of Fraud - Association of Certified Fraud Examiners

Taking Fraud Risk Management
To the Next Level
Daniel Williams
CGA, CFE, CIA, CISA, CAMS, PMP
October 28, 2012
Topics
1.
Introduction
2.
The Prevalence of Fraud
3.
The Impact of Fraud
4.
Managing Fraud Risk
5.
Performing a Fraud Risk Assessment
6.
Evaluating & Enhancing a Fraud Management Program
7.
Leveraging the Whistleblower Program
8.
Effective Response Protocols
1
© Deloitte & Touche LLP and affiliated entities.
Introduction
2
© Deloitte & Touche LLP and affiliated entities.
Objectives
1. Walk through how to build an effective fraud risk management program and
identify some of the key elements that are often missing or inadequate
2. Show how the effectiveness of key fraud response protocols will help to
minimize the damage to an organization should an incident occur
3
© Deloitte & Touche LLP and affiliated entities.
The Prevalence of Fraud
4
© Deloitte & Touche LLP and affiliated entities.
The Prevalence of Fraud
“The average fraud scheme lasted 24 months before it was detected”
“A typical organization loses a staggering 6% of its annual revenue to occupational fraud”
“The average organization loses more than $9 a day per employee to fraud and abuse”
“Fraud cases are estimated to have a median loss of $175,000 per incident”
“Public sector fraud cases are estimated to have a median loss of $100,000 per incident”
“Approximately 46% of fraud cases were detected by tips from employees, customers, vendors, etc.”
“The implementation of anti-fraud controls appears to have measurable impact on the organization’s
exposure to fraud. “
“Lack of adequate internal control was cited by 35% of respondents as a factor that allowed fraud to occur. “
- ACFE; 2010 Report to the Nation on Occupational Fraud and Abuse
5
© Deloitte & Touche LLP and affiliated entities.
The Impact of Fraud
6
© Deloitte & Touche LLP and affiliated entities.
The Impact of Fraud
•
•
•
•
•
•
•
•
•
Financial losses to the organization
Financial losses to stakeholders
Civil litigation
Regulatory fines
Criminal litigation and prosecution
Diversion of executive attention and organization resources
Expensive compliance and/or monitoring programs
Expensive investigation fees
Reputation damage including:
– Loss of public trust
– Negative public perception
– Greater scrutiny from public advocates and leadership
– Negative media attention
7
© Deloitte & Touche LLP and affiliated entities.
The Impact of Fraud - Reputation Risk
Reputation risk is the risk of loss of brand image, or
stakeholders’ support such that the organization will be
unable to operate at its full capacity.
It is the risk of losing the ability to compete, due to
perceptions that the organization does not deal fairly
with its stakeholders or know how to manage its
business; furthermore, it is the risk a decline in
stakeholders' confidence that may impair the organization’s
ability to have support in the community and to efficiently
raise capital.
8
© Deloitte & Touche LLP and affiliated entities.
Managing Fraud Risk
9
© Deloitte & Touche LLP and affiliated entities.
Managing the Risk of Fraud
Fraud is predictable and manageable; however, only through diligent and
ongoing effort can an organization protect itself against acts of fraud.
• The IIA has developed five key principles for proactively establishing a Fraud
Risk Management Program to effectively manage an organization’s fraud risk:
1. As part of an organization’s governance structure, a fraud risk management program
should be in place including a written policy to convey the expectations of the board of
directors and senior management regarding fraud risk;
2. Fraud risk exposure should be assessed periodically by the organization to identify
specific potential fraud schemes and events that the organization must mitigate;
3. Prevention techniques to avoid potential key fraud risk events should be established,
where feasible, to mitigate possible impacts on the organization;
4. Detection techniques should be established to uncover fraud events when preventive
measures fail or unmitigated risks are realized;
5. A reporting process should be in place to solicit input on potential fraud, an a
coordinated approach to investigation and corrective action should be used to help
ensure potential fraud is addressed appropriately and timely.
10
© Deloitte & Touche LLP and affiliated entities.
What is Motivating Organizations to Develop a Comprehensive and Holistic Fraud
Management Strategy (what are the drivers?)
• Stakeholders are becoming
increasingly aware of fraud risk
• Organizations that are perceived as
being vulnerable to fraud can lose
stakeholder confidence and
ultimately suffer business losses
• Loss from reimbursing stakeholders
for losses incurred
• Loss from incident response,
investigation and recovery efforts
Stakeholder
Confidence
• Loss from diversion of resources in
response to fraud
Fraud Loss
• Geographical expansion and
changes in customer demography
introduce new threat factors requiring
businesses to prepare and respond
to emerging fraud risks
Globalization
Fraud
Risk
Brand
Risk
Changing
Business
Model
• Ongoing modifications to services,
products and infrastructure exposes
the organization to new threats that
need to be considered
Advances in
Technology
• With fraudsters using sophisticated
technology , organizations must
continually enhance and refine
controls
• Technology tends to make fraud risk
more pervasive and can impact a
number of areas of operations
11
© Deloitte & Touche LLP and affiliated entities.
Applying the COSO Framework
•
•
•
•
• Identify fraud risk
factors, fraud risks
and fraud schemes
Tone at the top
Code of conduct/ethics
Whistleblower hotline
Investigation process
Creating
a Control
Environment
• Monitoring
effectiveness of
antifraud programs
and controls
Monitoring
Activities
FRMP
Sharing
Information and
Communication
• Effective communication of
antifraud programs and
controls throughout
Performing
Fraud Risk
Assessments
Designing and
Implementing
Antifraud
Control
Activities
• Link/map identified
fraud risks to
control activities
© Deloitte & Touche LLP and affiliated entities.
Effective Fraud Risk Management Program
Elements of an Effective Fraud Risk Management Program
Prevention
• Good governance
• Code of conduct and related
standards
• Fraud and misconduct risk
assessment
Detection
Response
• Hotlines and whistleblower
mechanisms
• Timely and consistent response
mechanisms
• Auditing and monitoring
• Comprehensive internal
investigation protocols
• Quality assurance
• Proactive data analysis
• Employee and third party due
diligence
• Comprehensive Enforcement
and accountability protocols
• Disclosure protocols
• Communication and training
• Remedial action protocols
• Process-specific fraud risk
controls
Deterrence
13
© Deloitte & Touche LLP and affiliated entities.
Completing a Fraud Risk
Assessment
14
© Deloitte & Touche LLP and affiliated entities.
Step 1 – Define Fraud as it Relates to Your Organization
The first step in developing any fraud risk management program is to
define fraud as it relates to your organization.
As simple as this may seem, it is crucial that a firm definition is developed
and applied consistently throughout the organization including:
– Any and all communications to staff;
– When developing a fraud risk assessment to determine if specific scenarios that can be
executed are, in fact, fraudulent;
– When developing and publishing policies and procedures (including the code of
conduct and the fraud risk management charter); and
– When developing and facilitating fraud awareness training.
15
© Deloitte & Touche LLP and affiliated entities.
Definition(s) of Fraud
“Fraud is criminal deception intended to financially benefit the deceiver”
- The Accountant’s Handbook of Fraud and Commercial Crime (CICA)
“Fraud is a generic term, embracing all multifarious means which human ingenuity can devise, and which are
resorted to by one individual to get an advantage over another by false suggestions or suppressions of truth,
and unfair way by which another is cheated”
- Black’s Law Dictionary
“Fraud is any act of deception carried out for the purpose of unfair, undeserved and/or unlawful gain, either
valuable financially or comprising a legal right”
- Wikipedia
“Fraud is any act of wrongdoing where the organization is knowingly misled for personal (or third party) gain”
- Deloitte
16
© Deloitte & Touche LLP and affiliated entities.
Step 2 – Determine Your Approach for Identifying Risks
Fraud risk identification includes:
• Gathering external information from regulatory bodies, industry sources, key guidance
setting groups (such as COSO), and professional bodies/service providers; and
• Consulting internal sources including:
– Examining the incentives, pressures and opportunities to commit fraud specifically within your
organization (i.e. – performance metrics, incentive programs, etc.);
– Reviewing past whistleblower complaints;
– Reviewing external audit management letters that identify issues pertaining to flaws in processes,
procedures or controls;
– Reviewing any fraudulent acts that may have occurred in the past;
– Reviewing incident reports and other analytical reports on errors, customer complaints, vendor
complaints, employee feedback, etc.; and
– Collaborating with employees across the organization to identify specific fraud scenarios that could
occur as well as weaknesses in the processes that would allow fraud to occur.
17
© Deloitte & Touche LLP and affiliated entities.
Engaging Employees to Identify Fraud Risk Scenarios
Employee
Engagement
Surveys/
Questionnaires
issued to employees
Interviews with the
Board and Executive
Interviews with
Management
Workshops with
Employees
(recommended)
Collaboration with a
Project Team
(recommended)
18
Minimal
Minimal
Moderate
Time Required
Minimal
Moderate
Moderate
Fraud Scenarios
Identified
Pros
Generic
Minimal impact on
resources and little
effort required.
There is a risk that
you will not receive
open and honest
responses from
Generic
Minimal impact on
resources and little
effort required.
Board members may
not have a strong
understanding of day
to day operations.
High Level
Minimal impact on
resources and little
effort required.
Management may
not have insight into
specific weaknesses
within the process.
Detailed fraud
scenarios are identified.
High
Significant
Detailed
Opportunity to educate
employees.
High
Significant
Cons
Detailed
Project team members
provide valuable input
and can be advocates
for remediation
strategies.
Significant impact on
resources and
significant effort
required.
Moderate impact on
resources and
significant effort
required.
© Deloitte & Touche LLP and affiliated entities.
Step 3 – Identify Fraud Risk Scenarios
Fraud risk assessments differ somewhat from the more conventional methods
used to assess risk in that they are scheme/scenario-based. This requires
experienced personnel who are familiar with the more common fraud schemes
impacting today's organizations.
Fraud, by definition entails intentional misconduct, designed to evade
detection. As such, those performing a fraud risk assessment should
engage in strategic reasoning to anticipate the behavior of a potential
fraud perpetrator. In essence, you need to think like a criminal.
Initially, fraud scenarios are initially identified and assessed based on inherent
risk assuming the absence of controls.
It is difficult to take a “one-size-fits-all” approach by obtaining a list of generic
fraud risks and using it as the fraud risk assessment as a boiler plate listing will
most likely not include all fraud opportunities inherent to your organization.
19
© Deloitte & Touche LLP and affiliated entities.
Step 4.a – Determine Likelihood Assessment Criteria
• The Likelihood that an event will occur based on inherent factors such as:
– Access to assets by an individual
– Level of trust placed in an individual
– How difficult it is to commit the act without involving others
• Likelihood assessment criteria:
– High – a significant opportunity that can be executed by just one person
– Moderate – requires collusion with other and/or an activity outside of normal
operational processes/procedures
– Low - many people involved increasing the chance of being detected and an audit trail
is available for review by others
20
© Deloitte & Touche LLP and affiliated entities.
Step 4.b – Determine Consequence Assessment Criteria
• The Consequence of an event occurring is derived from two key factors:
– Qualitative (relating to reputation risk)
– Quantitative (relating to a specific dollar amount lost due to the fraud occurring)
• Consequence assessment criteria:
– High – significant loss of public trust and/or a high dollar value (i.e. - $200,000)
– Moderate – moderate public reaction and/or a moderate dollar value (i.e. - $30,000)
– Low – little to no public reaction and/or a low dollar value (i.e. - $5,000)
21
© Deloitte & Touche LLP and affiliated entities.
Step 5 – Map Existing Controls to Fraud Schemes
Once all fraud risk scenarios have been identified, the next step is to link
each risk to relevant internal controls that can mitigate each risk to an
acceptable level.
It is important to identify and leverage existing controls to determine if
they are designed effectively to actually prevent or detect fraud.
This can be a value-added activity:
– The mapping exercise provides Management with a gap analysis that will identify
residual fraud risks – risks that remain outside the organization’s tolerable range.
– A gap analysis will also identify inefficiencies/ineffectiveness in internal controls.
– The assessment may identify a misallocation of resources and or redundancies
in internal controls.
22
© Deloitte & Touche LLP and affiliated entities.
Step 6.a – Assess Internal Controls
How effective is the control in mitigating the risk of fraud?
Has the control been designed effectively – not just in principal but in
practice?
Objective-based versus activity-based controls.
23
© Deloitte & Touche LLP and affiliated entities.
Step 6.b – Assess the Control Environment
• This is not your typical control environment assessment.
• The assessment needs to consider:
– The maturity of the control environment as it relates to the sophistication, size and
scope of the organization;
– How effective the control environment is in preventing fraud; and
– How effective the control environment is in communicating appropriate standards of
conduct. It is not sufficient to say that management is communicating the right
message; rather we need to confirm that employees are actually receiving and
appreciating that message.
• The assessment includes:
– Reviewing documentation
– Enquiries of Management and employees
– Direct observation
24
© Deloitte & Touche LLP and affiliated entities.
Step 7 – Determine Residual Risk and Response
The final step is to determine what the acceptable level of risk for the
organization is and work towards addressing each fraud scenario that exceeds
the organization’s risk tolerance.
A detailed fraud risk assessment will help identify areas where residual risk may
not be appropriate and prioritize areas that require immediate attention.
The fraud risk assessment may also identify critical areas that were so highly
exposed to undue risk that it would require investigation of past transactions to
determine if inappropriate activity had taken place.
Finally, the fraud risk assessment will allow an organization to consider
necessary remediation strategies for each risk identified:
– Revise the existing process to reduce the inherent risk;
– Accept or increase the tolerated risk level based on the organization’s operating model;
– Reduce residual risk through increased control effectiveness.
25
© Deloitte & Touche LLP and affiliated entities.
Fraud Risk Assessment Template - SAMPLE
Fraud Risk
Scenarios
Likelihood
Assessment
Consequence
Assessment
Inherent
Risk
Internal
Controls
Residual
Risk
L
The CFO directs
employees to hold the
books open after year
end to accrue
additional revenues.
M
M
M
A.1
A.2
B.3
The inventory manager
misappropriates
inventory and then
makes an adjustment
to the GL to cover up
the theft.
L
L
L
C.6
L
An supervisor colludes
with another employee
by authorizing
fraudulent overtime
claims.
H
H
H
C.6
D.1
M
Ghost employees are
added to the payroll by
the HR Manager.
H
L
M
N/A
M
26
© Deloitte & Touche LLP and affiliated entities.
Additional Benefits
• Identify inefficiencies in operations, processes or controls that expose the organization to
the risk of to waste and error as well.
• Identify redundant internal controls or other risk management practices.
• Find ways to optimize/ enhance existing internal controls (which were initially designed to
support another program) in such a way as to have them also prevent/detect fraud.
• Revise or enhance various organizational process assets (such as the internal audit
charter, code of conduct/ethics and various policies and procedures)
– For example training materials can be enhanced to include information on fraud
awareness. The code of conduct/ethics can also include a fraud policy.
• Leverage and/or align with the organization’s Enterprise Risk Management Framework,
SOX program, anti-corruption/ compliance and ethics program, etc.
27
© Deloitte & Touche LLP and affiliated entities.
Additional Benefits: Example #1 (Procurement Function)
• Through conducting our fraud risk assessment, it was noted that third party suppliers
were sometimes engaged without going through the proper procurement process
• Suppliers were selected and being paid for services:
– Without being recognized as an “approved vendor” by the procurement function;
– Without going out to tender;
– Without undergoing the proper due diligence; and
– Without being formally added to the Accounts Payable system as an approved vendor for payment
• While the intent was not malicious, it did demonstrate that an opportunity to commit fraud
existed. More importantly, it presented several other risk scenarios:
– Suppliers/ services were engaged which are contrary to the organization’s goals/objectives;
– By engaging an alternate Supplier, the organization violated contractual terms/ conditions it had
with existing Suppliers;
– The organization engaged a Supplier that, due to weak/ questionable business practices, exposed
the organization to excessive risk (FCPA);
– An employee committed the organization to an inappropriate contractual arrangement with a
Supplier (i.e., unfavorable terms, inappropriate pricing, etc.)
– These suppliers were being paid outside the normal Accounts Payable process
28
© Deloitte & Touche LLP and affiliated entities.
Benefits: Example #2 (Accounts Payable Process)
• Through conducting our fraud risk assessment, it was noted that the organization’s
current Accounts Payable process was inefficient and, due to the high level of
inefficiency, exposed the organization to an excessive number of inherent risks.
– Management was unaware of this until all risks were identified through conducting a proper fraud
risk assessment and mapping the risks to the Accounts Payable Process flow;
– Given the current process, the cost of mitigation was too high (there are too many inherent risks
that would need to be addressed with control activities);
– The process was so weak that we were almost certain that fraud, waste or error was already taking
place but it was too costly to address it given the current process.
•
The solution was to map all risk scenarios to the business process to find out where
they would fall along the process flow.
•
We then determined what weaknesses in the process flow contributed to the inherent
risks identified.
•
We designed a new process flow to address these weaknesses and limiting the number
of inherent risks found in the revised process.
•
Finally, we identified and implemented internal controls to address the remaining
inherent risks.
29
© Deloitte & Touche LLP and affiliated entities.
Employee 1
Activity 2
Activity 3
Activity 4
Activity 5
Activity 6
Employee 4
Employee 3
Activity 1
Employee 2
Benefits: Example #2 (Accounts Payable Process)
Activity 8
= High Risk
30
= Moderate Risk
Activity 11
Activity 7
Activity 9
Activity 10
= Low Risk
© Deloitte & Touche LLP and affiliated entities.
Benefits: Example #2 (Accounts Payable Process)
• We also took this opportunity to design a Segregation of Duties map to help with the
reconstruction process:
Accountable for this duty.
As
su
ran
ce
De
p
Em
pl o
ye
e
Ac
co
un
ts
P
Qu
ali
ty
ay
ab
le
Inv
oic
e
art
me
nt
He
ad
Ve
nd
or
The following key duties performed along the process must be separated to
ensure that the risk of fraud/error is mitigated and operational efficiencies are
achieved through specialization and standardization of activities.
Pro
ce
ss
ing
Should not be performing this duty.
Acceptable to perform this duty.
1. REQUISITION
- submits invoice, call in for payment etc.
Y
N
N
Y
N
N
2. INVOICE PROCESSING
- sets up invoice in system
- reviews invoice for completeness, validity and accuracy
N
Y
N
N
N
N
3. AUTHORIZATION
- approves invoice for payment and applies spending authority
N
N
Y
N
N
N
4. SECONDARY REVIEW
- reviews invoice for completeness and accuracy
N
N
Y
N
N
N
5. TERTIARY REVIEW
- reviews invoice for completeness, accuracy and validity
N
N
N
Y
N
N
6. DISBURSEMENT
- issues payment
- maintains chain of custody over payments
N
N
N
N
Y
N
7. QUALITY ASSURANCE
- compliance check
N
N
N
N
N
Y
8. VENDOR MAINTENANCE
- updates vendors on changes related to all client account information
- monitors vendors for compliance with policies and standards
- modifies and maintains vendor master data
N
N
N
N
Y
P
31
© Deloitte & Touche LLP and affiliated entities.
Evaluating & Enhancing a
Fraud Management
Program
32
© Deloitte & Touche LLP and affiliated entities.
Stakeholder Value
A Model for Evaluating FRMP Maturity
Tribal & Heroic
Specialist Silos
• Ad-hoc/chaotic
• Independent risk
• Depends primarily
management
on individual
activities
heroics,
• Limited focus on
capabilities, and
the linkage
verbal wisdom
between risks
• Limited alignment
of risk to
strategies
• Disparate
monitoring and
reporting
functions
Top Down
• Common
framework, program
statement, policy
• Routine risk
assessments
• Communication of
top strategic risks to
the Board
• Executive/Steering
Committee
• Knowledge sharing
across risk functions
• Awareness activities
• Formal risk
consulting
• Dedicated team
- 33 -
Systemic Risk Mgmt.
• Coordinated risk mgmt,
activities across silos
• Risk appetite is fully
define
• Enterprise-wide risk
monitoring, measuring,
and reporting
• Technology
implementation
• Contingency plans and
escalation procedures
• Risk management
training
Risk Intelligence
• Embedded in strategic
planning
• Early warning risk
indicators
• Development of
performance metrics and
key risk indicators
• Linkage to performance
measurement/
incentives
• Risk modeling/scenarios
• Industry benchmarking
Evaluating the Program Using a Common Framework
A comprehensive Fraud Risk Management Program Framework encompasses seven domains that can help manage fraud, waste
and error across the enterprise
Strategy
Governance
Enterprise strategy that defines the Fraud Management Program function, role and objectives, and
establishes a strategic roadmap
Fraud Risk Management Program oversight structure with well defined roles and responsibilities to
manage risks ensuring that there is adequate collaboration among the various forums/functions
Policies, Standards
and Procedures
Policies, standards and procedures defining risk management methodology and activities, risk
tolerance levels and integration points between risk management functions to ensure
consistency and quality across all program activities
Risk Management *
Due diligence and ongoing oversight that an organization must exercise
throughout the fraud management lifecycle
Tools and Technology
Tools and technology that drive commonalities in risk management process,
and support data accuracy, availability and timeliness.
Metrics and Reporting
Metrics and reports that provide a comprehensive view of
enterprise Fraud risk to the relevant stakeholders across the
enterprise.
Coordinated communication channels and programs to educate
stakeholders of responsibilities at all stages of the fraud
management lifecycle.
Communication, Training and Awareness
- 34 -
DRAFT – FOR DISCUSSION PURPOSES ONLY
How to Refine the Fraud Risk Management Strategy
Program Management
1
Assess
Develop
Define target state by developing a
fraud management architectural
framework
Develop fraud management
governance materials
Conduct organization readiness
review and gap analysis based on the
fraud management architectural
framework
Design fraud management process
flows
Develop fraud management roles and
responsibilities
Identify stakeholders and establish
fraud management organization
Work Products
• Fraud Management Architectural
Framework
• Fraud Management Roles and
Responsibilities
• Fraud Management Organization
Structure
• Fraud risk governance interaction
model
• Forum, charter and mandate
35
2
3
Execute
Operationalize fraud management
processes and controls
Develop fraud risk assessment
questionnaire and risk ranking model
Develop fraud detection and
prevention technology controls
Conduct fraud management training
sessions
Develop fraud management
monitoring and reporting metrics
Work Products
• Fraud Management Policy
• Fraud Management Process Flows
• Fraud Risk Assessment
Questionnaire
• Fraud Risk Ranking Model
• Fraud Management Technology
Architecture
• Fraud Management Monitoring and
Reporting Metrics
Work Products
• Fraud Management Training
Materials
• Program review and assessment
• Trend analysis and industry
benchmarking
• Continuous improvement
© Deloitte & Touche LLP and affiliated entities.
Governance
36
© Deloitte & Touche LLP and affiliated entities.
Governance
Observation: Groups, forums and functions do not interact or support each other; further, governance forums are
created without knowledge and/or approval of the organization.
Recommendation: Document the current governance framework and interaction model to identify gaps and
deficiencies. Then, determine how to realign the framework to encourage greater collaboration.
• By formally documenting the fraud governance framework and interaction model, the organization will
have clear insight into how to align the governance forums and drive synergy.
Enterprise-wide Fraud Governance
Enterprise Fraud Risk
Management Committee /
Owner
Internal Audit
Investigations
Enterprise Fraud Risk
Management Group
Compliance
Forum level Governance
`
`
Ideal State
Business Unit 1
Business Unit 2
Forum 1
Inputs /
Outputs
Function 1
37
Legal
Forum 2
Cross-Forum
Exchange
Inputs /
Outputs
Function 2
Isolated Silo
Isolated Silo
Business Unit 1
Business Unit 2
Forum 3
Inputs /
Outputs
Function 3
Forum 4
Output
only
Function 4
© Deloitte & Touche LLP and affiliated entities.
Enterprise Fraud Risk Management (EFRM) Framework
Nine Principles for Building an Enterprise
Fraud Risk Management Framework
The Risk Intelligent Enterprise
Line 3.A
Oversee & Endorse
Common Definition of Risk
Common Risk Framework
Oversight
Risk Governance
Roles & Responsibilities
Board of Directors
Tone at the
top
Transparency for Governing Bodies
Quasi-Independent
Line 2
Operate & Enable
Common Risk Infrastructure
including management & reponse
Executive Management
Responsibility
Risk Infrastructure
and Management
Common Risk
Infrastructure
Executive Management
Quasi-Independent
Objective Assurance and
Monitoring
People
Process
Technology
Line 1
Own & Execute
Risk Process
Business Unit Responsibility
Support of Pervasive Functions
Risk
Ownership
Identify Risks
Assess &
Evaluate
Risks
Integrate
Risks
Respond
to Risks
Level 1
Design,
Implement &
Test
Controls
Monitor,
Assure &
Escalate
Business Units and
Supporting
Functions
Risk Classes
Governance
Strategy
& Planning
Operations/
Infrastructure
Internal Audit
Compliance
Reporting
Line 3.B
Observe & Evaluate
Independent
- 38 -
Establishing an EFRM Governance & Operating Model
1st Line of Defense
2nd Line of Defense
 Implement internal controls and practices
consistent with company-wide policies &
procedures
 Managers appointed by the Lines of Business
(LOBs) are responsible for identifying, assessing
and mitigating risk associated with their business
3rd Line of Defense
 Design and assist in implementing company-wide
risk framework and oversee enterprise risks
 Independently test, verify and evaluate risk
management controls against internal policies
 Business partners work with the LOB’s to identify,
assess and mitigate all risks
 Assess design and operating effectiveness of the
program considering enhancements to
operations, increased customer base or
geographical expansion
 Provide tools and resources to enable effective &
efficient execution of risk management activities
Board of
Directors
 Define and implement Fraud
Risk Guiding Principles and
Strategy
 Leverage the whistleblower
program to identify trends
and/or Program weaknesses
 Provide regulatory
interpretation
and guidance
3rd Line of Defense
Risk Steering
Committee
Fraud Risk
Advisory Board
Internal Audit
 Establish risk
tolerances and
advice on
complex risk
issues
2nd Line of Defense
1st Line of Defense
 Identify critical
risk scenarios
 Own fraud risk
for the business
 Maintain
accountability for
FRM practices
 Identify risks and
mitigation strategy
 Manage and
resolve day-to-day
issues
 Implement key
controls
 Perform periodic
audits and testing
to monitor policy
compliance
Line of
Business
Line of
Business
Line of
Business
Centre of Excellence (COE)
FRM Office
Risk Officers
Line of
Business
Line of
Business
Line of
Business
 Maintain
accountability for
FRM practices and
identified risks
 Drive consistent process across LOBs
 Provide enterprise FRM standard processes
and templates
 Track issues and facilitate corrective actions
 Interact with regulators on fraud risk and
information security topics
 Set FRM policies, procedures and
standards to govern O/O activity
Investigations
HR
Finance
Risk
Compliance
Technology
Legal
Corporate
Communications
 Assist in developing TPRM
guidelines, tools and templates
 Provide subject matter expertise to
1st Line of Defense
 Promote consistency and quality of
FRM practices
 Provide ongoing training
© Deloitte & Touche LLP and affiliated entities.
DRAFT – FOR DISCUSSION PURPOSES ONLY
Assessing & Enhancing
Tools
40
© Deloitte & Touche LLP and affiliated entities.
Assessing and Enhancing Tools
A technology architecture for managing Fraud risk is an ecosystem of orchestrated processes and systems which, if designed
appropriately, can help ensure that all relevant data obtained across the Fraud lifecycle (including fraud scenarios, metrics, and
whistleblower logs, and incident reports) is available to facilitate risk assessment, classification, monitoring and reporting.
TPRM Tool Box
Key Data Inventory
Risk Scenario Inventory
Risk Management / Monitoring Systems
Performance Monitoring
Risk & Compliance Assessment
Third Party Event Monitoring
Infrastructure Components
Reporting / Notification Rules
Information Entitlements & Security
Logging / Audit Trails
Risk Metrics Calculation/ Modeling
Interfaces with Databases and Risk Systems
Fraud Information Databases
Reporting
Risk Aggregation
Scenario Risk Score calculation
Standardized
Reports
Key Risk Indicators
Dashboards
Risk Threshold/ Tolerance
Performance Metrics
Analytics
Residual Risk Calculation
Feedback: promotes continuous improvement to data, systems and architecture
- 41 -
DRAFT – FOR DISCUSSION PURPOSES ONLY
Develop Industry-Specific Metrics
Develop metrics to assess the performance of the FRMP and identify emerging
risks/issues. Having the right metrics in place enables an organization to:
• Document, measure and monitor the organization’s risk appetite for Fraud Risk when
making various business decisions (i.e., whether to outsource to a third party, to expand
into a specific geographical region, etc.)
• Identify trends in fraudulent activity as well as allowing for the discernment of
weaknesses in the current process and/or applications that expose the organization and
its customers to undue risk.
• Determine the “true cost” of fraud including losses to the customer, incident response
costs, investigation and recovery cost and the impact on customer attrition.
• Make better decisions for how to manage fraud and what areas to focus resources on;
• Entertain the idea of implementing control activities that were initially perceived as being
costly to the organization
• Measure its performance in relation to loss mitigation, total cost of mitigation, total funds
recovered and cost of recovery.
42
© Deloitte & Touche LLP and affiliated entities.
43
Risk Appetite and Enterprise Fraud Risk Management (EFRM)
Components of an effective ERM
Program
Enterprise
Risk
Management
Vision
and
Strategy
Articulating Risk Appetite
•
Provides a structure for discussion of the balance
between business strategy and risk
Governance
•
Provides guiding principles for management in
determining whether strategic/business activities and
risk levels are acceptable or not
Culture
•
Provides a consistent view of risk across the
organization to facilitate decision making
Methodology
•
Enhances the risk awareness culture
•
Establish thresholds to monitor against
•
Allows the business to make decisions considering risk
Common Language
Risk Measurement
Risk Policies
Risk Monitoring
Risk Appetite
Reporting and Escalation
Risk Assessment
Independent Verification/
Testing
© Deloitte & Touche LLP and affiliated entities.
Risk and Reward Scale
Risk Appetite
`
Risk Seeking
Risk Tolerant
Risk Neutral
Risk Averse
Description
Taking risk is
considered part of
company’s
strategy
Company takes an Company takes a Company accepts
aggressive
balanced approach as little risk as
approach towards to risk taking
possible
taking risk
Example risk
appetite by
business activity
New market
expansion and
acquisition
activities
Innovation, tax
activities
44
Operations,
Health, safety,
financing activities environment,
security, fraud,
financial reporting,
regulatory
compliance, and
reputation
Copyright © 2012 Deloitte Development LLC. All rights reserved.
Developing and Monitor Key Risk Indicators (KRI) to proactively identify, when
tolerable risk thresholds are exceeded
Develop comprehensive risk reporting which takes into account a composite view of emerging risks or trends/behaviors
which may indicate that a risk has been, or is about to be realized.
Aggregate &
Review KRI Values
Gather Data
•Establish Data Points
per KRI
•Identify Data Source(s)
per Data Point
•Determine data usage
Identify Data
Points
•Determine collection
method
•Obtain data from
relevant sources
including existing
reports and key
databases
•Perform in-depth
review of data
elements at each step
of process to ensure
data quality and
accuracy
Review Data
Points
KRI Information
KRI Ref No.
45
KRI Description
•Combine data points
to generate KRI values
•Determine thresholds
to monitor
KRI Thresholds
KRI Calculation
Formula
Outcome
Value
1
Number of whistleblower complaints related to fraud
Count
0
2
Number of internal control operating deficiencies identified
Count
0
3
Count of significant breach events against applicable ethical standards,
Count
as defined in supplier contract
<3
>0
0
1-2
>2
2
3-5
>5
8
RAG
© Deloitte & Touche LLP and affiliated entities.
Metrics to Consider
Monitoring KRIs based on geographical location, areas of operation, and/or services provided will help an organization
determine where to allocate resources in response to emerging risks.
Trends/Weaknesses Exploited
Loss/Damage Quantification







Total customer losses to be reimbursed.
Customer attrition costs due to experiencing a fraud incident.
Total effort expended per incident and the related costs.
Total incidents for each period.
Average legal fees per incident.
Number of employee hours diverted to incident response.
Cross-Channel losses resulting from incidents originating in a
specific department/division.
 Successful bypass of internal controls – what controls are getting
targeted and bypassed the most?
 Incidents of management override of controls.
 Attack volume.
 Incident by type and transaction.
 Incident by geographic location.
 Trends – time of day most attacks occur.
 Trends – types of businesses targeted.
Response and Recovery
Performance
 Number of compromised customers in a period.
 Number of repeat offences against a customer in a period.
 Number of incidents identified by the organization compared to
incidents identified by the customer.
 Number of fraudulent attacks denied versus successful attempts.
 Total false positives recognized in a period.
 Total incidents in a period.
 Total incidents by theme.
 Impact of remediation efforts on total incidents.
46





Total effort required to respond to each incident.
Response time for each incident.
Timeliness of investigation and wrap up.
Total funds recovered in a period.
Cost-benefit analysis as it relates to cost of recovery versus actual
funds recovered.
 Phishing – time from notification to take down.
 Phishing – success rate of take down.
© Deloitte & Touche LLP and affiliated entities.
Use metrics to determine the “true cost” of fraud
• An online banking division had been experiencing an increase in the following fraud scenarios:
- Access of a legitimate customer account by a fraudulent third party with the intention of acquiring sensitive client information (browsing); and
- Access of a legitimate customer account by a fraudulent third party with the intention of executing unauthorized transactions for personal gain.
• Perpetrators were successfully able to access client accounts through the deployment of financial malware.
• Once a perpetrator gains access to valid customer credentials, the perpetrator is then able to access the client account and commence with
fraudulent browsing on the account and/or the execution of fraudulent transactions.
Fraudulent Event Frequency and Detection
• There have been 45 fraud incidents since October of the prior year
o October to June: 1-4 incidents occurred per month.
o July: 10 incidents occurred.
o August: 12 incidents occurred.
• Only half of all fraud incidents are detected by the bank. The other
half are discovered and reported by the customers.
• Business customers account for 80% of fraud.
Impact
• Average loss to the customer was $15,000 per incident.
• 235 to 660 employee hours are consumed for each fraud incident
depending on the severity.
• Hours consumed by employees for incident response are estimated
to be as follows:
o Contacting the client: 50 – 75;
o Freezing. closing and opening new accounts:150 – 300;
o Corporate Security: 25 to 250 (depending if an investigation is
warranted);
o IT: 0 – 15;
o Management: 10 – 20.
• At an average cost of $50 per hour, it is estimated to cost
approximately $11,750 to $33,000 in payroll expenses per incident.
• Investigation costs are averaging $10,000 per incident.
• Total costs do not consider the cost of customer attrition should
customers leave subsequent to falling victim to a fraud incident
and/or reimbursements made to clients.
For the months of July and August alone, the total cost incurred to mitigate, manage and respond to incidents of fraud was estimated
to be between $300,000 and $500,000.
47
Private and Confidential
© Deloitte & Touche LLP and affiliated entities.
Extending the FRMP to
Third Parties
48
© Deloitte & Touche LLP and affiliated entities.
Third Party Risk
Third Party Risk Management is the discipline of systematic measurement and management of risks associated with Third Parties throughout
the relationship lifecycle.
What is Third Party Risk
•
•
Reliance on third-party relationships can significantly increase a organization’s strategic, reputation, compliance, and transaction risk. Increased risk most
often arises from poor planning, oversight, and control on the part of the organization and/or inferior performance or service on the part of the third party.
The consequences can go well beyond direct financial loss to include damage to reputation, media embarrassment, regulatory scrutiny and loss of customers.
How Third Party Risk Manifests Itself
Potential Risks
Strategic
The presence and severity of each risk vary based on the nature
of the third party relationship. Determining factors include:
1.
Reputation
2.
Compliance
Transaction
Credit
3.
4.
Country
Business Continuity
5.
Contractual
Financial Stability
Information Security/ Privacy
Third Party Profile
• Geographical location
• Type of service provided
• Nature and extent of customer interaction
Criticality of Outsourced Product/ Service
• The impact to the organization (financial, reputational, etc.) should
the third party be unable to meet its contractual obligations
Access to Confidential/Sensitive Information
• The impact to the organization should confidential information be
misappropriated and/or transferred across borders
Level and point of Integration with Operations
• At what point(s) within the process flow do third parties contribute to
the execution of the process
• How ingrained a third party’s people, practices and technology are in
support of the execution of a process (i.e., payroll, data processing)
Service Model Affecting Level of Oversight Over the Third Party
• Staff Augmentation
• Managed Service
• Co-sourcing
Note that a third party’s risk profile can be greatly enhanced if the third
party chooses to rely on a fourth party for support
Note that while you can outsource a
product/service, you cannot
outsource the risk
• Reliance on third-party relationships
can significantly increase an
organization’s fraud risk
• Organizations that outsource
products or services need to
understand that their Fraud Risk
Management Program is as strong
as the weakest practices in the Third
Parties they are outsourcing to
• Failure to extend the Fraud Risk
Management Program to Third
Parties an result in the organization
facing severe penalties and greater
regulatory scrutiny (FCPA, UK
Bribery Act, CFPB, Privacy Laws,
etc.)
Drivers for Third Party Risk Management
Heightened Regulatory
Awareness & Expectations
(CFPB, FFIEC, OCC, FCPA)
Increased Outsourcing of
Critical Services Increasing
the Exposure to Continuity
of Business Risk
Increased Reliance on Third
and Fourth Parties as they
become more accessible
- 49 -
Increased Third Party
Access to PII and Other
Confidential/Sensitive Data
Deloitte Confidential
Key Elements of a Third Part Risk Management Program
The organization must first understand that each Third Party’s risk profile is unique and requires a tailored risk management strategy. The
appropriate strategy is dependent on the nature of the particular Third Party relationship, the type and materiality of the risks present, and the
ability of the organization to manage those risks. Therefore, a holistic risk management program with select risk management practices
targeted to address specific Third Party Risks must be in place across the entire Third Party Lifecycle
Applying the Third Party Risk Management Program Across the Third Party Lifecycle
Evaluate & Select
Contract & On-board
Manage & Monitor
Terminate & Off-board
Ongoing Program Management & Reporting
• Risk assessment
• Inherent Risk Profiling and
Vendor Selection Reviews
• Third party approval and tiering
process
• Contract negotiation and
legal/procurement approvals
• Control assessments including
• Exit strategy and contract review
̶
Information Security review
̶
Physical Security Review
̶
Vulnerability and Threat
Assessment
̶
Business Continuity
assessment
̶
SLA and Performance
monitoring
• Contract Language Exception
Management
• Review Vendor for the following
̶
Financial Viability
̶
Exit strategy
̶
Sanction screening
̶
Reputational reviews
̶
Compliance assessments
̶
Country risk reviews
̶
News and event monitoring
̶
Ability to meet compliance
obligations
̶
Reputational reviews
̶
Country risk reviews
̶
Contract reviews
• Termination Management to
confirm that the Vendor meets
the obligations of their contract
and all client data is removed per
the Vendor’s contractual
obligations
Changes in environmental factors have increased the depth and frequency of regulatory reviews. A proactive organization will try to minimize
such regulatory scrutiny and possibility of penalties due to non-compliance. It also allows the organization to retain the flexibility in developing
and implementing risk management strategies on their own absent direction from a regulatory authority (i.e., MRA, consent order).
- 50 -
DRAFT – FOR DISCUSSION PURPOSES
ONLY
Deloitte Confidential
Leveraging the
Whistleblower Program
51
© Deloitte & Touche LLP and affiliated entities.
Whistleblower Program
The 2012 Corporate Governance and Compliance Hotline Benchmarking report is a compilation of 599,162 reports
throughout a fiive-year period covering 2007 to 2011. In 2011, 129,199 reports were taken from 1,128 organizations
representing 15,052,215 employees.
Source: The Network “2012 Corporate Governance and Compliance Hotline Benchmarking Report
“As organizations continue to either implement or improve their Whistleblower Programs, their ability to detect and
prevent fraud grows.”
Note that the percentage of
whistleblower complaints pertaining
to Fraud have significantly increased
52
© Deloitte & Touche LLP and affiliated entities.
Whistleblower Program
Observation: Whistleblower Programs get used the most in industries focused on Retail or Service
Observation: There are 7 key types of incidents that are escalated via the Whistleblower Program
53
© Deloitte & Touche LLP and affiliated entities.
Whistleblower Program
Observation: Phone is still the most popular intake method by far
Observation: Incidents of retaliation for reporting are on the rise
54
© Deloitte & Touche LLP and affiliated entities.
Whistleblower Program
Observation: Organizations are finding creative ways to inform stakeholders of the Whistleblower Program
55
© Deloitte & Touche LLP and affiliated entities.
Whistleblower Program
Observation: Minimal preference over the ability to report anonymously
Observation: Preference to not want to notify management
56
© Deloitte & Touche LLP and affiliated entities.
Whistleblower Program
In 2011, 67% of all reports warranted an investigation and only 16% did not warrant an investigation. This is referred to
as the “actionability” of the report. Of the 67%, 41% resulted in a corrective action on being taken. In 2010 and 2011
there has been nearly a 10% increase from 2007 in the “other” category, which may be due to companies implementing
variations in the reporting outcomes.
57
© Deloitte & Touche LLP and affiliated entities.
Whistleblower Program
Features of a Well-Designed Whistleblower Program
• Option for anonymity
• Organization-wide (global) and available 24/7, ideally by telephone, with professionally-trained
interviewers in all local languages
• Single hotline for all ethics-related issues
• Dual dissemination of the information received so that no single person controls the information, with
criteria for immediate escalation where warranted, and for notification of the audit committee when
financial irregularities or senior management are involved
• Case management protocols, including processes for the timely investigation of hotline reports and
documentation of the results
• Supports the collection and analysis of data to identify trending
• Management analysis of trends and comparison to norms
• Data security and retention policies and procedures (including geographical trends)
• Customization to comply with the laws of foreign jurisdictions and to address cultural differences
• Ongoing messaging to motivate everyone in the organization, as well as vendors, to use the hotline
58
© Deloitte & Touche LLP and affiliated entities.
Whistleblower Program
• A significant number of fraud schemes are uncovered due to employee tips
• A whistleblower program provides employees with a way to report their concerns to the
appropriate stakeholders of the organizations
• Can only be effective if the following criteria are met:
1.
The program is targeted to the relevant stakeholders
2.
The stakeholders are aware that such a program exists
3.
The stakeholders have a requirement to report
4.
The stakeholders have a reasonable assurance of anonymity
5.
The stakeholders have access to reporting mechanisms inexpensively and with as few
complications as possible and the program supports direct communication
6.
The stakeholder feels comfortable communicating her/his concerns
7.
The stakeholder believes that appropriate action will be taken
8.
The stakeholder has reasonable assurance that she/he will not be persecuted for reporting her/his
concerns
Consider extending your whistleblower program out to
external parties as well
59
© Deloitte & Touche LLP and affiliated entities.
Effective Response
Protocols
60
© Deloitte & Touche LLP and affiliated entities.
Develop a fraud policy with appropriate fraud response protocols and ownership of
fraud risk management
Formalize and document roles and responsibilities as well as fraud response protocols within an enterprise-wide fraud
policy. This is to help ensure that incidents are responded to in a timely manner to minimize the financial and
reputational impact
•
It is essential that any violations, deviations, or other breaches of the code of conduct or controls, regardless of where
in the organization, or by whom, they are committed, be reported and dealt with consistently and in a timely manner.
•
Appropriate punishment must be imposed, and suitable remediation completed.
•
The board should ensure that the same rules are applied at all levels of the organization, including senior
management.
•
The organization should ensure that the organization develops a system for prompt, competent, and confidential
review, investigation, and resolution of allegations involving potential fraud or misconduct.
•
Protocols for the board’s involvement in such cases — which will vary depending on the nature, potential impact, and
seniority of persons involved — should be defined clearly and communicated to management by the board.
•
The roles of the board, management, legal counsel, internal audit and others in the investigation process should be
clearly defined.
61
© Deloitte & Touche LLP and affiliated entities.
A Fraud Policy
Many organizations use a fraud policy to communicate the organization’s approach to
fraud. An effective fraud policy typically contains the following:
62
•
A statement of the organization’s attitude to fraud (e.g., zero tolerance);
•
A discussion on the commitment of leadership to address and respond to fraud risks;
•
Alignment with the code of conduct/ethics;
•
Alignment with the whistleblower policy;
•
The allocation of responsibilities for the management of fraud including:
–
Reporting suspicions of fraud including whistleblower arrangements (if used);
–
The procedures employees should follow if fraud is identified;
–
Guidance on training for the prevention/detection of fraud;
–
Reference to the response plans and protocols that have been devised to deal with and minimize
the damage caused by an incident of fraud;
–
Reference to the remedial action protocols in place.
Private and Confidential
© Deloitte & Touche LLP and affiliated entities.
Developing Investigation Standards
Management is ultimately responsible for developing standards and controls over the
investigation process, including:
– Developing policies and procedures for effective investigations;
– Preserving evidence;
– Handling the results of investigations;
– Reporting to the board; and
– Internal and external communications.
Such standards often documented in a fraud policy.
Internal audit may assist in the evaluation of the policy.
It is often important to assemble the investigation team without delay. If the
organization is likely to need external experts, the organization may want to prequalify service providers so external resources are quickly available when
needed.
63
Private and Confidential
© Deloitte & Touche LLP and affiliated entities.
The Key Elements of an Investigation
The investigation and response system should include a process for:
– Categorizing issues;
– Confirming the validity of the allegation;
– Defining the severity of the allegation;
– Escalating the issue or investigation when appropriate;
– Referring issues outside the scope of the program;
– Conducting the investigation and fact-finding;
– Resolving or closing the investigation;
– Listing types of information that should be kept confidential;
– Defining how the investigation will be documented; and
– Managing and retaining documents and information.
Investigations should be performed in accordance with protocols approved by the
board. A consistent process for conducting investigations can help the
organization mitigate losses and manage risks associated with the investigation.
Consider using investigation templates and checklists to standardize and formalize
the investigation process (including who to contact and when).
64
Private and Confidential
© Deloitte & Touche LLP and affiliated entities.
Internal Audit’s Role in Responding to Incidents of Fraud
It is acceptable for Internal Audit or other internal personnel to participate in the
investigation provided that those persons conducting the investigation are
sufficiently independent, objective and possess the relevant skills and expertise
necessary to:
– Conduct interviews;
– Collect and manage evidence;
– Compile and analyze evidence;
– Access and analyze public records;
– Access and analyze personal documents belonging to the perpetrator;
– Conduct computer forensic examinations; and
– Liaise with legal counsel to prepare evidence and provide a forensic report.
If in doubt – consult!
– To ensure that investigations are completed timely, effectively and efficiently, it is
always recommended that external resources be consulted.
65
Private and Confidential
© Deloitte & Touche LLP and affiliated entities.
Legal Counsel Considerations
It is in the best interest of the company (and its stakeholders), both
professionally and legally, to work effectively with legal counsel and to become
familiar with the relevant laws in the country the fraud investigation occurs.
Legal counsel may also be able to assess the impact the fraud will have on the
board and management and provide guidance on how to manage both internal
and external communications regarding the status of the fraud and the
investigation.
It is strongly recommended, in many cases, to use counsel to invoke attorneyclient privilege thus having the investigation being executed under the direction
of legal counsel. This will maximize the legal privilege attached to any work
performed by the investigation team.
66
Private and Confidential
© Deloitte & Touche LLP and affiliated entities.
Fraud Policy Decision Matrix
Similar to a RACI, a fraud policy decision matrix summarizes the roles and responsibilities
articulated in the fraud policy itself:
Action Required
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Controls to prevent fraud
Incident reporting
Investigation of fraud
Referrals to law enforcement
Recovery of monies
Internal controls review
Handle sensitive cases
Publicity/ press releases
Civil litigation
Corrective action/ recommendations
to prevent recurrences
Monitor recoveries
Proactive fraud auditing
Fraud education/training
Risk analysis of areas of vulnerability
Trend analysis
Investigation case analysis
Whistleblower complaint monitoring
P (Primary Responsibility)
67
Private and Confidential
Investigations Internal Audit Finance
S
P
P
P
P
SR
S
S
S
S
S
P
S
S
S
S
SR
SR
S
S
SR
S
S
P
S
Executive
Risk
Human
Public Relations
Management Management
Resources
P
SR
S
S
S
SR
S
S
S
SR
S
P
S
S
P
Legal
S
S
S
S
S
P
SR
P
SR
P
P
P
S
SR
SR
SR
S (Secondary Responsibiltiy)
S
P
P
S
S
P
SR (Shared Responsibiltiy)
© Deloitte & Touche LLP and affiliated entities.
Incorporate Post Investigation Considerations into the FRMP
Develop a formalized process in which investigations, management and internal audit collaborate to identify deficiencies
in operations and/or internal controls that led to the fraud and determine optimal solutions to address this deficiency.
Resolution - consists of determining what actions will be taken by the organization once a fraud
scheme and perpetrator(s) have been fully investigated, and evidence has been reviewed.
Management and the Board are responsible for determining how to resolve the incident.
Reflection - The results of a fraud investigation may indicate that an occupational fraud had a
previously undiscovered adverse effect on the organization’s financial position and its operational
results. Senior management and the board need to be informed of this so they can decide on the
appropriate reporting requirements.
Remediation - After the fraud has been investigated and communicated, it is important for
management and internal audit to consider the lessons learned.
– How did the fraud occur?
– What weaknesses were exploited?
– What controls failed?
– Why wasn’t this caught and what were the red flags?
68
Private and Confidential
© Deloitte & Touche LLP and affiliated entities.
Questions & Answers
69
© Deloitte & Touche LLP and affiliated entities.
Questions & Answers
Daniel J. Williams
CGA, CFE, CIA, CISA, CAMS, PMP
604.640.3286
604.351.5567
[email protected]
70
© Deloitte & Touche LLP and affiliated entities.