Fighting Fraud Through False Positives

2y ago
25 Views
3 Downloads
901.36 KB
18 Pages
Last View : 13d ago
Last Download : 3m ago
Upload by : Josiah Pursley
Transcription

Fighting Fraud through False Positives:a new approach to combatting insider threatDavid Pollino2017

Introduction Occupational fraud involves an employee that defrauds the business they work for. Occupational fraud is not a new threat. It is a universal problem for all types of business that can be difficult todetect due to advances in technology and it’s impact to business environments. Understanding the different vulnerabilities and planning is key to reducing the risk of exposure. A common sense approach that utilizes proactive monitoring, internal audit, and TIP hotlines can be aneffective first step to deter occupational fraud.Fraud is ubiquitous; it does not discriminate in its occurrence.And while anti-fraud controls can effectively reduce thelikelihood and potential impact of fraud, the truth is that noentity is immune to this threat.Source: ACFE – Report to the Nations on Occupational Fraud and Abuse: 2014 Global Fraud Study2

Internal Threats: Rising Security RiskBank Tellers, With Access to Accounts, Pose a Rising Security RiskBy STEPHANIE CLIFFORD and JESSICA SILVER-GREENBERG FEB 1, 2016“Bank robbers used to burst into banks brandishing guns and bearing notes demanding cash to the teller behindthe window. Today, the thieves may be on the other side of the counter.”“Though much of the focus on bank fraud has beenon sophisticated hackers, it is the more prosaicfigure of the teller behind the window who shouldworry depositors, according to prosecutors,government officials and security experts.”“Under laws passed in the aftermath of the Sept. 11attacks, banks are required to thoroughly vet theircustomers and closely monitor accounts to detectany suspicious activity. The same level of scrutinydoes not always apply to the tellers, according toprosecutors. Sometimes, little more than a basiccriminal-background check is performed.”3

Insider Cyber ThreatInsiders Still Top Breach Threat: Experian’s Michael Bruemmer Offers 2016 Breach Forecast “Whether it’s a true malicious insider, or just employee negligence, 80 percent of the breaches we’ve workedso far in 2015 have been [caused by] employees”Source: Information Security Media Group, CorpBe Prepared “Organizations should consider creating an insider cyber threat program, led by a senior manager. This programwould ensure that policies, resources and oversight are in place to assess and implement company controlsthat specifically deter, detect and mitigate the risk from employees, contractors and business partners.”Source: Steven Chabinsky, Security Magazine 2015 Cyber Fraud Statistics44% of adults online have been victims of cyber crimes in the last year.68% of losses from cyber crime are 10,000 or moreOf 7,818 businesses surveyed 67% had detected at least one cyber crimeSource: cybercrimestatistics.com4

The Fraud Triangle Three components which together, lead to internal fraudulent behavior The component we have the most control over is Opportunity The best way to eliminate “perceived opportunity” is through Detection and MonitoringRationalization - Real or Perceived:Motivation or pressure to commit the crimecan be financial or non financial:Vast majority (95%) are first-time offenders with nocriminal past, view themselves as “honest peoplecaught between a rock and hard spot temporarily;not as a criminal Personal I am only borrowing the money, I’llreturn it next week I had no choice, I have to pay the doctorbill My employer owes me for all the extrahard workInability to pay one’s billsIncrease sales or other productivity targetsDrug or gambling addictionsStatus symbol drivenA frame of mind or ethical character that allowsemployees to intentionally misappropriate cashor assets and justify their dishonest actionsOpportunityPossible when employees have access to assets and information that allow them to commit and conceal fraud A belief that their activities will not be detectedThere must be a way for the person to use or abuse their position of trustPreferred approach is “low and slow” where detection is delayed and more damage can be doneOpportunity is created by weak internal controls, poor oversight and/or through use of ones position and authority5

Accidental Fraudster vs Career CriminalAccidental Fraudsters Law-biding individual who never thought of committing fraud, breakserious law and harm people Usually first time offender and the reason they commit fraud is because ofnon-sharable problem that can only be solved with money THE FRAUD DIAMONDThe AccidentalFraudsterRationalize actions aligned with opportunityPredators Often start out as an accidental fraudsterOpportunity Look for target organization where they can commit crimeOpportunity Harder to detect because their fraud schemes are usually better organizedSource: Chegg, Forensic Accounting and Fraud Examination study aidsThe PredatorSource: ACFE, Bill Blend, MSL6

Initial Detection of Occupation FraudSource: ACFE – Report to the Nations on Occupational Fraud and Abuse: 2014 Global Fraud Study7

Anatomy of Employee Theft 75% of employees steal from the work placeEmployee theft costs U.S. companies between 20 to 40 billion a year64% of businesses have been victims of employee theft84% of business do not report employee theft to investigators40.9% of inventory shrinkage is a resultThefts Money makes up 40% of business thefts ranging from 5 - 2 million18% of thefts compromised of product sold by the business6% of employee thefts involved equipmentOffice supplies make up the restWho 60% General or first-line employees20%: Managers / Executives18%: Accountants / Bookkeepers / Receptionists / Secretaries2% Cashiers / Cash handlersStatisticsSource: raphics/anatomy-of-employee-theft8

Behavioral Red FlagsOccupational fraudsters exhibit certain behavioral traits or characteristics while committing crimes. In 92% of the cases analyzed bythe Association of Certified Fraud Examiners (ACFE), the fraudster displayed at least one of these red flags, and in 64% of cases,multiple red flags were observed before the fraud was detected.Other Common Red Flags: Unusually close associationwith a vendor or customer(22%) Displaying control issues oran unwillingness to shareduties (21%) General “wheeler-dealer”attitude involving shrewd orunscrupulous behavior(18%) Recent divorce or familyproblems (17%).Source: http://www.acfe.com/rttn-red-flags.aspx9

Insider Cyber ThreatInsiders Still Top Breach Threat: Experian’s Michael Bruemmer Offers 2016 Breach Forecast “Whether it’s a true malicious insider, or just employee negligence, 80 percent of the breaches we’ve workedso far in 2015 have been [caused by] employees”Source: Information Security Media Group, CorpBe Prepared “Organizations should consider creating an insider cyber threat program, led by a senior manager. This programwould ensure that policies, resources and oversight are in place to assess and implement company controlsthat specifically deter, detect and mitigate the risk from employees, contractors and business partners.”Source: Steven Chabinsky, Security Magazine 2015 Cyber Fraud Statistics44% of adults online have been victims of cyber crimes in the last year.68% of losses from cyber crime are 10,000 or moreOf 7,818 businesses surveyed 67% had detected at least one cyber crimeSource: cybercrimestatistics.com10

Be Purposefully NoisyAs appropriate, internal fraud alerts are routed to employees and managers for the purpose of: Gathering additional information for investigators Reinforcing the awareness of suspicious activity monitoringIrregular Activity Clarification ProcessInternal Fraud AlertsAlert investigatorevaluates alert Alert is eitheracquitted,escalated, or theIrregular ActivityClarificationProcess istriggeredNotificationEngine createsemailnotifications Employeenotified ofirregular activitydetected; Askedto clarifyEmployeeprovidesclarification foractivity Employeeprovidesclarification/justification forirregular activityManager isprovidednotificationupdates Managerinformed of theclarificationprovidedManagerrequests furtherInvestigation Manager canconfirm that theactivity issuspicious andrequest furtherinvestigationAlert Investigatorreviews updatesand escalates asneededCaseManagementWorkflow ManagerCC’d11

Internal Threat Deterrence: Communications & ControlsCOMMUNICATIONSStandards and PoliciesOrganizational CultureTraining and TestingTipline / Ethics hotline Ethical Conduct Policy “No Jerks Rule” Onboarding Training Phone Email Web Standard Operating Procedures Management Tone Manager Kits Employment Contracts Word of Mouth Privacy Policy Signage Risk Assessmentsand Testing Feedback Loop /Continuous ionalControlsPhysicalSecurityControls Background Checks Segregation of Duties Building Access Network Access Reference Checks Equipment Access Logical Access Social Media Searches Transactional ParametersScreening Early Warning -InternalFraud Prevention Service Equipment/PropertyPasses System Access Employee Self-DealingMonitoring Guards Error Resolution Process Application Access Cameras Quality Control Process Computer activity monitoring Inventory handing andtracking Web Monitoring Reconciliation Process Accounts Payable FraudAnalysisInformationSecurityControls Permissions/Accessibility Data Loss Prevention Internal Audits Surprise Audits Customer Returns12

Insider Threat Mitigation Best Practices Consider threats from insiders and business partners in enterprise-wide risk assessments. Clearly document and consistently enforce policies and controls. Incorporate insider threat awareness into periodic security training for all employees. Beginning with the hiring process, monitor and respond to suspicious or disruptive behavior. Anticipate and manage negative issues in the work environment. Know your assets Implement strict password and account management policies and practices Enforce separation of duties and least privilege Define explicit security agreements for any cloud services, especially access restrictions and monitoring capabilities. Institute stringent access controls and monitoring policies on privileged users Institutionalize system change controls Use a log correlation engine or security information and event management(SEIM) system to log, monitor, and audit employee actions Monitor and control remote access from all end points, including mobile devices Develop a comprehensive employee termination process Implement secure backup and recovery processes Develop a formalized insider threat program Establish a baseline of normal network device behavior Be especially vigilant regarding social media Close the doors to unauthorized data exfiltrationSource: “Common Sense Guide to Mitigating Insider Threats, 4th Edition” CERT 13

Appendix14

Fraud Tree – ClassificationSource: ACFE – Report to the Nations on Occupational Fraud and Abuse: 2014 Global Fraud Study15

Fraud Tree – ClassificationSource: ACFE – Report to the Nations on Occupational Fraud and Abuse: 2014 Global Fraud Study16

Losses & FrequencyOccupational Fraudsby Category4.8%Financial Statement 86.3%Asset 60.0%80.0%100.0%54.4%51.9%50.0%Distribution % 12.8% 11.8%10.0%20126.9%5.7% 6.6%2.9% 3.5% 3.4%2.0% 1.9% 1.8%0.0%Less than 200,000 200,000 399,999 400,000 599,999 600,000 799,999 800,000 999,999 1,000,000and upSource: ACFE – Report to the Nations on Occupational Fraud and Abuse: 2014 Global Fraud Study17

T H A N K YO UBank of the WestDavid Pollino13505 California St.Omaha, NE 68154David.Pollino@bankofthewest.com

effective first step to deter occupational fraud. Source: ACFE – 2Report to the Nations on Occupational Fraud and Abuse: 2014 Global Fraud Study Fraud is ubiquitous; it does not discriminate in its occurrence. And while anti-fraud controls can effectively reduce the likelihood and potenti

Related Documents:

Manufacturer Game Name Year Comments A-One Korea A-One Korean monitor 26” Monitor CAGS TRUE FALSE FALSE FALSE FALSE ADP TAIFUN Air Hockey TRUE FALSE FALSE FALSE FALSE Advance OS3000 Oscilloscope TRUE TRUE FALSE FALSE TRUE ALCA FLYING CIRCUS Arcade TRUE FALSE FALSE FALSE FALSE Algo Algo Color Monitor TRUE TRUE FALSE FALSE FALSE

Types of economic crime/fraud experienced Customer fraud was introduced as a category for the first time in our 2018 survey. It refers to fraud committed by the end-user and comprises economic crimes such as mortgage fraud, credit card fraud, claims fraud, cheque fraud, ID fraud and similar fraud types. Source: PwC analysis 2

Types of economic crime/fraud experienced Customer fraud was introduced as a category for the first time in our 2018 survey. It refers to fraud committed by the end-user and comprises economic crimes such as mortgage fraud, credit card fraud, claims fraud, cheque fraud, ID fraud and similar fraud types. Source: PwC analysis 2

Card Fraud 11 Unauthorised debit, credit and other payment card fraud 12 Remote purchase (Card-not-present) fraud 15 Counterfeit Card Fraud 17 Lost and Stolen Card Fraud 18 Card ID theft 20 Card not-received fraud 22 Internet/e-commerce card fraud los

screening false positives, a 40% reduction while the transaction monitoring false positives, and a 5% increase in true positives through AI-enhanced data analytics techniques. In another case, a bank reported double-digit efficiency gains in . serves to enhance existing AML monitoring programmes. However, persistent issues related to data .

Fraud by any other name is still fraud “Relatively few occupational fraud and abuse offenses are discovered through routine audits. Most Fraud is uncovered as a result of tips and complaints from other employees.” Association of Fraud

Detection of Fraud Schemes Fraud is much more likely to be detected by tips than by any other method. 2012 Association of Certified Fraud Examiners, Inc. 26 Detection of Occupational Frauds 2012 Association of Certified Fraud Examiners, Inc. 27 Why Employees Do Not Report Fraud According to a Business Ethics Study (Association of Certified Fraud Examiners), employees do not .

Calligraphy, Manuscript Gilding and Related Courses - Spring/Summer 2016 (page 4) 781.740.9000 www.theabbeystudio.com Ten Accord Pond Drive, Hingham, MA 02043 Class/ Location Description Date/Time Price Instructor Registration is now open for our 2016 Classroom Abroad Trip to Cambridge & London, UK and the South of France October 1 - October 12, 2016 For details visit the ‘trips’ link at .