SlideShare a Scribd company logo
3/11/2014
1
Copyright © FraudResourceNet LLC
Using Data Analytics to Find 
and Deter Procure‐to‐Pay 
Fraud 
March 12, 2014
Special Guest Presenter:
Rich Lanza
Copyright © FraudResourceNet LLC
About Jim Kaplan, MSc, CIA, CFE
• President and Founder of
AuditNet®, the global resource for
auditors (now available on Apple
and Android devices)
• Auditor, Web Site Guru,
• Internet for Auditors Pioneer
• Recipient of the IIA’s 2007
Bradford Cadmus Memorial
Award.
• Author of “The Auditor’s Guide to
Internet Resources” 2nd Edition
3/11/2014
2
Copyright © FraudResourceNet LLC
About Peter Goldmann, MSc., CFE
President and Founder of White Collar Crime 101
• Publisher of White-Collar Crime Fighter
• Developer of FraudAware® Anti-Fraud Training
• Monthly Columnist, The Fraud Examiner, ACFE
Newsletter
Member of Editorial Advisory Board, ACFE
Author of “Fraud in the Markets”
• Explains how fraud fueled the financial crisis.
Copyright © FraudResourceNet LLC
Richard B. Lanza, CPA, CFE, CGMA
• Over two decades of ACL and Excel software usage
• Wrote the first practical ACL publication on how to
use the product in 101 ways (101 ACL
Applications)
• Has written and spoken on the use of audit data
analytics for over 15 years.
• Received the Outstanding Achievement in Business
Award by the Association of Certified Fraud
Examiners for developing the publication
Proactively Detecting Fraud Using Computer Audit
Reports as a research project for the IIA
• Recently was a contributing author of:
• Global Technology Audit Guide (GTAG #13) Fraud
in an Automated World - IIA
• Data Analytics – A Practical Approach - research
whitepaper for the Information System
Accountability Control Association.
• “Cost Recovery – Turning Your Accounts Payable
Department into a Profit Center” – Wiley & Sons.
Please see full bio at www.richlanza.com
3/11/2014
3
Copyright © FraudResourceNet LLC
This webinar and its material are the property of FraudResourceNet LLC.
Unauthorized usage or recording of this webinar or any of its material is strictly
forbidden. We are recording the webinar and you will be provided with a link
access to that recording as detailed below. Downloading or otherwise
duplicating the webinar recording is expressly prohibited.
Webinar recording link will be sent via email within 5-7 business days.
NASBA rules require us to ask polling questions during the Webinar and CPE
certificates will be sent via email to those who answer ALL the polling questions
The CPE certificates and link to the recording will be sent to the email address
you registered with in GTW. We are not responsible for delivery problems due to
spam filters, attachment restrictions or other controls in place for your email
client.
Submit questions via the chat box on your screen and we will answer them
either during or at the conclusion.
After the Webinar is over you will have an opportunity to provide feedback.
Please complete the feedback questionnaire to help us continuously improve
our Webinars
If GTW stops working you may need to close and restart. You can always dial in
and listen and follow along with the handout.
Webinar Housekeeping
Copyright © FraudResourceNet LLC
The views expressed by the presenters do not necessarily represent the
views, positions, or opinions of FraudResourceNet LLC (FRN) or the
presenters’ respective organizations. These materials, and the oral
presentation accompanying them, are for educational purposes only and
do not constitute accounting or legal advice or create an accountant-client
relationship.
While FRN makes every effort to ensure information is accurate and
complete, FRN makes no representations, guarantees, or warranties as to
the accuracy or completeness of the information provided via this
presentation. FRN specifically disclaims all liability for any claims or
damages that may result from the information contained in this
presentation, including any websites maintained by third parties and
linked to the FRN website
Any mention of commercial products is for information only; it does not
imply recommendation or endorsement by FraudResourceNet LLC
6
Disclaimers
3/11/2014
4
Copyright © FraudResourceNet LLC
Today’s Agenda
 Costliest procurement frauds to beware of (with
case studies)
 Indicators of possible collusive procurement-
vendor schemes
 Red flags to look for in audits of procurement
using data analytics
 How to conduct the audit using data analytics
 What to do if you find vendor or procurement
fraud during an audit
Copyright © FraudResourceNet LLC
Issues in Vendor Master 
Management
Too many active vendors 
(with no activity) 
Improper segregation 
of duties
Difficult to understand or 
improve spend 
management
Difficult to manage or 
improve payment terms
Invalid Tax IDs leading to B 
notices
Too many active vendors 
(with no activity) 
Improper segregation 
of duties
Difficult to understand or 
improve spend 
management
Difficult to manage or 
improve payment terms
Invalid Tax IDs leading to B 
notices
Duplicate vendors 
representing parents and 
subs, for different 
companies, or just 
mistakes = duplicate pays
Duplicate vendors 
representing parents and 
subs, for different 
companies, or just 
mistakes = duplicate pays
Duplicate vendors 
representing parents and 
subs, for different 
companies, or just 
mistakes = duplicate pays
Vendors are confused and 
may see opportunities to 
take advantage of the 
company
Vendors are confused and 
may see opportunities to 
take advantage of the 
company
Lack of vendor 
management …increases 
opportunity for fraud
Lack of vendor 
management …increases 
opportunity for fraud
Lack of vendor 
management …increases 
opportunity for fraud
3/11/2014
5
Copyright © FraudResourceNet LLC
Vendor Billing Fraud/Corruption
Is #1 or #2 No Matter Where  You  Go
Copyright © FraudResourceNet LLC
Top Fraud Schemes By 
Department
3/11/2014
6
Copyright © FraudResourceNet LLC
Primary Weaknesses  Leading to 
the Fraud
Copyright © FraudResourceNet LLC
1. Whistleblowing hotline
2. Signed code of conduct
3. Train employees
4. Background checks
5. Look for and respond to fraud
12
Most companies have these procedures in 
place but the question is….how effective 
are they?
The Top Procedures
Per  SAS 99 – Appendix B
3/11/2014
7
Copyright © FraudResourceNet LLC
Where Are You Using Data 
Analytics?
AuditNet – 2012 Data 
Analysis Software 
Survey
Copyright © FraudResourceNet LLC
Polling Question 1
What is not one of the top occurring frauds per the ACFE
study?
A. Billing
B. Corruption
C. Overstated Revenue
D. Expense Reimbursements
3/11/2014
8
Copyright © FraudResourceNet LLC
Mapping Red Flags to Analytics
Copyright © FraudResourceNet LLC
Report Brainstorm Tool
3/11/2014
9
Copyright © FraudResourceNet LLC
Proactively Detecting Fraud
Using Computer Audit Reports
IIA Research Paper / CPE Course
See the IIA’s website at www.theiia.org
The purpose of this document is to assist
auditors, fraud examiners, and
management in implementing data analysis
routines for improved fraud prevention and
detection.
A comprehensive checklist of data
analysis reports that are associated
with each occupational fraud category
per the Association of Certified Fraud
Examiners’ classification system.
Copyright © FraudResourceNet LLC
Visualizing the Cost Recovery 
and Savings Process
3/11/2014
10
Copyright © FraudResourceNet LLC
Profit Opportunities Outweigh
Analytic  Costs
 Accounts Payable
 Audit Fee Benchmarking
 Advertising Agency
 Document Fleet
 Freight
 Health Benefits
 Lease
 Media
 Order to Cash
 Proactive Fraud Detection
 Project Fraud
 Real Estate Depreciation
 Sales & Use Tax / VAT / R&D 
tax
 Strategic Sourcing
 Telecom
 Travel and Entertainment
 Utilities
Copyright © FraudResourceNet LLC
Process to Report Mapping
3/11/2014
11
Copyright © FraudResourceNet LLC
Fraud Task to Report Mapping
Copyright © FraudResourceNet LLC
Fraud Task to Supplier Map
3/11/2014
12
Copyright © FraudResourceNet LLC
Polling Question #2
What are example cost recovery areas
associated with the P2P cycle?
A. Freight
B. Order to cash
C. Healthcare
D. Accounts Payable
Copyright © FraudResourceNet LLC
Using an Analytic Process to Detect 
Fraud
3/11/2014
13
Copyright © FraudResourceNet LLC
Best Practice Approach on 
Fraud:Find It Before It Finds You
Think Prevention vs. Future Detection
 Identify issues earlier in their lifecycle
 Build a aura of deterrence within procure to pay
Build a Continuous Review Process
 Technology
 Minimal staff time / external assistance
Keep Improving the Model
 Model on identified frauds
 Remove false positives to isolate interesting events
Copyright © FraudResourceNet LLC
Analytic Command Center
Analytic Command Center
1. Accounts Payable
2. Accounts Receivable
3. Financial Statement
4.General Ledger
5. Inventory
6.Payroll
7. Revenue
Data Mart
Local Analytic 
Toolkit
Feedback from 
all locations
Recovery Auditors
Shared Services
3/11/2014
14
Copyright © FraudResourceNet LLC
The Overall Fraud
Analytic Process
 Get the Most Useful Data for Analysis
General Ledger / Accounts Payable
Other? / Use external data sources
 Develop Fraud Query Viewpoints
The 5 Dimensions
Brainstorm report ideas
 Analytically Trend
Benford’s Law
Statistical averages and simple trending by day, month, day of week
Post dated changes
 Use Visualization Techniques
Copyright © FraudResourceNet LLC
Clear Data Request
3/11/2014
15
Copyright © FraudResourceNet LLC
Fraud Data Considerations for
the P2P Cycle
A/P and G/L Review Factors
Accounts that are sole sourced
Accounts that have too many vendors
Categories that map to the “recovery list”
Assess to industry cost category benchmarks
Top 100 vendors
Trend analysis over time
Trend analysis by vendor (scatter graph)
Purchase Order / Price List
Match to invoice payments to assess price
differences
Strategic sourcing vendor review
Copyright © FraudResourceNet LLC
Distribution Analysis
 Remove subtotals for improved visibility
 Focus on sole source and multi source vendors
 Scroll out and drill to details as needed
3/11/2014
16
Copyright © FraudResourceNet LLC
Query Viewpoints
Copyright © FraudResourceNet LLC
It’s The Trends….Right?
Trend categories (meals, hotel, airfare,
other)
Trend by person and title
Trend departments
Trend vendors
Trend in the type of receipts
Trend under limits (company policy)
32
3/11/2014
17
Copyright © FraudResourceNet LLC
Number Ranking
 Summarize each amount (Pivot or ACL)
 Rank each number in order of occurrence
 Score each item in a sliding scale
 May be easiest to use a stratified score
 Decide if unique is weirder than non-unique
 Relate this summarized list back to the original
Copyright © FraudResourceNet LLC
Some Data Mining Approaches
Personnel Analysis
 Adjustments by employee
 Processing by employee
Contextual Summarizations
 Transaction types
Time Trending
 Month, week, and day / Also by department
 Last month to first 11 months
 Transactions at the end of and start of a fiscal year
3/11/2014
18
Copyright © FraudResourceNet LLC
Stratify Data ‐ Results
Copyright © FraudResourceNet LLC
Is Your Organization Working  
With Banned Companies?
EPLS is the excluded party list service of the U.S. Government as
maintained by the GSA
WWW.EPLS.GOV
Now
WWW.SAM.GOV
3/11/2014
19
Copyright © FraudResourceNet LLC
Is Your Organization 
Working With Terrorists?
Copyright © FraudResourceNet LLC
Are Your Vendors Real?
IRS TIN Matching Program
Validates U.S. Tax Identification Numbers
Can submit up to 100,000 TIN submissions at a
time
Make sure all punctuation is removed
See http://www.irs.gov/taxpros/ and enter “TIN
matching program” in the search box
3/11/2014
20
Copyright © FraudResourceNet LLC
Polling Question 3
What is not one of the query viewpoints?
A. Who
B. What
C. How
D. When
Copyright © FraudResourceNet LLC
Other T&E Reports
 Unmatched query of cardholders to an active employee
masterfile
 Cards used in multiple states (more than 2) in same day
 Cards processing in multiple currencies (more than 2) in
the same day
 Identify cards that have not had activity in last six months
 Cardholders that have more than one card
 Extract any cash back credits processed through the card
 Extract declined card transactions and determine if they
are frequent for certain cards
 Summary of card usage by merchant to find newly
added merchants and most active
3/11/2014
21
Copyright © FraudResourceNet LLC
Daily Transactional Analysis
Copyright © FraudResourceNet LLC
GeoMapping ‐ Map Point
3/11/2014
22
Copyright © FraudResourceNet LLC
Charting the Score
Copyright © FraudResourceNet LLC
Scatter Graph
3/11/2014
23
Copyright © FraudResourceNet LLC
Scatter Graph Explanation
1 – high dollar change and low count (outliers)
2 – charges that make sense
3 – changes that don’t make sense
4 – inefficiency that is developing
Copyright © FraudResourceNet LLC
Dashboarding Graphing
3/11/2014
24
Copyright © FraudResourceNet LLC
Polling Question 4
What graph is used to map value to score for
easier selections of data subsets?
A. Pie
B. Line
C. Bar
D. Scatter
Copyright © FraudResourceNet LLC
Fraud Scoring for Maximum Impact
3/11/2014
25
Copyright © FraudResourceNet LLC
 Vendors on report 1 vs. report 2 of duplicate payments.
 Duplicate transactions paid on different checks.
 Duplicate transactions with debit amounts in the vendor account
 Vendors with a high proportion of round dollar payments.
 Invoices that are exactly 10x, 100x or 1000x larger than another
invoice.
 Payments to any vendor that exceed the twelve month average
payments to that vendor by a specified percentage (i.e., 200%) o
the standard deviation for that vendor.
 Vendors paid with a high proportion of manual checks.
Simple Fraud Vendor Scoring 
Analysis – How It Started
Copyright © FraudResourceNet LLC
The Sampling “Problem” 
Bottom Line Numbers
 Modern tests (round numbers, duplicates, missing fields)
identify thousands of ‘suspicious’ transactions, usually about
1 in 5 of all transactions get a ‘red flag’
 Historically at least 0.02 – 0.03 % of all transactions have
real problems, such as a recoverable over-payment
 So roughly 0.00025 / 0.2 = 0.00125 or 1 in 800 ‘red flags’
lead to a real problem.
Imagine throwing a random dart at 800 balloons
hoping to hit the right one!!!
3/11/2014
26
Copyright © FraudResourceNet LLC
Transactional Score Benefits
 The best sample items (to meet your attributes) are selected
based on the severity given to each attribute. In other words,
errors, as you define them, can be mathematically calculated.
 Instead of selecting samples from reports, transactions that meet
multiple report attributes are selected (kill more birds with one
stone). Therefore a 50 unit sample can efficiently audit:
 38 duplicate payments
 22 round invoices
 18 in sequence invoices
….and they are the best given they are
mathematically the most “severe”.
51
Copyright © FraudResourceNet LLC
Summaries on Various 
Perspectives
52
Summarize by 
dimensions (and sub 
dimension) to pinpoint 
within the cube the 
crossover between the top 
scored location, time, and 
place of fraud based on 
the combined judgmental 
and statistical score 
3/11/2014
27
Copyright © FraudResourceNet LLC
Key Control Reports & Scoring
Copyright © FraudResourceNet LLC
Combining the Scores
ACL Code
3/11/2014
28
Copyright © FraudResourceNet LLC
Using Vlookup to Combine 
Scores
 Create a record number
 Relate sheets based on VLookup
Copyright © FraudResourceNet LLC
Polling Question #5
What Excel function is mainly used to organize
the scores into a master score?
A. SUMIF()
B. COUNTIF()
C. RAND()
D. VLOOKUP()
3/11/2014
29
Copyright © FraudResourceNet LLC
Questions?
Copyright © FraudResourceNet LLC
Peter Goldmann
FraudResourceNet LLC
800-440-2261
www.fraudresourcenet.com
pgoldmann@fraudresourcenet.com
Jim Kaplan
FraudResourceNet LLC
800-385-1625
www.fraudresourcenet.com
jkaplan@fraudresourcenet.com
Rich Lanza
Cash Recovery Partners, LLC
Phone: 973-729-3944
rich@richlanza.com
Thank You!
3/11/2014
30
Copyright © FraudResourceNet LLC
Coming Up
Upcoming March Anti-Fraud
Webinar…
 "How to Use Data Analytics to
Expose Fixed Asset and Inventory
Fraudsters”, March 19
Sign up at:
http://www.fraudresourcenet.com

More Related Content

PDF
Quick Response Fraud Detection
PDF
Finding Payroll Fraud Using Audit Software
PDF
Using Data Analytics to Detect and Deter Procure to Pay Fraud
PDF
Catch T&E and P-Card Fraudsters Using Data Analytics
PDF
Vendor Master File Fraud Detection and Prevention Using Data Analytics
PDF
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
PDF
Think Like a Fraudster to Catch a Fraudster
PDF
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Quick Response Fraud Detection
Finding Payroll Fraud Using Audit Software
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Catch T&E and P-Card Fraudsters Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Think Like a Fraudster to Catch a Fraudster
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics

Viewers also liked (18)

PPTX
ACCOUNTING & AUDITING WITH EXCEL2011
PDF
Simplifying stats
PDF
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
PDF
Babok2 Big Picture
PDF
Using Data Analytics to Conduct a Forensic Audit
PPTX
Fraud, Waste & Abuse: Capture low hanging fruit and more
PDF
Go Predictive Analytics
PDF
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
PDF
9 Quantitative Analysis Techniques
PDF
Faster document review and production
PPTX
User Behavior Analytics And The Benefits To Companies
PDF
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
PDF
Using benford's law for fraud detection and auditing
PPTX
Fraud: Understanding Fraud and Our Responsibilities
PDF
[Tutorial] building machine learning models for predictive maintenance applic...
PPTX
Hr analytics
PPTX
Fraud principles1
PPTX
HR Analytics, Done Right
ACCOUNTING & AUDITING WITH EXCEL2011
Simplifying stats
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Babok2 Big Picture
Using Data Analytics to Conduct a Forensic Audit
Fraud, Waste & Abuse: Capture low hanging fruit and more
Go Predictive Analytics
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
9 Quantitative Analysis Techniques
Faster document review and production
User Behavior Analytics And The Benefits To Companies
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
Using benford's law for fraud detection and auditing
Fraud: Understanding Fraud and Our Responsibilities
[Tutorial] building machine learning models for predictive maintenance applic...
Hr analytics
Fraud principles1
HR Analytics, Done Right
Ad

Similar to Using Data Analytics to Find and Deter Procure to Pay Fraud (20)

PDF
Uncovering Fraud in Key Financial Accounts using Data Analysis
PDF
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
PDF
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
PDF
Bribery and Corruption (FCPA): What Auditors Need to Know
PDF
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
PDF
Best Practices in Detecting Payable Fraud Using Data Analytics
PDF
Fraud Risk Assessment: An Expert’s Blueprint
PDF
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
PDF
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
PDF
Enhanced fraud detection with data analytics
PPT
Finding Fraud and What To Do With It.ppt
PDF
Super data-charging your corruption reviews with integrated analytics
PDF
Fraud Prevention and Internal Controls - A Winning Combination
PPTX
What You Need To Know To Protect Your Organization From Fraud
PPTX
Bank Fraud & Data Forensics
PDF
False Invoices - Would you detect them
PDF
02/18/2010 Meeting - Data Analytics
PPTX
What You Need to Know About Occupational Fraud in Government - 2014
PDF
Fraud Incident Response Planning Essentials
Uncovering Fraud in Key Financial Accounts using Data Analysis
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Bribery and Corruption (FCPA): What Auditors Need to Know
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
Best Practices in Detecting Payable Fraud Using Data Analytics
Fraud Risk Assessment: An Expert’s Blueprint
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Enhanced fraud detection with data analytics
Finding Fraud and What To Do With It.ppt
Super data-charging your corruption reviews with integrated analytics
Fraud Prevention and Internal Controls - A Winning Combination
What You Need To Know To Protect Your Organization From Fraud
Bank Fraud & Data Forensics
False Invoices - Would you detect them
02/18/2010 Meeting - Data Analytics
What You Need to Know About Occupational Fraud in Government - 2014
Fraud Incident Response Planning Essentials
Ad

More from FraudBusters (11)

PDF
The Power of Benford's Law in Finding Fraud
PDF
Background Check Best Practices
PDF
Best Practices: Planning Data Analytic into Your Audits
PDF
Fraud in Social Media: Facing the Growing Threat
PDF
Management Override: Common Tactics and How to Audit For Red Flags
PDF
Setting Up and Managing an Anonymous Fraud Hotline
PDF
Detecting Healthcare Vendor Fraud Using Data Analysis
PDF
Establishing an Organization Wide Fraud Policy
PDF
Essentials of a Highly Effective Employee Fraud Awareness Program
PDF
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
PDF
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
The Power of Benford's Law in Finding Fraud
Background Check Best Practices
Best Practices: Planning Data Analytic into Your Audits
Fraud in Social Media: Facing the Growing Threat
Management Override: Common Tactics and How to Audit For Red Flags
Setting Up and Managing an Anonymous Fraud Hotline
Detecting Healthcare Vendor Fraud Using Data Analysis
Establishing an Organization Wide Fraud Policy
Essentials of a Highly Effective Employee Fraud Awareness Program
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them

Recently uploaded (20)

PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
Deliverable file - Regulatory guideline analysis.pdf
PDF
MSPs in 10 Words - Created by US MSP Network
PDF
IFRS Notes in your pocket for study all the time
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
Chapter 5_Foreign Exchange Market in .pdf
PDF
Training And Development of Employee .pdf
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
Types of control:Qualitative vs Quantitative
PPTX
Lecture (1)-Introduction.pptx business communication
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PDF
How to Get Funding for Your Trucking Business
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PPTX
Probability Distribution, binomial distribution, poisson distribution
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PDF
Unit 1 Cost Accounting - Cost sheet
PPTX
Amazon (Business Studies) management studies
PPT
Data mining for business intelligence ch04 sharda
ICG2025_ICG 6th steering committee 30-8-24.pptx
Deliverable file - Regulatory guideline analysis.pdf
MSPs in 10 Words - Created by US MSP Network
IFRS Notes in your pocket for study all the time
COST SHEET- Tender and Quotation unit 2.pdf
Chapter 5_Foreign Exchange Market in .pdf
Training And Development of Employee .pdf
Power and position in leadershipDOC-20250808-WA0011..pdf
Types of control:Qualitative vs Quantitative
Lecture (1)-Introduction.pptx business communication
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Ôn tập tiếng anh trong kinh doanh nâng cao
How to Get Funding for Your Trucking Business
Belch_12e_PPT_Ch18_Accessible_university.pptx
New Microsoft PowerPoint Presentation - Copy.pptx
Probability Distribution, binomial distribution, poisson distribution
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Unit 1 Cost Accounting - Cost sheet
Amazon (Business Studies) management studies
Data mining for business intelligence ch04 sharda

Using Data Analytics to Find and Deter Procure to Pay Fraud

  • 1. 3/11/2014 1 Copyright © FraudResourceNet LLC Using Data Analytics to Find  and Deter Procure‐to‐Pay  Fraud  March 12, 2014 Special Guest Presenter: Rich Lanza Copyright © FraudResourceNet LLC About Jim Kaplan, MSc, CIA, CFE • President and Founder of AuditNet®, the global resource for auditors (now available on Apple and Android devices) • Auditor, Web Site Guru, • Internet for Auditors Pioneer • Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award. • Author of “The Auditor’s Guide to Internet Resources” 2nd Edition
  • 2. 3/11/2014 2 Copyright © FraudResourceNet LLC About Peter Goldmann, MSc., CFE President and Founder of White Collar Crime 101 • Publisher of White-Collar Crime Fighter • Developer of FraudAware® Anti-Fraud Training • Monthly Columnist, The Fraud Examiner, ACFE Newsletter Member of Editorial Advisory Board, ACFE Author of “Fraud in the Markets” • Explains how fraud fueled the financial crisis. Copyright © FraudResourceNet LLC Richard B. Lanza, CPA, CFE, CGMA • Over two decades of ACL and Excel software usage • Wrote the first practical ACL publication on how to use the product in 101 ways (101 ACL Applications) • Has written and spoken on the use of audit data analytics for over 15 years. • Received the Outstanding Achievement in Business Award by the Association of Certified Fraud Examiners for developing the publication Proactively Detecting Fraud Using Computer Audit Reports as a research project for the IIA • Recently was a contributing author of: • Global Technology Audit Guide (GTAG #13) Fraud in an Automated World - IIA • Data Analytics – A Practical Approach - research whitepaper for the Information System Accountability Control Association. • “Cost Recovery – Turning Your Accounts Payable Department into a Profit Center” – Wiley & Sons. Please see full bio at www.richlanza.com
  • 3. 3/11/2014 3 Copyright © FraudResourceNet LLC This webinar and its material are the property of FraudResourceNet LLC. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden. We are recording the webinar and you will be provided with a link access to that recording as detailed below. Downloading or otherwise duplicating the webinar recording is expressly prohibited. Webinar recording link will be sent via email within 5-7 business days. NASBA rules require us to ask polling questions during the Webinar and CPE certificates will be sent via email to those who answer ALL the polling questions The CPE certificates and link to the recording will be sent to the email address you registered with in GTW. We are not responsible for delivery problems due to spam filters, attachment restrictions or other controls in place for your email client. Submit questions via the chat box on your screen and we will answer them either during or at the conclusion. After the Webinar is over you will have an opportunity to provide feedback. Please complete the feedback questionnaire to help us continuously improve our Webinars If GTW stops working you may need to close and restart. You can always dial in and listen and follow along with the handout. Webinar Housekeeping Copyright © FraudResourceNet LLC The views expressed by the presenters do not necessarily represent the views, positions, or opinions of FraudResourceNet LLC (FRN) or the presenters’ respective organizations. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client relationship. While FRN makes every effort to ensure information is accurate and complete, FRN makes no representations, guarantees, or warranties as to the accuracy or completeness of the information provided via this presentation. FRN specifically disclaims all liability for any claims or damages that may result from the information contained in this presentation, including any websites maintained by third parties and linked to the FRN website Any mention of commercial products is for information only; it does not imply recommendation or endorsement by FraudResourceNet LLC 6 Disclaimers
  • 4. 3/11/2014 4 Copyright © FraudResourceNet LLC Today’s Agenda  Costliest procurement frauds to beware of (with case studies)  Indicators of possible collusive procurement- vendor schemes  Red flags to look for in audits of procurement using data analytics  How to conduct the audit using data analytics  What to do if you find vendor or procurement fraud during an audit Copyright © FraudResourceNet LLC Issues in Vendor Master  Management Too many active vendors  (with no activity)  Improper segregation  of duties Difficult to understand or  improve spend  management Difficult to manage or  improve payment terms Invalid Tax IDs leading to B  notices Too many active vendors  (with no activity)  Improper segregation  of duties Difficult to understand or  improve spend  management Difficult to manage or  improve payment terms Invalid Tax IDs leading to B  notices Duplicate vendors  representing parents and  subs, for different  companies, or just  mistakes = duplicate pays Duplicate vendors  representing parents and  subs, for different  companies, or just  mistakes = duplicate pays Duplicate vendors  representing parents and  subs, for different  companies, or just  mistakes = duplicate pays Vendors are confused and  may see opportunities to  take advantage of the  company Vendors are confused and  may see opportunities to  take advantage of the  company Lack of vendor  management …increases  opportunity for fraud Lack of vendor  management …increases  opportunity for fraud Lack of vendor  management …increases  opportunity for fraud
  • 6. 3/11/2014 6 Copyright © FraudResourceNet LLC Primary Weaknesses  Leading to  the Fraud Copyright © FraudResourceNet LLC 1. Whistleblowing hotline 2. Signed code of conduct 3. Train employees 4. Background checks 5. Look for and respond to fraud 12 Most companies have these procedures in  place but the question is….how effective  are they? The Top Procedures Per  SAS 99 – Appendix B
  • 7. 3/11/2014 7 Copyright © FraudResourceNet LLC Where Are You Using Data  Analytics? AuditNet – 2012 Data  Analysis Software  Survey Copyright © FraudResourceNet LLC Polling Question 1 What is not one of the top occurring frauds per the ACFE study? A. Billing B. Corruption C. Overstated Revenue D. Expense Reimbursements
  • 9. 3/11/2014 9 Copyright © FraudResourceNet LLC Proactively Detecting Fraud Using Computer Audit Reports IIA Research Paper / CPE Course See the IIA’s website at www.theiia.org The purpose of this document is to assist auditors, fraud examiners, and management in implementing data analysis routines for improved fraud prevention and detection. A comprehensive checklist of data analysis reports that are associated with each occupational fraud category per the Association of Certified Fraud Examiners’ classification system. Copyright © FraudResourceNet LLC Visualizing the Cost Recovery  and Savings Process
  • 10. 3/11/2014 10 Copyright © FraudResourceNet LLC Profit Opportunities Outweigh Analytic  Costs  Accounts Payable  Audit Fee Benchmarking  Advertising Agency  Document Fleet  Freight  Health Benefits  Lease  Media  Order to Cash  Proactive Fraud Detection  Project Fraud  Real Estate Depreciation  Sales & Use Tax / VAT / R&D  tax  Strategic Sourcing  Telecom  Travel and Entertainment  Utilities Copyright © FraudResourceNet LLC Process to Report Mapping
  • 12. 3/11/2014 12 Copyright © FraudResourceNet LLC Polling Question #2 What are example cost recovery areas associated with the P2P cycle? A. Freight B. Order to cash C. Healthcare D. Accounts Payable Copyright © FraudResourceNet LLC Using an Analytic Process to Detect  Fraud
  • 13. 3/11/2014 13 Copyright © FraudResourceNet LLC Best Practice Approach on  Fraud:Find It Before It Finds You Think Prevention vs. Future Detection  Identify issues earlier in their lifecycle  Build a aura of deterrence within procure to pay Build a Continuous Review Process  Technology  Minimal staff time / external assistance Keep Improving the Model  Model on identified frauds  Remove false positives to isolate interesting events Copyright © FraudResourceNet LLC Analytic Command Center Analytic Command Center 1. Accounts Payable 2. Accounts Receivable 3. Financial Statement 4.General Ledger 5. Inventory 6.Payroll 7. Revenue Data Mart Local Analytic  Toolkit Feedback from  all locations Recovery Auditors Shared Services
  • 14. 3/11/2014 14 Copyright © FraudResourceNet LLC The Overall Fraud Analytic Process  Get the Most Useful Data for Analysis General Ledger / Accounts Payable Other? / Use external data sources  Develop Fraud Query Viewpoints The 5 Dimensions Brainstorm report ideas  Analytically Trend Benford’s Law Statistical averages and simple trending by day, month, day of week Post dated changes  Use Visualization Techniques Copyright © FraudResourceNet LLC Clear Data Request
  • 15. 3/11/2014 15 Copyright © FraudResourceNet LLC Fraud Data Considerations for the P2P Cycle A/P and G/L Review Factors Accounts that are sole sourced Accounts that have too many vendors Categories that map to the “recovery list” Assess to industry cost category benchmarks Top 100 vendors Trend analysis over time Trend analysis by vendor (scatter graph) Purchase Order / Price List Match to invoice payments to assess price differences Strategic sourcing vendor review Copyright © FraudResourceNet LLC Distribution Analysis  Remove subtotals for improved visibility  Focus on sole source and multi source vendors  Scroll out and drill to details as needed
  • 16. 3/11/2014 16 Copyright © FraudResourceNet LLC Query Viewpoints Copyright © FraudResourceNet LLC It’s The Trends….Right? Trend categories (meals, hotel, airfare, other) Trend by person and title Trend departments Trend vendors Trend in the type of receipts Trend under limits (company policy) 32
  • 17. 3/11/2014 17 Copyright © FraudResourceNet LLC Number Ranking  Summarize each amount (Pivot or ACL)  Rank each number in order of occurrence  Score each item in a sliding scale  May be easiest to use a stratified score  Decide if unique is weirder than non-unique  Relate this summarized list back to the original Copyright © FraudResourceNet LLC Some Data Mining Approaches Personnel Analysis  Adjustments by employee  Processing by employee Contextual Summarizations  Transaction types Time Trending  Month, week, and day / Also by department  Last month to first 11 months  Transactions at the end of and start of a fiscal year
  • 18. 3/11/2014 18 Copyright © FraudResourceNet LLC Stratify Data ‐ Results Copyright © FraudResourceNet LLC Is Your Organization Working   With Banned Companies? EPLS is the excluded party list service of the U.S. Government as maintained by the GSA WWW.EPLS.GOV Now WWW.SAM.GOV
  • 19. 3/11/2014 19 Copyright © FraudResourceNet LLC Is Your Organization  Working With Terrorists? Copyright © FraudResourceNet LLC Are Your Vendors Real? IRS TIN Matching Program Validates U.S. Tax Identification Numbers Can submit up to 100,000 TIN submissions at a time Make sure all punctuation is removed See http://www.irs.gov/taxpros/ and enter “TIN matching program” in the search box
  • 20. 3/11/2014 20 Copyright © FraudResourceNet LLC Polling Question 3 What is not one of the query viewpoints? A. Who B. What C. How D. When Copyright © FraudResourceNet LLC Other T&E Reports  Unmatched query of cardholders to an active employee masterfile  Cards used in multiple states (more than 2) in same day  Cards processing in multiple currencies (more than 2) in the same day  Identify cards that have not had activity in last six months  Cardholders that have more than one card  Extract any cash back credits processed through the card  Extract declined card transactions and determine if they are frequent for certain cards  Summary of card usage by merchant to find newly added merchants and most active
  • 23. 3/11/2014 23 Copyright © FraudResourceNet LLC Scatter Graph Explanation 1 – high dollar change and low count (outliers) 2 – charges that make sense 3 – changes that don’t make sense 4 – inefficiency that is developing Copyright © FraudResourceNet LLC Dashboarding Graphing
  • 24. 3/11/2014 24 Copyright © FraudResourceNet LLC Polling Question 4 What graph is used to map value to score for easier selections of data subsets? A. Pie B. Line C. Bar D. Scatter Copyright © FraudResourceNet LLC Fraud Scoring for Maximum Impact
  • 25. 3/11/2014 25 Copyright © FraudResourceNet LLC  Vendors on report 1 vs. report 2 of duplicate payments.  Duplicate transactions paid on different checks.  Duplicate transactions with debit amounts in the vendor account  Vendors with a high proportion of round dollar payments.  Invoices that are exactly 10x, 100x or 1000x larger than another invoice.  Payments to any vendor that exceed the twelve month average payments to that vendor by a specified percentage (i.e., 200%) o the standard deviation for that vendor.  Vendors paid with a high proportion of manual checks. Simple Fraud Vendor Scoring  Analysis – How It Started Copyright © FraudResourceNet LLC The Sampling “Problem”  Bottom Line Numbers  Modern tests (round numbers, duplicates, missing fields) identify thousands of ‘suspicious’ transactions, usually about 1 in 5 of all transactions get a ‘red flag’  Historically at least 0.02 – 0.03 % of all transactions have real problems, such as a recoverable over-payment  So roughly 0.00025 / 0.2 = 0.00125 or 1 in 800 ‘red flags’ lead to a real problem. Imagine throwing a random dart at 800 balloons hoping to hit the right one!!!
  • 26. 3/11/2014 26 Copyright © FraudResourceNet LLC Transactional Score Benefits  The best sample items (to meet your attributes) are selected based on the severity given to each attribute. In other words, errors, as you define them, can be mathematically calculated.  Instead of selecting samples from reports, transactions that meet multiple report attributes are selected (kill more birds with one stone). Therefore a 50 unit sample can efficiently audit:  38 duplicate payments  22 round invoices  18 in sequence invoices ….and they are the best given they are mathematically the most “severe”. 51 Copyright © FraudResourceNet LLC Summaries on Various  Perspectives 52 Summarize by  dimensions (and sub  dimension) to pinpoint  within the cube the  crossover between the top  scored location, time, and  place of fraud based on  the combined judgmental  and statistical score 
  • 28. 3/11/2014 28 Copyright © FraudResourceNet LLC Using Vlookup to Combine  Scores  Create a record number  Relate sheets based on VLookup Copyright © FraudResourceNet LLC Polling Question #5 What Excel function is mainly used to organize the scores into a master score? A. SUMIF() B. COUNTIF() C. RAND() D. VLOOKUP()
  • 29. 3/11/2014 29 Copyright © FraudResourceNet LLC Questions? Copyright © FraudResourceNet LLC Peter Goldmann FraudResourceNet LLC 800-440-2261 www.fraudresourcenet.com pgoldmann@fraudresourcenet.com Jim Kaplan FraudResourceNet LLC 800-385-1625 www.fraudresourcenet.com jkaplan@fraudresourcenet.com Rich Lanza Cash Recovery Partners, LLC Phone: 973-729-3944 rich@richlanza.com Thank You!
  • 30. 3/11/2014 30 Copyright © FraudResourceNet LLC Coming Up Upcoming March Anti-Fraud Webinar…  "How to Use Data Analytics to Expose Fixed Asset and Inventory Fraudsters”, March 19 Sign up at: http://www.fraudresourcenet.com