Beyond Rules-Based Tests: The "Seven Wonder" Counter-Fraud Statistical Modeling Tests. Vincent Walden, CFE, CPA, CITP

Size: px
Start display at page:

Download "Beyond Rules-Based Tests: The "Seven Wonder" Counter-Fraud Statistical Modeling Tests. Vincent Walden, CFE, CPA, CITP"

Transcription

1 Beyond Rules-Based Tests: The "Seven Wonder" Counter-Fraud Statistical Modeling Tests Vincent Walden, CFE, CPA, CITP 2015 Association of Certified Fraud Examiners, Inc.

2 Beyond Rules-Based Tests: The Seven Wonder Counter-Fraud Statistical Modeling Tests 2015 ACFE Annual Conference

3 Today s Topics Big risks require big data thinking. What do we mean by beyond rules-based tests? The seven wonder statistical tests and examples Effective deployment considerations What s ahead cognitive computing Page 3

4 Page 4 Big Risks Require Big Data Thinking

5 The Forensic Data Analytics Landscape Making the Business Case for Action The regulators are upping their game. Be ready the regulators are investing in advanced monitoring technology. Big risks require big data thinking. New approaches to counter fraud and compliance monitoring, beyond simple rules-based tests Compliance fatigue? Analytics can help. Analytics can help improve efficiency and program effectiveness to help compliance functions audit and monitor smarter saving both time and valuable resources. Page 5

6 Upping Their Game: SEC Priorities Around Forensic Data Analytics U.S. SEC Chair Mary Jo White, prepared testimony before the Senate Appropriations Subcommittee, May 14, 2014 Page 6

7 Global Forensic Data Analytics Survey Big Risks Require Big Data Thinking ( 63% of companies agree they need to do more to improve their anti-fraud/anti-bribery procedures, including the use of forensic data analytics (FDA). 68% of companies responded that the board of directors is a top beneficiary of FDA. 72% of companies say that big data technologies can play a key role in fraud prevention and detection, yet very few are deploying it for FDA. Only 11% reported the use of statistical analysis and data-mining packages (SPSS, SAS, R, Strata) for use in forensic data analytics. Single biggest FDA challenge: getting the right tools or expertise for FDA

8 What s the difference between rules-based and statistical analysis techniques? CONFIDENTIAL INFORMATION: Do not disclose Ernst & Young LLP 2013

9 Gartner s Data Analytics Maturity Framework Value What happened? Descriptive Analytics Why did it happen? Diagnostic Analytics What will happen? Predictive Analytics What should we do? Prescriptive Analytics Statistics-based tests Rules-based tests Sophistication CONFIDENTIAL INFORMATION: Do not disclose Ernst & Young LLP

10 Rules-Based vs. Statistical-Based Tests Rules Based Statistics Based Effective for fraud detection and prevention ü ü Used most commonly in controls monitoring Requires hypothesis of fraud being conducted Associated with matching, querying, sorting, filtering Generally easy to understand and interpret ü ü ü ü Allows the data to define itself without a hypothesis or pre-defined criteria Looks for outliers, anomalies, or similarities Effective for both structured and unstructured data Typically results in fewer false positives and higher detection rates ü ü ü ü 10 FIDS Unitized Revenue Recognition Confidential Internal Use Only

11 Forensic Data Analytics Maturity Model Beyond Traditional Rules-Based Tests Consider All Four Quadrants Low Detection Rate High Structured Data Matching, Grouping, Ordering, Joining, Filtering Traditional Rules-Based Queries and Analytics Anomaly Detection, Clustering Risk Ranking Statistical-Based Analysis Unstructured Data Keyword Search Traditional Keyword Searching Data Visualization, Drill-Down into Data, Text Mining Data Visualization and Text Mining High False Positive Rate Low CONFIDENTIAL INFORMATION: Do not disclose Ernst & Young LLP

12 Seven Wonder Statistical Analysis Tests for Counter Fraud 1. Predictive modeling 2. Text analytics/concept extraction 3. K-Means clustering 4. Entity analytics 5. Pattern matching and social network analysis 6. Statistical anomaly detection 7. Jackknife resampling Page 12

13 Predictive Modeling Find Me More Like This Profile existing known suspect transactions/activities. Understand key variables that drive the outcome. Finds statistically similar transactions based on a confidence interval. Model continuously improves based on human validation of results strong alignment with continuous monitoring programs. Page 13

14 Case Example: Predictive Modeling Challenge: Analyze 400,000 transactions for suspected bribery payments per DOJ subpoena. 1. Team reviewed 2,000 transactions from ledger data (text comments, amounts, dates, etc.). Identified 400 suspicious and 1,600 non-suspicious entries 2. Created statistical model: Is Suspicious/Is Not Suspicious 3. Applied model to remaining 398,000 additional transactions 4. Identified 14,000 new suspicious transactions With confidence over 95% similar to Is Suspicious Identified over $8 million in highly suspicious payments. Methodology accepted by the DOJ for this case. CONFIDENTIAL INFORMATION: Do not disclose Ernst & Young LLP

15 Predictive Modeling Focus on the Variables That Matter Most Perform Variable Analysis Dependent Variable (Improper Payment) These three variables were this highest drivers of suspicious transactions These variables were less important when predicting suspicious transactions. Client should focus resources on monitoring efforts for the three leading drivers, which accounts for 80% of the predictive value. Independent Variables CONFIDENTIAL INFORMATION: Do not disclose Ernst & Young LLP

16 Text Analytics What is text analytics? Uses natural language processing, heuristic rules, and statistical techniques to reveal conceptual meaning and sentiments in text. Extracts concepts from text and categorizes them What are the benefits? Makes unstructured qualitative data more quantifiable Combine with data mining to improve the predictive power of the models that are created.

17 Rationalization Often Lives in the Text T&E descriptions Payment descriptions and instant message Social media Contracts Presentations User documents Page 17

18 Text Mining: Concept Extraction From the T&E data, we identified over 500 noun or noun-phase concepts from the expense descriptions. We analyzed these concepts and identified 30 concepts that warrant additional audit inquiry based on the word description or amounts. Recommendation: Utilize concept analysis to identify suspect payment descriptions. Page 18

19 Text Mining: Sentiment Analysis Sentiment by Category of Keywords Sentiment by Keyword and Person Page 19 19

20 Text Mining: Text Link Analysis and Word Clouds Page 20

21 K-Means Clustering Categorical Analysis to Find Anomalies K-means clustering is a popular statistical method for partitioning data into groups that share a common set of quantitative attributes. This is a method of organizing data in a sensible, yet objective way for subsequent analysis. Re-clustering is often performed to look at the same set of data in different ways. Page 21

22 Entity Analytics Run demo CONFIDENTIAL INFORMATION: Do not disclose Ernst & Young LLP

23 Entity Analytics What is entity analytics? An entity could be an individual, vehicle, vessel, etc. Resolve like entities, even when the entities do not share key values (e.g. ID number). The result is more accurate analytics, based on correctly resolved entities. Where would you use it? Where data quality and model accuracy are critical Financial services such as banking and insurance know your customer and AML Sanctions and watchlist screening Is this one person or two? CONFIDENTIAL INFORMATION: Do not disclose Ernst & Young LLP

24 Named Entity Recognition Named-entity recognition (NER) seeks to locate and classify elements in text into pre-defined categories. Example: Jim bought 300 shares of Acme Corp. in [Jim] Person bought 300 shares of [Acme Corp.] Organization in [2006] Time. Much like concept extraction, the results can be examined within accounting or expense transactions for any unusual or unexpected interactions by occurrence or aggregate monetary value. Page 24

25 Pattern Matching and Social Network Analysis What is social network analysis? Provides a way to analyze groupings Where would you use it? Primarily used to identify and target influential group leaders Identifies individual groups and relationships between individuals Third-party due diligence, know your customer or vendor Identifies core groups and leader(s) within them Improve segmentation accuracy by adding new social network attributes. Analyze influence spheres amongst Twitter users. CONFIDENTIAL INFORMATION: Do not disclose Ernst & Young LLP

26 Pattern Matching and Social Network Analysis Example Hypothesis: A discrete vendor should not share bank accounts with other vendors or employees. Found an instance Recommendation: Analyze relationships with multiple, discrete vendors linking to one bank account. Review for duplicate vendors. Review for high-risk travel agencies and hidden relationships. Page 26

27 Social Network Analysis, Continued Who Is Talking to Whom? The first 48 hours: Live server log files pulled for early case assessments Understanding a complex organization s true organization chart: identification of relationships, versus activities, amongst actors Filtered Page 27 27

28 Anomaly Detection Anomaly detection identifies unusual cases, or outliers, that do not conform to patterns of normal data. For example: In this graph, records A, B, and C would be anomalous. Page 28 28

29 Statistical Anomaly Detection (Letting Anomalies Identify Themselves) Statistically driven anomalies based on patterns in the data Incorporate statistical anomaly detection as an extra measure to identify potentially improper payments across the entire population, based on highest anomaly score. Page 29

30 Jackknife Resampling Systematically recomputes the statistic estimate, leaving out one or more observations at a time from the sample set Used to quality assure the model and/or find outliers by removing one transaction at a time to see if it makes a meaningful difference to the model Page 30

31 Page 31 Effective Deployment Considerations

32 Understanding Your Data Is the data available? Does the data cover the relevant attributes? Is the data messy? Is there enough data? Is domain expertise on the data available?? CONFIDENTIAL INFORMATION: Do not disclose Ernst & Young LLP 2013

33 Selecting the Best Predictive Modeling Projects Ease of obtaining relevant data High Invest Minimally Postpone or Avoid Priority Projects Cautiously Accept Low Business Importance/Impact/ROI High CONFIDENTIAL INFORMATION: Do not disclose Ernst & Young LLP 2013

34 No One Tool Does It All Visualization: Detect fraud within a business process. Detect Respond Statistical: Apply fraud insights to take action in real time when it matters. Case management: Turn fraud intelligence into action. Investigate Discover Pattern and link: Uncover hidden fraud and relationships. Page 34

35 Counter Fraud Framework A Process View unstructured structured Monitoring & Detection Tools Investigation Tools Pattern matching FINANCIAL ACCOUNTING DATA MASTER & REFERENCE DATA Library of counter fraud tests Text mining & advanced search Statistical & predictive INTERNAL RISK ELEMENTS EXTERNAL, SOCIAL MEDIA DATA Repeat the process: continuous auditing Big data processing platform Triage, stop payment and/or sample audit selection VISUALIZATION & RISK RANKING Case manager, task delegation and data refresh/ scripting automation Audit, shared services, compliance Investigative mindset Page 35

36 Five Success Factors in Deploying FDA 1. Focus on the low-hanging fruit; the priority of the first project matters. 2. Go beyond traditional rules-based tests incorporate big data thinking. 3. Communicate: Share information on early successes across departments/business units to gain broad support. 4. Leadership gets it funded, but interpretation of the results by experienced or trained professionals make the program successful. 5. Enterprise-wide deployment takes time; don t expect overnight adoption. Page 36

37 Forensic Data Analytics Deployment Models Solution as a Service (SaaS): Client logs into secure platform hosted by EY and conducts analysis and case management. Mobile support: EY sends a high-powered mobile kit to client site and performs analysis on-site with client. On-site deployment: Client purchases necessary hardware/ software. Service provider familiar with the business assists with configuration, test design, and training. Page 37

38 Compliance Analytics Vision Recap Internal Sources Data Governance and Collaboration Beneficiaries Shared svcs. data feeds ERP systems Entity analytics Predictive analytics Behavioral analytics Internal Audit Master & reference data Security intelligence Internal reports & communications External Sources Social media feeds Sanctions & watchlists News feeds & adverse media Context analytics Business intelligence Decision management Content management Compliance Analytics Platform Flexible approaches, reports, and capabilities for each beneficiary Changing risks requires flexible tools Knowing who is who is key to identifying patterns & opportunities Reduced false positives, better ROI Cross-enterprise view of exposures Expedient audits/investigations Data transparency, no black box Case management Forensic analysis Text analytics Social network analysis GeoSpatial analytics Big data, scalable platform, delivered on desktop or mobile device Legal & Compliance (including M&A) Shared Services & Finance BU Leadership & Corporate Other beneficiaries Page 38

39 Page 39 What s Ahead: Cognitive Computing

40 About Cognitive Computing Definition and Discussion Cognitive computing makes a new class of problems computable. It addresses complex situations that are characterized by ambiguity and uncertainty; in other words, it handles human kinds of problems. To respond to the fluid nature of users understanding of their problems, the cognitive computing system offers a synthesis not just of information sources but of influences, contexts, and insights. To do this, systems often need to weigh conflicting evidence and suggest an answer that is best rather than right. Cognitive computing systems make context computable. They identify and extract context features such as hour, location, task, history, or profile to present an information set that is appropriate for an individual or for a dependent application engaged in a specific process at a specific time and place. Page 40

41 Uses Link Analysis and Entity Extraction to Document Decision and Relationships Page 41

42 Entity Relationships Page 42

43 Watson-Like Cognitive Anti-Fraud Questions What investigations involved more than five suspects? What job title is most likely to commit travel and entertainment abuse fraud? What contract terms pose the highest risk of abusive trade discounts? In what division are we at risk of improper revenue recognition? Page 43

44 Questions and Discussion Vincent Walden Partner, EY Fraud Investigation & Dispute Services New York Page 44

45 Beyond Rules-Based Tests: The "Seven Wonder" Counter-Fraud Statistical Modeling Tests Vincent Walden, CFE, CPA, CITP 2015 Association of Certified Fraud Examiners, Inc.

Leading Practices to Leverage Forensic Data Analytics in Compliance Monitoring and Investigation

Leading Practices to Leverage Forensic Data Analytics in Compliance Monitoring and Investigation Leading Practices to Leverage Forensic Data Analytics in Compliance Monitoring and Investigation Table of contents 1 Proactive Compliance Monitoring 2 EY s First Annual Global Forensic Data Analytics Survey

More information

Integrating COSO s Fraud Risk Management Guide on an Enterprise Scale

Integrating COSO s Fraud Risk Management Guide on an Enterprise Scale Integrating COSO s Fraud Risk Management Guide on an Enterprise Scale September 15, 2017 Vincent Walden Partner EY Atlanta Delores White Director, Internal Audit Southern Company Scott Hulsey Chief Compliance

More information

Comprehensive Enterprise Solution for Compliance and Risk Monitoring

Comprehensive Enterprise Solution for Compliance and Risk Monitoring Comprehensive Enterprise Solution for Compliance and Risk Monitoring 30 Wall Street, 8th Floor New York, NY 10005 E inquiries@surveil-lens.com T (212) 804-5734 F (212) 943-2300 UNIQUE FEATURES OF SURVEILLENS

More information

Using Data Analytics to Detect Fraud

Using Data Analytics to Detect Fraud Using Data Analytics to Detect Fraud Other Data Analysis Techniques 2017 Association of Certified Fraud Examiners, Inc. Qualitative Data Analysis Most data analysis techniques require the use of data in

More information

Using Data Analytics to Detect Fraud

Using Data Analytics to Detect Fraud Using Data Analytics to Detect Fraud Introduction to Data Analytics Gerard M. Zack, CFE, CPA, CIA Managing Director, BDO USA, LLP 2017 Association of Certified Fraud Examiners, Inc. CPE Information 2017

More information

Big risks require big data thinking. Global Forensic Data Analytics Survey 2014

Big risks require big data thinking. Global Forensic Data Analytics Survey 2014 Big risks require big data thinking Contents Foreword 1 Executive summary 2 Big risks require big data thinking 5 Why use FDA: key benefits and adoption 11 Technology: the right tools for the right job

More information

ERNST & YOUNG. Spotlight On DR. RASHMI JOSHI

ERNST & YOUNG. Spotlight On DR. RASHMI JOSHI Spotlight On ERNST & YOUNG DR. RASHMI JOSHI Ernst & Young is a global leader in assurance, tax, transaction, and advisory services. We interviewed Assistant Director Dr. Rashmi Joshi at the 2011 European

More information

It s time to revisit your anti-corruption compliance program How to design an effective and defensible compliance program in response to global trends

It s time to revisit your anti-corruption compliance program How to design an effective and defensible compliance program in response to global trends It s time to revisit your anti-corruption compliance program How to design an effective and defensible compliance program in response to global trends Many legal and compliance officers are revisiting

More information

The State of Fraud in Government

The State of Fraud in Government Public and private organizations employ tools and applications for data analysis and predictive analytics to battle both the rising incidence of fraud and improper payments and the increasing cost of detecting

More information

Actimize Essentials AML. Cloud Based Anti-Money Laundering Solutions

Actimize Essentials AML. Cloud Based Anti-Money Laundering Solutions Actimize Essentials AML Cloud Based Anti-Money Laundering Solutions Essential Anti-Money Laundering Compliance Capabilities Growing Compliance Burdens for Financial Institutions of All Sizes As recent

More information

Fighting online payments fraud. SAS Banking and Insurance Day May 2014 Andy Scherpenberg, Fraud Expert, SAS

Fighting online payments fraud. SAS Banking and Insurance Day May 2014 Andy Scherpenberg, Fraud Expert, SAS Fighting online payments fraud SAS Banking and Insurance Day May 2014 Andy Scherpenberg, Fraud Expert, SAS Fraud is everywhere Internet Application Online Shopping Transfer Payment Credit Card Claims Darknet

More information

ORACLE ADVANCED FINANCIAL CONTROLS CLOUD SERVICE

ORACLE ADVANCED FINANCIAL CONTROLS CLOUD SERVICE ORACLE ADVANCED FINANCIAL CONTROLS CLOUD SERVICE Advanced Financial Controls (AFC) Cloud Service enables continuous monitoring of all expense and payables transactions in Oracle ERP Cloud, for potential

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to build and operate security operations centers (SOC) of any size (large, med,

More information

Effective implementation of COSO s new anti-fraud guidance

Effective implementation of COSO s new anti-fraud guidance Effective implementation of COSO s new anti-fraud guidance In September 2016, the Committee of Sponsoring Organizations of the Treadway Commission (COSO) published a new Fraud Risk Management Guide (Anti-fraud

More information

Actimize Essentials. Cloud-based Solutions for Financial Crime Prevention & Regulatory Compliance

Actimize Essentials. Cloud-based Solutions for Financial Crime Prevention & Regulatory Compliance Actimize Essentials Cloud-based Solutions for Financial Crime Prevention & Regulatory Compliance FIs of All Sizes Face Increasing Pressures From Financial Crime and Tightening Regulations As regulations

More information

How to improve your AML detection? Christopher Ghenne Principal Manager Fraud & Security Intelligence EMEA

How to improve your AML detection? Christopher Ghenne Principal Manager Fraud & Security Intelligence EMEA How to improve your AML detection? Christopher Ghenne Principal Manager Fraud & Security Intelligence EMEA Years of 14,010 SAS employees worldwide 93 of the top 100 on the 40 #1 BUSINESS ANALYTICS companies

More information

IBM SPSS Modeler Personal

IBM SPSS Modeler Personal IBM SPSS Modeler Personal Make better decisions with predictive intelligence from the desktop Highlights Helps you identify hidden patterns and trends in your data to predict and improve outcomes Enables

More information

Using Transactional Analysis for

Using Transactional Analysis for Using Transactional Analysis for Effective Fraud Detection Date: 15 th January 2009 Nishith Seth Seth Services.P. Ltd. www.sspl.net.in Cost Indirect costs: image, morale Fraud Issues & Impact Direct costs:

More information

How well does your procurement measure up?

How well does your procurement measure up? How well does your procurement measure up? Find out how KPMG and Coupa can help you achieve smarter spend management. May 2017 kpmg.com/us/coupa How well does your procurement measure up? 1 Optimizing

More information

Surveillance Program Design and Behavioral Analytics Implementation

Surveillance Program Design and Behavioral Analytics Implementation Surveillance Program Design and Behavioral Analytics Implementation Scott Jarrell Senior Manager EY #AnalyticsX C o p y r ig ht 201 6, SAS In sti tute In c. Al l r ig hts r ese rve d. EY Fraud Investigation

More information

Real Time Close. Case Study and Demo

Real Time Close. Case Study and Demo Real Time Close Case Study and Demo November 2017 1 Session Overview The next step in the evolution of financial performance management is Real Time Close (RTC) RTC will enable delivery of continuous financial

More information

NICE INCENTIVE COMPENSATION MANAGEMENT. NICE Incentive Compensation Management 6.2

NICE INCENTIVE COMPENSATION MANAGEMENT. NICE Incentive Compensation Management 6.2 NICE INCENTIVE COMPENSATION MANAGEMENT NICE Incentive Compensation Management 6.2 DRIVE SUCCESS WITH NICE INCENTIVE COMPENSATION MANAGEMENT 6.2 SOLUTION INTRODUCTION The NICE Incentive Compensation Management

More information

KPMG Intelligent Diligence An automated approach to KYC. kpmg.com/uk

KPMG Intelligent Diligence An automated approach to KYC. kpmg.com/uk KPMGIntelligence Diligence 0 KPMG Intelligent Diligence An automated approach to KYC kpmg.com/uk KPMGIntelligence Diligence 1 Key Features KPMG Intelligent Diligence( KPMG ID ) replicatesthe cognitive

More information

What s New In Microsoft Dynamics NAV 2013

What s New In Microsoft Dynamics NAV 2013 What s New In Microsoft Dynamics NAV 2013 Get ahead. Shape your own future. Today more than ever, small and midsize businesses like yours need solutions that drive success. Microsoft Dynamics NAV 2013,

More information

3 STEPS TO MAKE YOUR SHARED SERVICE ORGANIZATION A DIGITAL POWERHOUSE

3 STEPS TO MAKE YOUR SHARED SERVICE ORGANIZATION A DIGITAL POWERHOUSE GUIDE 3 STEPS TO MAKE YOUR SHARED SERVICE ORGANIZATION A DIGITAL POWERHOUSE www.celonis.com IN THIS GUIDE Shared-service organizations (SSOs) are about to get a digital upgrade. For decades, SSOs have

More information

PORTFOLIO AND TECHNOLOGY DIRECTION ARMISTEAD SAPP & RANDY GUARD

PORTFOLIO AND TECHNOLOGY DIRECTION ARMISTEAD SAPP & RANDY GUARD PORTFOLIO AND TECHNOLOGY DIRECTION ARMISTEAD SAPP & RANDY GUARD FOCUS MARKETS SAS Addressable Market Size $US Billions $14.7 2015 2019 $10.6 $9.6 $7.0 $7.9 $5.0 $2.6 $3.7 $5.7 $4.4 $3.0 $4.2 BUSINESS INTELLIGENCE

More information

Continuous Monitoring: Getting Results Today!

Continuous Monitoring: Getting Results Today! Continuous Monitoring: Getting Results Today! Gerard (Rod) Brennan, PhD, CFE Risk & Internal Control Officer NA, Siemens Corporation Jason A. Gross, CPA, CIA, CFE, CISA, ACDA Vice President, Controls Management,

More information

IBM AML compliance solution

IBM AML compliance solution IBM AML compliance solution Staying ahead of financial crimes Highlights Continuously harnesses a powerful array of advanced analytics that are available to proactively fight the long-term war against

More information

Continuous Auditing - A Delicate Chemistry

Continuous Auditing - A Delicate Chemistry Continuous Auditing - A Delicate Chemistry Continuous Auditing - A Delicate Chemistry - WeiserMazars LLP s Governance, Risk and Compliance (GRC) Group WeiserMazars LLP is an independent member firm of

More information

SAS Business Knowledge Series

SAS Business Knowledge Series 2014 SAS Business Knowledge Series A unique collaboration between SAS and a global network of industry experts who deliver the most current information on business practices, concepts, methodology and

More information

Managing Business Rules and Analytics as an Enterprise Asset

Managing Business Rules and Analytics as an Enterprise Asset Managing Business Rules and Analytics as an Enterprise Asset Discover Financial Services Business unit of Morgan Stanley Operates the Discover Card brands Largest proprietary credit card network in the

More information

Thomson Reuters SCREENING RESOLUTION SERVICE

Thomson Reuters SCREENING RESOLUTION SERVICE Thomson Reuters SCREENING RESOLUTION SERVICE Benefits Reduce the compliance burden and maximize existing staff resources Demonstrate a complete audit trail to regulators Improve regulatory compliance Adopt

More information

GIVING ANALYTICS MEANING AGAIN

GIVING ANALYTICS MEANING AGAIN GIVING ANALYTICS MEANING AGAIN GIVING ANALYTICS MEANING AGAIN When you hear the word analytics what do you think? If it conjures up a litany of buzzwords and software vendors, this is for good reason.

More information

Channel Incentive Study B2B Technology Industry

Channel Incentive Study B2B Technology Industry Channel Incentive Study B2B Technology Industry A CCI Report CCI conducted a study in Q4 of 2010 to assess the utilization of various incentive program types and their relative importance and/or effectiveness

More information

IBM Planning Analytics

IBM Planning Analytics Speed, agility and foresight Powered by IBM TM1 Highlights Automates manual, spreadsheet-based planning, budgeting, forecasting, reporting and analysis Links operational tactics to financial plans, synthesizes

More information

In-Memory Analytics: Get Faster, Better Insights from Big Data

In-Memory Analytics: Get Faster, Better Insights from Big Data Discussion Summary In-Memory Analytics: Get Faster, Better Insights from Big Data January 2015 Interview Featuring: Tapan Patel, SAS Institute, Inc. Introduction A successful analytics program should translate

More information

Verint Engagement Management Solution Brief. Overview of the Applications and Benefits of

Verint Engagement Management Solution Brief. Overview of the Applications and Benefits of Verint Engagement Management Solution Brief Overview of the Applications and Benefits of Verint Engagement Management November 2015 Table of Contents Introduction... 2 Verint Engagement Management Advantages...

More information

WHITE PAPER. The ACL Audit Analytic Capability Model: Leveraging analytics in the fight against fraud

WHITE PAPER. The ACL Audit Analytic Capability Model: Leveraging analytics in the fight against fraud WHITE PAPER The ACL Audit Analytic Capability Model: Leveraging analytics in the fight against fraud CONTENTS INTRODUCTION... 1 THE ANALYTIC CAPABILITY MODEL... 1 LEVEL 1 - BASIC... 3 Characteristics...

More information

HotScan Risk Screening Solutions Suite

HotScan Risk Screening Solutions Suite HotScan Risk Screening Solutions Suite Reduce risk and stay ahead of the regulatory curve Contents A modular approach to effective & efficient financial crime risk mitigation HotScan Payments Filter HotScan

More information

Enterprise intelligence in modern shipping

Enterprise intelligence in modern shipping Enterprise intelligence in modern shipping Leveraging commercial and cost performance with data analytics 7th Capital Link Greek Shipping Forum 16 February 2016 Agenda I. What is Enterprise Intelligence?

More information

Machine intelligence ascending

Machine intelligence ascending Machine intelligence ascending How robotic process automation, machine learning, and artificial intelligence will help define tomorrow s kinetic enterprise Tech Trends: Machine intelligence ascending Machine

More information

Mitigating Corruption Risk When Acquiring Companies in High-Risk Jurisdictions

Mitigating Corruption Risk When Acquiring Companies in High-Risk Jurisdictions Mitigating Corruption Risk When Acquiring Companies in High-Risk Jurisdictions By Bill Olsen, Scott Nemeroff, Dan Reynolds and Alex Koltsov Grant Thornton The hallmark of merger and acquisition activity

More information

Fraud Detection for SWIFT and Payments

Fraud Detection for SWIFT and Payments Fraud Detection for SWIFT and Payments March 28, 2017 2:00 3:00 pm EST Dan Barta, Sr. Enterprise Fraud Specialist SAS Institute Question and Answer If you have a question during the presentation, please

More information

Arjun Kalra - Senior Manager - Crowe Horwath Risk Consulting Practice Chuck Taylor BSA Officer City National Bank

Arjun Kalra - Senior Manager - Crowe Horwath Risk Consulting Practice Chuck Taylor BSA Officer City National Bank Arjun Kalra - Senior Manager - Crowe Horwath Risk Consulting Practice Chuck Taylor BSA Officer City National Bank Discuss the following Regarding Anti-Money Laundering (AML) Systems AML System Implementations

More information

Global Benchmark. Role of data analytics for internal fraud detection

Global Benchmark. Role of data analytics for internal fraud detection Global Benchmark Role of data analytics for internal fraud detection 2 overview According to the latest findings in the Ernst & Young Global Forensic Data Analytics Survey 2016 and 2016 ACFE Report to

More information

Business is being transformed by three trends

Business is being transformed by three trends Business is being transformed by three trends Big Cloud Intelligence Stay ahead of the curve with Cortana Intelligence Suite Business apps People Custom apps Apps Sensors and devices Cortana Intelligence

More information

Artificial Intelligence & Cognitive Computing for Lawyers and Their Clients

Artificial Intelligence & Cognitive Computing for Lawyers and Their Clients Artificial Intelligence & Cognitive Computing for Lawyers and Their Clients by Brian Kuhn, Esq. Partner, Watson Legal Watson Legal Co-Founder & Co-Leader I. AI/Cognitive Computing: the Future is Arriving.

More information

Who Does What, When, and How for a Divestiture?

Who Does What, When, and How for a Divestiture? Who Does What, When, and How for a Divestiture? Anil Kukreja Chief Operating Officer, eprentise PVT Ihtesham Uddin Sr. Director, Product Development, eprentise Webinar Mechanics Submit text questions.

More information

Augmenting The Future: The Emerging Role of the Cognitive Insurer Where Digital Business meets Digital Intelligence

Augmenting The Future: The Emerging Role of the Cognitive Insurer Where Digital Business meets Digital Intelligence Augmenting The Future: The Emerging Role of the Cognitive Insurer Where Digital Business meets Digital Intelligence Kelley Buchanan VP & Partner, Strategy Advisory Leader - Insurance The Market Dynamics:

More information

Robotic Process Automation. Reducing process costs, increasing speed and improving accuracy Process automation with a virtual workforce

Robotic Process Automation. Reducing process costs, increasing speed and improving accuracy Process automation with a virtual workforce Robotic Process Automation Reducing process costs, increasing speed and improving accuracy Process automation with a virtual workforce What is Robotic Process Automation (RPA)? Advanced macros? Robots...

More information

Digital Insight CGI IT UK Ltd. Digital Customer Experience. Digital Employee Experience

Digital Insight CGI IT UK Ltd. Digital Customer Experience. Digital Employee Experience Digital Insight Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd. Contents Introduction Business

More information

IBM QRadar SIEM. Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights

IBM QRadar SIEM. Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights IBM Security Data Sheet IBM QRadar SIEM Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights Use IBM QRadar Security Information and Event Management, powered by the

More information

Digital Finance in Shared Services & GBS. Deloitte: Piyush Mistry & Oscar Hamilton LBG: Steve McKenna

Digital Finance in Shared Services & GBS. Deloitte: Piyush Mistry & Oscar Hamilton LBG: Steve McKenna Digital Finance in Shared Services & GBS Deloitte: Piyush Mistry & Oscar Hamilton LBG: Steve McKenna Agenda Agenda Content Digital Finance of the Future Uncover the picture of what the future of Finance

More information

FRAUD SCHEMES. South Carolina HFMA Finance & Reimbursement Forum. November 13, 2012 WITH RELATED INTERNAL CONTROLS

FRAUD SCHEMES. South Carolina HFMA Finance & Reimbursement Forum. November 13, 2012 WITH RELATED INTERNAL CONTROLS FRAUD SCHEMES WITH RELATED INTERNAL CONTROLS South Carolina HFMA Finance & Reimbursement Forum November 13, 2012 2 Fraud Facts: Estimated loss of 5% of annual revenues to occupational fraud Financial statement

More information

Turn Your Business Vision into Reality with Microsoft Dynamics NAV

Turn Your Business Vision into Reality with Microsoft Dynamics NAV Turn Your Business Vision into Reality with Microsoft Dynamics NAV You have worked hard to build a vision for your business. With Microsoft Dynamics NAV, you can turn that vision into reality with a solution

More information

Integrated Social and Enterprise Data = Enhanced Analytics

Integrated Social and Enterprise Data = Enhanced Analytics ORACLE WHITE PAPER, DECEMBER 2013 THE VALUE OF SOCIAL DATA Integrated Social and Enterprise Data = Enhanced Analytics #SocData CONTENTS Executive Summary 3 The Value of Enterprise-Specific Social Data

More information

Chapter 8 Analytical Procedures

Chapter 8 Analytical Procedures Slide 8.1 Principles of Auditing: An Introduction to International Standards on Auditing Chapter 8 Analytical Procedures Rick Hayes, Hans Gortemaker and Philip Wallage Slide 8.2 Analytical procedures Analytical

More information

Who Does What, When, and How for a Divestiture?

Who Does What, When, and How for a Divestiture? Who Does What, When, and How for a Divestiture? Session ID: #10813 Prepared by: Ihtesham Uddin Sr. Director, Product Development eprentise, LLC @eprentise Learning Objectives Objective 1: Understand key

More information

AUDIT RISK ASSESSMENT AND RESPONSES TO ASSESSED RISK BY Geoffrey Byamugisha Partner, Ernst & Young. Lessons on Audit Risk. Responding to fraud risk

AUDIT RISK ASSESSMENT AND RESPONSES TO ASSESSED RISK BY Geoffrey Byamugisha Partner, Ernst & Young. Lessons on Audit Risk. Responding to fraud risk AUDIT RISK ASSESSMENT AND RESPONSES TO ASSESSED RISK BY Geoffrey Byamugisha Partner, Ernst & Young ICPAU Page 1 COURSE CONTENT Lessons on Audit Risk Identification of audit risk and audit risk assessment

More information

Enterprise Transformation Methodology Strategic Roadmap Development

Enterprise Transformation Methodology Strategic Roadmap Development Enterprise Transformation Methodology Strategic Roadmap Development White Paper Contents Think Big, Start Small, Deliver Quickly... 3 Transformation Roadmap... 3 Fundamental Business Drivers... 4 Enterprise

More information

BEST PRACTICES IN AP AUTOMATION

BEST PRACTICES IN AP AUTOMATION MINUTE READ TIME WHITE PAPER ACCOUNTS PAYABLE BEST PRACTICES IN AP AUTOMATION Consolidating Workflow Outside the SAP System www.esker.com BEST PRACTICES IN AP AUTOMATION Consolidating Workflow Outside

More information

Automating Audit Analytics: The benefits, the concepts and the road to Continuous Auditing

Automating Audit Analytics: The benefits, the concepts and the road to Continuous Auditing Automating Audit Analytics: The benefits, the concepts and the road to Continuous Auditing Agenda 1. Why automation for data based audits? 2. What options are available? 3. Automation Considerations 4.

More information

The Best of Crimes, the Worst of Crimes: Fraud Stories That Prove the Truth Is in the Transactions

The Best of Crimes, the Worst of Crimes: Fraud Stories That Prove the Truth Is in the Transactions Technology for Business Assurance The Best of Crimes, the Worst of Crimes: Fraud Stories That Prove the Truth Is in the Transactions Copyright 2009 ACL Services Ltd. Peter Millar Director, Technology Application

More information

Model Risk Management

Model Risk Management Model Risk Management Brian Nappi, Crowe Horwath 2017 Crowe Horwath LLP Agenda Regulatory Perspectives on Model Risk Management Model Basics MRM Audit Considerations MRM Best Practices FAQ s 2017 Crowe

More information

Fraud Risk Management

Fraud Risk Management Fraud Risk Management Using Automated Continuous Monitoring Tools 2017 Association of Certified Fraud Examiners, Inc. Discussion Questions 1. Does your organization use continuous and/or automated monitoring

More information

Experience the commitment. CGI Exploration2Revenue TM Business Suite. Optimize your upstream back office

Experience the commitment. CGI Exploration2Revenue TM Business Suite. Optimize your upstream back office Experience the commitment CGI Exploration2Revenue TM Business Suite Optimize your upstream back office Delivering a competitive edge Today s oil and gas companies are challenged to lower the costs of running

More information

INTEGRATING FORENSIC INVESTIGATION TECHNIQUES INTO INTERNAL AUDITING

INTEGRATING FORENSIC INVESTIGATION TECHNIQUES INTO INTERNAL AUDITING INTEGRATING FORENSIC INVESTIGATION TECHNIQUES INTO INTERNAL AUDITING The internal auditors roles in combating fraud are becoming more profound within an organization. Internal auditors may assume a variety

More information

Infor PM 10. Do business better.

Infor PM 10. Do business better. Infor PM 10 Infor PM is designed for companies in all industries that seek to better monitor, measure, and manage their business performance in real time. Do business better. The speed, complexity, and

More information

Harnessing the Power of IBM Business Analytics Through Application Specific Licensing

Harnessing the Power of IBM Business Analytics Through Application Specific Licensing Harnessing the Power of IBM Business Analytics Through Application Specific Licensing David Albert WW ASL Business Development and Technical Manager Business Analytics Business Analytics software Agenda

More information

1. Search, for finding individual or sets of documents and files

1. Search, for finding individual or sets of documents and files WHITE PAPER TURNING UNSTRUCTURED TEXT INTO INSIGHT Extending Business Intelligence With Text Analysis and Search EXECUTIVE SUMMARY While traditional business intelligence (BI) has transformed business

More information

41880 Introduction to Hyperion Financial Management. Mike Malwitz Director Product Strategy Oracle Enterprise Performance Management

41880 Introduction to Hyperion Financial Management. Mike Malwitz Director Product Strategy Oracle Enterprise Performance Management 41880 Introduction to Hyperion Financial Management Mike Malwitz Director Product Strategy Oracle Enterprise Performance Management Agenda Customer needs Solving financial consolidation and reporting issues

More information

Leverage T echnology: July 19 th, 2013 Adil Khan. Move Your Business Forward. Copyright. Fulcrum Information Technology, Inc.

Leverage T echnology: July 19 th, 2013 Adil Khan. Move Your Business Forward. Copyright. Fulcrum Information Technology, Inc. Life After ERP Go-Live: Navigating to Nirvana Learn how leading organizations are utilizing Advanced Controls to make systematic improvements in their ERP systems to achieve expected benefits of ERP systems

More information

Proactive Listening: Taking Action to Meet Customer Expectations

Proactive Listening: Taking Action to Meet Customer Expectations 2013 Proactive Listening: Taking Action to Meet Customer Expectations Summary: Proactive listening lets your company meet your customers demands for coordinated, responsive treatments. A proactive listening

More information

IBM SPSS Statistics Editions

IBM SPSS Statistics Editions Editions Get the analytical power you need for better decision-making Why use IBM SPSS Statistics? is the world s leading statistical software. It enables you to quickly dig deeper into your data, making

More information

Messaging structure. By By Persona Persona. Big Data & Analytics in MM. Business Leader / LOB Finance Marketing IT. Business Analytics in MM

Messaging structure. By By Persona Persona. Big Data & Analytics in MM. Business Leader / LOB Finance Marketing IT. Business Analytics in MM structure for for Midmarket Midmarket By By Big Data & Analytics in MM Business Analytics in MM Big Data in MM Business Leader / LOB Finance Marketing IT Page 1 LOB: Business Owner-Leader / Department

More information

Digital Industries Apprenticeship: Occupational Brief. Software Tester. March 2016

Digital Industries Apprenticeship: Occupational Brief. Software Tester. March 2016 Digital Industries Apprenticeship: Occupational Brief Software Tester March 2016 1 Digital Industries Apprenticeships: Occupational Brief Level 4 Software Tester Apprenticeship Minimum Standards and Grading

More information

Steven Gibbs IBM Business Analytics Channels Sales Leader NEIOT 2010 IBM Corporation

Steven Gibbs IBM Business Analytics Channels Sales Leader NEIOT 2010 IBM Corporation Business Partner Strategy 2011 Switzerland Steven Gibbs IBM Business Analytics Channels Sales Leader NEIOT 2010 IBM Corporation Agenda 11:00-11:30 Renewals Licensing, Migrations, Pricing, 11:30-12.00 Software

More information

How Artificial Intelligence can help during the Due Diligence process for Mergers & Acquisitions. Complimentary ebook offered by

How Artificial Intelligence can help during the Due Diligence process for Mergers & Acquisitions. Complimentary ebook offered by How Artificial Intelligence can help during the Due Diligence process for Mergers & Acquisitions Complimentary ebook offered by THE CHALLENGE WITH EVERY M&A PROCESS: FINDING RELEVANT INFORMATION In all

More information

KnowledgeENTERPRISE FAST TRACK YOUR ACCESS TO BIG DATA WITH ANGOSS ADVANCED ANALYTICS ON SPARK. Advanced Analytics on Spark BROCHURE

KnowledgeENTERPRISE FAST TRACK YOUR ACCESS TO BIG DATA WITH ANGOSS ADVANCED ANALYTICS ON SPARK. Advanced Analytics on Spark BROCHURE FAST TRACK YOUR ACCESS TO BIG DATA WITH ANGOSS ADVANCED ANALYTICS ON SPARK Are you drowning in Big Data? Do you lack access to your data? Are you having a hard time managing Big Data processing requirements?

More information

CREATING A FRAUD RISK ASSESSMENT AND IMPLEMENTING A CONTINUOUS MONITORING PROGRAM

CREATING A FRAUD RISK ASSESSMENT AND IMPLEMENTING A CONTINUOUS MONITORING PROGRAM CREATING A FRAUD RISK ASSESSMENT AND IMPLEMENTING A CONTINUOUS MONITORING PROGRAM Compliance professionals around the world are struggling with how to do more with less. In order to provide effective assurance

More information

Financial Crime Mitigation

Financial Crime Mitigation Financial Crime Mitigation A uniquely flexible range of intelligent, versatile solutions for financial institutions, large and small, to combat financial crime. Introduction Our Financial Crime Mitigation

More information

Anti Money Laundering Compliance Solutions. Copyright 2016 Allsec Technologies. All rights reserved.

Anti Money Laundering Compliance Solutions. Copyright 2016 Allsec Technologies. All rights reserved. Anti Money Laundering Compliance Solutions Copyright 2016 Allsec Technologies. All rights reserved. Contents Allsec Overview Information Security Credentials AML-as-a-Service Case Study 2016 Allsec Technologies.

More information

What does an external auditor look for in SAP R/3 during SOX 404 Audits? Ram Bapu, CISSP, CISM Sandra Keigwin, CISSP

What does an external auditor look for in SAP R/3 during SOX 404 Audits? Ram Bapu, CISSP, CISM Sandra Keigwin, CISSP What does an external auditor look for in SAP R/3 during SOX 404 Audits? Ram Bapu, CISSP, CISM Sandra Keigwin, CISSP What does an external auditor look for in SAP during SOX 404 Audits? Corporations have

More information

EY Advisory: Driving business performance

EY Advisory: Driving business performance EY Advisory: Driving business performance Advisory EY s consulting practice Helping clients grow, protect and optimize their businesses Page 1 EY Advisory by the numbers 15,000+ Americas 20,000+ EMEIA

More information

Transformation in the Internal Audit Function Neil White October 5, 2017

Transformation in the Internal Audit Function Neil White October 5, 2017 Transformation in the Internal Audit Function Neil White October 5, 2017 2017 Deloitte Global Chief Audit Executive (CAE) Forum Key Opportunities Key Insights Deliver advanced analytics and visualization

More information

SAP Predictive Analytics Suite

SAP Predictive Analytics Suite SAP Predictive Analytics Suite Tania Pérez Asensio Where is the Evolution of Business Analytics Heading? Organizations Are Maturing Their Approaches to Solving Business Problems Reactive Wait until a problem

More information

Common Customer Use Cases in FSI

Common Customer Use Cases in FSI Common Customer Use Cases in FSI 1 Marketing Optimization 2014 2014 MapR MapR Technologies Technologies 2 Fortune 100 Financial Services Company 104M CARD MEMBERS 3 Financial Services: Recommendation Engine

More information

Building Cognitive applications with Watson services on IBM Bluemix

Building Cognitive applications with Watson services on IBM Bluemix BusinessConnect A New Era of Thinking Building Cognitive applications with services on Bluemix Bert Waltniel Cloud 1 2016 Corporation A New Era of Thinking What is Bluemix? Your Own Hosted Apps / Services

More information

Quick Facts. Driven by Science. 3 Locations. 26 Years. R&D & Innovation Teams. 42 Country Footprint. 9 Languages.

Quick Facts. Driven by Science. 3 Locations. 26 Years. R&D & Innovation Teams. 42 Country Footprint. 9 Languages. Corporate Brief Quick Facts 26 Years Driven by Science R&D & Innovation Teams 3 Locations Of expertise in pattern recognition Artificial intelligence, RNN & Machine learning Ability to be quick & flexible

More information

Welcome to the postmodern era for public sector ERP

Welcome to the postmodern era for public sector ERP Welcome to the postmodern era for public sector ERP Time to update your public sector enterprise resource planning (ERP)? Consider a postmodern strategy to address your unique requirements. Welcome to

More information

The Road to Continuous Assurance. Jason A. Gross, CPA, CIA, CFE, CISA, ACDA Vice President, Controls Management Siemens Financial Services, Inc.

The Road to Continuous Assurance. Jason A. Gross, CPA, CIA, CFE, CISA, ACDA Vice President, Controls Management Siemens Financial Services, Inc. The Road to Continuous Assurance Jason A. Gross, CPA, CIA, CFE, CISA, ACDA Vice President, Controls Management Siemens Financial Services, Inc. Challenge Statement: Implement a CCM program for the Organization

More information

Crowe Caliber. Using Technology to Enhance AML Model Risk Management Programs and Automate Model Calibration. Audit Tax Advisory Risk Performance

Crowe Caliber. Using Technology to Enhance AML Model Risk Management Programs and Automate Model Calibration. Audit Tax Advisory Risk Performance Crowe Caliber Using Technology to Enhance AML Model Risk Management Programs and Automate Model Calibration Audit Tax Advisory Risk Performance The Unique Alternative to the Big Four Crowe Caliber: Using

More information

ACFE FRAUD PREVENTION CHECK-UP ASSOCIATION OF CERTIFIED FRAUD EXAMINERS

ACFE FRAUD PREVENTION CHECK-UP ASSOCIATION OF CERTIFIED FRAUD EXAMINERS ACFE FRAUD PREVENTION ASSOCIATION OF CERTIFIED FRAUD EXAMINERS ACFE FRAUD PREVENTION One of the ACFE s most valuable fraud prevention resources, the ACFE Fraud Prevention Check-Up is a simple yet powerful

More information

Third Party Risk Management ( TPRM ) Transformation

Third Party Risk Management ( TPRM ) Transformation Third Party Risk Management ( TPRM ) Transformation September 20, 2017 Internal use only An introduction to TPRM What is a Third Party relationship? A Third Party relationship is any business arrangement

More information

Energy Future Holdings (EFH)

Energy Future Holdings (EFH) Energy Future Holdings (EFH) Inclusion of Data Analytics into the Internal Audit Lifecycle June 3, 2015 Starting Place Baseline Questions Pertaining to the utilization of data analytics in the internal

More information

The 2014 Guide to SAP Enterprise Performance Management (EPM) Solutions: An excerpt. David Williams SAP

The 2014 Guide to SAP Enterprise Performance Management (EPM) Solutions: An excerpt. David Williams SAP The 2014 Guide to SAP Enterprise Performance Management (EPM) Solutions: An excerpt David Williams SAP Performance Management Challenges for Finance The new normal for Finance professionals Volatile economic

More information

Leveraging Data Analytics for Customer Support Efficiency

Leveraging Data Analytics for Customer Support Efficiency Leveraging Data Analytics for Customer Support Efficiency October 6, 2016 Kelly Hoopes Senior Consultant Service Strategies Overview Discussion Topics Types of Data Structured vs. Unstructured Reporting

More information

Achieving customer intimacy with IBM SPSS products

Achieving customer intimacy with IBM SPSS products Achieving customer intimacy with IBM SPSS products Transformative technologies for the new era of customer interactions Highlights: Customer intimacy is an innovative strategy for helping organizations

More information

Smarter Planet Meets Manufacturing: Big Data and Analytics

Smarter Planet Meets Manufacturing: Big Data and Analytics Smarter Planet Meets Manufacturing: Big Data and Analytics Bruce Anderson General Manager Global Electronics Industry, IBM As we look at the electronics industry landscape today, there are at least five

More information

SAP Leonardo Machine Learning Enabling the Intelligent Enterprise

SAP Leonardo Machine Learning Enabling the Intelligent Enterprise SAP Leonardo Machine Learning Enabling the Intelligent Enterprise Markus Noga Head of Machine Learning SAP Innovation Center Network 2 SAP Leonardo enables the intelligent enterprise 76% of the world s

More information