sparks
3/5/2014
3
Copyright © FraudResourceNet LLC
Webinar Housekeeping
• This webinar and its material are the property of FraudResourceNet LLC.
Unauthorized usage or recording of this webinar or any of its material is
strictly forbidden. We are recording the webinar and you will be provided with
a link access to that recording as detailed below. Downloading or otherwise
duplicating the webinar recording is expressly prohibited.
• Webinar recording link will be sent via email within 5-7 business days.
• NASBA rules require us to ask polling questions during the Webinar and CPE
certificates will be sent via email to those who answer ALL polling questions
• The CPE certificates and link to the recording will be sent to the email
address you registered with in GTW. We are not responsible for delivery
problems due to spam filters, attachment restrictions or other controls in
place for your email client.
• Submit questions via the chat box on your screen and we will answer them
either during or at the conclusion.
• After the Webinar is over you will have an opportunity to provide feedback.
Please complete the feedback questionnaire to help us continuously improve
our Webinars
• If GTW stops working you may need to close and restart. You can always dial
in and listen and follow along with the handout.
Copyright © FraudResourceNet LLC 6
Disclaimers
• The views expressed by the presenters do not necessarily represent the 
views, positions, or opinions of FraudResourceNet LLC (FRN) or the 
presenters’ respective organizations. These materials, and the oral 
presentation accompanying them, are for educational purposes only and do 
not constitute accounting or legal advice or create an accountant‐client 
relationship. 
• While FRN makes every effort to ensure information is accurate and 
complete, FRN makes no representations, guarantees, or warranties as to 
the accuracy or completeness of the information provided via this 
presentation. FRN specifically disclaims all liability for any claims or 
damages that may result from the information contained in this 
presentation, including any websites maintained by third parties and linked 
to the FRN website
• Any mention of commercial products is for information only; it does not 
imply recommendation or endorsement by FraudResourceNet LLC
3/5/2014
4
Copyright © FraudResourceNet LLC
Today’s Agenda
 Auditing for Fraud: Standards & Essentials
 Learning the logic/help explain it to others 
 A user‐friendly introduction
 Help detect the red flags of fraud
 Best data to use 
 Step‐by‐step demonstration of fraud audits
 Common software programs to facilitating use
 Demonstration on 492,000 P‐Card File
 Your Questions - Conclusion
Copyright © FraudResourceNet LLC
Fraud Applications
 Forensic Auditing
 Tax Auditing
 Audit of Annual Financial Statements
 Internal Auditing
 Corporate Finance/Company Evaluation
 Controllers
3/5/2014
5
Copyright © FraudResourceNet LLC
Using Statistics To Seek Out 
Criminals
Feb. 26, 2013 – Discovery of banks’ efforts to 
manipulate the London Interbank Offered Rate 
(LIBOR) owes a lot to statistical techniques that 
provide first indications of wrongdoing.  
If regulators (and auditors) want to uncover more 
misdeeds in the markets, they’ll have to use statistical 
screening tools more actively than they do today.  
Extending the analysis over a 30 year period revealed 
Libor submissions followed Benford’s closely for about 
20 years, but began to diverge sharply in the mid‐
2000’s.
Copyright © FraudResourceNet LLC
Bernie Madoff Fraud 
When it comes to Madoff, if it 
is too good to be true chances 
are it is not true.  This issue is 
definitely a candidate for the 
fraud of the century!
3/5/2014
6
Copyright © FraudResourceNet LLC
Do Patterns in Data Mean 
Anything?
Copyright © FraudResourceNet LLC
Inventors and Innovators
 Simon Newcomb – 1881
 Frank Benford – 1938
 Roger Pinkham – 1961
 Mark Nigrini – 1992
3/5/2014
7
Copyright © FraudResourceNet LLC
Benford’s Law Defined
On the right, you can see the 
number 1 occurs as the leading digit 
30.1% of the time, while larger 
numbers occur in the first digit less 
frequently.
For example, the number 3879
 3 ‐ first digit
 8 ‐ second digit
 7 ‐ third digit
 9 – fourth digit
Copyright © FraudResourceNet LLC
Expected Frequencies Based 
on Benford’s Law 
Digit 1
st
Place 2
nd
Place 3
rd
Place 4
th
Place
0 0.11968 0.10178 0.10018
1 0.30103 0.11389 0.10138 0.10014
2 0.17609 0.19882 0.10097 0.1001
3 0.12494 0.10433 0.10057 0.10006
4 0.09691 0.10031 0.10018 0.10002
5 0.07918 0.09668 0.09979 0.09998
6 0.06695 0.09337 0.0994 0.09994
7 0.05799 0.0935 0.09902 0.0999
8 0.05115 0.08757 0.09864 0.09986
9 0.04576 0.085 0.09827 0.09982
3/5/2014
8
Copyright © FraudResourceNet LLC
Polling Question 1
Benford’s Law is sometimes also called:
A. First‐Digit Law
B. First‐two Digits Law
C. Third‐Digit Law
D. Nigrini’s Law
Copyright © FraudResourceNet LLC
Key Facts 
 The number 1 predominates most progressions.  
 Probabilities are scale invariant – works with  
numbers denominated as dollars, yen, euros, 
pesos, rubles, etc.
 Not all data sets are suitable for analysis.
 Not good for sampling – results in large 
selection sizes.
 Good low cost entry into using continuous 
auditing/monitoring.
3/5/2014
9
Copyright © FraudResourceNet LLC
Can You Use it To Win the 
Lottery?
No. Outcome of the lottery is 
truly random.  This means 
every lottery number has an 
equal chance of occurring. 
Copyright © FraudResourceNet LLC
Is Benford’s Law in Your 
Anti‐Fraud Program?
3/5/2014
10
Copyright © FraudResourceNet LLC
See Red Flags ‐ Less Costly, 
Better and Faster
 Technology is getting better all the time
 The need to find fraud faster to improve recovery
 Risk based audit planning
 Early warning sign past data patterns have changed
 Fraud Deterrence – fraudsters may not understand
the theory but know audit is always looking
 Identify Duplicates, Whole Numbers, Recurring
Expenses, other data pattern Anomalies
 Great analytic when coupled with high dollar and
stratified random sample techniques
Copyright © FraudResourceNet LLC
Polling Question 2
Benford’s Law is a good tool for finding fraud
when just a few fraudulent transactions are
entered into the system.
A. True
B. False
3/5/2014
11
Copyright © FraudResourceNet LLC
 CFE found a 6 year $860,000 AP fraud.  I often 
get a question could Benford’s have found this 
sooner?
 CFE asked three questions:
 How many employees work in AP
 Longest tenure employee
 Can you pull 6 years of AP from AS400
 Imported AP into IDEA
 Ran Summarization
 Bank re‐imaged suspicious duplicate checks 
selected by the CFO
Demo Real Fraud
Copyright © FraudResourceNet LLC
Types of Data That Conform
Accounts Payable 
(number sold * price)
Estimations in General 
Ledger
Test of approval 
violations under $2,500
Accounts Receivable 
(number bought*price)
Inventories at many 
locations
Purchase orders
Disbursements Computer System data 
file conversions
Loan data 
Sales Processing inefficiencies
due to high quantity
Customer balances
T&E Expenses New Combinations of 
selling prices
Stock prices
Most sets of Accounting 
Numbers with 
Customer refunds Journal entries
Full year of transactions Credit card transactions
3/5/2014
12
Copyright © FraudResourceNet LLC
Non‐Conforming Data Types
Situation Examples
Data set comprised of assigned
numbers
Checks, invoices, zip codes,
telephone, insurance policy
YYMM#### 
Numbers influenced by human
thought
Prices set at psychological thresholds
($1.99, ATM withdrawals)
Accounts with a large number of
firm-specific numbers
An account specifically set up to
record $100 refunds
Accounts with a built in minimum or
maximum
Assets must meet a threshold before
recorded
Airline passenger counts per plane  Data sets with 500 or fewer 
transactions 
Where no transaction is recorded Theft, kickback, skimming, contract
rigging
Situation Examples
Data set comprised of assigned 
numbers
Checks, invoices, zip codes, 
telephone, insurance policy 
YYMM#### 
Numbers influenced by human 
thought
Prices set at psychological 
thresholds ($1.99, ATM withdrawals)
Accounts with a large number of 
firm‐specific numbers
An account specifically set up to 
record $100 refunds
Accounts with a built in minimum or 
maximum
Assets must meet a threshold before 
recorded
Airline passenger counts per plane  Data sets with 500 or fewer 
transactions 
Where no transaction is recorded Theft, kickback, skimming, contract 
rigging
Copyright © FraudResourceNet LLC
 First and Second Digit Analysis *
 First Two Digits Analysis*
 First Three Digits Analysis**
 Last Two Digits Analysis**
 Summation Test**
 Advanced Settings – Fuzzy Logic Setting #
 Rounded By Analysis #
 Duplication Analysis #
* =Primary      **=Advanced       #=Associated
Uses in Fraud Investigations
3/5/2014
13
Copyright © FraudResourceNet LLC
Polling Question 3
Types of financial data that conform to use
in Benford’s Law testing (choose the best
answer(s)
A. Accounts Payable (number sold * price)
B. Accounts Receivable (number bought * price)
C. Disbursements
D. Sales
E. All of the above
F. All of the above
Copyright © FraudResourceNet LLC
Check for Benford’s 
Conformity
3/5/2014
14
Copyright © FraudResourceNet LLC
First and Second Digit Analysis
Copyright © FraudResourceNet LLC
First Two Digits Analysis
 Examines the frequency of the numerical 
combinations 10 through 99 on the first two digits 
of a series of numbers.
 In particular the output serves for the analysis of 
avoided threshold values.  Thus, these tests help to 
clearly visualize when order or permission limits 
have been systematically avoided.  
3/5/2014
15
Copyright © FraudResourceNet LLC
First Three Digits Analysis
 This test examines the frequency of the 
numerical combinations 100 through 999 in the 
first two digits of a series of numbers.
 The output serves for analysis after conspicuous 
rounding off operations.  Requires a large 
amount of deviations with a population greater 
than 10,000.
Copyright © FraudResourceNet LLC
Last Two Digits Test:
The Last Two Digits test analyzes the frequency of the 
last two digits and is useful in auditing election 
results, inventory counts—any situation in which 
padding or number invention is suspected.
3/5/2014
16
Copyright © FraudResourceNet LLC
 This test is used to analyze the 
relative increasing frequency of 
rounded numbers.  
 The determination comprises the 
frequencies of the numbers that are 
divisible by 10, 25, 100 and 1,000 
(and any user‐defined values of 
whole numbers) without 
remainders.
Rounded By Analysis
Copyright © FraudResourceNet LLC
The analysis of multiple duplicates includes all 
number values in the entire database that occur 
more than once.  This test helps the user to 
recognize all existing duplicates in the data supply 
whereas the result table presents the duplicates 
sorted according to the descending frequency.  The 
aim of the test is to identify certain numbers that 
occur more than once (for example, possible 
duplicate payments).  
Difference from the other tests: Does not analyze 
any numerical combinations, but the pure value of 
a number.
Duplicates Analysis
3/5/2014
17
Copyright © FraudResourceNet LLC
Summation Test
Copyright © FraudResourceNet LLC
Second Order Test
3/5/2014
18
Copyright © FraudResourceNet LLC
Advanced Settings
With most Benford’s Law tests in IDEA Version 
Nine, you have the option of extracting 
“suspicious” data whose digit frequencies do not 
follow the digit frequencies of Benford’s Law. 
With Advanced Settings, you can also refine this 
output to limit the size of the output database.
Copyright © FraudResourceNet LLC
Polling Question 4
Area(s) where Benford’s Law is not a good tool (choose all
that apply):
A. All the numbers in a series are at or below $9.99 or frauds
involving situations where nothing is recorded.
B. All of the numbers are positive.
C. All of the numbers are negative.
D. Very large data sets over 1 billion records.
3/5/2014
19
Copyright © FraudResourceNet LLC
Benford’s Law Software
Integrated Tools Add‐In Component
CaseWare IDEA Excel
Arbutus Access
Active Data SAS
ACL
ESKORT Computer Audit 
(SESAM)
Tableau
TopCAATs
Copyright © FraudResourceNet LLC
Creating a Continuous 
Auditing Application
3/5/2014
20
Copyright © FraudResourceNet LLC
Demo P‐Card File ‐ Steps in 
Presentation
 Stratify the Population
 Analyze the Population Using Benford
 Organize Population into groups by the number of 
leading digits.
 Analyze Groups Using Benford
 Store Benford Analysis into a Table and then 
extract high frequency digit combinations 
 Make the analysis “repeatable and continuous”.
Copyright © FraudResourceNet LLC
Polling Question 5
Mark Nigrini:
A. Invented Benford’s Law
B. Is a close relative of Benford
C. Is the only one to find fraud using Benford’s Law
D. Believes auditors should use it to detect fraud
3/5/2014
21
Copyright © FraudResourceNet LLC
Improve Data Analysis Skills
Copyright © FraudResourceNet LLC
Conclusion
Digital analysis tools like Benford’s Law enable auditors 
and other data analysts to focus on possible anomalies 
in large data sets. They do not prove that error or fraud 
exist, but identify items that deserve further study on 
statistical grounds. Digital analysis complements existing 
analytical tools and techniques, and should not be used 
in isolation from them.
Not necessarily fraud – many False positives
Certain types of fraud will not be detected
Useful tool, setting future auditing plans
Low Cost Entry into Digital continuous analysis
3/5/2014
22
Copyright © FraudResourceNet LLC
Questions?
Copyright © FraudResourceNet LLC
Thank You!
• Peter Goldmann
• FraudResourceNet LLC
• 800-440-2261
• www.fraudresourcenet.com
• pgoldmann@fraudresourcenet.com
• Jim Kaplan
• FraudResourceNet LLC
• 800-385-1625
• www.fraudresourcenet.com
• jkaplan@fraudresourcenet.com
• Don Sparks
• 832‐327‐1877
3/5/2014
23
Copyright © FraudResourceNet LLC
Coming Up
March Anti‐Fraud Webinars…
 "Finding and Preventing Vendor 
Procurement & P2P Fraud Using 
Data Analytics”, March 12
 "How to Use Data Analytics to 
Expose Fixed Asset and Inventory 
Fraudsters”, March 19
Sign up at:
http://www.fraudresourcenet.com

Más contenido relacionado

Similar a The Power of Benford's Law in Finding Fraud

Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudFraudBusters
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFraudBusters
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsFraudBusters
 
Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics FraudBusters
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudFraudBusters
 
How to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewHow to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewJim Kaplan CIA CFE
 
Fraud auditing creative techniques
Fraud auditing creative techniquesFraud auditing creative techniques
Fraud auditing creative techniquesJim Kaplan CIA CFE
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud DetectionFraudBusters
 
Sales Email Hacks for Gmail and Salesforce
Sales Email Hacks for Gmail and SalesforceSales Email Hacks for Gmail and Salesforce
Sales Email Hacks for Gmail and SalesforceRingLead
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsFraudBusters
 
Era fly in_deck (1)
Era fly in_deck (1)Era fly in_deck (1)
Era fly in_deck (1)ERAMarketing
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudFraudBusters
 
#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes
#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes
#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmesEmma Mirrington
 
#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...
#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...
#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...Emma Mirrington
 
Vivint Wireless How to De-Risk a New Venture & Build a Better ISP - Luke L...
Vivint Wireless   How to De-Risk a New Venture & Build a Better ISP  - Luke L...Vivint Wireless   How to De-Risk a New Venture & Build a Better ISP  - Luke L...
Vivint Wireless How to De-Risk a New Venture & Build a Better ISP - Luke L...Lounge47
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisFraudBusters
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
How To Write A Essay Step By Ste
How To Write A Essay Step By SteHow To Write A Essay Step By Ste
How To Write A Essay Step By SteAlicia Stoddard
 
Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterFraudBusters
 

Similar a The Power of Benford's Law in Finding Fraud (20)

Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit Software
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data Analytics
 
Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
How to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewHow to prepare for your first anti fraud review
How to prepare for your first anti fraud review
 
Fraud auditing creative techniques
Fraud auditing creative techniquesFraud auditing creative techniques
Fraud auditing creative techniques
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
 
Sales Email Hacks for Gmail and Salesforce
Sales Email Hacks for Gmail and SalesforceSales Email Hacks for Gmail and Salesforce
Sales Email Hacks for Gmail and Salesforce
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
 
Era fly in_deck (1)
Era fly in_deck (1)Era fly in_deck (1)
Era fly in_deck (1)
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
 
Asmi San Diego
Asmi San DiegoAsmi San Diego
Asmi San Diego
 
#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes
#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes
#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes
 
#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...
#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...
#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...
 
Vivint Wireless How to De-Risk a New Venture & Build a Better ISP - Luke L...
Vivint Wireless   How to De-Risk a New Venture & Build a Better ISP  - Luke L...Vivint Wireless   How to De-Risk a New Venture & Build a Better ISP  - Luke L...
Vivint Wireless How to De-Risk a New Venture & Build a Better ISP - Luke L...
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
How To Write A Essay Step By Ste
How To Write A Essay Step By SteHow To Write A Essay Step By Ste
How To Write A Essay Step By Ste
 
Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a Fraudster
 

Más de FraudBusters

Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning EssentialsFraudBusters
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best PracticesFraudBusters
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsFraudBusters
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisFraudBusters
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraudBusters
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsFraudBusters
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsFraudBusters
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudFraudBusters
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsFraudBusters
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisFraudBusters
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyFraudBusters
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraudBusters
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditFraudBusters
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisFraudBusters
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisFraudBusters
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial IntegrityFraudBusters
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudBusters
 

Más de FraudBusters (19)

Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning Essentials
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best Practices
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your Audits
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data Analytics
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay Fraud
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data Analysis
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud Policy
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

The Power of Benford's Law in Finding Fraud