1
UNITED KINGDOM UNITED STATES CANADA DUBAI AUSTRALIA NEW ZEALAND
Three simple steps to help stop fraud
Published by Wynyard U.S. for Jim Oakes, Wynyard Director of Financial Crime and ACFE
Regent Emeritus
STOP OCCUPATIONAL FRAUD
2
ABOUT WYNYARD
Wynyard Group is a market leader in risk management
and crime fighting software used in investigations
and intelligence operations by government agencies and
financial organisations. Wynyard solutions help solve and
prevent crime, defend against advanced persistent cyber
threats and counter terrorism. Wynyard’s powerful
software platform combines big data, advanced crime
analytics and tradecraft to identify persons of interest,
stop offenders and protect victims.
Wynyard has more than 120,000 users of its solutions
and offices in the United States, United Kingdom,
Canada, United Arab Emirates, Australia and New
Zealand. For more information visit
http://www.wynyardgroup.com
3
JIM OAKES SHARES HIS INSIGHTS ON INTERNAL FRAUD
Jim Oakes has been with Wynyard Group
since 2013 as the Director of Financial Crime.
A former Fraud Squad Detective, Jim is ACFE
Regent Emeritus, a Certified Fraud Examiner
and Certified Financial Crimes Investigator.
He is an invaluable industry expert and
advisor for Wynyard and brings over 30 years’
experience in Fraud, Security and Anti-Money
Laundering.
Jim has deep operational experience having
operated as Financial Crime Director with
some of the world’s largest banks in countries
across Europe, the Middle East, Africa, North
America, and Asia.
https://www.wynyardgroup.com/en/about/indu
stry-advisors/
4
INTERNAL FRAUD AND THREAT IS ON THE RISE
The number and frequency of internal
fraud incidents continues to rise,
according to Verizon’s 2014 Global
Data Breach Investigation Report .
The leading cause of insider threat is
staff members taking advantage of
their systems’ access privileges and
using their organizations’ corporate
LAN systems as attack vectors.
Crimes ARE being committed on
company premises.
5
INTERNAL FRAUD STAKES ARE HIGH
The consequences of internal fraud
are significant to organizations,
brands and Boards of Directors:
• Financial loss
• Reputational damage
• Losing customers’ trust
• Risk of increased regulation
• Civil and even criminal penalties
6
WHAT CAN COMPANIES DO TO COUNTER INSIDER THREATS?
Three simple steps can help alleviate
risk:
1. Be proactive in identifying and
addressing the problem
2. Strengthen employment policies
3. Employ data analytics tools to
quickly process and analyze large
volumes of data to identify events
and relationships of interest
7
STEP ONE - TACKLE THREAT FROM THE START
• Educate employees about fraud protection policies and
their responsibility to report suspicious behavior.
• Hold regular meetings to update staff on policies and the
law and reiterate watching for suspicious activities.
• Establish communications channels for those who want
to blow the whistle safely.
• Strict enforcement of password security is essential.
8
STEP TWO: STRENGTHEN EMPLOYMENT POLICIES
Strengthen pre-employment checks.
• Don’t rely on an element of trust
• Conduct effective background checks - don’t take job
applicants at their word
• Do not place a candidate who has “references pending”
into any position of trust without a background check
• Use agencies that guarantee they check references and
backgrounds and penalize them if they don’t
• Cross-reference applicants against your organization’s
internal records
9
STEP TWO: STRENGTHEN EMPLOYMENT POLICIES
Know your employees:
• Knowing and understanding your
employees is key to management’s
awareness of risk.
• Be cognizant of employees’
behavioral or personality changes.
Are employees requesting
emotional or financial help or taking
uncharacteristic actions?
10
STEP THREE: MITIGATE INSIDER RISK EARLY TO MINIMIZE
EXPOSURE
Early detection is the best form of defense.
• Detecting developing threats behind the firewall isn’t
easy.
• Quickly responding gives a much better chance to
prevent the compromise or loss of critical information.
• Early response gives valuable time to understand a
situation, stop the problem from spreading.
• Detecting insider misuse using traditional techniques can
take months or years but by then, the damage has been
done, and sometimes it’s irreparable.
• Analytics help detect suspicious user patterns, identify
and manage internal risk to quickly mitigate potential
threats.
11
RELATED NEWS AND LINKS
Insights into the world of an ex-fraudster
Local insurance fraud money-go-round has global impact
The evolution of crime analytics - Turning big data into smart data to help solve crime
Wynyard’s ACA software helps analysts to uncover hidden connections
CONTACT US TO REQUEST MORE INFORMATION ON ADVANCED ANALYTICS
SOLUTIONS TO ADDRESS INTERNAL FRAUD
12

More Related Content

PDF
The Small Business Cyber Security Best Practice Guide
PPTX
Fraud Detection With User Behavior Analytics
PDF
[Infographic] 5 Security Threats in Healthcare Industry
PDF
The July 2017 Cybersecurity Risk Landscape
PDF
Common Cybersecurity Mistakes
PDF
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
PPTX
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
PDF
7 cyber security questions for boards
The Small Business Cyber Security Best Practice Guide
Fraud Detection With User Behavior Analytics
[Infographic] 5 Security Threats in Healthcare Industry
The July 2017 Cybersecurity Risk Landscape
Common Cybersecurity Mistakes
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
7 cyber security questions for boards

What's hot (20)

PDF
Cyber Risks & Liabilities - Cyber Security for Small Businesses
PPT
Online Security Breach Compromises 77 Million Client Accounts
PPTX
Ransomware
PPSX
Board and Cyber Security
PDF
10 best cybersecurity companies in healthcare for 2021
PDF
Ri cyber-security-for-your-small-business
PDF
Implement Effective Cybersecurity Practices In 2021 With Top LA Prevention Re...
PPTX
Ransomware attack
PDF
MP_OneSheet_VulnThreat
PPTX
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
PDF
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
PPTX
Human Risk Management
PDF
Infographic: Stopping Attacks at the Identity Perimeter
PDF
Ransomware 2020 Report
PDF
Enemy from Within: Managing and Controlling Access
PPT
Ahearn Security Presentation
PDF
Simple Safe Steps to Cyber Security
PDF
Cyber Risk Management in the New Digitalisation Age - eSentinel™
PDF
5 Key Findings on Advanced Threats
PDF
Cybersecurity Toolkit
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Online Security Breach Compromises 77 Million Client Accounts
Ransomware
Board and Cyber Security
10 best cybersecurity companies in healthcare for 2021
Ri cyber-security-for-your-small-business
Implement Effective Cybersecurity Practices In 2021 With Top LA Prevention Re...
Ransomware attack
MP_OneSheet_VulnThreat
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
Human Risk Management
Infographic: Stopping Attacks at the Identity Perimeter
Ransomware 2020 Report
Enemy from Within: Managing and Controlling Access
Ahearn Security Presentation
Simple Safe Steps to Cyber Security
Cyber Risk Management in the New Digitalisation Age - eSentinel™
5 Key Findings on Advanced Threats
Cybersecurity Toolkit
Ad

Viewers also liked (15)

PPTX
How Next Gen Companies are saving millions using effective communication duri...
PPTX
OpenTransportNet Data Hubs: Stimulating Innovation with Open GI
PDF
Elevledda utvecklingssatmal vt 2016
PDF
Leveraging the-digital-future
PPTX
Reforma en ginebra
PPSX
Quality in the new delivery paradigm
PPTX
Mbe19 Macro G.5
PPSX
Innovation with Rapid Application Delivery
PDF
Building Cyber Resilience in the Digital Economy
PPT
PSC 2013 ATH
PPTX
BCM & IT Resilience in Aadhaar
PPTX
perfSONAR: getting telemetry on your network
PPTX
พฤติกรรมการผลิต
PPTX
The Science DMZ
PPTX
Machine learning use cases in finance
How Next Gen Companies are saving millions using effective communication duri...
OpenTransportNet Data Hubs: Stimulating Innovation with Open GI
Elevledda utvecklingssatmal vt 2016
Leveraging the-digital-future
Reforma en ginebra
Quality in the new delivery paradigm
Mbe19 Macro G.5
Innovation with Rapid Application Delivery
Building Cyber Resilience in the Digital Economy
PSC 2013 ATH
BCM & IT Resilience in Aadhaar
perfSONAR: getting telemetry on your network
พฤติกรรมการผลิต
The Science DMZ
Machine learning use cases in finance
Ad

Similar to Stop occupational fraud - Three simple steps to help stop fraud (20)

PDF
Setting Up and Managing an Anonymous Fraud Hotline
PDF
Insight2014 mitigate risk_fraud_6863
PPTX
Cyber Security - Things you need to know
PDF
Cybersecurity crisis management a prep guide
PPT
How-to-Respond-to-a-Data-Breach_-A-Comprehensive-Guide.ppt
PDF
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
PPTX
Cyber risk tips for boards and executive teams
PPTX
Fraud in the Public Sector
PDF
Netwealth educational webinar: Peace of mind in a digital world
PDF
Audit and Compliance BDR Knowledge Training
PDF
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
PPTX
What Small Business Can Do To Protect Themselves Now in Cybersecurity
PDF
Whistleblower presentation
PPTX
CCIAOR Cyber Security Forum
PDF
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
PPTX
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
PDF
Security Scare - Cybersecurity & What to Do About It!
PDF
Before the Breach: Using threat intelligence to stop attackers in their tracks
PPTX
Siskinds | Incident Response Plan
PDF
DWP Cybersecurity 101 for Nonprofits
Setting Up and Managing an Anonymous Fraud Hotline
Insight2014 mitigate risk_fraud_6863
Cyber Security - Things you need to know
Cybersecurity crisis management a prep guide
How-to-Respond-to-a-Data-Breach_-A-Comprehensive-Guide.ppt
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Cyber risk tips for boards and executive teams
Fraud in the Public Sector
Netwealth educational webinar: Peace of mind in a digital world
Audit and Compliance BDR Knowledge Training
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
What Small Business Can Do To Protect Themselves Now in Cybersecurity
Whistleblower presentation
CCIAOR Cyber Security Forum
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Security Scare - Cybersecurity & What to Do About It!
Before the Breach: Using threat intelligence to stop attackers in their tracks
Siskinds | Incident Response Plan
DWP Cybersecurity 101 for Nonprofits

More from Wynyard Group (8)

PPTX
Helping Australian agencies fight serious crime
PDF
Wynyard 2014-results-presentationpptx
PPTX
Slideshare Wynyard story in icons
PPTX
Wynyard Group -Technology modules
PPTX
Cyber risk trends in 2015
PPTX
Wynyard Group Annual General Meeting 2014
PPTX
Case Studies: An overview of Wynyard's solutions and how they are used worldwide
PDF
Felony Lane Gang Problem
Helping Australian agencies fight serious crime
Wynyard 2014-results-presentationpptx
Slideshare Wynyard story in icons
Wynyard Group -Technology modules
Cyber risk trends in 2015
Wynyard Group Annual General Meeting 2014
Case Studies: An overview of Wynyard's solutions and how they are used worldwide
Felony Lane Gang Problem

Recently uploaded (20)

PPTX
Phase1_final PPTuwhefoegfohwfoiehfoegg.pptx
PPTX
Lesson-01intheselfoflifeofthekennyrogersoftheunderstandoftheunderstanded
PPTX
Pilar Kemerdekaan dan Identi Bangsa.pptx
PPTX
Business_Capability_Map_Collection__pptx
PPTX
New ISO 27001_2022 standard and the changes
PPTX
Leprosy and NLEP programme community medicine
PPT
DU, AIS, Big Data and Data Analytics.ppt
PDF
Transcultural that can help you someday.
PPTX
sac 451hinhgsgshssjsjsjheegdggeegegdggddgeg.pptx
PPT
statistic analysis for study - data collection
DOCX
Factor Analysis Word Document Presentation
PPTX
QUANTUM_COMPUTING_AND_ITS_POTENTIAL_APPLICATIONS[2].pptx
PPTX
FMIS 108 and AISlaudon_mis17_ppt_ch11.pptx
PDF
OneRead_20250728_1808.pdfhdhddhshahwhwwjjaaja
PDF
Introduction to the R Programming Language
PDF
Systems Analysis and Design, 12th Edition by Scott Tilley Test Bank.pdf
PPTX
Copy of 16 Timeline & Flowchart Templates – HubSpot.pptx
PPTX
Managing Community Partner Relationships
PPTX
chrmotography.pptx food anaylysis techni
PDF
Data Engineering Interview Questions & Answers Batch Processing (Spark, Hadoo...
Phase1_final PPTuwhefoegfohwfoiehfoegg.pptx
Lesson-01intheselfoflifeofthekennyrogersoftheunderstandoftheunderstanded
Pilar Kemerdekaan dan Identi Bangsa.pptx
Business_Capability_Map_Collection__pptx
New ISO 27001_2022 standard and the changes
Leprosy and NLEP programme community medicine
DU, AIS, Big Data and Data Analytics.ppt
Transcultural that can help you someday.
sac 451hinhgsgshssjsjsjheegdggeegegdggddgeg.pptx
statistic analysis for study - data collection
Factor Analysis Word Document Presentation
QUANTUM_COMPUTING_AND_ITS_POTENTIAL_APPLICATIONS[2].pptx
FMIS 108 and AISlaudon_mis17_ppt_ch11.pptx
OneRead_20250728_1808.pdfhdhddhshahwhwwjjaaja
Introduction to the R Programming Language
Systems Analysis and Design, 12th Edition by Scott Tilley Test Bank.pdf
Copy of 16 Timeline & Flowchart Templates – HubSpot.pptx
Managing Community Partner Relationships
chrmotography.pptx food anaylysis techni
Data Engineering Interview Questions & Answers Batch Processing (Spark, Hadoo...

Stop occupational fraud - Three simple steps to help stop fraud

  • 1. 1 UNITED KINGDOM UNITED STATES CANADA DUBAI AUSTRALIA NEW ZEALAND Three simple steps to help stop fraud Published by Wynyard U.S. for Jim Oakes, Wynyard Director of Financial Crime and ACFE Regent Emeritus STOP OCCUPATIONAL FRAUD
  • 2. 2 ABOUT WYNYARD Wynyard Group is a market leader in risk management and crime fighting software used in investigations and intelligence operations by government agencies and financial organisations. Wynyard solutions help solve and prevent crime, defend against advanced persistent cyber threats and counter terrorism. Wynyard’s powerful software platform combines big data, advanced crime analytics and tradecraft to identify persons of interest, stop offenders and protect victims. Wynyard has more than 120,000 users of its solutions and offices in the United States, United Kingdom, Canada, United Arab Emirates, Australia and New Zealand. For more information visit http://www.wynyardgroup.com
  • 3. 3 JIM OAKES SHARES HIS INSIGHTS ON INTERNAL FRAUD Jim Oakes has been with Wynyard Group since 2013 as the Director of Financial Crime. A former Fraud Squad Detective, Jim is ACFE Regent Emeritus, a Certified Fraud Examiner and Certified Financial Crimes Investigator. He is an invaluable industry expert and advisor for Wynyard and brings over 30 years’ experience in Fraud, Security and Anti-Money Laundering. Jim has deep operational experience having operated as Financial Crime Director with some of the world’s largest banks in countries across Europe, the Middle East, Africa, North America, and Asia. https://www.wynyardgroup.com/en/about/indu stry-advisors/
  • 4. 4 INTERNAL FRAUD AND THREAT IS ON THE RISE The number and frequency of internal fraud incidents continues to rise, according to Verizon’s 2014 Global Data Breach Investigation Report . The leading cause of insider threat is staff members taking advantage of their systems’ access privileges and using their organizations’ corporate LAN systems as attack vectors. Crimes ARE being committed on company premises.
  • 5. 5 INTERNAL FRAUD STAKES ARE HIGH The consequences of internal fraud are significant to organizations, brands and Boards of Directors: • Financial loss • Reputational damage • Losing customers’ trust • Risk of increased regulation • Civil and even criminal penalties
  • 6. 6 WHAT CAN COMPANIES DO TO COUNTER INSIDER THREATS? Three simple steps can help alleviate risk: 1. Be proactive in identifying and addressing the problem 2. Strengthen employment policies 3. Employ data analytics tools to quickly process and analyze large volumes of data to identify events and relationships of interest
  • 7. 7 STEP ONE - TACKLE THREAT FROM THE START • Educate employees about fraud protection policies and their responsibility to report suspicious behavior. • Hold regular meetings to update staff on policies and the law and reiterate watching for suspicious activities. • Establish communications channels for those who want to blow the whistle safely. • Strict enforcement of password security is essential.
  • 8. 8 STEP TWO: STRENGTHEN EMPLOYMENT POLICIES Strengthen pre-employment checks. • Don’t rely on an element of trust • Conduct effective background checks - don’t take job applicants at their word • Do not place a candidate who has “references pending” into any position of trust without a background check • Use agencies that guarantee they check references and backgrounds and penalize them if they don’t • Cross-reference applicants against your organization’s internal records
  • 9. 9 STEP TWO: STRENGTHEN EMPLOYMENT POLICIES Know your employees: • Knowing and understanding your employees is key to management’s awareness of risk. • Be cognizant of employees’ behavioral or personality changes. Are employees requesting emotional or financial help or taking uncharacteristic actions?
  • 10. 10 STEP THREE: MITIGATE INSIDER RISK EARLY TO MINIMIZE EXPOSURE Early detection is the best form of defense. • Detecting developing threats behind the firewall isn’t easy. • Quickly responding gives a much better chance to prevent the compromise or loss of critical information. • Early response gives valuable time to understand a situation, stop the problem from spreading. • Detecting insider misuse using traditional techniques can take months or years but by then, the damage has been done, and sometimes it’s irreparable. • Analytics help detect suspicious user patterns, identify and manage internal risk to quickly mitigate potential threats.
  • 11. 11 RELATED NEWS AND LINKS Insights into the world of an ex-fraudster Local insurance fraud money-go-round has global impact The evolution of crime analytics - Turning big data into smart data to help solve crime Wynyard’s ACA software helps analysts to uncover hidden connections CONTACT US TO REQUEST MORE INFORMATION ON ADVANCED ANALYTICS SOLUTIONS TO ADDRESS INTERNAL FRAUD
  • 12. 12