Best Practices in Detecting Payable Fraud Using Data Analytics

21
Copyright © 2013 FraudResourceNet™ LLC Best Practices in Detecting Accounts Payable Fraud Using Data Analysis August 21, 2013 Special Guest Presenter: Katrina Kiselinchev, CIA, CPA, CFE Copyright © 2013 FraudResourceNet™ LLC About Peter Goldmann, MSc., CFE President and Founder of White Collar Crime 101 Publisher of White-Collar Crime Fighter Developer of FraudAware® Anti-Fraud Training Monthly Columnist, The Fraud Examiner, ACFE Newsletter Member of Editorial Advisory Board, ACFE Author of “Fraud in the Markets” Explains how fraud fueled the financial crisis.

description

Webinar series from FraudResourceNet LLC on Preventing and Detecting Fraud Using Data Analytics. Recordings of these Webinars are available for purchase from our Website fraudresourcenet.com This Webinar focused on fraud detection using data analytic software (Excel, ACL, IDEA) FraudResourceNet (FRN) is the only searchable portal of practical, expert fraud prevention, detection and audit information on the Web. FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware. The two entities designed FRN as the “go-to”, easy-to-use source of “how-to” fraud prevention, detection, audit and investigation templates, guidelines, policies, training programs (recorded no CPE and live with CPE) and articles from leading subject matter experts. FRN is a continuously expanding and improving resource, offering auditors, fraud examiners, controllers, investigators and accountants a content-rich source of cutting-edge anti-fraud tools and techniques they will want to refer to again and again.

Transcript of Best Practices in Detecting Payable Fraud Using Data Analytics

Page 1: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

Best Practices in Detecting Accounts Payable Fraud Using Data Analysis

August 21, 2013

Special Guest Presenter:Katrina Kiselinchev, CIA, CPA, CFE

Copyright © 2013 FraudResourceNet™ LLC

About Peter Goldmann, MSc., CFE

President and Founder of White Collar Crime 101

Publisher of White-Collar Crime FighterDeveloper of FraudAware® Anti-Fraud Training

Monthly Columnist, The Fraud Examiner, ACFE Newsletter

Member of Editorial Advisory Board, ACFE Author of “Fraud in the Markets”

Explains how fraud fueled the financial crisis.

Page 2: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

About Jim Kaplan, MSc, CIA, CFE

President and Founder of AuditNet®, the global resource for auditors

Auditor, Web Site Guru,

Internet for Auditors Pioneer

Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award.

Author of “The Auditor’s Guide to Internet Resources” 2nd Edition

Copyright © 2013 FraudResourceNet™ LLC

About Katrina Kiselinchev, CPA, CIA, CFE, CFF

President of Inclusivitie, We Do “SMART”

Integration Partner with IDEA

Experience across industries, audit, fraud, and value

Achieved Value of $5+ Million & ROI of 2000+%, which 

included using IDEA’s SMART Analyzer .

Instructor with AICPA & ACFE 

Specific Frauds in Accounts Payable: Duplicates, P‐Card, Travel

Page 3: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

Webinar Housekeeping

This webinar and its contents are the property of FraudResourceNet™ LLC. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden.

We will be recording the webinar and you will be provided access to that recording within five-seven business days. Downloading or otherwise duplicating the webinar recording is expressly prohibited.

You must answer the polling questions to qualify for CPE per NASBA unless you are viewing the Webinar with a group on a single screen.

Please complete the evaluation to help us continuously improve our Webinars.

Submit questions via the chat box on your screen and we will answer them either during or at the conclusion.

If GTW stops working you may need to close and restart. You can always dial in and listen and follow along with the handout.

CS

Copyright © 2013 FraudResourceNet™ LLC

Disclaimers

5

The views expressed by the presenters do not necessarily represent the views, positions, or opinions of FraudResourceNet LLC (FRN) or the presenters’ respective organizations. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client relationship.

While FRN makes every effort to ensure information is accurate and complete, FRN makes no representations, guarantees, or warranties as to the accuracy or completeness of the information provided via this presentation. FRN specifically disclaims all liability for any claims or damages that may result from the information contained in this presentation, including any websites maintained by third parties and linked to the FRN website

Any mention of commercial products is for information only; it does not imply recommendation or endorsement by FraudResourceNet LLC

Page 4: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

Agenda

Introduction

Standards & Anti‐Fraud Essentials Auditors

Fraud State of the Union

Accounts Payable Background

Accounts Payable Fraud

Overview

Schemes

Red Flags

Aiding Discovery of Fraud: Industry & Risks & Operations 

Data Mining for AP Fraud: Analytics & Testing Methods

Case Studies & Practice in Data Analytics

6

Copyright © 2013 FraudResourceNet™ LLC

The Auditor’s Role

IPPF Standard 1210.A3 Internal auditors must have sufficient knowledge of…available technology 

based audit techniques   to perform their assigned work

Page 5: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

IIA Guidance – GTAG 13

Internal auditors require appropriate skills 

and should use available technological 

tools to help them maintain a successful 

fraud management program that covers 

prevention, detection, and investigation. 

As such, all audit professionals — not just 

IT audit specialists — are expected to be 

increasingly proficient in areas such as 

data analysis and the use of technology to 

help them meet the demands of the job.

Copyright © 2013 FraudResourceNet™ LLC

Professional Guidance

Page 6: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

Workplace Fraud

Copyright © 2013 FraudResourceNet™ LLC

Fraud State of the Union

Source: 2012 ACFE Report to the Nations

Page 7: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

Fraud State of the Union

Source: 2012 ACFE Report to the Nations

Copyright © 2013 FraudResourceNet™ LLC

Learning Objectives

Uncover Check Fraud in Accounts Payable

Detect Duplicate Billing Schemes

Detect & Prevent Expense Reimbursement Scams

Flag Bogus Invoices

Identify Purchasing Card & Other Expense Scams & Schemes

13

Page 8: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

Dishonest AP Fraudsters

What They Do:

Create Fake Vendors, Expenses, Receipts, Invoices

Collude and Create Kickback Schemes

Misclassify Expenses 

Understate Liabilities

Forge, intercept, alter and counterfeit checks 

Take Advantage of Multiple Decentralized Policies

Preferred Vendor / Travel / Card/ P‐Card

Copyright © 2013 FraudResourceNet™ LLC

Accounts Payable Fraud: Schemes

1) External Accounts Payable Fraud: Sham Vendors Vendor Billing Scams/Double billing  Customer/Client Fraud External Hacking of Customer/Vendor Data

2) Internal Accounts Payable Fraud: Shell Company Schemes Internal Billing Schemes Vendor Master File  Check Tampering Travel & Entertainment Payroll Fraud  Continued…

Page 9: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

Accounts Payable Fraud: Schemes

3) Collusion: Bid‐Rigging Invoice Billing Collusion Bribery & Kickbacks Pricing Schemes Payroll Schemes 

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 1

Which One of the Following is a Type of Fraudulent Disbursement Scheme?

A. Asset Req & Transfers

B. Unrecorded Sales

C. Write‐Off Schemes

D. Shell Company

Page 10: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

Accounts Payable Fails… Business Fails

How a company manages its Accounts Payable process affects two very important areas of an organization’s business: Cash Flow and Supplier Relationships

Fraud Impacting One or Both of These Areas is Detrimental. Period.

Internal Controls, Fraud Assessments, and Periodic Audits are Very Important to Discover Issues Sooner Rather than 

Later.

Copyright © 2013 FraudResourceNet™ LLC

Prevention of Common Schemes

Prevention: Periodically Review Vendor Listings

Block Fake Receipt Sites

Block Vendors Not on Approved Listings

Block Certain Types of Vendors (P‐Cards)

Disallow Acceptance of Non‐Itemized Receipts

Implement Proper Segregation of Duties

Implement Automated Controls

Implement Budgets

Page 11: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

20

Payments Name, Address, Phone = Employees Unusual Patterns in Check Amounts Only P.O. Box Addresses Available Improper Locations  Over & Under  Duplicates, Gaps False

By Vendor Inconsistent Price Fluctuations Excessive Purchases > Budget Unusual Billing Trends

By Accounts & Department  Unexpected Trends or Rates Gross Profit Price Adjustments

Accounts PayablesData Analysis Techniques

Copyright © 2013 FraudResourceNet™ LLC

Detection of Common Schemes

Continuous Monitoring Through Data Analysis

Compare Vendor Invoice Numbers 

Compare Vendor Spend v. Budget

Compare Vendor Overall Spend Trends & Approvals

Review Dates on Expenses Submitted for Non‐Working Days

Review for Proper Approver

Review for Expenses in Round Dollars

Review Top 80% Spend by Individual, Vendor, Type

Compare Submission to Prior Two Expense Reports for Fraud

Request Travel Confirmations

Review Monthly & Annual Mileage for Driving Validity & Reasonableness 

Periodically Analyze & Review Gaps

Page 12: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

22

Large Amounts of Data  Identify Red Flags Faster Increased Coverage Determine Trends Continuous Analysis Process Improvement

Data Analytics for Fraud:Tools You Can Use

Small Amounts of Data Delay in Identifying Red Flags Decreased Coverage Harder to ID Trends

Data Analytics Traditional Auditing

Show First View of IDEA

Copyright © 2013 FraudResourceNet™ LLC

Polling Question #2

Which of the following is one of the Collusion Schemes?

A. Vendor Master File Tampering

B. External Hacking of Accounts Payable

C. Check Tampering

D. Invoice Billing 

23

Page 13: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

Case Study: IM A COLLUDING

Initial Contact:

You get an urgent call from someone in AP.  They have reviewed accounts payable records, and found some alarming red flags. 

“Concerns about Fictitious Vendors”

“Concerns about Vendors with Triple Spend Over Budget”

“We Need a Data Analysis Expert… .. Massive Data”

Copyright © 2013 FraudResourceNet™ LLC

IM A Colluding

No Master Vendor Review 3+ Years

No Duplicate Spend Review 5+ Years

No Segregation of Duties Between Approving & Paying

No Review of Proper Approver 

No Budget v. Actual Review

No Vendor Spend Trend Analysis

.

Page 14: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

Software Overview & Introduction

Set Working Folder

Import Data

Check Control Totals

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 3

Which Preventative Control is IMA Colluding Lacking In?

A. Master Vendor Review

B. Budget v. Actual

C. Vendor Spend Trend Analysis

D. Duplicate Spend Review

Page 15: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

Auditee Communication:Planning for Accounts Payable Fraud

Walk‐through of Approvals, Approvers, Policy 

Procure‐to‐Pay Cycle 

Complete Audit Plan with Data Analysis Incorporated

Include  Different Types Alongside Consideration of Fraud

Copyright © 2013 FraudResourceNet™ LLC

Data Gathering for Data Analysis

Request All Meta Data Fields  & FilesEmployee ID, Type of Spend, $ Amount, 

Budget

Page 16: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

Discovery with DA: Spend

Audits to Perform:

Approver Submissions

Vendor Spend Trends

Duplicates

Budget v Actual

Address v. Employee Address

Approver Submissions

Summarize by Employee

Red Flag #1: Approved Purchase Orders Entered

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 4

Name a Test That IMA Should Run Initially 

to Identify Red Flags?

A. Depreciation Calculation

B. Inventory

C. Expenses Submitted v. Co. Card

D. Vendor Budget v. Actual

Page 17: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

Discovery with DA: Duplicates

Red Flag 1 & 2: Numerous Duplicates, Odd Amounts & Quantities 

Copyright © 2013 FraudResourceNet™ LLC

Discovery with DA: Expense v. Card, Expense v. Budget, Type

Red Flag #3:Spend Trends

Red Flag 4:Duplicates

Red Flag 5:Budget v Actual

Page 18: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 5

Name the Red Flags Found

A. Spend Trends and Duplicates

B. Inventory Obsolescence

C. Expenses Submitted v. Co. Card

D. Contract Overages

Copyright © 2013 FraudResourceNet™ LLC

Finding Fraud & Next Steps

1)  Complete Summary of Data & Findingsa) Total by Each Type of Discrepancyb) Aggregate Discrepancy

2)    Determine Additional Tests to Run & Perform3) Discuss Findings with Owner Initially & Recommendations4) Complete Interviews with Employees 5) Review Gaps & Control Deficiencies & Provide Recommendations 6) Recommend Management Review for Cost v Benefit & Implement ASAP7) Determine if Client has Fraud Insurance Rider.  If not, recommend.8) Contact Insurance Carrier (if applicable) & Begin Claim Process.9) Contact Authorities & File Report.10) Determine if Prosecution is Advisable e.g. Dollar Amount, Management, etc.11) Complete Report (See ACFE.com) 12) Complete Supporting Doc for Insurance Co. & Authorities

Page 19: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

Formulating Anti-Fraud Policy

Policy Statement: To Prevent & Detect Fraud… and No Tolerance

Definition of Fraud: Intent to Defraud & Personal Gain

Reporting Responsibilities: By Staff Level

Reporting Suspicions: Process & Avenues

Fraud Response Plan: Process Once Potential Investigation is Warranted

Policy Communication: Avenues & Frequency

Copyright © 2013 FraudResourceNet™ LLC

Proactive Data Analysis

Accounts Payable:

Bulk Fuel & Fuel Cards

Combining Audits & Data Analysis for Fraud

Discovery

Travel & Entertainment

Maintenance

Per Diem & Petty Cash

Supplier Contracts

Page 20: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

38

Payments Name, Address, Phone = Employees Unusual Patterns in Check Amounts Only P.O. Box Addresses Available Improper Locations  Over & Under  Duplicates, Gaps False

By Vendor Inconsistent Price Fluctuations Excessive Purchases > Budget Unusual Billing Trends

By Accounts & Department  Unexpected Trends or Rates Gross Profit Price Adjustments

Accounts PayablesData Analysis Techniques

Copyright © 2013 FraudResourceNet™ LLC

Questions?

Questions?

Page 21: Best Practices in Detecting Payable Fraud Using Data Analytics

Copyright © 2013 FraudResourceNet™ LLC

Thank You!

Website: http://www.fraudresourcenet.com

Jim KaplanFraudResourceNet™

800-385-1625 [email protected]

Peter GoldmannFraudResourceNet™

[email protected]

Katrina KiselinchevInclusivitie, LLC832-236-4778

Email: [email protected]://www.inclusivitie.com

Copyright © 2013 FraudResourceNet™ LLC

Coming Up This Month

“Continuous Controls Monitoring (Putting Controls in Place Is Not Enough)” (Sept. 11)

“Protecting Your Organization from the Growing Threat of Cyber Fraud” (Sept. 18)

“A Primer on Social Networking and Fraud Risk—What you Don’t Know Can Cost You” (Sept 25)