Documente Academic
Documente Profesional
Documente Cultură
CopyrightFraudResourceNet LLC
CopyrightFraudResourceNet LLC
1
3/19/2014
CopyrightFraudResourceNet LLC
CopyrightFraudResourceNet LLC
2
3/19/2014
Webinar Housekeeping
This webinar and its material are the property of FraudResourceNet LLC. Unauthorized
usage or recording of this webinar or any of its material is strictly forbidden. We are
recording the webinar and you will be provided with a link access to that recording as
detailed below. Downloading or otherwise duplicating the webinar recording is expressly
prohibited.
Webinar recording link will be sent via email within 5-7 business days.
NASBA rules require us to ask polling questions during the Webinar and CPE certificates
will be sent via email to those who answer ALL the polling questions
The CPE certificates and link to the recording will be sent to the email address you
registered with in GTW. We are not responsible for delivery problems due to spam
filters, attachment restrictions or other controls in place for your email client.
Submit questions via the chat box on your screen and we will answer them either during
or at the conclusion.
After the Webinar is over you will have an opportunity to provide feedback. Please
complete the feedback questionnaire to help us continuously improve our Webinars
If GTW stops working you may need to close and restart. You can always dial in and
listen and follow along with the handout.
CopyrightFraudResourceNet LLC
Disclaimers
6
CopyrightFraudResourceNet LLC
3
3/19/2014
Learning Objectives
CopyrightFraudResourceNet LLC
Agenda
Introduction
In the news: Costliest forms of fixed asset and inventory
fraud
Fixed asset and inventory fraudsters
AssetCo case
Planning for fixed asset and/or inventory fraud
engagements
Data gathering and software introduction
Discovery with data analysis: Is there fraud at AssetCo
Red flag detection and collusion
Finding fixed asset and inventory fraud and next steps
CopyrightFraudResourceNet LLC
4
3/19/2014
CopyrightFraudResourceNet LLC
Fraud schemes
Fixed Assets
Booking fictitious assets
Misrepresenting asset valuation
Improper capitalization
Asset theft
Inventory
Stealing inventory
Diverting inventory in transit
Manipulating inventory quantities on hand / creating phantom
inventory
Inflating inventory costs
Misrepresenting inventory valuation
Reversing inventory adjustments at period-end
CopyrightFraudResourceNet LLC
5
3/19/2014
Polling Question 1
What percentage of all frauds are non-cash schemes
(e.g. financial statement frauds)?
A 5%
B 10%
C 15%
D 25%
CopyrightFraudResourceNet LLC
CopyrightFraudResourceNet LLC
6
3/19/2014
Perpetrators of fraud
CopyrightFraudResourceNet LLC
Create Couple
Handle ofamounts
huge TOPCAATS selling points
of data Handle limited amounts of data
opportunities
CopyrightFraudResourceNet LLC
7
3/19/2014
Planyour
testing
Request
Review
Data
Continuous
Learning
Evaluateand Obtainand
Followup CleanData
Carryout
testing
CopyrightFraudResourceNet LLC
8
3/19/2014
CopyrightFraudResourceNet LLC
CopyrightFraudResourceNet LLC
9
3/19/2014
Polling Question 2
Choose all of the following that are components of the
data analytics cycle:
A Request data
B Clean data
C Conduct testing
D Review
E All of the above
CopyrightFraudResourceNet LLC
10
3/19/2014
Operations Manager
Assumed CCTV cameras were not working
Thought he would never get caught
Hadnt had a raise in over 3 years
Worked at AssetCo for 10 years
Claims he had not stolen anything before
Needed the extra money to pay the rent
CopyrightFraudResourceNet LLC
Planning
CopyrightFraudResourceNet LLC
11
3/19/2014
Assertion Risks
CopyrightFraudResourceNet LLC
Polling Question 3
Which three of these would normally be the primary
focus when looking for inventory asset fraud using
data analysis?
A Completeness
B Existence
C Accuracy
D Valuation
E Ownership
F Presentation
CopyrightFraudResourceNet LLC
12
3/19/2014
CopyrightFraudResourceNet LLC
CopyrightFraudResourceNet LLC
13
3/19/2014
CopyrightFraudResourceNet LLC
Data gathering
Request all data fields and files in line with desired tests
Inventory Sales
Part number Sold quantity
Part description Sales price
Unit cost
Transfer to COGS
Quantity
Total value Customer ID, name, address
Part status (e.g. current, obsolete) Date of sale
Inventory purchases Date of transfer to CoGS
GRN date
GRN quantity
Unit cost
Vendor ID, name, address
Purchase order number
Posted by and approved by ID
Budgets by vendor or product
Comments
CopyrightFraudResourceNet LLC
14
3/19/2014
Fixed assets
Asset ID
Depreciation for period
Accumulated depreciation
Net book value
Asset description
Date of purchase
Date of sale
Date of disposal
Loss / Gain on Sale
Acquisition revaluations and dates
CopyrightFraudResourceNet LLC
Polling Question 4
Which of the following are useful tests for inventory
manipulation?
CopyrightFraudResourceNet LLC
15
3/19/2014
CopyrightFraudResourceNet LLC
1. Assets under-depreciated
CopyrightFraudResourceNet LLC
16
3/19/2014
3. Duplicated assets
CopyrightFraudResourceNet LLC
6. Significant additions
CopyrightFraudResourceNet LLC
17
3/19/2014
CopyrightFraudResourceNet LLC
CopyrightFraudResourceNet LLC
18
3/19/2014
CopyrightFraudResourceNet LLC
CopyrightFraudResourceNet LLC
19
3/19/2014
9. Aged inventory
CopyrightFraudResourceNet LLC
Polling Question 5
Sales prices that are lower than cost held in stock is a
red flag of inventory fraud
A True
B. False
CopyrightFraudResourceNet LLC
20
3/19/2014
Next steps
CopyrightFraudResourceNet LLC
Fraud prevention
Fixed Assets
Implement capital vs expense items policy
Add review controls for capitalization of assets over $X
Add system controls to prevent capitalization of assets under $X
Default depreciation calculation based on asset category
Add test of comparison of anticipated value to book value
Implement capital and inventory budgetary review
Add surprise physical verification of assets
Obtain expected industry valuation and decline by year for significant assets
Inventory
Add control at month-end over CoGS transfer period
Add system controls over price and quantity adjustments
Implement provisioning policy for aged / obsolete stock
Perform audited counts of all inventory of high volume sites (PI or annual)
Corporate oversight of significant transfers between sites
Implement inventory budgetary review
CopyrightFraudResourceNet LLC
21
3/19/2014
Fraud prevention
Continuous Monitoring
Complete risk assessment and develop annual audit plan
Determine monthly and quarterly testing by priority
Implement data analysis testing and incorporate into annual audit
plan
Perform and complete ongoing control assessments
CopyrightFraudResourceNet LLC
Questions?
CopyrightFraudResourceNet LLC
22
3/19/2014
Thank You!
Peter Goldmann
FraudResourceNet LLC
800-440-2261
www.fraudresourcenet.com
pgoldmann@fraudresourcenet.com
Jim Kaplan
FraudResourceNet LLC
800-385-1625
www.fraudresourcenet.com
jkaplan@fraudresourcenet.com
Stefan Davis
Reinvent Data Ltd
www.topcaats.com
stefan.davis@reinventdata.com
CopyrightFraudResourceNet LLC
ComingUp
Sign up at:
http://www.fraudresourcenet.com
CopyrightFraudResourceNet LLC
23