Join us on October 3rd in Nashville, TN for the Institute of Internal Auditors (IIA) Nashville Chapter’s annual conference. This year’s topic is Fraud Risk Management.
Continue ReadingFraudCast – Bank Statement Review Automation
Bank statement review automation. Join us on this episode of FraudCast as we discuss this with Sam Bobley, CEO of Ocrolus. We answer questions such as: How can bank statement review be automated? What is OCR? What differentiates Ocrolus from traditional OCR solutions? What value does Ocrolus technology deliver? Who are Ocrolus’s customers? How does Ocrolus price its products? And much more. YouTube link: https://youtu.be/Qo_V_RvCEyE
Continue ReadingNew COSO Guidance
There is new guidance just released on fraud risk management for COSO principle 8 and the full COSO framework. [Excerpt from the ACFE Forum] We are excited to announce the publication of the new Fraud Risk Management Guide, a resource jointly sponsored by COSO and the ACFE. This guide is an update to the previously released ACFE/IIA/AICPA publication, Managing the Business Risk of Fraud, and is designed to build on both COSO principle 8 and the full COSO Internal Control–Integrated Framework as a foundation for a comprehensive fraud risk management program. The Executive Summary of the guide is attached to this post. We’ve also created a website (ACFE.com/fraudrisktools) that provides interactive tools and other resources… Read More
Continue ReadingFraudCast – FCPA Compliance and Translation Considerations
FCPA Compliance & Translation Considerations Join us on this episode of FraudCast as we discuss this with Jay Rosen, VP of Legal & Corporate Language Solutions at Merrill Brink International, a United Language Group company. We answer questions such as: Where do translation services fit into the non-English language investigation protocol? How do most organizations attempt to deal with non-English language data? How should a global organization with potential risk exposure go about finding and vetting a qualified Language Solutions Provider (LSP)? And much more. YouTube link: https://youtu.be/-HsfrDixGZ8 Also see: Call for Subject Matter Experts to become a guest speaker on FraudCast. Helpful Speaker Tips for step by step instructions on… Read More
Continue ReadingFraudCast – Interviewing in Fraud Matters
Join us on this episode of FraudCast as we discuss interviewing and interrogations in the fraud environment with Mark Anderson, Director of Training & Development of Anderson Investigative Associates LLC. We answer questions such as: How important are interviews in the digital age? What are areas of emphasis required in a fraud subject interview? How important is rapport? And much more. YouTube link: https://youtu.be/I_EvmU_V9ow Also see:Call for Subject Matter Experts to become a guest speaker on FraudCast.Helpful Speaker Tips for step by step instructions on the interview process.Join us on this episode of FraudCast as we discuss interviewing and interrogations in the fraud environment with Mark Anderson, Director of Training & Development of Anderson Investigative Associates LLC. We answer questions such as: How important are interviews in… Read More
Continue ReadingFraudCast – Auto Fraud
Join us on this episode of FraudCast as we discuss fraud in the automotive industry with Todd Wolf, Vehicle Theft Investigator of the California Highway Patrol. We answer questions such as: Why is auto fraud an issue? Who are the victims in auto fraud scams? What are some of the red flags for auto fraud? How can you protect yourself from auto fraud? And much more.
Continue ReadingFraud Risk Assessment
Specializing in antifraud for INSIDER THREAT & FRAUD MANAGEMENT. The first step in effective fraud management is the Fraud Risk Assessment. It provides much more than the inputs required for a risk-based annual audit plan. The results of the evaluation begin the process to allow for the determination of risk appetite, tolerance levels (+/- %), key risk indicators (KRIs), identification of anomalies, and the development of predefined management actions and communication strategy in response to exception reporting. Benefits of the fraud risk assessment include: Visibility into the organization’s fraud risk; Understanding of the risks by department and scheme; Prioritize antifraud efforts and allocate resources effectively by focusing on the risks… Read More
Continue ReadingFraudCast – ROI for Compliance
What is the ROI for compliance and fraud prevention programs? Join us on this episode of FraudCast as we discuss compliance and fraud prevention programs with Susan Walberg, Vice President & National Director of Compliance at Kohler Healthcare Inc. We answer questions such as: Why is the ROI for compliance and fraud prevention programs even a discussion? What keeps people from building a program? What are the costs and benefits? How can you keep the budget realistic given all of the risks? And much more. YouTube link: https://youtu.be/Q6V-WMvzaKc Also see: Call for Subject Matter Experts to become a guest speaker on FraudCast. Helpful Speaker Tips for step by step instructions on the interview process. Reputation… Read More
Continue ReadingTaxonomy of Fraud in Microfinance
Taxonomy of Fraud in Microfinance Background One of the challenges we face in the antifraud industry is the lack of congruity between various thought leaders in how we define fraud and its many schemes. Each industry group or academic expert added great value to the advancement of the antifraud field. However, while every new distinction created a little more clarity, they all seemed to be inputs into a larger equation of the dynamic nature of what we face on a daily basis. In an effort to create a standardized fraud classification system that would apply across all fraud schemes, the Framework for a Taxonomy of Fraud was published by the… Read More
Continue ReadingFraudCast – Cloud Computing
The other day I was at a client site assisting them with building their global antifraud program. While there, I realized they did not have a process for back-up related to employees who travelled. They had a robust system-level process for backing up desktops and laptops while they were actively connected to their network. However, there was no process in place (manual or otherwise) to back-up the data on employee’s laptops when they were travelling and thus not connected to the organization’s network. Many of the thousands of people who travelled would be in the field (yes, sometimes an actual field near a tiny village in the jungle) for weeks… Read More
Continue Reading