SlideShare a Scribd company logo
6/18/2014
1
Copyright © FraudResourceNet LLC
Quick Response Fraud Detection using Data Analytics: 
Hitting the Ground Running using Technology in a 
Suspected Fraud Case
June 18, 2014
Special Guest Presenter:
Rich Lanza
Copyright © FraudResourceNet LLC
President and Founder of White Collar Crime 101
 Publisher of White-Collar Crime Fighter
 Developer of FraudAware® Anti-Fraud Training
 Monthly Columnist, The Fraud Examiner, ACFE
Newsletter
Member of Editorial Advisory Board, ACFE
Author of “Fraud in the Markets”
• Explains how fraud fueled the financial crisis.
About Peter Goldmann, MSc., CFE
6/18/2014
2
Copyright © FraudResourceNet LLC
About Jim Kaplan, MSc, CIA, CFE
• President and Founder of
AuditNet®, the global resource for
auditors (now available on Apple
and Android devices)
• Auditor, Web Site Guru,
• Internet for Auditors Pioneer
• Recipient of the IIA’s 2007
Bradford Cadmus Memorial
Award.
• Author of “The Auditor’s Guide to
Internet Resources” 2nd Edition
Copyright © FraudResourceNet LLC
Richard B. Lanza, CPA, CFE, CGMA
• Over two decades of ACL and Excel software usage
• Wrote the first practical ACL publication on how to
use the product in 101 ways (101 ACL
Applications)
• Has written and spoken on the use of audit data
analytics for over 15 years.
• Received the Outstanding Achievement in Business
Award by the Association of Certified Fraud
Examiners for developing the publication
Proactively Detecting Fraud Using Computer Audit
Reports as a research project for the IIA
• Recently was a contributing author of:
• Global Technology Audit Guide (GTAG #13) Fraud
in an Automated World - IIA
• Data Analytics – A Practical Approach - research
whitepaper for the Information System
Accountability Control Association.
• “Cost Recovery – Turning Your Accounts Payable
Department into a Profit Center” – Wiley & Sons.
Please see full bio at www.richlanza.com
6/18/2014
3
Copyright © FraudResourceNet LLC
The CPE certificates and link to the
recording will be sent to the email
address you registered with in GTW.
We are not responsible for delivery
problems due to spam filters,
attachment restrictions or other
controls in place for your email client.
Submit questions via the chat box on
your screen and we will answer them
either during or at the conclusion.
After the Webinar is over you will have
an opportunity to provide feedback.
Please complete the feedback
questionnaire to help us continuously
improve our Webinars
If GTW stops working you may need to
close and restart. You can always dial
in and listen and follow along with the
handout.
This webinar and its material are the
property of FraudResourceNet LLC.
Unauthorized usage or recording of
this webinar or any of its material is
strictly forbidden. We are recording the
webinar and you will be provided with a
link access to that recording as
detailed below. Downloading or
otherwise duplicating the webinar
recording is expressly prohibited.
Webinar recording link will be sent via
email within 5-7 business days.
NASBA rules require us to ask polling
questions during the Webinar and CPE
certificates will be sent via email to
those who answer ALL the polling
questions
Webinar Housekeeping
Copyright © FraudResourceNet LLC
The views expressed by the presenters do not necessarily represent the views, 
positions, or opinions of FraudResourceNet LLC (FRN) or the presenters’ 
respective organizations. These materials, and the oral presentation 
accompanying them, are for educational purposes only and do not constitute 
accounting or legal advice or create an accountant‐client relationship. 
While FRN makes every effort to ensure information is accurate and complete, 
FRN makes no representations, guarantees, or warranties as to the accuracy or 
completeness of the information provided via this presentation. FRN 
specifically disclaims all liability for any claims or damages that may result from 
the information contained in this presentation, including any websites 
maintained by third parties and linked to the FRN website
Any mention of commercial products is for information only; it does not imply 
recommendation or endorsement by FraudResourceNet LLC
6
Disclaimers
6/18/2014
4
Copyright © FraudResourceNet LLC
Today’s Agenda
 Which data files should be requested in the area of concern or
what should the data request look like when there is no specific
area of concern.
 Using a fast-track process to validating data and understanding
statistical norms for benchmarking purposes. Statistical
techniques to be utilized include: standard deviation, a unique
method of combining Benford’s Law and other digital analysis
techniques, time/size stratifications, and value/volume difference
scattergraphs.
 How the general ledger can provide a digital road map for analytics
for fraud (and errors) within the organization.
 How to quickly gather report ideas and techniques for analysis, as
well as, obtain a list of some of the top fraud tests by process area.
(continued)
Copyright © FraudResourceNet LLC
Today’s Agenda (continued)
 How to combine your reports for maximum impact and
understanding this concept within a specific review of accounts
payable. Additional report techniques that can be applied to
expected data files include user transaction analysis, data file
change reviews, and external data mapping.
 Understand a provided Excel macro tool (free as part of the
course) that will quickly map an entire hard drive in minutes.
Various applications of this tool will be presented.
 Your Questions
 Conclusion

Recommended for you

Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit

Webinar series from FraudResourceNet LLC on Preventing and Detecting Fraud Using Data Analytics. Recordings of these Webinars are available for purchase from our Website fraudresourcenet.com This Webinar focused on fraud detection using data analytic software (Excel, ACL, IDEA) FraudResourceNet (FRN) is the only searchable portal of practical, expert fraud prevention, detection and audit information on the Web. FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware. The two entities designed FRN as the “go-to”, easy-to-use source of “how-to” fraud prevention, detection, audit and investigation templates, guidelines, policies, training programs (recorded no CPE and live with CPE) and articles from leading subject matter experts. FRN is a continuously expanding and improving resource, offering auditors, fraud examiners, controllers, investigators and accountants a content-rich source of cutting-edge anti-fraud tools and techniques they will want to refer to again and again.

preventingideaexcel
Babok2 Big Picture
Babok2 Big PictureBabok2 Big Picture
Babok2 Big Picture

The document outlines the Business Analysis Body of Knowledge (BABOK), which provides best practices for business analysis. It details 36 techniques used in business analysis across 6 knowledge areas: business analysis planning & monitoring, elicitation & facilitation, requirements management & communication, enterprise analysis, requirements analysis, and solution assessment & validation. It also lists 6 underlying competencies needed for business analysis.

iibababokbig picture
Fraud, Waste & Abuse: Capture low hanging fruit and more
Fraud, Waste & Abuse: Capture low hanging fruit and moreFraud, Waste & Abuse: Capture low hanging fruit and more
Fraud, Waste & Abuse: Capture low hanging fruit and more

This document discusses using predictive analytics to detect, predict, and change behavior related to fraud, waste and abuse (F/W/A) in healthcare. It defines F/W/A and provides statistics on the large financial impact of F/W/A. A case study shows that a predictive modeling approach identified over $8 million in savings opportunities from a large Medicare program. The document recommends that healthcare organizations re-examine their current F/W/A practices, question if they are sufficiently reducing costs, and work proactively using predictive analytics to prevent losses from F/W/A.

6/18/2014
5
Copyright © FraudResourceNet LLC
Most Popular Products 
 Microsoft Excel
 ActiveData for Excel
 TopCaats
 Microsoft Access
 ACL
 IDEA
 WizRule, WizWhy, & WizSame 
(WizSoft products)
Copyright © FraudResourceNet LLC
Tool Selection 
Considerations
 Core processing features
 Advanced features
 Advanced data import
 Scripting
 Ease of use
 Training / Customer Support / User Groups 
 Years in business / Company sustainability
 Workpaper system integration
6/18/2014
6
Copyright © FraudResourceNet LLC
Proposal Decision Analysis
Page 11
http://www.caseware.com/products/idea#_research_reports
Copyright © FraudResourceNet LLC
Detection Methods
By Company Size
6/18/2014
7
Copyright © FraudResourceNet LLC
Asset Misappropriation
Tops The Charts
Copyright © FraudResourceNet LLC
Vendor Billing Fraud/Corruption
Is #1 or #2 No Matter Where You Go
6/18/2014
8
Copyright © FraudResourceNet LLC
Fraud Is It Really Hard 
To Find
Ask a CPA firm to FIND FRAUD AT YOUR 
COMPANY – A Fraud Audit to Find the 6% of 
Revenues Lost to Fraud – Will that be cheap or 
REALLY expensive?
How many people find or research a committed 
fraud provided to you daily, weekly, monthly, 
quarterly, annually?
What if technology could find it for you quarterly 
and we or someone else could tell you exactly how 
to find it?….but it’s there (on average) at 
companies…..
 If this were true, why are we not all running back to 
our desks now!?
 Caveat ‐ Probably will take a few hundred hours at 
minimum to research the data and present findings 
unless they are “right on top”
Copyright © FraudResourceNet LLC
Have to Start Somewhere
Report Mapping

Recommended for you

Go Predictive Analytics
Go Predictive AnalyticsGo Predictive Analytics
Go Predictive Analytics

Go Predictive Analytics, LLC is a premier data mining and predictive analytics consulting company. We remove the barriers that loom large with creating and deploying data mining solutions for high ROI.

Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis

Webinar series from FraudResourceNet LLC on Preventing and Detecting Fraud Using Data Analytics. Recordings of these Webinars are available for purchase from our Website fraudresourcenet.com This Webinar focused on fraud detection using data analytic software (Excel, ACL, IDEA) FraudResourceNet (FRN) is the only searchable portal of practical, expert fraud prevention, detection and audit information on the Web. FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware. The two entities designed FRN as the “go-to”, easy-to-use source of “how-to” fraud prevention, detection, audit and investigation templates, guidelines, policies, training programs (recorded no CPE and live with CPE) and articles from leading subject matter experts. FRN is a continuously expanding and improving resource, offering auditors, fraud examiners, controllers, investigators and accountants a content-rich source of cutting-edge anti-fraud tools and techniques they will want to refer to again and again.

preventingideaexcel
9 Quantitative Analysis Techniques
9   Quantitative Analysis Techniques9   Quantitative Analysis Techniques
9 Quantitative Analysis Techniques

This document provides an overview of quantitative analysis techniques for assessing relationships between variables. It discusses concepts related to relationships including presence, nature, direction, and strength of association. It also defines statistical techniques such as ANOVA, cluster analysis, conjoint analysis, discriminant analysis, factor analysis, logistic regression, and multiple regression. Examples are provided to demonstrate calculating explained and unexplained variance in regression, interpreting regression coefficients, and using dummy variables. Steps for conducting regression analysis are outlined including checking assumptions and interpreting residuals plots.

6/18/2014
9
Copyright © FraudResourceNet LLC
Mapping Data to Scripts
Map Your Reports to Your 
Data Needs
Copyright © FraudResourceNet LLC
Clear Data Request
Accounts Payable Data Request.doc
6/18/2014
10
Copyright © FraudResourceNet LLC
Sample Data Validation – Accounts
Payable Other Questions
Copyright © FraudResourceNet LLC
Polling Question 1
What comes first in the analytic process?
A. Get data
B. Run reports
C. Identify reports to run
D. Deliver reports to client
6/18/2014
11
Copyright © FraudResourceNet LLC
The Overall Fraud
Analytic Process
Get the Most Useful Data for Analysis
General Ledger / Accounts Payable
Other? / Use external data sources
Develop Fraud Query Viewpoints
The 5 Dimensions
Brainstorm report ideas
Analytically Trend
Benford’s Law
Statistical averages and simple trending by day, month, day of week
Post dated changes
Transactional Score Based On the Above
Copyright © FraudResourceNet LLC
Is Your Organization Working  
With Banned Companies?
EPLS is the excluded party list service of the U.S. Government as
maintained by the GSA
WWW.SAM.GOV
6/18/2014
12
Copyright © FraudResourceNet LLC
Is Your Organization 
Working With Terrorists?
Copyright © FraudResourceNet LLC
Are Your Vendors Real?
IRS TIN Matching Program
Validates U.S. Tax 
Identification Numbers
Can submit up to 100,000 
TIN submissions at a time
Make sure all punctuation is 
removed
See 
http://www.irs.gov/taxpro
s/ and enter “TIN matching 
program” in the search box

Recommended for you

Faster document review and production
Faster document review and productionFaster document review and production
Faster document review and production

This document summarizes a webinar on using technology-assisted review like predictive coding to increase the speed and reduce the costs of document review for litigation. The webinar covered topics like how predictive coding works by using a seed set to train an algorithm and testing it with control sets. It also discussed how to understand precision and recall metrics and the importance of transparency and scalability. The goal of the webinar was to educate lawyers on leveraging technology-enhanced methods for reviewing increasingly large document collections in litigation more efficiently.

linear reviewlexbemulti-index search
User Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To CompaniesUser Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To Companies

User behavior analytics and user activity monitoring can help organizations detect insider threats by analyzing patterns of user behavior and flagging anomalies. These tools collect user activity log data to monitor interactions with sensitive data and systems. They use algorithms and statistical analysis to identify meaningful anomalies that could indicate potential threats like data exfiltration. This provides a rich data source for investigations and helps focus an organization's security efforts on detecting insider threats, as internal actors often pose more risk than external ones.

ubasecuritysoftware
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraudPonzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud

A review of the elements and examples of ponzi schemes, pyramids, and market bubbles and how to avoid them.

personal financeponzipyramid
6/18/2014
13
Copyright © FraudResourceNet LLC
SSN – Death File
Copyright © FraudResourceNet LLC
The Overall Fraud
Analytic Process
Get the Most Useful Data for Analysis
General Ledger / Accounts Payable
Other? / Use external data sources
Develop Fraud Query Viewpoints
The 5 Dimensions
Brainstorm report ideas
Analytically Trend
Benford’s Law
Statistical averages and simple trending by day, month, day of week
Post dated changes
Transactional Score Based On the Above
6/18/2014
14
Copyright © FraudResourceNet LLC
Query Viewpoints
Copyright © FraudResourceNet LLC
Specific Tests Based 
on the 5 W’sWho
Summarize journal entries by the persons entering to determine if they’re 
authorized. 
What
 Summarize journal entries by account and repetitive extracts (more than 50 
instances) and unique account sequences used in the journal entry (based on 
the first five debit and credit postings). 
 Extract nonstandard or manual journal entries (versus a created system such as 
an accounts payable ledger posting) for further analysis.
 Stratify size of journal entries based on amount (using the debit side of the 
transaction).
 Summarize general ledger activity on the amount field (absolute value of debit 
or credit) to identify the top occurring amounts. Then summarize activity by 
account and the amount identified for the top 25 appearing amounts.
 Scatter‐graph general ledger account (debit and credit amounts separately) 
and numbers of transactions.
6/18/2014
15
Copyright © FraudResourceNet LLC
When
 Extract journal entries posted on weekends and holidays. 
 Extract journal entries relating to the prior year that were made just 
immediately following a fiscal‐year end.
 Summarize journal entry credits and debits processing by day, month, and 
year.
Where
 Extract journal entries made to suspense accounts and summarize by the 
person entering and corresponding account numbers.
 Extract journal entries to general ledger accounts known to be problems or 
complex based on past issues (errors of accounting in journal subsequently 
corrected by accounting staff or auditors) at the company or the industry in 
general.
 Extract debits in revenue and summarize by general ledger account. 
Summarize journal entries by the persons entering to determine if they’re authorized. 
Specific Tests Based 
on the 5 W’s (Continued)
Copyright © FraudResourceNet LLC
Why
 Extract general ledger transaction amounts (debit or credit) that 
exceed the average amounts for that general ledger account by a 
specified percentage. (Five times the average is the default.) 
 Extract journal entries that equate to round multiples of 10,000, 
100,000, and 1,000,000.
 Extract journal entries with key texts such as “plug” and “net to zero” 
anywhere in the record.
 Extract journal entries that are made below set accounting 
department approval limits especially multiple entries of amounts 
below such limits.
 Extract journal entries that don’t net to zero (debits less credits).
Specific Tests Based 
on the 5 W’s (Continued)
6/18/2014
16
Copyright © FraudResourceNet LLC
Report Brainstorm Tool
Copyright © FraudResourceNet LLC
Proactively Detecting Fraud
Using Computer Audit Reports
IIA Research Paper / CPE Course
See the IIA’s website at www.theiia.org
The purpose of this document is to assist
auditors, fraud examiners, and management in
implementing data analysis routines for
improved fraud prevention and detection.
A comprehensive checklist of data analysis
reports that are associated with each
occupational fraud category per the
Association of Certified Fraud Examiner’s
classification system.

Recommended for you

Using benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditingUsing benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditing

Using Benford’s Law for Fraud Detection & Auditing Referred to as the First-Digit Law, Benford’s Law is a mathematical theory conceived over 70 years ago that has aided numerous anti-fraud professionals in solving embezzlement, insurance claims and money laundering cases. Benford's Law gives the expected patterns of the digits in unaltered data, and explains there is a large bias towards the lower digits, so much so that nearly one-half of all numbers are expected to start with the digits 1 or 2. In this webinar, we will explain the theory behind the law and how it can be used to find potential fraud and errors to help turn your internal audit or fraud investigation into a revenue generating center. In this session, you will learn: • How to apply Benford’s law analysis to find outliers in processes such as cash disbursement, general ledger, insurance claims, tax assessments, etc. • The types of data that do and do not conform to Benford’s Law • A practical guide to apply Benford’s tests using IDEA software (1st digit, 2nd digit testing, advanced analytics – fuzzy logic, etc.)

data analyticsaudit softwareinternal audit
Fraud: Understanding Fraud and Our Responsibilities
Fraud:  Understanding Fraud and Our ResponsibilitiesFraud:  Understanding Fraud and Our Responsibilities
Fraud: Understanding Fraud and Our Responsibilities

This document discusses various types of fraud, famous fraudsters, how fraud is detected, and ways to prevent fraud. It provides details on common fraud schemes like asset misappropriation, corruption, and financial statement fraud. The largest fraudsters discussed are Bernie Madoff, whose Ponzi scheme resulted in $65 billion in losses, and Ken Lay of Enron, which led to a $100 billion loss for investors. Fraud is most often detected through tips, internal controls, and audits. Strong internal controls like surprise audits and job rotation were found to significantly reduce median fraud losses.

accounting fraudfraudwhistleblower
[Tutorial] building machine learning models for predictive maintenance applic...
[Tutorial] building machine learning models for predictive maintenance applic...[Tutorial] building machine learning models for predictive maintenance applic...
[Tutorial] building machine learning models for predictive maintenance applic...

The document discusses using machine learning for predictive maintenance in IoT applications compared to traditional approaches. It describes using publicly available aircraft engine data to build models in Azure ML to predict remaining useful life. Models tested include regression, binary classification, and multi-class classification. An end-to-end pipeline is demonstrated, from data preparation through deploying web services with different machine learning models.

6/18/2014
17
Copyright © FraudResourceNet LLC
Payroll Fraud Report Ideas
Copyright © FraudResourceNet LLC
Top Reports in Payroll
 Duplicate employee payments
 Payments to the same bank account 
and a different employee number
 Overtime trending by department and 
person (% of overtime to gross pay, 
average overtime by department)
 Match employee data from the human 
resource to the payroll system
 Look for inaccurate or incomplete 
employee data
6/18/2014
18
Copyright © FraudResourceNet LLC
Other T&E Reports
 Unmatched query of cardholders to an active employee 
masterfile
 Cards used in multiple states (more than 2) in the same day
 Cards processing in multiple currencies (more than 2) in the 
same day
 Identify cards that have not had activity in the last six months
 Cardholders that have more than one card 
 Extract any cash back credits processed through the card
 Extract declined card transactions and determine if they are 
frequent for certain cards
 Summary of card usage by merchant to find newly added 
merchants and most active
Copyright © FraudResourceNet LLC
T&E ‐ It’s The Trends…Right?
 Trend categories (meals, hotel, 
airfare, other)
 Trend by person and title
 Trend departments
 Trend vendors
 Trend in the type of receipts
 Trend under limits (company policy)
36
6/18/2014
19
Copyright © FraudResourceNet LLC
Other Data Mining Ideas
Personnel Analysis
 Adjustments by employee
 Processing by employee
Contextual Summarizations
 Transaction types
Time Trending
 Month, week, and day / Also by department
 Last month to first 11 months 
 Transactions at the end of and start of a fiscal year
Copyright © FraudResourceNet LLC
Polling Question 2
What is not one of the query viewpoints?
A. Who
B. What
C. How
D. When
6/18/2014
20
Copyright © FraudResourceNet LLC
Adding the Analysis 
Toolpak Add‐In
Copyright © FraudResourceNet LLC
Above Average / Standard 
Deviation

Recommended for you

Hr analytics
Hr analyticsHr analytics
Hr analytics

This document discusses HR analytics and workforce analytics. It provides an overview of the history and current state of HR analytics. Some key uses of HR analytics include problem solving, decision making, and improving HR process efficiency. The document outlines various HR activities that can be analyzed, such as reporting, benchmarking, and predictive analysis. It emphasizes that HR analytics should focus on relevant metrics and provide context to be most useful. Overall, the document promotes the use of workforce analytics to gain insights that can provide competitive advantages and more effective organizational functioning.

Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1

The document discusses various principles of fraud including: 1) Definitions of fraud, corporate fraud, management fraud, and financial statement fraud. 2) The fraud triangle consisting of pressure/motivation, opportunity, and rationalization as the three elements common to every fraud. 3) Characteristics of typical fraudsters including that they are usually someone trusted and not initially suspected, and profiles of high-level and low-level thieves. 4) Taxonomies used to classify fraud including against customers/investors, criminal/civil, for/against the company, and internal/external fraud. 5) The "fraud tree" categorizing fraud into fraudulent statements, asset

HR Analytics, Done Right
HR Analytics, Done RightHR Analytics, Done Right
HR Analytics, Done Right

Trendwise Analytics provides three levels of HR analytics and reporting capabilities to organizations. Level 1 involves descriptive analysis and dashboards to report basic metrics and percentages. Level 2 derives operational metrics like turnover and promotion ratios to track HR function efficiency. Level 3 utilizes predictive modeling like attrition forecasting, segmentation, and compensation analysis to inform decisions regarding retention, hiring, and compensation.

hadoopcrm analyticsdata analysis
6/18/2014
21
Copyright © FraudResourceNet LLC
Stratify Data in Excel or with 
ActiveData for ExcelTM
Use Excel Vlookup = TRUE
Use ActiveData for ExcelTM
Copyright © FraudResourceNet LLC
How Fraud Grows Over Time
42
6/18/2014
22
Copyright © FraudResourceNet LLC
Scatter Graph
Copyright © FraudResourceNet LLC
Scatter Graph Explanation
1 – high dollar change and low count (outliers)
2 – charges that make sense
3 – changes that don’t make sense
4 – inefficiency that is developing
6/18/2014
23
Copyright © FraudResourceNet LLC
Polling Question 3
Where do you find the Descriptive Statistics in 
Excel?
A. Excel Option
B. Data Menu
C. Excel Add‐Ins
D. Insert Menu
Copyright © FraudResourceNet LLC
Unique Journal Entry Test
Account Sequencing
The Sampson Index
6/18/2014
24
Copyright © FraudResourceNet LLC
Normalize and test general ledger data consistently on all locations
 Most internal audit shops obtain general ledger data quarterly for their external 
auditors anyway – no excuse
G/L data is the lifeblood of the organization
 It is the first data set with enough detail to effectively comb through
 Planning will improve as focus can be placed on key accounts, entries, timeframes, 
enterers, etc. and will guide future data extracts
 Most systems post in detail (even down to inventory movements) which can allow 
detailed review of subledgers….using G/L data
Identify savings, better ideas,…and fraud
 Fraud has been the focus and we should still test for it
 Savings in cost recoveries can now become more of a focus
 Better ideas leveraged through technology
 Efficiency (to help a faster close)
 Revenue and business enhancement 
Key Mantras of G/L 
Analytic Auditing
Copyright © FraudResourceNet LLC
Polling Question 4
What ActiveData for Excel function allows for
the development of the account sequence:
A.Summarize
B.Stratify
C.Merge
D.Top / Bottom Items

Recommended for you

IT Fraud and Countermeasures
IT Fraud and CountermeasuresIT Fraud and Countermeasures
IT Fraud and Countermeasures

IT Fraud Series: IT Fraud and Countermeasures - July 20, 2017 Description Webinar Series Overview: In today’s world, fraud investigations have become an everyday part of corporate life and the auditor must gain expertise in this area. The 8 part series will cover the tasks of the fraud auditor, Forensic techniques and tools and the abilities required of the fraud auditor, the type and nature of common frauds, investigating fraud, computer fraud and control, white collar crime, the auditor in court. This session IT Fraud and Countermeasures • Investigating by computer • Document collection and analysis • Interviewing skills • Documenting evidence • Testifying as a witness

leveraging technology for auditingit fraud
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics

FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware. The two entities designed FRN as the “go-to”, easy-to-use source of “how-to” fraud prevention, detection, audit and investigation templates, guidelines, policies, training programs (recorded no CPE and live with CPE) and articles from leading subject matter experts. FRN is a continuously expanding and improving resource, offering auditors, fraud examiners, controllers, investigators and accountants a content-rich source of cutting-edge anti-fraud tools and techniques they will want to refer to again and again. White-Collar Crime Fighter Newsletter Subscribe Now at No Cost! FraudResourceNet has made the premier Anti-Fraud newsletter, White-Collar Crime Fighter freely available to all. All this is required is to complete the registration form with your work email address! The widely read newsletter, White-Collar Crime Fighter brings you expert strategies and actionable advice from the most prominent experts in the fraud-fighting business. Every two months you'll learn about the latest frauds, scams and schemes... and the newest and most effective fraud-fighting tools, techniques and technologies to put to work immediately to protect your organization. When it comes to fraud, knowledge of the countless schemes, how they work and red flags to look for will help keep you, your organization and your clients safe. At FraudResourceNet we understand this and take great pride in providing our FREE White Collar Crime Fighter newsletter -- filled with exclusive articles and tips to provide the knowledge you need. Make sure you stay informed. Sign up for White Collar Crime Fighter newsletter and we’ll keep you up-to-date on special promos, training opportunities, and other news and offers from FraudResourceNet! Signing up is easy and FREE. If you have not already subscribed to our newsletter, please sign up to get started! Sign up for the White Collar Crime Fighter Newsletter (a $99 value ... now completely FREE)

data analyticsdetecting and auditing for fraudfraud using data analytics
Retrospective data analytics slides
Retrospective data analytics slidesRetrospective data analytics slides
Retrospective data analytics slides

A Retrospective in Analytic Auditing and What’s Ahead Description The speaker will outline salient best practices in establishing an analytic program based on lessons learned looking back on the past two and a half decades. Specific learning objectives include: o Review key dates in the last two decade’s timing that led to the advancement of audit data analytic programs. o Highlight lessons learned over the years through case study examples. o Outline the effective culture around the analytics program to serve as its foundation. o Learn to apply analytics across the entire lifecycle from risk assessment, to planning, fieldwork, and reporting. o Present analytic best practices being deployed by top performing organizations.

internal auditdata analyticsleveraging technology for auditing
6/18/2014
25
Copyright © FraudResourceNet LLC
Simple Fraud Vendor Scoring Analysis
– How It Started
 Vendors on report 1 vs. report 2 of duplicate payments.
 Duplicate transactions paid on different checks.
 Duplicate transactions with debit amounts in the vendor 
account.
 Vendors with a high proportion of round dollar payments.
 Invoices that are exactly 10x, 100x or 1000x larger than 
another invoice.
 Payments to any vendor that exceed the twelve month 
average payments to that vendor by a specified percentage 
(i.e., 200%) or 3x the standard deviation for that vendor.
 Vendors paid with a high proportion of manual checks.
49
Copyright © FraudResourceNet LLC
The Sampling “Problem” 
Bottom Line Numbers
 Modern tests (round numbers, duplicates, missing fields) 
identify thousands of ‘suspicious’ transactions, usually about 1 in 
5 of all transactions get a ‘red flag’
 Historically at least 0.02 – 0.03 % of all transactions have real 
problems, such as a recoverable over‐payment
 So roughly 0.00025 / 0.2 = 0.00125 or 1 in 800 ‘red flags’ lead to a 
real problem.
Imagine throwing a random dart at 800 balloons hoping to hit 
the right one!!!
6/18/2014
26
Copyright © FraudResourceNet LLC
Transactional Score 
Benefits
The best sample items (to meet your attributes) are 
selected based on the severity given to each attribute.  
In other words, errors, as you define them, can be 
mathematically calculated.
Instead of selecting samples from reports, transactions 
that meet multiple report attributes are selected (kill 
more birds with one stone).  Therefore a 50 unit sample 
can efficiently audit:
 38 duplicate payments
 22 round invoices
 18 in sequence invoices
….and they are the best given they are 
mathematically the most “severe”.
51
Copyright © FraudResourceNet LLC
Pick Items Rare in 
Several Ways
 Don’t choose just ANY weekend invoice
 Choose an UNUSUAL weekend invoice
 Large weekend invoices are the rarest kind (i.e., 
only 2 percent of large invoices)
 The odds of finding a recoverable error go up 
AND since the invoice is large, the value 
recovered goes up too!
6/18/2014
27
Copyright © FraudResourceNet LLC
Summaries on 
Various Perspectives
53
Summarize by 
dimensions (and sub 
dimension) to pinpoint 
within the cube the 
crossover between the top 
scored location, time, and 
place of fraud based on 
the combined judgmental 
and statistical score
ALL TIES BACK TO THE 
ORIGINAL ANALYTIC 
APPROACH 
Copyright © FraudResourceNet LLC
Key Control Reports 
& Scoring
6/18/2014
28
Copyright © FraudResourceNet LLC
Combining the Scores
ACL Code
Copyright © FraudResourceNet LLC
Using Vlookup to 
Combine Scores
Create a record number
Relate sheets based on VLookup

Recommended for you

Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...

Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and FulcrumWay at Oracle Open World 2014

fraudfinancial leakageadvanced controls
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...

Webinar series from FraudResourceNet LLC on Preventing and Detecting Fraud Using Data Analytics. Recordings of these Webinars are available for purchase from our Website This Webinar focused on fraud detection using data analytic software (Excel, ACL, IDEA) FraudResourceNet (FRN) is the only searchable portal of practical, expert fraud prevention, detection and audit information on the Web. FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware. The two entities designed FRN as the “go-to”, easy-to-use source of “how-to” fraud prevention, detection, audit and investigation templates, guidelines, policies, training programs (recorded no CPE and live with CPE) and articles from leading subject matter experts. FRN is a continuously expanding and improving resource, offering auditors, fraud examiners, controllers, investigators and accountants a content-rich source of cutting-edge anti-fraud tools and techniques they will want to refer to again and again.

preventingideaexcel
Future audit analytics
Future audit analyticsFuture audit analytics
Future audit analytics

The Future of Auditing and Fraud Detection – Re-imagining the art and science of auditing and fraud detection is coming to the forefront of risk management functions. What was seen as a “nice to have” a few years ago has become a “must have” as digital transformation and data surrounds all aspects of the organization. Specific learning objectives include: o See how analytics can maximize the annual audit plan and better ensure focus is placed on top organizational risks. o Establish a framework to using analytics and automation across the entire audit lifecycle. o Use the general ledger as a case study to provide a digital road map for analytics for detecting fraud (and errors) within the organization. o Define the top company areas for data integration from structured, unstructured and external data sources. o Highlight culturally what audit and fraud detection functions must do to embrace continuous embedded analytic reviews.

fraud detectiondetecting frauddetecting corruption
6/18/2014
29
Copyright © FraudResourceNet LLC
Charting the Score
Copyright © FraudResourceNet LLC
Transactional Score 
Benefit Patterns Example
58
6/18/2014
30
Copyright © FraudResourceNet LLC
GeoMapping ‐ Map Point
Copyright © FraudResourceNet LLC
Polling Question 5
What graph is used to map value to score for easier 
selections of data subsets?
A. Pie
B. Line
C. Bar
D. Scatter
6/18/2014
31
Copyright © FraudResourceNet LLC
Free Excel Directory Tool
 Collects all file information by folder
 Provides additional information on the 
files
 Be careful – Can take 30 minutes to run 
an entire harddrive
 Useful to identify files accessed recently
 Great for backups and cleanups of HDs
Copyright © FraudResourceNet LLC
Questions?
Any Questions?
Don’t be Shy!
6/18/2014
32
Copyright © FraudResourceNet LLC
Coming Up Next Month
1. Think Like a Fraudster to Catch  a 
Fraudster July 9, 2014, 1:00 PM
2. Secrets of Finding Fraudulent 
Documentation, July 16, 11:00 AM
3. How to Build Fraud��Focused Data 
Analytics Into Your Audit & Risk 
Assessment , July 23, 11:00 AM
Copyright © FraudResourceNet LLC
The best information newsletter 
on fraud and white collar crime is 
now available for free!
Sign Up Now
Please share with your network!
WCC Fighter News ‐ Free

Recommended for you

Are You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAATAre You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAAT

Selecting the right Computer Assisted Audit Tool may appear to be a huge undertaking; however, following a systematic approach eases the burden. The right approach minimizes the risk of selecting a product that might not fit into your organization, which could impair your function as it sits underutilized or on the shelf. While point and click visual style tools are settling into the market, many auditors rely on the legacy step-by-step software tools such as ACL, IDEA, Excel and “add-on” tools. Many chief auditors pursue opportunities to increase the frequency and intensity of interactions with management and realize nothing gets attention faster than finding previously undetected anomalies in company data. Finding the right issues quickly and timely improves the value of audit and can assist audit in winning more work. Attending this webinar you will learn: · Identify analysis and financial constraints · Scoping and defining audit strategic objectives · Reviewing selection field based on Technical needs · Building a short/long term on-boarding roadmap · Realize the lost opportunity of not including all auditors (no auditor left behind)

audit softwaredata analyticsinternal audit
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling

Sampling has existed as a standard for controls testing since controls testing began. We’ve developed algorithms to tell us how many samples we should pull and how many errors we can have and still pass the control. We’ve even developed algorithms to tell us how many more samples we can test if the control didn’t pass the first time. If your goal is simply to do the minimum to pass a SOX audit, then these behaviors should probably continue. If your goals also include really improving the operations of the organization to make it stronger then a more holistic approach is needed, such as analysis on 100% of the population, rather than a small sample. Most controls analytics do not require a degree in data science, but they do require the controls team begin changing its behaviors. Join us to understand what it takes to begin this change, it’s not as challenging as you might think. Learning Objectives Understanding the advantages of analytics vs sampling How to Identify controls where analytics can be applied Real life examples of controls and their associated analytics How to effect a change

audit toolsdata analyticsdata analytics software
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling

Sampling has existed as a standard for controls testing since controls testing began. We’ve developed algorithms to tell us how many samples we should pull and how many errors we can have and still pass the control. We’ve even developed algorithms to tell us how many more samples we can test if the control didn’t pass the first time. If your goal is simply to do the minimum to pass a SOX audit, then these behaviors should probably continue. If your goals also include really improving the operations of the organization to make it stronger then a more holistic approach is needed, such as analysis on 100% of the population, rather than a small sample. Most controls analytics do not require a degree in data science, but they do require the controls team begin changing its behaviors. Join us to understand what it takes to begin this change, it’s not as challenging as you might think. Learning Objectives Understanding the advantages of analytics vs sampling How to Identify controls where analytics can be applied Real life examples of controls and their associated analytics How to effect a change

internal auditdata analyticsdata analytics software
6/18/2014
33
Copyright © FraudResourceNet LLC
AuditSoftwareVideos.com
Now Free!
Videos accessible for FREE subscriptions
Repeat video and text instruction as much as you need
Sample files, scripts, and macros in ACL™, Excel™, etc. 
available for purchase
Bite-size video format (3 to 10 minutes)
>> Professionally produced videos by 
instructors with over 20 years 
experience in ACL™, Excel™ , and 
more 
Copyright © FraudResourceNet LLC
Thank You!
Website: http://www.fraudresourcenet.com
Jim Kaplan
FraudResourceNet™
800‐385‐1625 
jkaplan@fraudresourcenet.com
Peter Goldmann
FraudResourceNet™
800‐440‐2261
pgoldmann@fraudresourcenet.com
Rich Lanza
Cash Recovery Partners, LLC
Phone: 973‐729‐3944
rich@richlanza.com

More Related Content

Viewers also liked

ACCOUNTING & AUDITING WITH EXCEL2011
ACCOUNTING & AUDITING WITH EXCEL2011ACCOUNTING & AUDITING WITH EXCEL2011
ACCOUNTING & AUDITING WITH EXCEL2011
Horatius K. Porte, CFE
 
Simplifying stats
Simplifying  statsSimplifying  stats
Simplifying stats
Arvind Maharajan
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
FraudBusters
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
FraudBusters
 
Babok2 Big Picture
Babok2 Big PictureBabok2 Big Picture
Babok2 Big Picture
CBAP Master
 
Fraud, Waste & Abuse: Capture low hanging fruit and more
Fraud, Waste & Abuse: Capture low hanging fruit and moreFraud, Waste & Abuse: Capture low hanging fruit and more
Fraud, Waste & Abuse: Capture low hanging fruit and more
Brett Reynolds
 
Go Predictive Analytics
Go Predictive AnalyticsGo Predictive Analytics
Go Predictive Analytics
Go Predictive Analytics, LLC
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
FraudBusters
 
9 Quantitative Analysis Techniques
9   Quantitative Analysis Techniques9   Quantitative Analysis Techniques
9 Quantitative Analysis Techniques
Gajanan Bochare
 
Faster document review and production
Faster document review and productionFaster document review and production
Faster document review and production
Lexbe_Webinars
 
User Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To CompaniesUser Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To Companies
Spectorsoft
 
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraudPonzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
Russell James
 
Using benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditingUsing benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditing
Jim Kaplan CIA CFE
 
Fraud: Understanding Fraud and Our Responsibilities
Fraud:  Understanding Fraud and Our ResponsibilitiesFraud:  Understanding Fraud and Our Responsibilities
Fraud: Understanding Fraud and Our Responsibilities
Jason Lundell
 
[Tutorial] building machine learning models for predictive maintenance applic...
[Tutorial] building machine learning models for predictive maintenance applic...[Tutorial] building machine learning models for predictive maintenance applic...
[Tutorial] building machine learning models for predictive maintenance applic...
PAPIs.io
 
Hr analytics
Hr analyticsHr analytics
Hr analytics
E P John
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
Sevisa Isufaj
 
HR Analytics, Done Right
HR Analytics, Done RightHR Analytics, Done Right
HR Analytics, Done Right
Trendwise Analytics
 

Viewers also liked (18)

ACCOUNTING & AUDITING WITH EXCEL2011
ACCOUNTING & AUDITING WITH EXCEL2011ACCOUNTING & AUDITING WITH EXCEL2011
ACCOUNTING & AUDITING WITH EXCEL2011
 
Simplifying stats
Simplifying  statsSimplifying  stats
Simplifying stats
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
Babok2 Big Picture
Babok2 Big PictureBabok2 Big Picture
Babok2 Big Picture
 
Fraud, Waste & Abuse: Capture low hanging fruit and more
Fraud, Waste & Abuse: Capture low hanging fruit and moreFraud, Waste & Abuse: Capture low hanging fruit and more
Fraud, Waste & Abuse: Capture low hanging fruit and more
 
Go Predictive Analytics
Go Predictive AnalyticsGo Predictive Analytics
Go Predictive Analytics
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
 
9 Quantitative Analysis Techniques
9   Quantitative Analysis Techniques9   Quantitative Analysis Techniques
9 Quantitative Analysis Techniques
 
Faster document review and production
Faster document review and productionFaster document review and production
Faster document review and production
 
User Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To CompaniesUser Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To Companies
 
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraudPonzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
 
Using benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditingUsing benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditing
 
Fraud: Understanding Fraud and Our Responsibilities
Fraud:  Understanding Fraud and Our ResponsibilitiesFraud:  Understanding Fraud and Our Responsibilities
Fraud: Understanding Fraud and Our Responsibilities
 
[Tutorial] building machine learning models for predictive maintenance applic...
[Tutorial] building machine learning models for predictive maintenance applic...[Tutorial] building machine learning models for predictive maintenance applic...
[Tutorial] building machine learning models for predictive maintenance applic...
 
Hr analytics
Hr analyticsHr analytics
Hr analytics
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
HR Analytics, Done Right
HR Analytics, Done RightHR Analytics, Done Right
HR Analytics, Done Right
 

Similar to Quick Response Fraud Detection

IT Fraud and Countermeasures
IT Fraud and CountermeasuresIT Fraud and Countermeasures
IT Fraud and Countermeasures
Jim Kaplan CIA CFE
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
FraudBusters
 
Retrospective data analytics slides
Retrospective data analytics slidesRetrospective data analytics slides
Retrospective data analytics slides
Jim Kaplan CIA CFE
 
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Oracle
 
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
FraudBusters
 
Future audit analytics
Future audit analyticsFuture audit analytics
Future audit analytics
Jim Kaplan CIA CFE
 
Are You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAATAre You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAAT
Jim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
Jim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
Jim Kaplan CIA CFE
 
How to data mine your print reports
How to data mine your print reports How to data mine your print reports
How to data mine your print reports
Jim Kaplan CIA CFE
 
How to use ai apps to unleash the power of your audit program
How to use ai apps to unleash the power of your audit program How to use ai apps to unleash the power of your audit program
How to use ai apps to unleash the power of your audit program
Jim Kaplan CIA CFE
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
Jim Kaplan CIA CFE
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel
Jim Kaplan CIA CFE
 
Cybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsCybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal Auditors
Jim Kaplan CIA CFE
 
Right to Audit Clauses: What you need to know!
Right to Audit Clauses: What you need to know!Right to Audit Clauses: What you need to know!
Right to Audit Clauses: What you need to know!
Jim Kaplan CIA CFE
 
Best Practices for the Service Cloud
Best Practices for the Service CloudBest Practices for the Service Cloud
Best Practices for the Service Cloud
Ross Bauer
 
CyberSecurity Series Malware slides
CyberSecurity Series Malware slidesCyberSecurity Series Malware slides
CyberSecurity Series Malware slides
Jim Kaplan CIA CFE
 
Eliminate Risks in SOA Implementation & Support
Eliminate Risks in SOA Implementation & SupportEliminate Risks in SOA Implementation & Support
Eliminate Risks in SOA Implementation & Support
SuneraTech
 
Moving To SaaS
Moving To SaaSMoving To SaaS
Moving To SaaS
Alistair Croll
 
Tech Time - Benefits of Being a Beta Site for CUES Magazine
Tech Time - Benefits of Being a Beta Site for CUES MagazineTech Time - Benefits of Being a Beta Site for CUES Magazine
Tech Time - Benefits of Being a Beta Site for CUES Magazine
Karen Sullivan, CISSP, CISA
 

Similar to Quick Response Fraud Detection (20)

IT Fraud and Countermeasures
IT Fraud and CountermeasuresIT Fraud and Countermeasures
IT Fraud and Countermeasures
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
 
Retrospective data analytics slides
Retrospective data analytics slidesRetrospective data analytics slides
Retrospective data analytics slides
 
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
 
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
 
Future audit analytics
Future audit analyticsFuture audit analytics
Future audit analytics
 
Are You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAATAre You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAAT
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
How to data mine your print reports
How to data mine your print reports How to data mine your print reports
How to data mine your print reports
 
How to use ai apps to unleash the power of your audit program
How to use ai apps to unleash the power of your audit program How to use ai apps to unleash the power of your audit program
How to use ai apps to unleash the power of your audit program
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel
 
Cybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsCybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal Auditors
 
Right to Audit Clauses: What you need to know!
Right to Audit Clauses: What you need to know!Right to Audit Clauses: What you need to know!
Right to Audit Clauses: What you need to know!
 
Best Practices for the Service Cloud
Best Practices for the Service CloudBest Practices for the Service Cloud
Best Practices for the Service Cloud
 
CyberSecurity Series Malware slides
CyberSecurity Series Malware slidesCyberSecurity Series Malware slides
CyberSecurity Series Malware slides
 
Eliminate Risks in SOA Implementation & Support
Eliminate Risks in SOA Implementation & SupportEliminate Risks in SOA Implementation & Support
Eliminate Risks in SOA Implementation & Support
 
Moving To SaaS
Moving To SaaSMoving To SaaS
Moving To SaaS
 
Tech Time - Benefits of Being a Beta Site for CUES Magazine
Tech Time - Benefits of Being a Beta Site for CUES MagazineTech Time - Benefits of Being a Beta Site for CUES Magazine
Tech Time - Benefits of Being a Beta Site for CUES Magazine
 

More from FraudBusters

Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning Essentials
FraudBusters
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
FraudBusters
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
FraudBusters
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding Fraud
FraudBusters
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best Practices
FraudBusters
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your Audits
FraudBusters
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
FraudBusters
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
FraudBusters
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay Fraud
FraudBusters
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
FraudBusters
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
FraudBusters
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
FraudBusters
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data Analysis
FraudBusters
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud Policy
FraudBusters
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
FraudBusters
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
FraudBusters
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
FraudBusters
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
FraudBusters
 

More from FraudBusters (18)

Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning Essentials
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding Fraud
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best Practices
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your Audits
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay Fraud
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data Analysis
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud Policy
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
 

Recently uploaded

INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
Matthew Sinclair
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
Toru Tamaki
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
Mark Billinghurst
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
Bert Blevins
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
ScyllaDB
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
ScyllaDB
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
Sally Laouacheria
 

Recently uploaded (20)

INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
 

Quick Response Fraud Detection