SlideShare una empresa de Scribd logo
1 de 26
Combating Internal Fraud
           5 Points You Should Think About
© Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
Internal Fraud – a Very Real Risk




     © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
Internal Fraud – a Very Real Risk




     © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
Internal Fraud – a Very Real Risk




     © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
Internal Fraud – a Very Real Risk




     © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
1. Your logs don’t tell the
                                                                                         complete story.
                                                                                      2. Be proactive – if the funds
                                                                                         are gone it might be too late.
                                                                                      3. How much of your external
                                                                                         fraud is actually internal?
                                                                                      4. The breach will happen at
                                                                                         the point where your control
                                                                                         is the weakest.
                                                                                      5. Avoid wasting time with false




                                        5
                                                                                         positives.




                                                                          POINTS TO THINK ABOUT
© Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
1     Your logs don’t tell the complete story
Time and again, we hear the story of organizations that invested millions in internal
fraud programs, yet are monitoring only a few key systems and are barely detecting
fraud.
They are not sure why, and cannot justify further investment to strengthen
internal fraud detection.




       © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
1     Your logs don’t tell the complete story
Time and again, we hear the story of organizations that invested millions in internal
fraud programs, yet are monitoring only a few key systems and are barely detecting
fraud.
They are not sure why, and cannot justify further investment to strengthen
internal fraud detection.
Here’s Why:
Organizations make the mistake of using log files (text files that record actions users take
in the system) to identify fraud. A lot of people we meet assume that log files record every
action that your employees take. However:
  Log files usually miss critical data: surprisingly, most log files don’t keep a record of
  searches, inquiries, and even which fields were changed on a page.
  Log files are expensive to use: normally these are huge files, and your IT team will be
  the first to tell you that they’re expensive to store, move and use.
  Log files are expensive to update: changing the log file process to capture the
  missing data requires expensive work by the system vendor and IT staff. Often, with
  homegrown systems, IT staff no longer has the know-how to make changes.

       © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
1      Your logs don’t tell the complete story
Example 1:
An employee is looking up high net-worth customers and selling their information
to identity thieves.
Most log-file based systems
can’t detect this common crime,
as they don’t keep a record of
which employees search against
Which accounts.

Make sure that the system you
select or build has the ability to
profile against searches AND
inquiries.




         © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
1      Your logs don’t tell the complete story
Example 2:
An employee is preparing to transfer funds from an internal account (e.g., general
ledger) to an account they control.
Most log-file based systems will detect when the funds move, but that’s usually too late.
An employee preparing to steal money will inquire against accounts to get ready for the
theft. Make sure that the system you build or select can profile inquiries against internal
accounts.

Example 3:
An employee is colluding with an outside criminal to commit check fraud or card
fraud.
Most log files don’t have enough information to detect accounts that had fraud and also
had a high rate of inquiries or searches by the employee that was feeding information to
the external criminal.




        © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
Be proactive – if the funds are gone,
2   it might be too late
Many fraud systems only watch for
funds or data leaving your institution.
That’s too late; the damage is already
done by the time you detect it.
And even after detection, most cases
take more than three months to
establish root cause, and two-thirds of
incidents go unpunished.*
To be successful in the fight against
internal fraud, you must prevent the
fraud before it happens.
To effectively prevent internal fraud,
your monitoring system must be able to
detect when an employee starts to
behave unusually.
*Source: “The Risk of Insider Fraud”, Dr. Larry Ponemon, Sept. 2011



       © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
Be proactive – if the funds are gone,
2       it might be too late
•   Many fraud systems only watch for                                                            Warning signs that an employee is
    funds or data leaving your institution.                                                      preparing to commit fraud:
    That’s too late; the damage is already
    done by the time you detect it.                                                               Employees who view high-risk accounts
                                                                                                  (like high-balance accounts, internal
•   And even after detection, most cases                                                          accounts, dormant accounts) more
    take more than three months to                                                                frequently than their peers
    establish root cause, and two-thirds of
    incidents go unpunished.*                                                                     Employees who behave inappropriately
                                                                                                  (like making off-hours inquiries, viewing
•   To be successful in the fight against                                                         accounts from other regions, or looking at
    internal fraud, you must prevent the                                                          other department’s accounts) more
    fraud before it happens.                                                                      frequently than their peers
•   To effectively prevent internal fraud,                                                        Branch employees who access an unusual
    your monitoring system must be able to                                                        number of accounts without performing
    detect when an employee starts to                                                             financial transaction(s).
    behave unusually.
                                                                                                  Employees who search or inquire on an
    *Source: “The Risk of Insider Fraud”, Dr. Larry Ponemon, Sept. 2011                           unusually high number of accounts.

           © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
An example of proactive internal fraud monitoring
               The Credit Card division of a $100 billion international bank was having a problem
               with employees looking at the spending history of celebrities. Since the Intellinx
               system focused on detecting inquiries (instead of the loss of data), the bank was
               able to detect and prevent losses very quickly.

                                    100

                                                                              Alerts on Celebrity Accounts Snooping
                  Alert# per Week




                                     80


                                     60


                                     40


                                     20


                                      0
                                                1          2          3        4               5   6    7         8     9   10

                                                                                        Weeks
               Rule                                 Security officers start                            First employee
               implemented                          calling on suspects                                is laid off




s Reserved.Intellinx Ltd. All Rights Reserved                                      29-Apr-12
An example of proactive internal fraud monitoring
               The Credit Card division of a $100 billion international bank was having a problem
               with employees looking at the spending history of celebrities. Since the Intellinx
               system focused on detecting inquiries (instead of the loss of data), the bank was
               able to detect and prevent losses very quickly.

                                    100

                                                                              Alerts on Celebrity Accounts Snooping
                  Alert# per Week




                                     80


                                     60


                                     40


                                     20


                                      0
                                                1          2          3        4               5   6    7         8     9   10

                                                                                        Weeks
               Rule                                 Security officers start                            First employee
               implemented                          calling on suspects                                is laid off



                                    Intellinx changes employee behavior and significantly increases
                                                   compliance with corporate policies
s Reserved.Intellinx Ltd. All Rights Reserved                                      29-Apr-12
3   How much of your external fraud is
    actually internal?
What do you think of the following statistic?


Occupational fraud, mostly through employee theft, is a
growing, global problem ... About 5 percent of an
organization's revenue is lost to these fraud incidents…
approaching $1 trillion a year.




     © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
3   How much of your external fraud is
    actually internal?
What do you think of the following statistic?


Occupational fraud, mostly through employee theft, is a
growing, global problem ... About 5 percent of an
organization's revenue is lost to these fraud incidents…
approaching $1 trillion a year.
Many banking fraud officers think this statistic is too high. But could it be true?
A likely answer: some of your external fraud is actually internal fraud.
With organized fraud rings becoming a more prevalent crime force, it’s becoming
increasingly common for bank employees to help external criminals to commit new account
fraud, deposit fraud, check fraud, card fraud, and loan fraud.
Collusion of insiders and external fraudsters can be detected by close monitoring of
Insiders’ behavior.


     © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
3     How much of your external fraud is
      actually internal?
How to detect external fraud caused by internal action
Example 1: An employee is looking up customers and selling their check images,
signature cards, etc. to a fraud ring that commits check fraud.
Make sure that the monitoring system you select can identify employees who are inquiring
against an unusual number of accounts that later end up having check fraud.

Example 2: An employee is colluding with an external party to open fraudulent
accounts that will later be used for first party fraud, money mule schemes, etc.
Make sure that the monitoring system you select can identify employees who are opening
an unusual number of accounts that later end up having first party fraud.

Example 3: An employee is colluding with a customer to defraud the bank.
Make sure that the monitoring system you select can identify employees who are
performing an unusual number of transactions (financial or non-financial) for the same
customer.

       © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
4          A breach will happen at the point where
           your control is weakest
Even the most security conscience organizations have weak points that can be
exploited by employees. This problem can be overcome by deploying an anti-fraud
system that is multi-layered, and combines indicators from multiple sources.


Example 1: Society General
What he did: Jerome Kerviel “borrowed” the login credentials of his
colleagues to cover his tracks while conducting transactions that ultimately
caused losses of over seven billion dollars.

How he should have been caught: An anti-fraud system that monitors
user activity at all levels - network, application and transaction - would have
compensated for the weak controls of the trading system. For example, by
detecting:
  The same user logged in from different workstations at the same time
  Several users logged in on the same workstation at the same time (or
  within close proximity)
  A user logging in to a workstation without scanning their badge through
  the physical entry system
  A user logging in for the first time from a new workstation
  A user who is logging in (or using their badge) during unusual working hours


            © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
4          A breach will happen at the point where
           your control is weakest
Even the most security conscience organizations have weak points that can be
exploited by employees. This problem can be overcome by deploying an anti-fraud
system that is multi-layered, and combines indicators from multiple sources.


Example 1: Society General
What he did: Jerome Kerviel “borrowed” the login credentials of his
                                                                                                  40 percent or
colleagues to cover his tracks while conducting transactions that ultimately                      organizations say it is
caused losses of over seven billion dollars.
                                                                                                  likely that a privileged
How he should have been caught: An anti-fraud system that monitors
user activity at all levels - network, application and transaction - would have                   user turns off or alters
compensated for the weak controls of the trading system. For example, by
detecting:
                                                                                                  application controls in
  The same user logged in from different workstations at the same time
                                                                                                  order to access or
  Several users logged in on the same workstation at the same time (or                            change sensitive
  within close proximity)
                                                                                                  information and then
  A user logging in to a workstation without scanning their badge through
  the physical entry system                                                                       resets the controls to
  A user logging in for the first time from a new workstation                                     cover his or her tracks.
  A user who is logging in (or using their badge) during unusual working hours                    Source: “The Risk of Insider Fraud”,
                                                                                                  Dr. Larry Ponemon, Sept. 2011




            © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
5   Minimize false positives and waste less time
False positive alerts generated by anti-fraud systems are massive time wasters:
analysts spend countless hours researching “alerts” that amount to nothing.

There are several key steps to minimizing false positives:
    Work with a vendor that can provide a set of pre-defined rules; you can learn a
    lot from the experience of other organizations.
    After you implement the system, make sure that it’s someone’s job to periodically
    analyze and tweak the rules that are providing the best results. The system you
    select or build should have a reporting engine that makes it easy to analyze rule
    effectiveness.
    Select a system with a scoring model that you can easily update on your own.
    Even if you have all the right rules, weighting them properly is the key to minimizing
    false positives, and you need to have this capability in-house.
    Make sure your system has a way for your analysts to write and deploy their own
    rules. New patterns of fraud emerge all of the time, and you need to make sure
    that the ability to create new rules is something your staff can do.

    © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
5     Minimize false positives and waste less time
                   Pre-Defined Rules: Common Internal Fraud Schemes

   Taking Over                                                      Money Theft                      Other
    Accounts                                                                                        Schemes
• Identity theft by                                         • Stealing money from            • Personal expenses on
  manipulating account                                        customers via:                   corporate card account.
  data.                                                       • Cash                         • Performing transactions for
                                                              • Check                          personal use.
• Opening accounts for                                        • Card                         • Stealing customer
  money mules/ deposit                                        • Transfer                       information.
  fraud schemes.                                              • ACH/Wire                     • Performing unauthorized
                                                                                               claims, rebates, reversals.
                                                            • Stealing money from            • Targeting the elderly.
• Opening accounts for
                                                              internal accounts via:         • Collusion between multiple
  non-existent or
                                                              • Cash                           employees.
  unqualified customers in
                                                              • Transfer                     • Violation of policy/ errors.
  order to meet quotas/
                                                              • ACH/Wire                     • Trying to avoid detection.
  incentives.

       © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
Five Facts about the Intellinx Enterprise
Fraud Solution
1. Intellinx offers the only true end-to-end insider fraud solution:
       Based on real-time sniffing of your corporate network, providing immediate alerts on suspicious activity.
       Captures and analyzes all user activity including user queries. The result: Intellinx detects fraudsters who
       are preparing to commit or have already committed illegal activity.


2. Intellinx uniquely combines real-time data from the network with other data sources, to
   create superior visibility into user activity. The data captured through network sniffing
   includes user queries and incomplete transactions not typically found in log files.


3. The Intellinx analytic engine profiles genuine human behavior in order to detect
   anomalies. Data from various channels, including both internal and external (customers)
   activity, is correlated in order to detect collusion.




     © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
Five Facts about the Intellinx Enterprise
Fraud Solution
4. Intellinx prevents employee fraud and data theft by improving policy compliance:
       Holding each employee accountable for his/her actions, through continuous monitoring with full
       audit trail of every activity.
       Creating deterrence by detecting and responding to suspicious behavior in real-time.

5. Intellinx saves time by minimizing false positive alerts through:
       Analysis based on comprehensive data, reflecting true user activity.
       A highly flexible scoring mechanism that weighs various behavior indicators for each entity (account,
       employee, customer, etc.), to produce accurate alerts.




     © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
Five Facts about the Intellinx Enterprise
Fraud Solution
4. Intellinx prevents employee fraud and data theft by improving policy compliance:
       Holding each employee accountable for his/her actions, through continuous monitoring with full
       audit trail of every activity.
       Creating deterrence by detecting and responding to suspicious behavior in real-time.

5. Intellinx saves time by minimizing false positive alerts through:
       Analysis based on comprehensive data, reflecting true user activity.
       A highly flexible scoring mechanism that weighs various behavior indicators for each entity (account,
       employee, customer, etc.), to produce accurate alerts.




     © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
Your Reputation is a
Critical Asset
 It takes 20 years to build a
reputation and five minutes
to ruin it. If you think about
that, you'll do things
differently
Warren Buffet




                                                                                           25
     © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12
Thank you
© Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved   29-Apr-12

Más contenido relacionado

La actualidad más candente

Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasuresKAMRAN KHALID
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes ObserveIT
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatAndrew Case
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider ThreatLancope, Inc.
 
An Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security PracticesAn Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security PracticesJerry Harding
 
Heartlandpt3
Heartlandpt3Heartlandpt3
Heartlandpt3grimesjo
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeDavid Mai, MBA
 
Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziKashif Semple
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionObserveIT
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteDamir Delija
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015Paul Ferrillo
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRIZivaro Inc
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...SafeNet
 

La actualidad más candente (20)

Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
 
Insider Threat
Insider ThreatInsider Threat
Insider Threat
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider Threat
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
 
An Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security PracticesAn Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security Practices
 
Heartlandpt3
Heartlandpt3Heartlandpt3
Heartlandpt3
 
Ht t17
Ht t17Ht t17
Ht t17
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
 
Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint Prezi
 
APT & What we can do TODAY
APT & What we can do TODAYAPT & What we can do TODAY
APT & What we can do TODAY
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat Detection
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidente
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 

Destacado

Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffFraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffDecosimoCPAs
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threatillustro
 
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesMaximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesSecunia
 
What Lies Ahead
What Lies AheadWhat Lies Ahead
What Lies AheadMoboom
 
Avaya Partners with Brand Embassy to Provide Digital Customer Service to Ente...
Avaya Partners with Brand Embassy to Provide Digital Customer Service to Ente...Avaya Partners with Brand Embassy to Provide Digital Customer Service to Ente...
Avaya Partners with Brand Embassy to Provide Digital Customer Service to Ente...Brand Embassy
 
Play Framework (anatomy of a play application) @ Codacy
Play Framework (anatomy of a play application) @ CodacyPlay Framework (anatomy of a play application) @ Codacy
Play Framework (anatomy of a play application) @ CodacyRodrigo Fernandes
 
InvisibleCRM Reselling Partner Program
InvisibleCRM Reselling Partner ProgramInvisibleCRM Reselling Partner Program
InvisibleCRM Reselling Partner ProgramInvisibleCRM
 
Don’t Hide Your Content in a Traditional Help System: A Case Study from TechP...
Don’t Hide Your Content in a Traditional Help System: A Case Study from TechP...Don’t Hide Your Content in a Traditional Help System: A Case Study from TechP...
Don’t Hide Your Content in a Traditional Help System: A Case Study from TechP...Sarah Silveri, RSI Content Solutions
 
When Everyone Talks At Once, But Leaders Still Know What To Do
When Everyone Talks At Once, But Leaders Still Know What To DoWhen Everyone Talks At Once, But Leaders Still Know What To Do
When Everyone Talks At Once, But Leaders Still Know What To Do9Lenses
 
Stop Branding Pollution: Managing brand complexity & ensuring consistency
Stop Branding Pollution: Managing brand complexity & ensuring consistencyStop Branding Pollution: Managing brand complexity & ensuring consistency
Stop Branding Pollution: Managing brand complexity & ensuring consistencyConceptShare
 
SoulCRM Brochure
SoulCRM BrochureSoulCRM Brochure
SoulCRM BrochureSoulCRM
 
Ecommerce In Sri Lanka: Building An Experience That Customers Will Love
Ecommerce In Sri Lanka: Building An Experience That Customers Will LoveEcommerce In Sri Lanka: Building An Experience That Customers Will Love
Ecommerce In Sri Lanka: Building An Experience That Customers Will LoveAdnan Issadeen
 
Dynasoft TeleFactura Telecom billing
Dynasoft TeleFactura Telecom billingDynasoft TeleFactura Telecom billing
Dynasoft TeleFactura Telecom billingDynasoft Limited
 

Destacado (18)

Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffFraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Step Up Business Intelligence
Step Up Business Intelligence Step Up Business Intelligence
Step Up Business Intelligence
 
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesMaximize Computer Security With Limited Ressources
Maximize Computer Security With Limited Ressources
 
What Lies Ahead
What Lies AheadWhat Lies Ahead
What Lies Ahead
 
Avaya Partners with Brand Embassy to Provide Digital Customer Service to Ente...
Avaya Partners with Brand Embassy to Provide Digital Customer Service to Ente...Avaya Partners with Brand Embassy to Provide Digital Customer Service to Ente...
Avaya Partners with Brand Embassy to Provide Digital Customer Service to Ente...
 
Play Framework (anatomy of a play application) @ Codacy
Play Framework (anatomy of a play application) @ CodacyPlay Framework (anatomy of a play application) @ Codacy
Play Framework (anatomy of a play application) @ Codacy
 
первая
перваяпервая
первая
 
InvisibleCRM Reselling Partner Program
InvisibleCRM Reselling Partner ProgramInvisibleCRM Reselling Partner Program
InvisibleCRM Reselling Partner Program
 
Don’t Hide Your Content in a Traditional Help System: A Case Study from TechP...
Don’t Hide Your Content in a Traditional Help System: A Case Study from TechP...Don’t Hide Your Content in a Traditional Help System: A Case Study from TechP...
Don’t Hide Your Content in a Traditional Help System: A Case Study from TechP...
 
When Everyone Talks At Once, But Leaders Still Know What To Do
When Everyone Talks At Once, But Leaders Still Know What To DoWhen Everyone Talks At Once, But Leaders Still Know What To Do
When Everyone Talks At Once, But Leaders Still Know What To Do
 
Stop Branding Pollution: Managing brand complexity & ensuring consistency
Stop Branding Pollution: Managing brand complexity & ensuring consistencyStop Branding Pollution: Managing brand complexity & ensuring consistency
Stop Branding Pollution: Managing brand complexity & ensuring consistency
 
SoulCRM Brochure
SoulCRM BrochureSoulCRM Brochure
SoulCRM Brochure
 
Ecommerce In Sri Lanka: Building An Experience That Customers Will Love
Ecommerce In Sri Lanka: Building An Experience That Customers Will LoveEcommerce In Sri Lanka: Building An Experience That Customers Will Love
Ecommerce In Sri Lanka: Building An Experience That Customers Will Love
 
Nonprofit Special Events
Nonprofit Special EventsNonprofit Special Events
Nonprofit Special Events
 
Infocom webinar race car metaphore
Infocom webinar   race car metaphoreInfocom webinar   race car metaphore
Infocom webinar race car metaphore
 
Dynasoft TeleFactura Telecom billing
Dynasoft TeleFactura Telecom billingDynasoft TeleFactura Telecom billing
Dynasoft TeleFactura Telecom billing
 
Impel elemech-company
Impel elemech-companyImpel elemech-company
Impel elemech-company
 

Similar a Combating Internal Fraud - 5 Points You Should Think About

Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?CBIZ, Inc.
 
Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Pairat Srivilairit
 
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Pairat Srivilairit
 
Addressing insider threats and data leakage
Addressing insider threats and data leakageAddressing insider threats and data leakage
Addressing insider threats and data leakageLepide USA Inc
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach SecurityMetrics
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryDecosimoCPAs
 
5 Types of Insider Threats and How to Detect them in Your ERP System
5 Types of Insider Threats and How to Detect them in Your ERP System5 Types of Insider Threats and How to Detect them in Your ERP System
5 Types of Insider Threats and How to Detect them in Your ERP SystemMichael Cunningham
 
EFTRAC_Canada.pdf
EFTRAC_Canada.pdfEFTRAC_Canada.pdf
EFTRAC_Canada.pdfAnisunB
 
Course Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemCourse Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemTheodore Le
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 

Similar a Combating Internal Fraud - 5 Points You Should Think About (20)

Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
 
Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4
 
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
 
Addressing insider threats and data leakage
Addressing insider threats and data leakageAddressing insider threats and data leakage
Addressing insider threats and data leakage
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
 
Employee Theft
Employee Theft Employee Theft
Employee Theft
 
5 Types of Insider Threats and How to Detect them in Your ERP System
5 Types of Insider Threats and How to Detect them in Your ERP System5 Types of Insider Threats and How to Detect them in Your ERP System
5 Types of Insider Threats and How to Detect them in Your ERP System
 
Window of Compromise
Window of CompromiseWindow of Compromise
Window of Compromise
 
2012-05-30 Nonprofit Fraud Schemes
2012-05-30 Nonprofit Fraud Schemes2012-05-30 Nonprofit Fraud Schemes
2012-05-30 Nonprofit Fraud Schemes
 
EFTRAC_Canada.pdf
EFTRAC_Canada.pdfEFTRAC_Canada.pdf
EFTRAC_Canada.pdf
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Jon ppoint
Jon ppointJon ppoint
Jon ppoint
 
Course Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemCourse Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information System
 
One of 2 protect your business
One of 2 protect your businessOne of 2 protect your business
One of 2 protect your business
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
02 presentation-christianprobst
02 presentation-christianprobst02 presentation-christianprobst
02 presentation-christianprobst
 
Salami attack
Salami attackSalami attack
Salami attack
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 

Último

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 

Último (20)

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 

Combating Internal Fraud - 5 Points You Should Think About

  • 1. Combating Internal Fraud 5 Points You Should Think About © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 2. Internal Fraud – a Very Real Risk © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 3. Internal Fraud – a Very Real Risk © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 4. Internal Fraud – a Very Real Risk © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 5. Internal Fraud – a Very Real Risk © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 6. 1. Your logs don’t tell the complete story. 2. Be proactive – if the funds are gone it might be too late. 3. How much of your external fraud is actually internal? 4. The breach will happen at the point where your control is the weakest. 5. Avoid wasting time with false 5 positives. POINTS TO THINK ABOUT © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 7. 1 Your logs don’t tell the complete story Time and again, we hear the story of organizations that invested millions in internal fraud programs, yet are monitoring only a few key systems and are barely detecting fraud. They are not sure why, and cannot justify further investment to strengthen internal fraud detection. © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 8. 1 Your logs don’t tell the complete story Time and again, we hear the story of organizations that invested millions in internal fraud programs, yet are monitoring only a few key systems and are barely detecting fraud. They are not sure why, and cannot justify further investment to strengthen internal fraud detection. Here’s Why: Organizations make the mistake of using log files (text files that record actions users take in the system) to identify fraud. A lot of people we meet assume that log files record every action that your employees take. However: Log files usually miss critical data: surprisingly, most log files don’t keep a record of searches, inquiries, and even which fields were changed on a page. Log files are expensive to use: normally these are huge files, and your IT team will be the first to tell you that they’re expensive to store, move and use. Log files are expensive to update: changing the log file process to capture the missing data requires expensive work by the system vendor and IT staff. Often, with homegrown systems, IT staff no longer has the know-how to make changes. © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 9. 1 Your logs don’t tell the complete story Example 1: An employee is looking up high net-worth customers and selling their information to identity thieves. Most log-file based systems can’t detect this common crime, as they don’t keep a record of which employees search against Which accounts. Make sure that the system you select or build has the ability to profile against searches AND inquiries. © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 10. 1 Your logs don’t tell the complete story Example 2: An employee is preparing to transfer funds from an internal account (e.g., general ledger) to an account they control. Most log-file based systems will detect when the funds move, but that’s usually too late. An employee preparing to steal money will inquire against accounts to get ready for the theft. Make sure that the system you build or select can profile inquiries against internal accounts. Example 3: An employee is colluding with an outside criminal to commit check fraud or card fraud. Most log files don’t have enough information to detect accounts that had fraud and also had a high rate of inquiries or searches by the employee that was feeding information to the external criminal. © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 11. Be proactive – if the funds are gone, 2 it might be too late Many fraud systems only watch for funds or data leaving your institution. That’s too late; the damage is already done by the time you detect it. And even after detection, most cases take more than three months to establish root cause, and two-thirds of incidents go unpunished.* To be successful in the fight against internal fraud, you must prevent the fraud before it happens. To effectively prevent internal fraud, your monitoring system must be able to detect when an employee starts to behave unusually. *Source: “The Risk of Insider Fraud”, Dr. Larry Ponemon, Sept. 2011 © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 12. Be proactive – if the funds are gone, 2 it might be too late • Many fraud systems only watch for Warning signs that an employee is funds or data leaving your institution. preparing to commit fraud: That’s too late; the damage is already done by the time you detect it. Employees who view high-risk accounts (like high-balance accounts, internal • And even after detection, most cases accounts, dormant accounts) more take more than three months to frequently than their peers establish root cause, and two-thirds of incidents go unpunished.* Employees who behave inappropriately (like making off-hours inquiries, viewing • To be successful in the fight against accounts from other regions, or looking at internal fraud, you must prevent the other department’s accounts) more fraud before it happens. frequently than their peers • To effectively prevent internal fraud, Branch employees who access an unusual your monitoring system must be able to number of accounts without performing detect when an employee starts to financial transaction(s). behave unusually. Employees who search or inquire on an *Source: “The Risk of Insider Fraud”, Dr. Larry Ponemon, Sept. 2011 unusually high number of accounts. © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 13. An example of proactive internal fraud monitoring The Credit Card division of a $100 billion international bank was having a problem with employees looking at the spending history of celebrities. Since the Intellinx system focused on detecting inquiries (instead of the loss of data), the bank was able to detect and prevent losses very quickly. 100 Alerts on Celebrity Accounts Snooping Alert# per Week 80 60 40 20 0 1 2 3 4 5 6 7 8 9 10 Weeks Rule Security officers start First employee implemented calling on suspects is laid off s Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 14. An example of proactive internal fraud monitoring The Credit Card division of a $100 billion international bank was having a problem with employees looking at the spending history of celebrities. Since the Intellinx system focused on detecting inquiries (instead of the loss of data), the bank was able to detect and prevent losses very quickly. 100 Alerts on Celebrity Accounts Snooping Alert# per Week 80 60 40 20 0 1 2 3 4 5 6 7 8 9 10 Weeks Rule Security officers start First employee implemented calling on suspects is laid off Intellinx changes employee behavior and significantly increases compliance with corporate policies s Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 15. 3 How much of your external fraud is actually internal? What do you think of the following statistic? Occupational fraud, mostly through employee theft, is a growing, global problem ... About 5 percent of an organization's revenue is lost to these fraud incidents… approaching $1 trillion a year. © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 16. 3 How much of your external fraud is actually internal? What do you think of the following statistic? Occupational fraud, mostly through employee theft, is a growing, global problem ... About 5 percent of an organization's revenue is lost to these fraud incidents… approaching $1 trillion a year. Many banking fraud officers think this statistic is too high. But could it be true? A likely answer: some of your external fraud is actually internal fraud. With organized fraud rings becoming a more prevalent crime force, it’s becoming increasingly common for bank employees to help external criminals to commit new account fraud, deposit fraud, check fraud, card fraud, and loan fraud. Collusion of insiders and external fraudsters can be detected by close monitoring of Insiders’ behavior. © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 17. 3 How much of your external fraud is actually internal? How to detect external fraud caused by internal action Example 1: An employee is looking up customers and selling their check images, signature cards, etc. to a fraud ring that commits check fraud. Make sure that the monitoring system you select can identify employees who are inquiring against an unusual number of accounts that later end up having check fraud. Example 2: An employee is colluding with an external party to open fraudulent accounts that will later be used for first party fraud, money mule schemes, etc. Make sure that the monitoring system you select can identify employees who are opening an unusual number of accounts that later end up having first party fraud. Example 3: An employee is colluding with a customer to defraud the bank. Make sure that the monitoring system you select can identify employees who are performing an unusual number of transactions (financial or non-financial) for the same customer. © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 18. 4 A breach will happen at the point where your control is weakest Even the most security conscience organizations have weak points that can be exploited by employees. This problem can be overcome by deploying an anti-fraud system that is multi-layered, and combines indicators from multiple sources. Example 1: Society General What he did: Jerome Kerviel “borrowed” the login credentials of his colleagues to cover his tracks while conducting transactions that ultimately caused losses of over seven billion dollars. How he should have been caught: An anti-fraud system that monitors user activity at all levels - network, application and transaction - would have compensated for the weak controls of the trading system. For example, by detecting: The same user logged in from different workstations at the same time Several users logged in on the same workstation at the same time (or within close proximity) A user logging in to a workstation without scanning their badge through the physical entry system A user logging in for the first time from a new workstation A user who is logging in (or using their badge) during unusual working hours © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 19. 4 A breach will happen at the point where your control is weakest Even the most security conscience organizations have weak points that can be exploited by employees. This problem can be overcome by deploying an anti-fraud system that is multi-layered, and combines indicators from multiple sources. Example 1: Society General What he did: Jerome Kerviel “borrowed” the login credentials of his 40 percent or colleagues to cover his tracks while conducting transactions that ultimately organizations say it is caused losses of over seven billion dollars. likely that a privileged How he should have been caught: An anti-fraud system that monitors user activity at all levels - network, application and transaction - would have user turns off or alters compensated for the weak controls of the trading system. For example, by detecting: application controls in The same user logged in from different workstations at the same time order to access or Several users logged in on the same workstation at the same time (or change sensitive within close proximity) information and then A user logging in to a workstation without scanning their badge through the physical entry system resets the controls to A user logging in for the first time from a new workstation cover his or her tracks. A user who is logging in (or using their badge) during unusual working hours Source: “The Risk of Insider Fraud”, Dr. Larry Ponemon, Sept. 2011 © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 20. 5 Minimize false positives and waste less time False positive alerts generated by anti-fraud systems are massive time wasters: analysts spend countless hours researching “alerts” that amount to nothing. There are several key steps to minimizing false positives: Work with a vendor that can provide a set of pre-defined rules; you can learn a lot from the experience of other organizations. After you implement the system, make sure that it’s someone’s job to periodically analyze and tweak the rules that are providing the best results. The system you select or build should have a reporting engine that makes it easy to analyze rule effectiveness. Select a system with a scoring model that you can easily update on your own. Even if you have all the right rules, weighting them properly is the key to minimizing false positives, and you need to have this capability in-house. Make sure your system has a way for your analysts to write and deploy their own rules. New patterns of fraud emerge all of the time, and you need to make sure that the ability to create new rules is something your staff can do. © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 21. 5 Minimize false positives and waste less time Pre-Defined Rules: Common Internal Fraud Schemes Taking Over Money Theft Other Accounts Schemes • Identity theft by • Stealing money from • Personal expenses on manipulating account customers via: corporate card account. data. • Cash • Performing transactions for • Check personal use. • Opening accounts for • Card • Stealing customer money mules/ deposit • Transfer information. fraud schemes. • ACH/Wire • Performing unauthorized claims, rebates, reversals. • Stealing money from • Targeting the elderly. • Opening accounts for internal accounts via: • Collusion between multiple non-existent or • Cash employees. unqualified customers in • Transfer • Violation of policy/ errors. order to meet quotas/ • ACH/Wire • Trying to avoid detection. incentives. © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 22. Five Facts about the Intellinx Enterprise Fraud Solution 1. Intellinx offers the only true end-to-end insider fraud solution: Based on real-time sniffing of your corporate network, providing immediate alerts on suspicious activity. Captures and analyzes all user activity including user queries. The result: Intellinx detects fraudsters who are preparing to commit or have already committed illegal activity. 2. Intellinx uniquely combines real-time data from the network with other data sources, to create superior visibility into user activity. The data captured through network sniffing includes user queries and incomplete transactions not typically found in log files. 3. The Intellinx analytic engine profiles genuine human behavior in order to detect anomalies. Data from various channels, including both internal and external (customers) activity, is correlated in order to detect collusion. © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 23. Five Facts about the Intellinx Enterprise Fraud Solution 4. Intellinx prevents employee fraud and data theft by improving policy compliance: Holding each employee accountable for his/her actions, through continuous monitoring with full audit trail of every activity. Creating deterrence by detecting and responding to suspicious behavior in real-time. 5. Intellinx saves time by minimizing false positive alerts through: Analysis based on comprehensive data, reflecting true user activity. A highly flexible scoring mechanism that weighs various behavior indicators for each entity (account, employee, customer, etc.), to produce accurate alerts. © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 24. Five Facts about the Intellinx Enterprise Fraud Solution 4. Intellinx prevents employee fraud and data theft by improving policy compliance: Holding each employee accountable for his/her actions, through continuous monitoring with full audit trail of every activity. Creating deterrence by detecting and responding to suspicious behavior in real-time. 5. Intellinx saves time by minimizing false positive alerts through: Analysis based on comprehensive data, reflecting true user activity. A highly flexible scoring mechanism that weighs various behavior indicators for each entity (account, employee, customer, etc.), to produce accurate alerts. © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 25. Your Reputation is a Critical Asset It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you'll do things differently Warren Buffet 25 © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12
  • 26. Thank you © Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved 29-Apr-12