using data analytics to find and deter procure to pay fraud
DESCRIPTION
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware. The two entities designed FRN as the “go-to”, easy-to-use source of “how-to” fraud prevention, detection, audit and investigation templates, guidelines, policies, training programs (recorded no CPE and live with CPE) and articles from leading subject matter experts. FRN is a continuously expanding and improving resource, offering auditors, fraud examiners, controllers, investigators and accountants a content-rich source of cutting-edge anti-fraud tools and techniques they will want to refer to again and again. White-Collar Crime Fighter Newsletter Subscribe Now at No Cost! FraudResourceNet has made the premier Anti-Fraud newsletter, White-Collar Crime Fighter freely available to all. All this is required is to complete the registration form with your work email address! The widely read newsletter, White-Collar Crime Fighter brings you expert strategies and actionable advice from the most prominent experts in the fraud-fighting business. Every two months you'll learn about the latest frauds, scams and schemes... and the newest and most effective fraud-fighting tools, techniques and technologies to put to work immediately to protect your organization. When it comes to fraud, knowledge of the countless schemes, how they work and red flags to look for will help keep you, your organization and your clients safe. At FraudResourceNet we understand this and take great pride in providing our FREE White Collar Crime Fighter newsletter -- filled with exclusive articles and tips to provide the knowledge you need. Make sure you stay informed. Sign up for White Collar Crime Fighter newsletter and we’ll keep you up-to-date on special promos, training opportunities, and other news and offers from FraudResourceNet! Signing up is easy and FREE. If you have not already subscribed to our newsletter, please sign up to get started! Sign up for the White Collar Crime Fighter Newsletter (a $99 value ... now completely FREE)TRANSCRIPT
3/11/2014
1
Copyright © FraudResourceNet LLC
Using Data Analytics to Find and Deter Procure‐to‐Pay
Fraud
March 12, 2014
Special Guest Presenter:Rich Lanza
Copyright © FraudResourceNet LLC
About Jim Kaplan, MSc, CIA, CFE
• President and Founder of AuditNet®, the global resource for auditors (now available on Apple and Android devices)
• Auditor, Web Site Guru,
• Internet for Auditors Pioneer
• Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award.
• Author of “The Auditor’s Guide to Internet Resources” 2nd Edition
3/11/2014
2
Copyright © FraudResourceNet LLC
About Peter Goldmann, MSc., CFE
President and Founder of White Collar Crime 101
• Publisher of White-Collar Crime Fighter• Developer of FraudAware® Anti-Fraud Training • Monthly Columnist, The Fraud Examiner, ACFE
Newsletter
Member of Editorial Advisory Board, ACFE
Author of “Fraud in the Markets”
• Explains how fraud fueled the financial crisis.
Copyright © FraudResourceNet LLC
Richard B. Lanza, CPA, CFE, CGMA
• Over two decades of ACL and Excel software usage
• Wrote the first practical ACL publication on how to use the product in 101 ways (101 ACL Applications)
• Has written and spoken on the use of audit data analytics for over 15 years.
• Received the Outstanding Achievement in Business Award by the Association of Certified Fraud Examiners for developing the publication Proactively Detecting Fraud Using Computer Audit Reports as a research project for the IIA
• Recently was a contributing author of:• Global Technology Audit Guide (GTAG #13) Fraud
in an Automated World - IIA• Data Analytics – A Practical Approach - research
whitepaper for the Information System Accountability Control Association.
• “Cost Recovery – Turning Your Accounts Payable Department into a Profit Center” – Wiley & Sons.
Please see full bio at www.richlanza.com
3/11/2014
3
Copyright © FraudResourceNet LLC
This webinar and its material are the property of FraudResourceNet LLC. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden. We are recording the webinar and you will be provided with a link access to that recording as detailed below. Downloading or otherwise duplicating the webinar recording is expressly prohibited.
Webinar recording link will be sent via email within 5-7 business days.
NASBA rules require us to ask polling questions during the Webinar and CPE certificates will be sent via email to those who answer ALL the polling questions
The CPE certificates and link to the recording will be sent to the email address you registered with in GTW. We are not responsible for delivery problems due to spam filters, attachment restrictions or other controls in place for your email client.
Submit questions via the chat box on your screen and we will answer them either during or at the conclusion.
After the Webinar is over you will have an opportunity to provide feedback. Please complete the feedback questionnaire to help us continuously improve our Webinars
If GTW stops working you may need to close and restart. You can always dial in and listen and follow along with the handout.
Webinar Housekeeping
Copyright © FraudResourceNet LLC
The views expressed by the presenters do not necessarily represent the views, positions, or opinions of FraudResourceNet LLC (FRN) or the presenters’ respective organizations. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client relationship.
While FRN makes every effort to ensure information is accurate and complete, FRN makes no representations, guarantees, or warranties as to the accuracy or completeness of the information provided via this presentation. FRN specifically disclaims all liability for any claims or damages that may result from the information contained in this presentation, including any websites maintained by third parties and linked to the FRN website
Any mention of commercial products is for information only; it does not imply recommendation or endorsement by FraudResourceNet LLC
6
Disclaimers
3/11/2014
4
Copyright © FraudResourceNet LLC
Today’s Agenda
Costliest procurement frauds to beware of (with case studies)
Indicators of possible collusive procurement-vendor schemes
Red flags to look for in audits of procurement using data analytics
How to conduct the audit using data analytics
What to do if you find vendor or procurement fraud during an audit
Copyright © FraudResourceNet LLC
Issues in Vendor Master Management
Too many active vendors
(with no activity)
Improper segregation
of duties
Difficult to understand or improve spend management
Difficult to manage or improve payment terms
Invalid Tax IDs leading to B notices
Too many active vendors
(with no activity)
Improper segregation
of duties
Difficult to understand or improve spend management
Difficult to manage or improve payment terms
Invalid Tax IDs leading to B notices
Duplicate vendors representing parents and
subs, for different companies, or just
mistakes = duplicate pays
Duplicate vendors representing parents and
subs, for different companies, or just
mistakes = duplicate pays
Duplicate vendors representing parents and
subs, for different companies, or just
mistakes = duplicate pays
Vendors are confused and may see opportunities to take advantage of the
company
Vendors are confused and may see opportunities to take advantage of the
company
Lack of vendor management …increases opportunity for fraud
Lack of vendor management …increases opportunity for fraud
Lack of vendor management …increases opportunity for fraud
3/11/2014
5
Copyright © FraudResourceNet LLC
Vendor Billing Fraud/CorruptionIs #1 or #2 No Matter Where You Go
Copyright © FraudResourceNet LLC
Top Fraud Schemes By Department
3/11/2014
6
Copyright © FraudResourceNet LLC
Primary Weaknesses Leading to the Fraud
Copyright © FraudResourceNet LLC
1. Whistleblowing hotline
2. Signed code of conduct
3. Train employees
4. Background checks
5. Look for and respond to fraud
12
Most companies have these procedures in place but the question is….how effective
are they?
The Top ProceduresPer SAS 99 –Appendix B
3/11/2014
7
Copyright © FraudResourceNet LLC
Where Are You Using Data Analytics?
AuditNet – 2012 Data Analysis Software Survey
Copyright © FraudResourceNet LLC
Polling Question 1
What is not one of the top occurring frauds per the ACFE study?
A. Billing
B. Corruption
C. Overstated Revenue
D. Expense Reimbursements
3/11/2014
8
Copyright © FraudResourceNet LLC
Mapping Red Flags to Analytics
Copyright © FraudResourceNet LLC
Report Brainstorm Tool
3/11/2014
9
Copyright © FraudResourceNet LLC
Proactively Detecting Fraud
Using Computer Audit ReportsIIA Research Paper / CPE Course
See the IIA’s website at www.theiia.org
The purpose of this document is to assist auditors, fraud examiners, and management in implementing data analysis routines for improved fraud prevention and detection.
A comprehensive checklist of data analysis reports that are associated
with each occupational fraud category per the Association of Certified Fraud
Examiners’ classification system.
Copyright © FraudResourceNet LLC
Visualizing the Cost Recovery and Savings Process
3/11/2014
10
Copyright © FraudResourceNet LLC
Profit Opportunities OutweighAnalytic Costs
Accounts Payable
Audit Fee Benchmarking
Advertising Agency
Document Fleet
Freight
Health Benefits
Lease
Media
Order to Cash
Proactive Fraud Detection Project Fraud Real Estate Depreciation Sales & Use Tax / VAT / R&D
tax Strategic Sourcing Telecom Travel and Entertainment Utilities
Copyright © FraudResourceNet LLC
Process to Report Mapping
3/11/2014
11
Copyright © FraudResourceNet LLC
Fraud Task to Report Mapping
Copyright © FraudResourceNet LLC
Fraud Task to Supplier Map
3/11/2014
12
Copyright © FraudResourceNet LLC
Polling Question #2
What are example cost recovery areas associated with the P2P cycle?
A. Freight
B. Order to cash
C. Healthcare
D. Accounts Payable
Copyright © FraudResourceNet LLC
Using an Analytic Process to Detect Fraud
3/11/2014
13
Copyright © FraudResourceNet LLC
Best Practice Approach on Fraud:Find It Before It Finds You
Think Prevention vs. Future Detection Identify issues earlier in their lifecycle
Build a aura of deterrence within procure to pay
Build a Continuous Review Process Technology
Minimal staff time / external assistance
Keep Improving the Model Model on identified frauds
Remove false positives to isolate interesting events
Copyright © FraudResourceNet LLC
Analytic Command Center
Analytic Command Center
1. Accounts Payable2. Accounts Receivable3. Financial Statement4.General Ledger5. Inventory6.Payroll7. Revenue
Data Mart
Local Analytic Toolkit
Feedback from all locations
Recovery Auditors
Shared Services
3/11/2014
14
Copyright © FraudResourceNet LLC
The Overall Fraud Analytic Process
Get the Most Useful Data for Analysis
General Ledger / Accounts Payable
Other? / Use external data sources
Develop Fraud Query Viewpoints
The 5 Dimensions
Brainstorm report ideas
Analytically Trend
Benford’s Law
Statistical averages and simple trending by day, month, day of week
Post dated changes
Use Visualization Techniques
Copyright © FraudResourceNet LLC
Clear Data Request
3/11/2014
15
Copyright © FraudResourceNet LLC
Fraud Data Considerations for the P2P Cycle
A/P and G/L Review FactorsAccounts that are sole sourcedAccounts that have too many vendorsCategories that map to the “recovery list”Assess to industry cost category benchmarksTop 100 vendorsTrend analysis over time Trend analysis by vendor (scatter graph)
Purchase Order / Price ListMatch to invoice payments to assess price
differencesStrategic sourcing vendor review
Copyright © FraudResourceNet LLC
Distribution Analysis
Remove subtotals for improved visibility
Focus on sole source and multi source vendors
Scroll out and drill to details as needed
3/11/2014
16
Copyright © FraudResourceNet LLC
Query Viewpoints
Copyright © FraudResourceNet LLC
It’s The Trends….Right?
Trend categories (meals, hotel, airfare, other)
Trend by person and title
Trend departments
Trend vendors
Trend in the type of receipts
Trend under limits (company policy)
32
3/11/2014
17
Copyright © FraudResourceNet LLC
Number Ranking
Summarize each amount (Pivot or ACL)
Rank each number in order of occurrence
Score each item in a sliding scaleMay be easiest to use a stratified score
Decide if unique is weirder than non-unique
Relate this summarized list back to the original
Copyright © FraudResourceNet LLC
Some Data Mining Approaches
Personnel Analysis Adjustments by employee Processing by employee
Contextual Summarizations Transaction types
Time Trending Month, week, and day / Also by department Last month to first 11 months Transactions at the end of and start of a fiscal year
3/11/2014
18
Copyright © FraudResourceNet LLC
Stratify Data ‐ Results
Copyright © FraudResourceNet LLC
Is Your Organization Working With Banned Companies?
EPLS is the excluded party list service of the U.S. Government as maintained by the GSA
WWW.EPLS.GOV
Now
WWW.SAM.GOV
3/11/2014
19
Copyright © FraudResourceNet LLC
Is Your Organization Working With Terrorists?
Copyright © FraudResourceNet LLC
Are Your Vendors Real?IRS TIN Matching Program
Validates U.S. Tax Identification NumbersCan submit up to 100,000 TIN submissions at a timeMake sure all punctuation is removedSee http://www.irs.gov/taxpros/ and enter “TIN matching program” in the search box
3/11/2014
20
Copyright © FraudResourceNet LLC
Polling Question 3
What is not one of the query viewpoints?A. WhoB. WhatC. HowD. When
Copyright © FraudResourceNet LLC
Other T&E Reports
Unmatched query of cardholders to an active employee masterfile
Cards used in multiple states (more than 2) in same day
Cards processing in multiple currencies (more than 2) in the same day
Identify cards that have not had activity in last six months
Cardholders that have more than one card
Extract any cash back credits processed through the card
Extract declined card transactions and determine if they are frequent for certain cards
Summary of card usage by merchant to find newly added merchants and most active
3/11/2014
21
Copyright © FraudResourceNet LLC
Daily Transactional Analysis
Copyright © FraudResourceNet LLC
GeoMapping ‐Map Point
3/11/2014
22
Copyright © FraudResourceNet LLC
Charting the Score
Copyright © FraudResourceNet LLC
Scatter Graph
3/11/2014
23
Copyright © FraudResourceNet LLC
Scatter Graph Explanation
1 – high dollar change and low count (outliers)
2 – charges that make sense
3 – changes that don’t make sense
4 – inefficiency that is developing
Copyright © FraudResourceNet LLC
Dashboarding Graphing
3/11/2014
24
Copyright © FraudResourceNet LLC
Polling Question 4
What graph is used to map value to score for easier selections of data subsets?
A. Pie
B. Line
C. Bar
D. Scatter
Copyright © FraudResourceNet LLC
Fraud Scoring for Maximum Impact
3/11/2014
25
Copyright © FraudResourceNet LLC
Vendors on report 1 vs. report 2 of duplicate payments.
Duplicate transactions paid on different checks.
Duplicate transactions with debit amounts in the vendor account
Vendors with a high proportion of round dollar payments.
Invoices that are exactly 10x, 100x or 1000x larger than anotherinvoice.
Payments to any vendor that exceed the twelve month average payments to that vendor by a specified percentage (i.e., 200%) othe standard deviation for that vendor.
Vendors paid with a high proportion of manual checks.
Simple Fraud Vendor Scoring Analysis – How It Started
Copyright © FraudResourceNet LLC
The Sampling “Problem” Bottom Line Numbers
Modern tests (round numbers, duplicates, missing fields) identify thousands of ‘suspicious’ transactions, usually about 1 in 5 of all transactions get a ‘red flag’
Historically at least 0.02 – 0.03 % of all transactions have real problems, such as a recoverable over-payment
So roughly 0.00025 / 0.2 = 0.00125 or 1 in 800 ‘red flags’ lead to a real problem.
Imagine throwing a random dart at 800 balloons hoping to hit the right one!!!
3/11/2014
26
Copyright © FraudResourceNet LLC
Transactional Score Benefits
The best sample items (to meet your attributes) are selected based on the severity given to each attribute. In other words, errors, as you define them, can be mathematically calculated.
Instead of selecting samples from reports, transactions that meet multiple report attributes are selected (kill more birds with one stone). Therefore a 50 unit sample can efficiently audit:
38 duplicate payments
22 round invoices
18 in sequence invoices
….and they are the best given they are
mathematically the most “severe”.
51
Copyright © FraudResourceNet LLC
Summaries on Various Perspectives
52
Summarize by dimensions (and sub dimension) to pinpoint within the cube the crossover between the top scored location, time, and place of fraud based on the combined judgmental and statistical score
3/11/2014
27
Copyright © FraudResourceNet LLC
Key Control Reports & Scoring
Copyright © FraudResourceNet LLC
Combining the ScoresACL Code
3/11/2014
28
Copyright © FraudResourceNet LLC
Using Vlookup to Combine Scores
Create a record number
Relate sheets based on VLookup
Copyright © FraudResourceNet LLC
Polling Question #5
What Excel function is mainly used to organize the scores into a master score?
A. SUMIF()
B. COUNTIF()
C. RAND()
D. VLOOKUP()
3/11/2014
29
Copyright © FraudResourceNet LLC
Questions?
Copyright © FraudResourceNet LLC
Peter Goldmann
FraudResourceNet LLC
800-440-2261
www.fraudresourcenet.com
Jim Kaplan
FraudResourceNet LLC
800-385-1625
www.fraudresourcenet.com
Rich Lanza
Cash Recovery Partners, LLC
Phone: 973-729-3944
Thank You!
3/11/2014
30
Copyright © FraudResourceNet LLC
Coming Up
Upcoming March Anti-Fraud Webinar…
"How to Use Data Analytics to Expose Fixed Asset and Inventory Fraudsters”, March 19
Sign up at:
http://www.fraudresourcenet.com