SlideShare una empresa de Scribd logo
1 de 30
Descargar para leer sin conexión
3/11/2014
1
Copyright © FraudResourceNet LLC
Using Data Analytics to Find 
and Deter Procure‐to‐Pay 
Fraud 
March 12, 2014
Special Guest Presenter:
Rich Lanza
Copyright © FraudResourceNet LLC
About Jim Kaplan, MSc, CIA, CFE
• President and Founder of
AuditNet®, the global resource for
auditors (now available on Apple
and Android devices)
• Auditor, Web Site Guru,
• Internet for Auditors Pioneer
• Recipient of the IIA’s 2007
Bradford Cadmus Memorial
Award.
• Author of “The Auditor’s Guide to
Internet Resources” 2nd Edition
3/11/2014
2
Copyright © FraudResourceNet LLC
About Peter Goldmann, MSc., CFE
President and Founder of White Collar Crime 101
• Publisher of White-Collar Crime Fighter
• Developer of FraudAware® Anti-Fraud Training
• Monthly Columnist, The Fraud Examiner, ACFE
Newsletter
Member of Editorial Advisory Board, ACFE
Author of “Fraud in the Markets”
• Explains how fraud fueled the financial crisis.
Copyright © FraudResourceNet LLC
Richard B. Lanza, CPA, CFE, CGMA
• Over two decades of ACL and Excel software usage
• Wrote the first practical ACL publication on how to
use the product in 101 ways (101 ACL
Applications)
• Has written and spoken on the use of audit data
analytics for over 15 years.
• Received the Outstanding Achievement in Business
Award by the Association of Certified Fraud
Examiners for developing the publication
Proactively Detecting Fraud Using Computer Audit
Reports as a research project for the IIA
• Recently was a contributing author of:
• Global Technology Audit Guide (GTAG #13) Fraud
in an Automated World - IIA
• Data Analytics – A Practical Approach - research
whitepaper for the Information System
Accountability Control Association.
• “Cost Recovery – Turning Your Accounts Payable
Department into a Profit Center” – Wiley & Sons.
Please see full bio at www.richlanza.com
3/11/2014
3
Copyright © FraudResourceNet LLC
This webinar and its material are the property of FraudResourceNet LLC.
Unauthorized usage or recording of this webinar or any of its material is strictly
forbidden. We are recording the webinar and you will be provided with a link
access to that recording as detailed below. Downloading or otherwise
duplicating the webinar recording is expressly prohibited.
Webinar recording link will be sent via email within 5-7 business days.
NASBA rules require us to ask polling questions during the Webinar and CPE
certificates will be sent via email to those who answer ALL the polling questions
The CPE certificates and link to the recording will be sent to the email address
you registered with in GTW. We are not responsible for delivery problems due to
spam filters, attachment restrictions or other controls in place for your email
client.
Submit questions via the chat box on your screen and we will answer them
either during or at the conclusion.
After the Webinar is over you will have an opportunity to provide feedback.
Please complete the feedback questionnaire to help us continuously improve
our Webinars
If GTW stops working you may need to close and restart. You can always dial in
and listen and follow along with the handout.
Webinar Housekeeping
Copyright © FraudResourceNet LLC
The views expressed by the presenters do not necessarily represent the
views, positions, or opinions of FraudResourceNet LLC (FRN) or the
presenters’ respective organizations. These materials, and the oral
presentation accompanying them, are for educational purposes only and
do not constitute accounting or legal advice or create an accountant-client
relationship.
While FRN makes every effort to ensure information is accurate and
complete, FRN makes no representations, guarantees, or warranties as to
the accuracy or completeness of the information provided via this
presentation. FRN specifically disclaims all liability for any claims or
damages that may result from the information contained in this
presentation, including any websites maintained by third parties and
linked to the FRN website
Any mention of commercial products is for information only; it does not
imply recommendation or endorsement by FraudResourceNet LLC
6
Disclaimers
3/11/2014
4
Copyright © FraudResourceNet LLC
Today’s Agenda
 Costliest procurement frauds to beware of (with
case studies)
 Indicators of possible collusive procurement-
vendor schemes
 Red flags to look for in audits of procurement
using data analytics
 How to conduct the audit using data analytics
 What to do if you find vendor or procurement
fraud during an audit
Copyright © FraudResourceNet LLC
Issues in Vendor Master 
Management
Too many active vendors 
(with no activity) 
Improper segregation 
of duties
Difficult to understand or 
improve spend 
management
Difficult to manage or 
improve payment terms
Invalid Tax IDs leading to B 
notices
Too many active vendors 
(with no activity) 
Improper segregation 
of duties
Difficult to understand or 
improve spend 
management
Difficult to manage or 
improve payment terms
Invalid Tax IDs leading to B 
notices
Duplicate vendors 
representing parents and 
subs, for different 
companies, or just 
mistakes = duplicate pays
Duplicate vendors 
representing parents and 
subs, for different 
companies, or just 
mistakes = duplicate pays
Duplicate vendors 
representing parents and 
subs, for different 
companies, or just 
mistakes = duplicate pays
Vendors are confused and 
may see opportunities to 
take advantage of the 
company
Vendors are confused and 
may see opportunities to 
take advantage of the 
company
Lack of vendor 
management …increases 
opportunity for fraud
Lack of vendor 
management …increases 
opportunity for fraud
Lack of vendor 
management …increases 
opportunity for fraud
3/11/2014
5
Copyright © FraudResourceNet LLC
Vendor Billing Fraud/Corruption
Is #1 or #2 No Matter Where  You  Go
Copyright © FraudResourceNet LLC
Top Fraud Schemes By 
Department
3/11/2014
6
Copyright © FraudResourceNet LLC
Primary Weaknesses  Leading to 
the Fraud
Copyright © FraudResourceNet LLC
1. Whistleblowing hotline
2. Signed code of conduct
3. Train employees
4. Background checks
5. Look for and respond to fraud
12
Most companies have these procedures in 
place but the question is….how effective 
are they?
The Top Procedures
Per  SAS 99 – Appendix B
3/11/2014
7
Copyright © FraudResourceNet LLC
Where Are You Using Data 
Analytics?
AuditNet – 2012 Data 
Analysis Software 
Survey
Copyright © FraudResourceNet LLC
Polling Question 1
What is not one of the top occurring frauds per the ACFE
study?
A. Billing
B. Corruption
C. Overstated Revenue
D. Expense Reimbursements
3/11/2014
8
Copyright © FraudResourceNet LLC
Mapping Red Flags to Analytics
Copyright © FraudResourceNet LLC
Report Brainstorm Tool
3/11/2014
9
Copyright © FraudResourceNet LLC
Proactively Detecting Fraud
Using Computer Audit Reports
IIA Research Paper / CPE Course
See the IIA’s website at www.theiia.org
The purpose of this document is to assist
auditors, fraud examiners, and
management in implementing data analysis
routines for improved fraud prevention and
detection.
A comprehensive checklist of data
analysis reports that are associated
with each occupational fraud category
per the Association of Certified Fraud
Examiners’ classification system.
Copyright © FraudResourceNet LLC
Visualizing the Cost Recovery 
and Savings Process
3/11/2014
10
Copyright © FraudResourceNet LLC
Profit Opportunities Outweigh
Analytic  Costs
 Accounts Payable
 Audit Fee Benchmarking
 Advertising Agency
 Document Fleet
 Freight
 Health Benefits
 Lease
 Media
 Order to Cash
 Proactive Fraud Detection
 Project Fraud
 Real Estate Depreciation
 Sales & Use Tax / VAT / R&D 
tax
 Strategic Sourcing
 Telecom
 Travel and Entertainment
 Utilities
Copyright © FraudResourceNet LLC
Process to Report Mapping
3/11/2014
11
Copyright © FraudResourceNet LLC
Fraud Task to Report Mapping
Copyright © FraudResourceNet LLC
Fraud Task to Supplier Map
3/11/2014
12
Copyright © FraudResourceNet LLC
Polling Question #2
What are example cost recovery areas
associated with the P2P cycle?
A. Freight
B. Order to cash
C. Healthcare
D. Accounts Payable
Copyright © FraudResourceNet LLC
Using an Analytic Process to Detect 
Fraud
3/11/2014
13
Copyright © FraudResourceNet LLC
Best Practice Approach on 
Fraud:Find It Before It Finds You
Think Prevention vs. Future Detection
 Identify issues earlier in their lifecycle
 Build a aura of deterrence within procure to pay
Build a Continuous Review Process
 Technology
 Minimal staff time / external assistance
Keep Improving the Model
 Model on identified frauds
 Remove false positives to isolate interesting events
Copyright © FraudResourceNet LLC
Analytic Command Center
Analytic Command Center
1. Accounts Payable
2. Accounts Receivable
3. Financial Statement
4.General Ledger
5. Inventory
6.Payroll
7. Revenue
Data Mart
Local Analytic 
Toolkit
Feedback from 
all locations
Recovery Auditors
Shared Services
3/11/2014
14
Copyright © FraudResourceNet LLC
The Overall Fraud
Analytic Process
 Get the Most Useful Data for Analysis
General Ledger / Accounts Payable
Other? / Use external data sources
 Develop Fraud Query Viewpoints
The 5 Dimensions
Brainstorm report ideas
 Analytically Trend
Benford’s Law
Statistical averages and simple trending by day, month, day of week
Post dated changes
 Use Visualization Techniques
Copyright © FraudResourceNet LLC
Clear Data Request
3/11/2014
15
Copyright © FraudResourceNet LLC
Fraud Data Considerations for
the P2P Cycle
A/P and G/L Review Factors
Accounts that are sole sourced
Accounts that have too many vendors
Categories that map to the “recovery list”
Assess to industry cost category benchmarks
Top 100 vendors
Trend analysis over time
Trend analysis by vendor (scatter graph)
Purchase Order / Price List
Match to invoice payments to assess price
differences
Strategic sourcing vendor review
Copyright © FraudResourceNet LLC
Distribution Analysis
 Remove subtotals for improved visibility
 Focus on sole source and multi source vendors
 Scroll out and drill to details as needed
3/11/2014
16
Copyright © FraudResourceNet LLC
Query Viewpoints
Copyright © FraudResourceNet LLC
It’s The Trends….Right?
Trend categories (meals, hotel, airfare,
other)
Trend by person and title
Trend departments
Trend vendors
Trend in the type of receipts
Trend under limits (company policy)
32
3/11/2014
17
Copyright © FraudResourceNet LLC
Number Ranking
 Summarize each amount (Pivot or ACL)
 Rank each number in order of occurrence
 Score each item in a sliding scale
 May be easiest to use a stratified score
 Decide if unique is weirder than non-unique
 Relate this summarized list back to the original
Copyright © FraudResourceNet LLC
Some Data Mining Approaches
Personnel Analysis
 Adjustments by employee
 Processing by employee
Contextual Summarizations
 Transaction types
Time Trending
 Month, week, and day / Also by department
 Last month to first 11 months
 Transactions at the end of and start of a fiscal year
3/11/2014
18
Copyright © FraudResourceNet LLC
Stratify Data ‐ Results
Copyright © FraudResourceNet LLC
Is Your Organization Working  
With Banned Companies?
EPLS is the excluded party list service of the U.S. Government as
maintained by the GSA
WWW.EPLS.GOV
Now
WWW.SAM.GOV
3/11/2014
19
Copyright © FraudResourceNet LLC
Is Your Organization 
Working With Terrorists?
Copyright © FraudResourceNet LLC
Are Your Vendors Real?
IRS TIN Matching Program
Validates U.S. Tax Identification Numbers
Can submit up to 100,000 TIN submissions at a
time
Make sure all punctuation is removed
See http://www.irs.gov/taxpros/ and enter “TIN
matching program” in the search box
3/11/2014
20
Copyright © FraudResourceNet LLC
Polling Question 3
What is not one of the query viewpoints?
A. Who
B. What
C. How
D. When
Copyright © FraudResourceNet LLC
Other T&E Reports
 Unmatched query of cardholders to an active employee
masterfile
 Cards used in multiple states (more than 2) in same day
 Cards processing in multiple currencies (more than 2) in
the same day
 Identify cards that have not had activity in last six months
 Cardholders that have more than one card
 Extract any cash back credits processed through the card
 Extract declined card transactions and determine if they
are frequent for certain cards
 Summary of card usage by merchant to find newly
added merchants and most active
3/11/2014
21
Copyright © FraudResourceNet LLC
Daily Transactional Analysis
Copyright © FraudResourceNet LLC
GeoMapping ‐ Map Point
3/11/2014
22
Copyright © FraudResourceNet LLC
Charting the Score
Copyright © FraudResourceNet LLC
Scatter Graph
3/11/2014
23
Copyright © FraudResourceNet LLC
Scatter Graph Explanation
1 – high dollar change and low count (outliers)
2 – charges that make sense
3 – changes that don’t make sense
4 – inefficiency that is developing
Copyright © FraudResourceNet LLC
Dashboarding Graphing
3/11/2014
24
Copyright © FraudResourceNet LLC
Polling Question 4
What graph is used to map value to score for
easier selections of data subsets?
A. Pie
B. Line
C. Bar
D. Scatter
Copyright © FraudResourceNet LLC
Fraud Scoring for Maximum Impact
3/11/2014
25
Copyright © FraudResourceNet LLC
 Vendors on report 1 vs. report 2 of duplicate payments.
 Duplicate transactions paid on different checks.
 Duplicate transactions with debit amounts in the vendor account
 Vendors with a high proportion of round dollar payments.
 Invoices that are exactly 10x, 100x or 1000x larger than another
invoice.
 Payments to any vendor that exceed the twelve month average
payments to that vendor by a specified percentage (i.e., 200%) o
the standard deviation for that vendor.
 Vendors paid with a high proportion of manual checks.
Simple Fraud Vendor Scoring 
Analysis – How It Started
Copyright © FraudResourceNet LLC
The Sampling “Problem” 
Bottom Line Numbers
 Modern tests (round numbers, duplicates, missing fields)
identify thousands of ‘suspicious’ transactions, usually about
1 in 5 of all transactions get a ‘red flag’
 Historically at least 0.02 – 0.03 % of all transactions have
real problems, such as a recoverable over-payment
 So roughly 0.00025 / 0.2 = 0.00125 or 1 in 800 ‘red flags’
lead to a real problem.
Imagine throwing a random dart at 800 balloons
hoping to hit the right one!!!
3/11/2014
26
Copyright © FraudResourceNet LLC
Transactional Score Benefits
 The best sample items (to meet your attributes) are selected
based on the severity given to each attribute. In other words,
errors, as you define them, can be mathematically calculated.
 Instead of selecting samples from reports, transactions that meet
multiple report attributes are selected (kill more birds with one
stone). Therefore a 50 unit sample can efficiently audit:
 38 duplicate payments
 22 round invoices
 18 in sequence invoices
….and they are the best given they are
mathematically the most “severe”.
51
Copyright © FraudResourceNet LLC
Summaries on Various 
Perspectives
52
Summarize by 
dimensions (and sub 
dimension) to pinpoint 
within the cube the 
crossover between the top 
scored location, time, and 
place of fraud based on 
the combined judgmental 
and statistical score 
3/11/2014
27
Copyright © FraudResourceNet LLC
Key Control Reports & Scoring
Copyright © FraudResourceNet LLC
Combining the Scores
ACL Code
3/11/2014
28
Copyright © FraudResourceNet LLC
Using Vlookup to Combine 
Scores
 Create a record number
 Relate sheets based on VLookup
Copyright © FraudResourceNet LLC
Polling Question #5
What Excel function is mainly used to organize
the scores into a master score?
A. SUMIF()
B. COUNTIF()
C. RAND()
D. VLOOKUP()
3/11/2014
29
Copyright © FraudResourceNet LLC
Questions?
Copyright © FraudResourceNet LLC
Peter Goldmann
FraudResourceNet LLC
800-440-2261
www.fraudresourcenet.com
pgoldmann@fraudresourcenet.com
Jim Kaplan
FraudResourceNet LLC
800-385-1625
www.fraudresourcenet.com
jkaplan@fraudresourcenet.com
Rich Lanza
Cash Recovery Partners, LLC
Phone: 973-729-3944
rich@richlanza.com
Thank You!
3/11/2014
30
Copyright © FraudResourceNet LLC
Coming Up
Upcoming March Anti-Fraud
Webinar…
 "How to Use Data Analytics to
Expose Fixed Asset and Inventory
Fraudsters”, March 19
Sign up at:
http://www.fraudresourcenet.com

Más contenido relacionado

Destacado

9 Quantitative Analysis Techniques
9   Quantitative Analysis Techniques9   Quantitative Analysis Techniques
9 Quantitative Analysis Techniques
Gajanan Bochare
 
Hr analytics
Hr analyticsHr analytics
Hr analytics
E P John
 

Destacado (18)

ACCOUNTING & AUDITING WITH EXCEL2011
ACCOUNTING & AUDITING WITH EXCEL2011ACCOUNTING & AUDITING WITH EXCEL2011
ACCOUNTING & AUDITING WITH EXCEL2011
 
Simplifying stats
Simplifying  statsSimplifying  stats
Simplifying stats
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
 
Babok2 Big Picture
Babok2 Big PictureBabok2 Big Picture
Babok2 Big Picture
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
Fraud, Waste & Abuse: Capture low hanging fruit and more
Fraud, Waste & Abuse: Capture low hanging fruit and moreFraud, Waste & Abuse: Capture low hanging fruit and more
Fraud, Waste & Abuse: Capture low hanging fruit and more
 
Go Predictive Analytics
Go Predictive AnalyticsGo Predictive Analytics
Go Predictive Analytics
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
 
9 Quantitative Analysis Techniques
9   Quantitative Analysis Techniques9   Quantitative Analysis Techniques
9 Quantitative Analysis Techniques
 
Faster document review and production
Faster document review and productionFaster document review and production
Faster document review and production
 
User Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To CompaniesUser Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To Companies
 
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraudPonzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
 
Using benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditingUsing benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditing
 
Fraud: Understanding Fraud and Our Responsibilities
Fraud:  Understanding Fraud and Our ResponsibilitiesFraud:  Understanding Fraud and Our Responsibilities
Fraud: Understanding Fraud and Our Responsibilities
 
[Tutorial] building machine learning models for predictive maintenance applic...
[Tutorial] building machine learning models for predictive maintenance applic...[Tutorial] building machine learning models for predictive maintenance applic...
[Tutorial] building machine learning models for predictive maintenance applic...
 
Hr analytics
Hr analyticsHr analytics
Hr analytics
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
HR Analytics, Done Right
HR Analytics, Done RightHR Analytics, Done Right
HR Analytics, Done Right
 

Similar a Using Data Analytics to Find and Deter Procure to Pay Fraud

How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
FraudBusters
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
FraudBusters
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
FraudBusters
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning Essentials
FraudBusters
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding Fraud
FraudBusters
 

Similar a Using Data Analytics to Find and Deter Procure to Pay Fraud (20)

How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
 
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning Essentials
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding Fraud
 
Fraud auditing creative techniques
Fraud auditing creative techniquesFraud auditing creative techniques
Fraud auditing creative techniques
 
How to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewHow to prepare for your first anti fraud review
How to prepare for your first anti fraud review
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
 
20141203 akjk
20141203 akjk20141203 akjk
20141203 akjk
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10)
 
Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial Data
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data Analytics
 
It52015 slides
It52015 slidesIt52015 slides
It52015 slides
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud Policy
 
IT Fraud Series: Data Analytics
IT Fraud Series: Data AnalyticsIT Fraud Series: Data Analytics
IT Fraud Series: Data Analytics
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
IT Fraud and Countermeasures
IT Fraud and CountermeasuresIT Fraud and Countermeasures
IT Fraud and Countermeasures
 
Super data-charging your corruption reviews with integrated analytics
Super data-charging your corruption reviews with integrated analyticsSuper data-charging your corruption reviews with integrated analytics
Super data-charging your corruption reviews with integrated analytics
 

Más de FraudBusters

Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best Practices
FraudBusters
 

Más de FraudBusters (11)

Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best Practices
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your Audits
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data Analysis
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
 

Último

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
Renandantas16
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 

Último (20)

Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 

Using Data Analytics to Find and Deter Procure to Pay Fraud

  • 1. 3/11/2014 1 Copyright © FraudResourceNet LLC Using Data Analytics to Find  and Deter Procure‐to‐Pay  Fraud  March 12, 2014 Special Guest Presenter: Rich Lanza Copyright © FraudResourceNet LLC About Jim Kaplan, MSc, CIA, CFE • President and Founder of AuditNet®, the global resource for auditors (now available on Apple and Android devices) • Auditor, Web Site Guru, • Internet for Auditors Pioneer • Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award. • Author of “The Auditor’s Guide to Internet Resources” 2nd Edition
  • 2. 3/11/2014 2 Copyright © FraudResourceNet LLC About Peter Goldmann, MSc., CFE President and Founder of White Collar Crime 101 • Publisher of White-Collar Crime Fighter • Developer of FraudAware® Anti-Fraud Training • Monthly Columnist, The Fraud Examiner, ACFE Newsletter Member of Editorial Advisory Board, ACFE Author of “Fraud in the Markets” • Explains how fraud fueled the financial crisis. Copyright © FraudResourceNet LLC Richard B. Lanza, CPA, CFE, CGMA • Over two decades of ACL and Excel software usage • Wrote the first practical ACL publication on how to use the product in 101 ways (101 ACL Applications) • Has written and spoken on the use of audit data analytics for over 15 years. • Received the Outstanding Achievement in Business Award by the Association of Certified Fraud Examiners for developing the publication Proactively Detecting Fraud Using Computer Audit Reports as a research project for the IIA • Recently was a contributing author of: • Global Technology Audit Guide (GTAG #13) Fraud in an Automated World - IIA • Data Analytics – A Practical Approach - research whitepaper for the Information System Accountability Control Association. • “Cost Recovery – Turning Your Accounts Payable Department into a Profit Center” – Wiley & Sons. Please see full bio at www.richlanza.com
  • 3. 3/11/2014 3 Copyright © FraudResourceNet LLC This webinar and its material are the property of FraudResourceNet LLC. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden. We are recording the webinar and you will be provided with a link access to that recording as detailed below. Downloading or otherwise duplicating the webinar recording is expressly prohibited. Webinar recording link will be sent via email within 5-7 business days. NASBA rules require us to ask polling questions during the Webinar and CPE certificates will be sent via email to those who answer ALL the polling questions The CPE certificates and link to the recording will be sent to the email address you registered with in GTW. We are not responsible for delivery problems due to spam filters, attachment restrictions or other controls in place for your email client. Submit questions via the chat box on your screen and we will answer them either during or at the conclusion. After the Webinar is over you will have an opportunity to provide feedback. Please complete the feedback questionnaire to help us continuously improve our Webinars If GTW stops working you may need to close and restart. You can always dial in and listen and follow along with the handout. Webinar Housekeeping Copyright © FraudResourceNet LLC The views expressed by the presenters do not necessarily represent the views, positions, or opinions of FraudResourceNet LLC (FRN) or the presenters’ respective organizations. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client relationship. While FRN makes every effort to ensure information is accurate and complete, FRN makes no representations, guarantees, or warranties as to the accuracy or completeness of the information provided via this presentation. FRN specifically disclaims all liability for any claims or damages that may result from the information contained in this presentation, including any websites maintained by third parties and linked to the FRN website Any mention of commercial products is for information only; it does not imply recommendation or endorsement by FraudResourceNet LLC 6 Disclaimers
  • 4. 3/11/2014 4 Copyright © FraudResourceNet LLC Today’s Agenda  Costliest procurement frauds to beware of (with case studies)  Indicators of possible collusive procurement- vendor schemes  Red flags to look for in audits of procurement using data analytics  How to conduct the audit using data analytics  What to do if you find vendor or procurement fraud during an audit Copyright © FraudResourceNet LLC Issues in Vendor Master  Management Too many active vendors  (with no activity)  Improper segregation  of duties Difficult to understand or  improve spend  management Difficult to manage or  improve payment terms Invalid Tax IDs leading to B  notices Too many active vendors  (with no activity)  Improper segregation  of duties Difficult to understand or  improve spend  management Difficult to manage or  improve payment terms Invalid Tax IDs leading to B  notices Duplicate vendors  representing parents and  subs, for different  companies, or just  mistakes = duplicate pays Duplicate vendors  representing parents and  subs, for different  companies, or just  mistakes = duplicate pays Duplicate vendors  representing parents and  subs, for different  companies, or just  mistakes = duplicate pays Vendors are confused and  may see opportunities to  take advantage of the  company Vendors are confused and  may see opportunities to  take advantage of the  company Lack of vendor  management …increases  opportunity for fraud Lack of vendor  management …increases  opportunity for fraud Lack of vendor  management …increases  opportunity for fraud
  • 6. 3/11/2014 6 Copyright © FraudResourceNet LLC Primary Weaknesses  Leading to  the Fraud Copyright © FraudResourceNet LLC 1. Whistleblowing hotline 2. Signed code of conduct 3. Train employees 4. Background checks 5. Look for and respond to fraud 12 Most companies have these procedures in  place but the question is….how effective  are they? The Top Procedures Per  SAS 99 – Appendix B
  • 7. 3/11/2014 7 Copyright © FraudResourceNet LLC Where Are You Using Data  Analytics? AuditNet – 2012 Data  Analysis Software  Survey Copyright © FraudResourceNet LLC Polling Question 1 What is not one of the top occurring frauds per the ACFE study? A. Billing B. Corruption C. Overstated Revenue D. Expense Reimbursements
  • 9. 3/11/2014 9 Copyright © FraudResourceNet LLC Proactively Detecting Fraud Using Computer Audit Reports IIA Research Paper / CPE Course See the IIA’s website at www.theiia.org The purpose of this document is to assist auditors, fraud examiners, and management in implementing data analysis routines for improved fraud prevention and detection. A comprehensive checklist of data analysis reports that are associated with each occupational fraud category per the Association of Certified Fraud Examiners’ classification system. Copyright © FraudResourceNet LLC Visualizing the Cost Recovery  and Savings Process
  • 10. 3/11/2014 10 Copyright © FraudResourceNet LLC Profit Opportunities Outweigh Analytic  Costs  Accounts Payable  Audit Fee Benchmarking  Advertising Agency  Document Fleet  Freight  Health Benefits  Lease  Media  Order to Cash  Proactive Fraud Detection  Project Fraud  Real Estate Depreciation  Sales & Use Tax / VAT / R&D  tax  Strategic Sourcing  Telecom  Travel and Entertainment  Utilities Copyright © FraudResourceNet LLC Process to Report Mapping
  • 12. 3/11/2014 12 Copyright © FraudResourceNet LLC Polling Question #2 What are example cost recovery areas associated with the P2P cycle? A. Freight B. Order to cash C. Healthcare D. Accounts Payable Copyright © FraudResourceNet LLC Using an Analytic Process to Detect  Fraud
  • 13. 3/11/2014 13 Copyright © FraudResourceNet LLC Best Practice Approach on  Fraud:Find It Before It Finds You Think Prevention vs. Future Detection  Identify issues earlier in their lifecycle  Build a aura of deterrence within procure to pay Build a Continuous Review Process  Technology  Minimal staff time / external assistance Keep Improving the Model  Model on identified frauds  Remove false positives to isolate interesting events Copyright © FraudResourceNet LLC Analytic Command Center Analytic Command Center 1. Accounts Payable 2. Accounts Receivable 3. Financial Statement 4.General Ledger 5. Inventory 6.Payroll 7. Revenue Data Mart Local Analytic  Toolkit Feedback from  all locations Recovery Auditors Shared Services
  • 14. 3/11/2014 14 Copyright © FraudResourceNet LLC The Overall Fraud Analytic Process  Get the Most Useful Data for Analysis General Ledger / Accounts Payable Other? / Use external data sources  Develop Fraud Query Viewpoints The 5 Dimensions Brainstorm report ideas  Analytically Trend Benford’s Law Statistical averages and simple trending by day, month, day of week Post dated changes  Use Visualization Techniques Copyright © FraudResourceNet LLC Clear Data Request
  • 15. 3/11/2014 15 Copyright © FraudResourceNet LLC Fraud Data Considerations for the P2P Cycle A/P and G/L Review Factors Accounts that are sole sourced Accounts that have too many vendors Categories that map to the “recovery list” Assess to industry cost category benchmarks Top 100 vendors Trend analysis over time Trend analysis by vendor (scatter graph) Purchase Order / Price List Match to invoice payments to assess price differences Strategic sourcing vendor review Copyright © FraudResourceNet LLC Distribution Analysis  Remove subtotals for improved visibility  Focus on sole source and multi source vendors  Scroll out and drill to details as needed
  • 16. 3/11/2014 16 Copyright © FraudResourceNet LLC Query Viewpoints Copyright © FraudResourceNet LLC It’s The Trends….Right? Trend categories (meals, hotel, airfare, other) Trend by person and title Trend departments Trend vendors Trend in the type of receipts Trend under limits (company policy) 32
  • 17. 3/11/2014 17 Copyright © FraudResourceNet LLC Number Ranking  Summarize each amount (Pivot or ACL)  Rank each number in order of occurrence  Score each item in a sliding scale  May be easiest to use a stratified score  Decide if unique is weirder than non-unique  Relate this summarized list back to the original Copyright © FraudResourceNet LLC Some Data Mining Approaches Personnel Analysis  Adjustments by employee  Processing by employee Contextual Summarizations  Transaction types Time Trending  Month, week, and day / Also by department  Last month to first 11 months  Transactions at the end of and start of a fiscal year
  • 18. 3/11/2014 18 Copyright © FraudResourceNet LLC Stratify Data ‐ Results Copyright © FraudResourceNet LLC Is Your Organization Working   With Banned Companies? EPLS is the excluded party list service of the U.S. Government as maintained by the GSA WWW.EPLS.GOV Now WWW.SAM.GOV
  • 19. 3/11/2014 19 Copyright © FraudResourceNet LLC Is Your Organization  Working With Terrorists? Copyright © FraudResourceNet LLC Are Your Vendors Real? IRS TIN Matching Program Validates U.S. Tax Identification Numbers Can submit up to 100,000 TIN submissions at a time Make sure all punctuation is removed See http://www.irs.gov/taxpros/ and enter “TIN matching program” in the search box
  • 20. 3/11/2014 20 Copyright © FraudResourceNet LLC Polling Question 3 What is not one of the query viewpoints? A. Who B. What C. How D. When Copyright © FraudResourceNet LLC Other T&E Reports  Unmatched query of cardholders to an active employee masterfile  Cards used in multiple states (more than 2) in same day  Cards processing in multiple currencies (more than 2) in the same day  Identify cards that have not had activity in last six months  Cardholders that have more than one card  Extract any cash back credits processed through the card  Extract declined card transactions and determine if they are frequent for certain cards  Summary of card usage by merchant to find newly added merchants and most active
  • 23. 3/11/2014 23 Copyright © FraudResourceNet LLC Scatter Graph Explanation 1 – high dollar change and low count (outliers) 2 – charges that make sense 3 – changes that don’t make sense 4 – inefficiency that is developing Copyright © FraudResourceNet LLC Dashboarding Graphing
  • 24. 3/11/2014 24 Copyright © FraudResourceNet LLC Polling Question 4 What graph is used to map value to score for easier selections of data subsets? A. Pie B. Line C. Bar D. Scatter Copyright © FraudResourceNet LLC Fraud Scoring for Maximum Impact
  • 25. 3/11/2014 25 Copyright © FraudResourceNet LLC  Vendors on report 1 vs. report 2 of duplicate payments.  Duplicate transactions paid on different checks.  Duplicate transactions with debit amounts in the vendor account  Vendors with a high proportion of round dollar payments.  Invoices that are exactly 10x, 100x or 1000x larger than another invoice.  Payments to any vendor that exceed the twelve month average payments to that vendor by a specified percentage (i.e., 200%) o the standard deviation for that vendor.  Vendors paid with a high proportion of manual checks. Simple Fraud Vendor Scoring  Analysis – How It Started Copyright © FraudResourceNet LLC The Sampling “Problem”  Bottom Line Numbers  Modern tests (round numbers, duplicates, missing fields) identify thousands of ‘suspicious’ transactions, usually about 1 in 5 of all transactions get a ‘red flag’  Historically at least 0.02 – 0.03 % of all transactions have real problems, such as a recoverable over-payment  So roughly 0.00025 / 0.2 = 0.00125 or 1 in 800 ‘red flags’ lead to a real problem. Imagine throwing a random dart at 800 balloons hoping to hit the right one!!!
  • 26. 3/11/2014 26 Copyright © FraudResourceNet LLC Transactional Score Benefits  The best sample items (to meet your attributes) are selected based on the severity given to each attribute. In other words, errors, as you define them, can be mathematically calculated.  Instead of selecting samples from reports, transactions that meet multiple report attributes are selected (kill more birds with one stone). Therefore a 50 unit sample can efficiently audit:  38 duplicate payments  22 round invoices  18 in sequence invoices ….and they are the best given they are mathematically the most “severe”. 51 Copyright © FraudResourceNet LLC Summaries on Various  Perspectives 52 Summarize by  dimensions (and sub  dimension) to pinpoint  within the cube the  crossover between the top  scored location, time, and  place of fraud based on  the combined judgmental  and statistical score 
  • 28. 3/11/2014 28 Copyright © FraudResourceNet LLC Using Vlookup to Combine  Scores  Create a record number  Relate sheets based on VLookup Copyright © FraudResourceNet LLC Polling Question #5 What Excel function is mainly used to organize the scores into a master score? A. SUMIF() B. COUNTIF() C. RAND() D. VLOOKUP()
  • 29. 3/11/2014 29 Copyright © FraudResourceNet LLC Questions? Copyright © FraudResourceNet LLC Peter Goldmann FraudResourceNet LLC 800-440-2261 www.fraudresourcenet.com pgoldmann@fraudresourcenet.com Jim Kaplan FraudResourceNet LLC 800-385-1625 www.fraudresourcenet.com jkaplan@fraudresourcenet.com Rich Lanza Cash Recovery Partners, LLC Phone: 973-729-3944 rich@richlanza.com Thank You!
  • 30. 3/11/2014 30 Copyright © FraudResourceNet LLC Coming Up Upcoming March Anti-Fraud Webinar…  "How to Use Data Analytics to Expose Fixed Asset and Inventory Fraudsters”, March 19 Sign up at: http://www.fraudresourcenet.com