www.complianceonlie.com
©2010 Copyright
© 2015 ComplianceOnline
This training session is sponsored by
1
Developing an Effective Fraud Risk
Management Program
This Training is Brought to you by ComplianceOnline.
Presenter: Craig M. Taggart
www.complianceonline.com
©2015 Copyright
 Areas Covered in the Webinar:
 Identify fraud risks and the factors that influence them
 Analyze existing risk management frameworks and
their application to managing fraud risk
 Develop and implement the necessary components of
a successful fraud risk management program
 Identify the elements of a strong ethical corporate
culture
 Conduct a cost effective fraud risk assessment
2
www.complianceonline.com
©2015 Copyright
Agenda
3
The risk of fraud is just one of the many types of
risks to be managed by an organization. But to let
this risk fall out of focus can bring catastrophic
results. Building an effective fraud risk
management program to combat organizational
fraud requires solid understanding of how and why
fraud is perpetrated. This course will discuss the
components of a fraudulent act, different types of
fraud schemes and the impact fraud has on
organizations. It will also analyze why individuals
commit fraud and why the threat of punishment
alone doesn’t deter potential fraudsters
www.complianceonline.com
©2015 Copyright
 Definition of Fraud source Wikipedia
 In law, fraud is deliberate deception to secure unfair or
unlawful gain. Fraud is both a civil wrong (i.e., a fraud victim
may sue the fraud perpetrator to avoid the fraud and/or
recover monetary compensation) and a criminal wrong (i.e., a
fraud perpetrator may be prosecuted and imprisoned by
governmental authorities). The purpose of fraud may be
monetary gain or other benefits, such as obtaining a drivers
license by way of false statements. A hoax is a distinct concept
that involves deception without the intention of gain or of
materially damaging or depriving the victim.
4
www.complianceonline.com
©2015 Copyright
5
 Instructor Profile:
 Craig Taggart has almost a decade of experience in the fields of mergers and acquisitions and
business financing. Mr. Taggart works strategically with his clients to achieve the highest value
for their business within the capital markets. His experience with BCC Capital Partners in the
M&A industry has greatly contributed to his understanding of transaction structure, strategic
 placement of buyers, and the attainment of maximum market value for his clients. He has
represented and sold many businesses in a number of different industries and has significant
experience working with companies in: continuing education, transportation, software and
professional services. Mr. Taggart is currently working in the clean energy sector that covers
multiple initiatives within M&A and corporate development.
 He is a certified merger and acquisition advisor, accredited valuation analyst as well as an active
member of Alliance of Mergers and Acquisition, and The National Association of Certified
Valuators and Analysts (NACVA). Mr. Taggart has been a certified fraud examiner since 2011
and has owned an investigative franchise business, which focused on fraud based cases
involving insurance, asset searches, surveillance, witness statements
 He earned his MBA from the San Diego State University specializing in financial management.
Mr. Taggart graduated from the California State University Northridge with a bachelor’s degree
majoring in organizational psychology.
www.complianceonline.com
©2015 Copyright
Agenda
6
Why Should You Attend:
The field of risk management has attracted
increased mainstream attention in the wake of
the economic meltdown as the public has
begun to comprehend the negative effects of
uncontained risk. Unfortunately, many risk
management professionals tend to
underestimate the role of fraud in the scope of
their professional duties.
www.complianceonline.com
©2015 Copyright
 With organizations losing an estimated 5 percent of
their annual revenues to fraud, the need for a strong
anti-fraud stance and proactive, comprehensive
approach to combating fraud is clear. As organizations
increase their focus on fraud, they should take the
opportunity to consider, enact and improve measures
to detect, deter and prevent fraud. Without clear,
defined objectives, a fraud risk management program
cannot be effective.
7
www.complianceonline.com
©2015 Copyright
 Common Fraud Schemes source FBI
 Telemarketing Fraud
 Identity Theft
 Advance Fee Schemes
 Health Care Fraud / Health Insurance Fraud
 Redemption / Strawman / bond Fraud
 Nigerian Letter or “419” Fraud
8
www.complianceonline.com
©2015 Copyright
9
www.complianceonline.com
©2015 Copyright
 Whether in your individual role or in a team setting,
you are taking on a process of determining current or
future acts of fraud. The process at a larger
organizational level or within a function, the fraud
assessment process is basically the same. Here is the
top down approach:
 Review Business Objectives
 Review current assessed fraud & fraud categories
 Review core processes tied to the objectives
 Brainstorm fraud that can affect your organization
The Fraud Assessment Process
10
www.complianceonline.com
©2015 Copyright
 Determine criteria or (possibility and impact) to
develop ranking acts of fraud into critical, important
and not important as it pertains to specific
organization
 Determine whether the controls in place are efficient
and effective
 Action plans and more testing where needed
11
www.complianceonline.com
©2015 Copyright
 Corruption, embezzlement, fraud, these are all
characteristics which exist everywhere. It is regrettably
the way human nature functions, whether we like it or
not. What successful economies do is keep it to a
minimum. No one has ever eliminated any of that
stuff.
 Alan Greenspan former Chairman of the Federal
Reserve of the United States from 1987 to 2006
12
www.complianceonline.com
©2015 Copyright
 In this course, participants will:
 Learn how to set program objectives and define risk
appetite as the first step in building the program.
 Discuss the steps involved in developing a fraud risk
management program, as well as the program
components necessary to fully manage the risk of
fraud.
13
www.complianceonline.com
©2015 Copyright
 Review risk management frameworks and will be
introduced to the concept of fraud risk, including the
factors that influence it.
 Learn why businesses should manage fraud risk and
who within the organization is responsible for this
task.
14
www.complianceonline.com
©2015 Copyright
 Learning Objectives:
 Identify, assess and manage fraud risks from all
sources and support fraud risk management initiatives
by establishing an anti-fraud culture and promoting
fraud awareness throughout the organization.
 Be able to develop a system of internal controls to
address the entity’s fraud risks and address and
respond to any identified instances of fraud.
15
www.complianceonline.com
©2015 Copyright
 Becoming familiar with common fraud schemes and
risks
 Identify fraud scenarios and schemes that threaten the
organization
 Identify red flags and encourage ethical corporate
culture
 Building a strong anti-fraud policy
 Promote fraud awareness to employees at all levels of
the organization
16
www.complianceonline.com
©2015 Copyright
 Who Will Benefit:
 Bank and financial institution auditors
 Controllers and corporate managers
 Forensic and management accountants, accounts
payable and financial analysts
 Governance, risk management and compliance officers
 Internal and external auditors, CPAs and CAs
 Certified fraud examiners and other anti-fraud
professionals
17
www.complianceonline.com
©2015 Copyright
 Techniques used for fraud detection fall into two primary
classes: statistical techniques and artificial intelligence.[3]
Examples of statistical data analysis techniques are:
 Data preprocessing techniques for detection, validation, error
correction, and filling up of missing or incorrect data.
 Calculation of various statistical parameters such as averages,
quantiles, performance metrics, probability distributions, and so
on. For example, the averages may include average length of
call, average number of calls per month and average delays in bill
payment.
18
www.complianceonline.com
©2015 Copyright
 Models and probability distributions of various business
activities either in terms of various parameters or probability
distributions.
 Computing user profiles.
 Time-series analysis of time-dependent data.
 Clustering and classification to find patterns and associations
among groups of data.
 Matching algorithms to detect anomalies in the behavior of
transactions or users as compared to previously known models
and profiles. Techniques are also needed to eliminate false
alarms, estimate risks, and predict future of current transactions
or users.
19
www.complianceonline.com
©2015 Copyright
THANK YOU FOR YOUR ATTENTION
20
For more information on Live Webinars and any Other Training Requirements please email us
webinarassist@complianceonline.com or Call us at this Toll Free Number: 1- 888-717-2436

More Related Content

PPT
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
PPT
ComplianceOnline PPT Format AMLOFAC Risk Assessment The Cornerstone of an Eff...
PDF
ICFE Fraud Risk Management Programme Infosheet
PDF
Combating Fraud: Six Principles for Security
PPT
Traditionally, the practice of risk management comprises acceptance, transfer...
PPT
Fraud risk assessment
PPT
Fraud In Our Midst, The Acfe 2010
PDF
Definitive guide to third-party risk management - how to successfully mitigat...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format AMLOFAC Risk Assessment The Cornerstone of an Eff...
ICFE Fraud Risk Management Programme Infosheet
Combating Fraud: Six Principles for Security
Traditionally, the practice of risk management comprises acceptance, transfer...
Fraud risk assessment
Fraud In Our Midst, The Acfe 2010
Definitive guide to third-party risk management - how to successfully mitigat...

What's hot (20)

PDF
Risk & Advisory Services: Quarterly Risk Advisor May 2016
PPTX
Fraud Risk and Control
PPTX
2016 - IQPC - Understanding and Assessing Corruption Risk
PPT
Fraud And Internal Controls Linked In April 2011
PDF
Essentials of a Highly Effective Employee Fraud Awareness Program
PDF
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
PDF
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
PDF
Emergence of the Chief Risk Officer function
PPT
Fight Fraud with Employee Fraud Training
PDF
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
PPTX
Mitigating Human Resources Risks
PDF
Using Data Analytics to Conduct a Forensic Audit
PPTX
2016 - IQPC - The key to raising awareness and comprehension
PDF
Fraud Awareness
PDF
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
PDF
Fraud Risk Assessment
PPTX
2016 MSCPA Fraud Conference Presentation
PDF
Smart devine-act now before its too late-0313-v6
PDF
Fraud & Risk Management - A Guide to Good Practice
PDF
TI Managing Third Party Risk
Risk & Advisory Services: Quarterly Risk Advisor May 2016
Fraud Risk and Control
2016 - IQPC - Understanding and Assessing Corruption Risk
Fraud And Internal Controls Linked In April 2011
Essentials of a Highly Effective Employee Fraud Awareness Program
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
Emergence of the Chief Risk Officer function
Fight Fraud with Employee Fraud Training
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Mitigating Human Resources Risks
Using Data Analytics to Conduct a Forensic Audit
2016 - IQPC - The key to raising awareness and comprehension
Fraud Awareness
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Fraud Risk Assessment
2016 MSCPA Fraud Conference Presentation
Smart devine-act now before its too late-0313-v6
Fraud & Risk Management - A Guide to Good Practice
TI Managing Third Party Risk
Ad

Similar to ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Management Program 4.9.2015 (20)

PDF
Fraud Risk Management | Fraud Risk Assessment - EY India
PDF
Fraud Risk Management | Fraud Risk Assessment - EY India
PDF
Fraud Risk Management - Are Your Doing Enough - EY India
PDF
Fraud Risk Management - Are Your Doing Enough - EY India
PDF
MCM 13 Fraud Supplement p11-13[1]
PDF
Best practice for anti corruption
PDF
When AML Programs Fail: Root Causes & How to Fix Them
PDF
Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_
PPTX
Anti-Fraud Playbook_Eswatini.pptx
PDF
Fraud Risk Assessment: An Expert’s Blueprint
PDF
FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra...
PDF
Insurance fraud risk management service
PDF
Insurance fraud risk management service
PDF
Insurance fraud risk management service
PDF
Mind the Gaps: AML and Fraud Global Benchmark Survey
PDF
Operation risk management in Private Equity firms
PDF
Financial Statement Fraud training by Tommy SEAH
PPTX
Fraud Detection : AI Risk Management
PPTX
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
PDF
Financial crimes compliance Brochure - BMR Advisors
Fraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management - Are Your Doing Enough - EY India
Fraud Risk Management - Are Your Doing Enough - EY India
MCM 13 Fraud Supplement p11-13[1]
Best practice for anti corruption
When AML Programs Fail: Root Causes & How to Fix Them
Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_
Anti-Fraud Playbook_Eswatini.pptx
Fraud Risk Assessment: An Expert’s Blueprint
FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra...
Insurance fraud risk management service
Insurance fraud risk management service
Insurance fraud risk management service
Mind the Gaps: AML and Fraud Global Benchmark Survey
Operation risk management in Private Equity firms
Financial Statement Fraud training by Tommy SEAH
Fraud Detection : AI Risk Management
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
Financial crimes compliance Brochure - BMR Advisors
Ad

ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Management Program 4.9.2015

  • 1. www.complianceonlie.com ©2010 Copyright © 2015 ComplianceOnline This training session is sponsored by 1 Developing an Effective Fraud Risk Management Program This Training is Brought to you by ComplianceOnline. Presenter: Craig M. Taggart
  • 2. www.complianceonline.com ©2015 Copyright  Areas Covered in the Webinar:  Identify fraud risks and the factors that influence them  Analyze existing risk management frameworks and their application to managing fraud risk  Develop and implement the necessary components of a successful fraud risk management program  Identify the elements of a strong ethical corporate culture  Conduct a cost effective fraud risk assessment 2
  • 3. www.complianceonline.com ©2015 Copyright Agenda 3 The risk of fraud is just one of the many types of risks to be managed by an organization. But to let this risk fall out of focus can bring catastrophic results. Building an effective fraud risk management program to combat organizational fraud requires solid understanding of how and why fraud is perpetrated. This course will discuss the components of a fraudulent act, different types of fraud schemes and the impact fraud has on organizations. It will also analyze why individuals commit fraud and why the threat of punishment alone doesn’t deter potential fraudsters
  • 4. www.complianceonline.com ©2015 Copyright  Definition of Fraud source Wikipedia  In law, fraud is deliberate deception to secure unfair or unlawful gain. Fraud is both a civil wrong (i.e., a fraud victim may sue the fraud perpetrator to avoid the fraud and/or recover monetary compensation) and a criminal wrong (i.e., a fraud perpetrator may be prosecuted and imprisoned by governmental authorities). The purpose of fraud may be monetary gain or other benefits, such as obtaining a drivers license by way of false statements. A hoax is a distinct concept that involves deception without the intention of gain or of materially damaging or depriving the victim. 4
  • 5. www.complianceonline.com ©2015 Copyright 5  Instructor Profile:  Craig Taggart has almost a decade of experience in the fields of mergers and acquisitions and business financing. Mr. Taggart works strategically with his clients to achieve the highest value for their business within the capital markets. His experience with BCC Capital Partners in the M&A industry has greatly contributed to his understanding of transaction structure, strategic  placement of buyers, and the attainment of maximum market value for his clients. He has represented and sold many businesses in a number of different industries and has significant experience working with companies in: continuing education, transportation, software and professional services. Mr. Taggart is currently working in the clean energy sector that covers multiple initiatives within M&A and corporate development.  He is a certified merger and acquisition advisor, accredited valuation analyst as well as an active member of Alliance of Mergers and Acquisition, and The National Association of Certified Valuators and Analysts (NACVA). Mr. Taggart has been a certified fraud examiner since 2011 and has owned an investigative franchise business, which focused on fraud based cases involving insurance, asset searches, surveillance, witness statements  He earned his MBA from the San Diego State University specializing in financial management. Mr. Taggart graduated from the California State University Northridge with a bachelor’s degree majoring in organizational psychology.
  • 6. www.complianceonline.com ©2015 Copyright Agenda 6 Why Should You Attend: The field of risk management has attracted increased mainstream attention in the wake of the economic meltdown as the public has begun to comprehend the negative effects of uncontained risk. Unfortunately, many risk management professionals tend to underestimate the role of fraud in the scope of their professional duties.
  • 7. www.complianceonline.com ©2015 Copyright  With organizations losing an estimated 5 percent of their annual revenues to fraud, the need for a strong anti-fraud stance and proactive, comprehensive approach to combating fraud is clear. As organizations increase their focus on fraud, they should take the opportunity to consider, enact and improve measures to detect, deter and prevent fraud. Without clear, defined objectives, a fraud risk management program cannot be effective. 7
  • 8. www.complianceonline.com ©2015 Copyright  Common Fraud Schemes source FBI  Telemarketing Fraud  Identity Theft  Advance Fee Schemes  Health Care Fraud / Health Insurance Fraud  Redemption / Strawman / bond Fraud  Nigerian Letter or “419” Fraud 8
  • 10. www.complianceonline.com ©2015 Copyright  Whether in your individual role or in a team setting, you are taking on a process of determining current or future acts of fraud. The process at a larger organizational level or within a function, the fraud assessment process is basically the same. Here is the top down approach:  Review Business Objectives  Review current assessed fraud & fraud categories  Review core processes tied to the objectives  Brainstorm fraud that can affect your organization The Fraud Assessment Process 10
  • 11. www.complianceonline.com ©2015 Copyright  Determine criteria or (possibility and impact) to develop ranking acts of fraud into critical, important and not important as it pertains to specific organization  Determine whether the controls in place are efficient and effective  Action plans and more testing where needed 11
  • 12. www.complianceonline.com ©2015 Copyright  Corruption, embezzlement, fraud, these are all characteristics which exist everywhere. It is regrettably the way human nature functions, whether we like it or not. What successful economies do is keep it to a minimum. No one has ever eliminated any of that stuff.  Alan Greenspan former Chairman of the Federal Reserve of the United States from 1987 to 2006 12
  • 13. www.complianceonline.com ©2015 Copyright  In this course, participants will:  Learn how to set program objectives and define risk appetite as the first step in building the program.  Discuss the steps involved in developing a fraud risk management program, as well as the program components necessary to fully manage the risk of fraud. 13
  • 14. www.complianceonline.com ©2015 Copyright  Review risk management frameworks and will be introduced to the concept of fraud risk, including the factors that influence it.  Learn why businesses should manage fraud risk and who within the organization is responsible for this task. 14
  • 15. www.complianceonline.com ©2015 Copyright  Learning Objectives:  Identify, assess and manage fraud risks from all sources and support fraud risk management initiatives by establishing an anti-fraud culture and promoting fraud awareness throughout the organization.  Be able to develop a system of internal controls to address the entity’s fraud risks and address and respond to any identified instances of fraud. 15
  • 16. www.complianceonline.com ©2015 Copyright  Becoming familiar with common fraud schemes and risks  Identify fraud scenarios and schemes that threaten the organization  Identify red flags and encourage ethical corporate culture  Building a strong anti-fraud policy  Promote fraud awareness to employees at all levels of the organization 16
  • 17. www.complianceonline.com ©2015 Copyright  Who Will Benefit:  Bank and financial institution auditors  Controllers and corporate managers  Forensic and management accountants, accounts payable and financial analysts  Governance, risk management and compliance officers  Internal and external auditors, CPAs and CAs  Certified fraud examiners and other anti-fraud professionals 17
  • 18. www.complianceonline.com ©2015 Copyright  Techniques used for fraud detection fall into two primary classes: statistical techniques and artificial intelligence.[3] Examples of statistical data analysis techniques are:  Data preprocessing techniques for detection, validation, error correction, and filling up of missing or incorrect data.  Calculation of various statistical parameters such as averages, quantiles, performance metrics, probability distributions, and so on. For example, the averages may include average length of call, average number of calls per month and average delays in bill payment. 18
  • 19. www.complianceonline.com ©2015 Copyright  Models and probability distributions of various business activities either in terms of various parameters or probability distributions.  Computing user profiles.  Time-series analysis of time-dependent data.  Clustering and classification to find patterns and associations among groups of data.  Matching algorithms to detect anomalies in the behavior of transactions or users as compared to previously known models and profiles. Techniques are also needed to eliminate false alarms, estimate risks, and predict future of current transactions or users. 19
  • 20. www.complianceonline.com ©2015 Copyright THANK YOU FOR YOUR ATTENTION 20 For more information on Live Webinars and any Other Training Requirements please email us webinarassist@complianceonline.com or Call us at this Toll Free Number: 1- 888-717-2436