SlideShare a Scribd company logo
Presented by:
                           William H. Brown, CPA, CFFA, CFE




GAIN CONTROL
How Secure is your Business?
Fraud Risk Analysis and Security Management




GAIN CONTROL                                  www.berrydunn.com
                                              www.berrydunn.com
What is the problem?
Some statistics…..
                  From the “Report to the Nations on
                Occupational Fraud and Abuse – 2010
                Global Fraud Study”, published by the
               Association for Certified Fraud Examiners


5.0%                                                       $231,000
                              37.8%

30.8%                                                      $155,000




GAIN CONTROL
How is Fraud Detected?




GAIN CONTROL
Where do Tips Come From?




GAIN CONTROL
What Controls are Used?




GAIN CONTROL
Disturbing Statistic




GAIN CONTROL
Objective


   Provide you with information to help you
   manage the business risks of loss due to
   fraud and inadequate IT security….
       …..not to prevent, detect and prosecute all
   instances of fraud and stamp out all evil
   regardless of the cost



GAIN CONTROL
What Can I Tell You….
     That Will Help?

• Overview of Fraud

• Fraud Risk Analysis

• IT Security Management



GAIN CONTROL
What is Fraud?

• U.S. Alleges Poker Site Stacked Deck
    - Wall Street Journal September 21, 2011
    -
• Focus on Goldman Ex-Director
   - Wall Street Journal September 21, 2011


• Maine Man Facing Charges of Securities
  Fraud
   - Portland Press Herald February 18, 2011

GAIN CONTROL
What is Fraud?


• Financial statement fraud

• Asset misappropriation

• Corruption



GAIN CONTROL
Loss Prevention


• Fraud prevention

• Fraud monitoring

• Fraud detection

• Security

GAIN CONTROL
Fraud Risk Analysis


• Internal control review

• Fraud risk checkup

• Fraud risk assessment



GAIN CONTROL
Fraud Prevention Checkup


               Is it time to see a professional?




GAIN CONTROL
Key Areas of Checkup


•   Fraud risk oversight and ownership
•   Fraud risk assessment
•   Risk tolerance/policy
•   Controls
    – Process level
    – Environment level
• Proactive detection

GAIN CONTROL
Fraud Risk Assessment


          Series of questions to help an
        organization identify risk areas and
              respond to those risks




GAIN CONTROL
Results of Assessment


• Results should allow the organization to:
    – Identify potential inherent fraud risks
    – Assess likelihood and significance of occurrence
    – Evaluate people and departments most likely to
      commit fraud
    – Identify and map preventative and detective
      controls


GAIN CONTROL
Results of Assessment


• Results should allow the organization to:
    – Evaluate whether identified controls are working
    – Identify fraud risks resulting from lack of
      control/ineffective controls
    – Develop response




GAIN CONTROL
Typical Assessment Areas


•   Employees
•   Physical controls
•   Cash
•   Purchasing and billing
•   Proprietary information/intellectual property
•   Corruption


GAIN CONTROL
Employee Assessment


• Are employees afraid to deliver bad news
  to management?
• Are employees required to take annual
  vacations?
• Are the duties related to authorization,
  custody of assets, and recording or reporting
  of transactions segregated?

GAIN CONTROL
Physical Control
  Assessment

• Does the organization conduct pre-employment
  background checks to identify previous dishonest
  or unethical behavior?
• Does the organization provide an anonymous way
  to report suspected violations of the ethics and
  anti-fraud policies?
• Does the organization restrict access to computer
  systems with sensitive documents?


GAIN CONTROL
Cash Receipts Assessment


• Does a person independent of the cash receipts and
  accounts receivable functions compare entries to the cash
  receipts journals with the bank deposit slips and bank
  deposit statements?
• Is an independent listing of cash receipts prepared
  before the receipts are submitted to the cashier or accounts
  receivable bookkeeper?
• Is job or assignment rotation mandatory for employees
  who handle cash receipts and accounting duties?



GAIN CONTROL
Purchasing Assessment


• Is the master vendor file periodically reviewed for
  unusual vendors and addresses?
• Are control methods in place to check for
  duplicate invoices and purchase order numbers?
• Do write-offs of accounts payable debit balances
  require approval of a designated manager?




GAIN CONTROL
Proprietary Info Assessment


• Are employees required to use screensaver and/or server
  passwords to protect unattended computer systems?
• Are employees who have access to proprietary information
  required to sign noncompete agreements to prevent them
  from working for competitors within a stated period of time
  and location?
• Are there policies and procedures addressing the
  identification, classification, and handling of proprietary
  information?



GAIN CONTROL
Corruption Assessment


• Is there a company policy that addresses the
  receipt of gifts, discounts, and services
  offered by a supplier or customer?
• Are contracts awarded based on
  predetermined criteria?
• Are purchasing account assignments
  rotated?

GAIN CONTROL
Information Technology
  Security Management

• Security assessment

• Purchasing

• Fraud prevention suggestions



GAIN CONTROL
IT Security Assessment


• Typical assessment includes following areas:
    – Organization/Management of IT
    – Computer/Network Hardware
    – Computer/Network Software
    – Network Security Controls
    – IT Security and Administration
    – Backup and System Recovery


GAIN CONTROL
IT Security Assessment


• Includes review of documentation,
  observation and interviews.
• Incorporates best practices guidelines
• Risk ratings
• Recommendations



GAIN CONTROL
IT Security Assessment


• Examples of specific areas:
    – Secure media disposal
    – Patch management
    – Network design
    – Backup procedures
    – Mobile devices



GAIN CONTROL
IT Fraud Prevention Tools



    Utilize reporting and monitoring systems
                  already in place




GAIN CONTROL
Using IT Controls Effectively


• Assign individual employees their own
  system IDs.
    – Disable usage of generic administrative IDs
    – Change administrative passwords every 60 days
    – Lock down system IDs
    – ENFORCE!



GAIN CONTROL
Using IT Controls Effectively


• Ensure access to financial accounting
  systems is compartmentalized, i.e.:
    – Users have no way to access the financial
      database
    – IT cannot affect non-technology reconciliation
      process
    – Limit access to master vendor and customer files


GAIN CONTROL
Flags and Symptoms


• Missing checks, expense reports, registers
• Multiple & ongoing errors in accounting
  system that are unexplained
• Access to the accounting system at odd
  hours and/or in an unusual way




GAIN CONTROL
IT Purchasing Considerations


• Software
    – Be aware of privacy and confidentiality issues,
      laws and regulations
    – What is vendor’s stated commitment in contract
      for remediation time after patches released by
      operating system companies
    – What is stated remediation time for security
      flaws?

GAIN CONTROL
IT Purchasing Considerations


• Outsourced services
    – Does contract ensure secure processes?
    – For credit card payments – PCI compliant?
    – Website management – CONFIDENTIALITY
      AND PRIVACY




GAIN CONTROL
Remember


• Fraud loss prevention includes preventative
  measures, monitoring activities and detection.
• Assessments provide a starting point for
  identifying and addressing the risk.
• Controls are only useful when they are
  implemented and enforced



GAIN CONTROL
Thanks for Attending




                 Have a Pleasant Afternoon!
      photo from near the Yurt at top of Pleasant Mountain – Shawnee Peak
                           Sunset on August 20, 2011

GAIN CONTROL
Contact Information


                      Bill Brown
               bbrown@berrydunn.com
                    207-541-2208

                    Eigen Heald
               eheald@berrydunn.com
                   207-541-2311
GAIN CONTROL

More Related Content

PPTX
CM Introduction 081414
PPT
Project_Paper_Presentation_ISSC471_Intindolo
PDF
Get Ready for Syncsort's New Best-of-Breed Security Solution
PPTX
When Internal Controls Fail - Baker Tilly
PDF
Separation strategy presentation
PDF
Accelerating Enhanced Threat Identification and Incident Investigation
PPTX
Horizon 2013 P2P Re-imagined: No User Pain, but Real Compliance Gains, A Cas...
PPTX
Finanzprodukt Emittenten im Netz: Social Media und Online Marketing
CM Introduction 081414
Project_Paper_Presentation_ISSC471_Intindolo
Get Ready for Syncsort's New Best-of-Breed Security Solution
When Internal Controls Fail - Baker Tilly
Separation strategy presentation
Accelerating Enhanced Threat Identification and Incident Investigation
Horizon 2013 P2P Re-imagined: No User Pain, but Real Compliance Gains, A Cas...
Finanzprodukt Emittenten im Netz: Social Media und Online Marketing

Viewers also liked (20)

PPTX
Finanzprodukte und Vermögensverwaltung 2.0 Strukiforum 24.10.13
PPTX
What is fintech and disruptive finance introduction for vietnam yes event
PPT
Remittance to india
PPTX
Inland Remittances of Pakistan
PPTX
Iso27001 The Road To Certification
PDF
PDF
Singapore Fintech Startups Best of Social Media and Blogs
PDF
Information security management system (isms) overview
PDF
digital strategy & e-reputation
PDF
Mapa mental iso 27002
PDF
Philippines Fintech Startup Report
PDF
Corporate compliance
PPS
ISO 27001 2013 isms final overview
PDF
COM CM 726 @ Boston University: Digital Strategy Building
PDF
Internet of Things, Innovation and India by Syam Madanapalli
PDF
Effective Internal Controls by @EricPesik
PPTX
All you wanted to know about iso 27000
PPTX
ISO 27001 - Information security user awareness training presentation - part 3
PPTX
Compliance ppt
PDF
Internal Control
Finanzprodukte und Vermögensverwaltung 2.0 Strukiforum 24.10.13
What is fintech and disruptive finance introduction for vietnam yes event
Remittance to india
Inland Remittances of Pakistan
Iso27001 The Road To Certification
Singapore Fintech Startups Best of Social Media and Blogs
Information security management system (isms) overview
digital strategy & e-reputation
Mapa mental iso 27002
Philippines Fintech Startup Report
Corporate compliance
ISO 27001 2013 isms final overview
COM CM 726 @ Boston University: Digital Strategy Building
Internet of Things, Innovation and India by Syam Madanapalli
Effective Internal Controls by @EricPesik
All you wanted to know about iso 27000
ISO 27001 - Information security user awareness training presentation - part 3
Compliance ppt
Internal Control
Ad

Similar to How Secure is your Business? Fraud Risk Analysis and Security Management (20)

PDF
Designing Effective Financial Controls - Leveraging the Internal Control Fram...
PPTX
2012 protecting your business
PPTX
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
PPT
Fraud Awareness For Managers
PPT
Accounting manual for Chamber of Commerce
PPT
Ais Romney 2006 Slides 06 Control And Ais
PPT
Ais Romney 2006 Slides 06 Control And Ais Part 1
PPT
Ais Romney 2006 Slides 06 Control And Ais
PPT
Ais Romney 2006 Slides 06 Control And Ais Part 1
DOCX
Anti-Fraud 1Anti-Fraud PreventionName.docx
PPT
Binary Scam Watch Monitor | Restriction Of Online Scam
PPTX
Internal Control And Fraud 11-19-10
PPTX
3. financial controllership
DOC
Internal control.. control env
PPT
Fraud And Internal Controls Linked In April 2011
PDF
Insight2014 mitigate risk_fraud_6863
PPTX
A Lack of IT Controls= Fraud Opportunities
PPTX
The Importance of Internal Controls in Fraud Prevention
 
PPT
Fraud In Our Midst, The Acfe 2010
PPT
Fraud In Our Midst, The Acfe 2010
Designing Effective Financial Controls - Leveraging the Internal Control Fram...
2012 protecting your business
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Fraud Awareness For Managers
Accounting manual for Chamber of Commerce
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais Part 1
Anti-Fraud 1Anti-Fraud PreventionName.docx
Binary Scam Watch Monitor | Restriction Of Online Scam
Internal Control And Fraud 11-19-10
3. financial controllership
Internal control.. control env
Fraud And Internal Controls Linked In April 2011
Insight2014 mitigate risk_fraud_6863
A Lack of IT Controls= Fraud Opportunities
The Importance of Internal Controls in Fraud Prevention
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010
Ad

How Secure is your Business? Fraud Risk Analysis and Security Management

  • 1. Presented by: William H. Brown, CPA, CFFA, CFE GAIN CONTROL How Secure is your Business? Fraud Risk Analysis and Security Management GAIN CONTROL www.berrydunn.com www.berrydunn.com
  • 2. What is the problem? Some statistics….. From the “Report to the Nations on Occupational Fraud and Abuse – 2010 Global Fraud Study”, published by the Association for Certified Fraud Examiners 5.0% $231,000 37.8% 30.8% $155,000 GAIN CONTROL
  • 3. How is Fraud Detected? GAIN CONTROL
  • 4. Where do Tips Come From? GAIN CONTROL
  • 5. What Controls are Used? GAIN CONTROL
  • 7. Objective Provide you with information to help you manage the business risks of loss due to fraud and inadequate IT security…. …..not to prevent, detect and prosecute all instances of fraud and stamp out all evil regardless of the cost GAIN CONTROL
  • 8. What Can I Tell You…. That Will Help? • Overview of Fraud • Fraud Risk Analysis • IT Security Management GAIN CONTROL
  • 9. What is Fraud? • U.S. Alleges Poker Site Stacked Deck - Wall Street Journal September 21, 2011 - • Focus on Goldman Ex-Director - Wall Street Journal September 21, 2011 • Maine Man Facing Charges of Securities Fraud - Portland Press Herald February 18, 2011 GAIN CONTROL
  • 10. What is Fraud? • Financial statement fraud • Asset misappropriation • Corruption GAIN CONTROL
  • 11. Loss Prevention • Fraud prevention • Fraud monitoring • Fraud detection • Security GAIN CONTROL
  • 12. Fraud Risk Analysis • Internal control review • Fraud risk checkup • Fraud risk assessment GAIN CONTROL
  • 13. Fraud Prevention Checkup Is it time to see a professional? GAIN CONTROL
  • 14. Key Areas of Checkup • Fraud risk oversight and ownership • Fraud risk assessment • Risk tolerance/policy • Controls – Process level – Environment level • Proactive detection GAIN CONTROL
  • 15. Fraud Risk Assessment Series of questions to help an organization identify risk areas and respond to those risks GAIN CONTROL
  • 16. Results of Assessment • Results should allow the organization to: – Identify potential inherent fraud risks – Assess likelihood and significance of occurrence – Evaluate people and departments most likely to commit fraud – Identify and map preventative and detective controls GAIN CONTROL
  • 17. Results of Assessment • Results should allow the organization to: – Evaluate whether identified controls are working – Identify fraud risks resulting from lack of control/ineffective controls – Develop response GAIN CONTROL
  • 18. Typical Assessment Areas • Employees • Physical controls • Cash • Purchasing and billing • Proprietary information/intellectual property • Corruption GAIN CONTROL
  • 19. Employee Assessment • Are employees afraid to deliver bad news to management? • Are employees required to take annual vacations? • Are the duties related to authorization, custody of assets, and recording or reporting of transactions segregated? GAIN CONTROL
  • 20. Physical Control Assessment • Does the organization conduct pre-employment background checks to identify previous dishonest or unethical behavior? • Does the organization provide an anonymous way to report suspected violations of the ethics and anti-fraud policies? • Does the organization restrict access to computer systems with sensitive documents? GAIN CONTROL
  • 21. Cash Receipts Assessment • Does a person independent of the cash receipts and accounts receivable functions compare entries to the cash receipts journals with the bank deposit slips and bank deposit statements? • Is an independent listing of cash receipts prepared before the receipts are submitted to the cashier or accounts receivable bookkeeper? • Is job or assignment rotation mandatory for employees who handle cash receipts and accounting duties? GAIN CONTROL
  • 22. Purchasing Assessment • Is the master vendor file periodically reviewed for unusual vendors and addresses? • Are control methods in place to check for duplicate invoices and purchase order numbers? • Do write-offs of accounts payable debit balances require approval of a designated manager? GAIN CONTROL
  • 23. Proprietary Info Assessment • Are employees required to use screensaver and/or server passwords to protect unattended computer systems? • Are employees who have access to proprietary information required to sign noncompete agreements to prevent them from working for competitors within a stated period of time and location? • Are there policies and procedures addressing the identification, classification, and handling of proprietary information? GAIN CONTROL
  • 24. Corruption Assessment • Is there a company policy that addresses the receipt of gifts, discounts, and services offered by a supplier or customer? • Are contracts awarded based on predetermined criteria? • Are purchasing account assignments rotated? GAIN CONTROL
  • 25. Information Technology Security Management • Security assessment • Purchasing • Fraud prevention suggestions GAIN CONTROL
  • 26. IT Security Assessment • Typical assessment includes following areas: – Organization/Management of IT – Computer/Network Hardware – Computer/Network Software – Network Security Controls – IT Security and Administration – Backup and System Recovery GAIN CONTROL
  • 27. IT Security Assessment • Includes review of documentation, observation and interviews. • Incorporates best practices guidelines • Risk ratings • Recommendations GAIN CONTROL
  • 28. IT Security Assessment • Examples of specific areas: – Secure media disposal – Patch management – Network design – Backup procedures – Mobile devices GAIN CONTROL
  • 29. IT Fraud Prevention Tools Utilize reporting and monitoring systems already in place GAIN CONTROL
  • 30. Using IT Controls Effectively • Assign individual employees their own system IDs. – Disable usage of generic administrative IDs – Change administrative passwords every 60 days – Lock down system IDs – ENFORCE! GAIN CONTROL
  • 31. Using IT Controls Effectively • Ensure access to financial accounting systems is compartmentalized, i.e.: – Users have no way to access the financial database – IT cannot affect non-technology reconciliation process – Limit access to master vendor and customer files GAIN CONTROL
  • 32. Flags and Symptoms • Missing checks, expense reports, registers • Multiple & ongoing errors in accounting system that are unexplained • Access to the accounting system at odd hours and/or in an unusual way GAIN CONTROL
  • 33. IT Purchasing Considerations • Software – Be aware of privacy and confidentiality issues, laws and regulations – What is vendor’s stated commitment in contract for remediation time after patches released by operating system companies – What is stated remediation time for security flaws? GAIN CONTROL
  • 34. IT Purchasing Considerations • Outsourced services – Does contract ensure secure processes? – For credit card payments – PCI compliant? – Website management – CONFIDENTIALITY AND PRIVACY GAIN CONTROL
  • 35. Remember • Fraud loss prevention includes preventative measures, monitoring activities and detection. • Assessments provide a starting point for identifying and addressing the risk. • Controls are only useful when they are implemented and enforced GAIN CONTROL
  • 36. Thanks for Attending Have a Pleasant Afternoon! photo from near the Yurt at top of Pleasant Mountain – Shawnee Peak Sunset on August 20, 2011 GAIN CONTROL
  • 37. Contact Information Bill Brown bbrown@berrydunn.com 207-541-2208 Eigen Heald eheald@berrydunn.com 207-541-2311 GAIN CONTROL