980 likes | 996 Views
Understand the fraud risk universe, write a fraud risk statement, and enhance fraud testing strategies. Learn about fraud concealment impact, fraud data analytics, and fraud audit procedures with thought-provoking insights. Explore methodologies, linked concepts, and superior knowledge to strengthen your audit program, detect fraud, and protect against vulnerabilities.
E N D
The Fraud Audit: Areas where Professional Skepticism is Required
Todays Agenda • The Fraud Audit: Areas where Professional Skepticism is Required • What is The Fraud Risk Universe • How to Write a Fraud Risk Statement • Understanding How Fraud Concealment Impacts Your Audit • Strategies for Fraud Testing • My goal for today: • Create the opportunity for discussion • Help you think about fraud differently • Answer your questions to the best of my ability
Could this Happen to You? • 63 Million Theft Loss to a False Billing Scheme • 2.3 Million Theft Spree, Purchase and Resell Scheme • Conflict of Interest Scheme: Wife of VP of Human Resources • Whistle Blower of Actual Fraud Committed by Senior Management: Was also accepting Kickbacks from a Vendor • How would you explain this to your Audit Committee
Breaking The Code of FraudFraud Data Analytics plan • The Expectation Questions: • Should internal audits find fraud? • Can internal audits find fraud? • How do we detect fraud schemes?
Your Strategic PlanTHOUGHT PROVOKING WORDS • Five key words I want you think about! • Differently • Logic • Linked • Methodology • Superior knowledge
Differently • Fraud risk identification needs to be logic driven versus professional experience driven • The statement has five elements • Person committing the scheme • Type of entity: master file data • Fraud action statement: transactional data • Fraud impact • Fraud conversion
Logic • You can compute the number of fraud scenarios in your scope with mathematical precision • The goal of logic analysis is two fold: • Ensure the completeness of your analysis • Create time for data interpretation • I may not know what the perpetrator is doing, but I know everything the perpetrator can do!
Linked • The fraud scenario is what drives the fraud data analytics plan and the fraud audit procedure • Person committing • Type of entity • Fraud action statement • By understanding what you are looking for; the programming of the routine become obvious
There is a Methodology • Scope of data analysis • Integrating the fraud risk assessment • Select the data mining strategy • Availability, reliability and usability • Understand the data • Develop search routines • Filtering techniques • Sample selection criteria • Plan to resolve false positives • Link the fraud audit test procedures
Superior Knowledge • Understanding data from the: • Data perspective • Industry perspective • Fraud perspective
Word of wisdom • The world’s best audit program and the world’s best auditor cannot detect fraud unless their sample includes a fraudulent transaction. • This is why fraud data analytics is so important to our profession.
Professional Skepticism • What is the difference between skepticism and educated skepticism? • What standards are you following? • What is due care? • Requires diligence, critical thinking, and professional skepticism!
Professional Skepticism • Component of the auditors general duty of care • Attitude that includes a questioning mind and critical assessment • Auditors attributes, mindset and actions • Source PCAOB
Professional Skepticism • Applying reason to determine the validity of the claim • Critically analyzing all evidence considered • Finding a factually supported conclusion • Source ACFE
Professional Skepticism • What is the difference between skepticism and educated skepticism? • What standards are you following? • What is due care? • Requires diligence, critical thinking, and professional skepticism!
Professional Skepticism • Component of the auditors general duty of care • Attitude that includes a questioning mind and critical assessment • Auditors attributes, mindset and actions • Source PCAOB
Educated Skepticism • Understand the fraud risk universe • Understand the Fraud Auditing is both a Science and a Art • Understand there is a methodology to assessing fraud risk • Understand there is a methodology to fraud data analytics, fraud auditing and fraud investigation
Part 1: What is fraud Part 2: Fraud risk structure Part 3: How to write the fraud riskstatement Part 4: Integrating into the audit program Part 5: Practical exercise
What is Fraud From A Legal Perspective • Blacks Law Dictionary Eight Edition: • A knowing misrepresentation of the truth or concealment of a material fact to induce another to act to his or her detriment • Provides definition of specific types of fraud: • Civil fraud • Criminal fraud • Promissory • Etc.
Threat and vulnerability analysis Organization’s fraud risk structure How to create a comprehensive fraud risk register Resources necessary to implement fraud auditing DOES THE AUDITOR UNDERSTAND?
Vulnerabilities:Points in the internal control structure that can be exploited Threats:Possible danger that someone might exploit a vulnerability in our internal control structure thereby causing monetary or non monetary harm Risk: Threat, probability and business impact Fraud Risk: An intentional act and concealed act which is designed to cause harm to the organization THREATS, VULNERABILITIES AND FRAUD RISKS
Governance structure or organization How and where we conduct business Non compliance with a internal control Sophistication of concealment Collusion or extortion Fraud risk factors WHAT IS A VULNERABILITY
Part 1: What is fraud Part 2: Fraud risk structure Part 3: How to write the fraud risk statement Part 4: Integrating into the audit program Part 5: Practical exercise
Fraud Risk Universe Fraud Risk Structure Offender and victim Type of fraud or category of fraud Inherent Scheme Generic description of a fraud risk. Comprised of an entity and action Fraud Risk Statement How the inherent scheme occurs within your business system
Common to all business systems Company specific Industry specific Unauthorized access Internal control inhibitor Types Of Fraud Risk Statements
Employee against employer Employer against employee Employer against government Employer against consumer or investing community Professional crime groups against companies or government STARTING POINT FOR THREAT ANALYSIS Offender And The Victim
Definitions Of Major Categories • Asset misappropriation: application of another's property or money dishonestly to ones own use (source Blacks Law Dictionary) • Corruption: is the use of entrusted power for personal gain (source Transparency international) Conceptually, corruption is a form of behaviour which departs from ethics, morality, tradition, law and civic virtue. • Financial reporting: Financial statement fraud is the process of intentionally misleading the reader of the financial statements. It is the deliberate misrepresentation, misstatement, or omission of financial data to provide the impression that the organization is financially sound.
inherent scheme Links to the Audit Process Person(s) Committing How The Scheme Occurs Fraud Impact Inherent Fraud Scheme Permutation Analysis Fraud Conversion Fraud Concealment Internal Control
Each business system has a finite and predictable list of inherent fraud schemes Each inherent fraud scheme has a finite and predictable list of fraud permutations Each inherent fraud scheme permutation creates a finite and predictable list of fraud scenarios Each inherent fraud scheme has two components Entity Action Inherent Fraud Schemes
False entity: vendor False billing: receive no goods or services Pass Through billing: receive goods or services Real entity: vendor Over billing: over pay on some aspect or some way Disguised expenditure: personal or theft conversion THE PREDICTABLE PHASE Inherent Fraud Scheme Example: Disbursement of Funds
Each inherent scheme links to a person(s) that commit the scheme Person Committing: Operations manager falsely accepts product with known defect Entity: Real vendor that is complicit Action: Over billing Actions may have multiple categories Primary Category: Overbilling by vendor Secondary Category: Product Substitution Inherent Fraud Schemes
Vendor overbills the company Vendor commits product substitution scheme Product substitution Fitness issue Knock off scheme Counterfeit Manufacturer false label Chemical Composition Country of Origin At what level should your describe the fraud action statement
Group Discussion • How does the fraud risk structure help the auditor in developing their audit scope?
Part 1: What is fraud Part 2: Fraud risk structure Part 3: How to write the fraud riskstatement Part 4: Integrating into the audit program Part 5: Practical exercise
Building The Fraud Risk Statement Person(s) Committing How The Scheme Occurs Fraud Impact Inherent Fraud Scheme Permutation Analysis Fraud Conversion Fraud Concealment Internal Control
How To Build A Fraud Risk Statement Customize Merging Business process and permutation analysis