Seven Steps to Creating a Data-Analysis Program to Prevent Fraud - Slide 2

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Know What's Around the Corner-2 Next

Know What's Around the Corner

Fraud risks should be developed as part of an overall risk assessment. You're not likely to make friends throughout the organization by conducting this on your own. If you think it's high time to look into the fraud potential of purchasing cards, it's probably a good idea to include the p-card manager in the discussions. That way it's a joint effort that will benefit both parties and hopefully result in a more continuous approach to fraud risks in that area.

Which risks to look at?

  • With data analysis, you can identify and monitor business risks to ensure you are auditing today's risks, not yesterday's. Consider these:
  • Revenue by location, division or product line
  • Revenue backlogs-by value and age
  • Personnel changes in key positions (legal, controller, R&D)
  • Volume of manual JEs or credit notes
  • Aging A/R balances or Inventory levels
  • Vendor management (# vendors, volume of transactions)
  • PCard vs. PO procurement
  • Average days for customer payment

If anyone was looking for an example of the benefits that continuous controls can bring to an enterprise, the state of the U.S. economy and the fall of some of the largest, most admired financial institutions in the last couple of years provide more than enough data. And instituting a continuous controls process focusing on risks related to fraud is likely now in the plan for many companies this year.

Check out this seven-step outline, provided by Dustin Lewis, CISA, a senior technical consultant with ACL Services, Ltd. for building an analytics-based program that will allow you to focus on risks that have the greatest chance of reducing shareholder value. For example:

  • Extended supply chain re: safety, quality, reliability of suppliers and processes
  • Is there a process to receive and act on regulatory comments or findings?
  • Are pricing strategies consistent with regulations and free from collusion?
  • Can you detect and avoid discrimination with customers, suppliers and employees?

Plus, by focusing on reducing the risk to shareholders, you make management happy, and this can result in a more robust, long-term fraud program.

Also be sure to read Lora Bentley's interview with Peter Millar, director of technology application at ACL Services Ltd., for insights on how to interpret the emotional reaction that discoveries of fraud can create, as opposed to the casual interest many companies take in the situation.

 

Related Topics : Botnets, Firewall, Intrusion-Detection Systems, Intrusion-Prevention Systems, Peer-to-Peer

 
More Slideshows

Misc31-190x128 Are Your Firewalls Ready for Summer?

If you want to spend more time this summer paying attention to the barbeque than your firewalls -- then it's time to get your firewalls in shape. ...  More >>

Five Tips for Defending Against a DDoS Attack

There are many things that can be done with existing network infrastructure to protect against network-layer attacks. ...  More >>

Nine Document Security Tips Nine Tips to Keep Your Electronic Documents Secure

Tips to help ensure that your electronic document repository is 100 percent secure. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.