March 2009 Fraud Risks & Controls in the Financial Sector* *connectedthinking Foreword Finance Administrative Organisation & Internal control Purchase Production F-Scan IT Staff Ethics & Integrity Management Security Financial Crime is a prominent issue that financial institutions need to tackle with great care. It is known to be more prevalent in the financial sector than in any other: in our last Global Economic Crime Survey (2007), the insurance sector was the most frequent victim (57% of insurance respondents had suffered fraud in the last two years), closely followed by the other Financial Services (46%), whilst the overall average was 43%. The current economic crisis also impacts fraud risk management as many financial institutions are currently launching cost reduction plans (sometimes involving reduction of staff), potentially resulting in weakening of the control environment as controls will be performed by less experienced staff or, in the worst, not performed anymore. Moreover, back-office staff is currently facing significant increases in workload on issuing valuations statistics due to the difficult economic environment, leading to decreased focus on the execution of controls that are there to mitigate fraud risk. Finally, the closing down of certain activities within financial institutions could impact the incentive to commit fraud for those who will leave the company in the near future. Therefore, whilst the legal environment and regulators have obviously pushed the Financial Sector in the right direction, it is now time to take the lead in protecting your earnings and your reputation in these troubled times. In this respect, the PwC Forensic Team, together with our Financial Sector specialists, has designed a dedicated ‘Top 10’ service offering to support you in the timely detection and efficient prevention of your fraud risk. Prevention Prevention Fraud scan – Realise the quick wins Our ‘F-Scan’ is a competitive sector-oriented benchmarking solution aimed at assessing the fraud vulnerability of your business. Within a week, we assess your key risk areas against best practice for institutions of a similar size. We focus on fraud considerations made by management in order to detect fraud risks and weaknesses within your organisation. The outcome includes a targeted and cost-effective action plan. Identification of fraud warning signs • Fraud warning signs identified or fraud risky business • Decision wether fraud scan is required • Selection by management of at least 4 domains to be included in fraud scan Determination of company characteristics • Completion of question list on company characteristics • Remittance of question list to PwC Forensic team Execution of fraud scan on site • Interviews with key management based on selected risk domains • The scan is executed by members of PwC Forensic team Analysis of results • At least 4 risk zones are analysed • Score by risk zone and category Reporting • Findings • Recommendations • Urgent actions Prevention Fraud Internal Controls Matrix – Know where you are today Best practice indicates that the key elements of an anti-fraud program are prevention and timely detection of fraud and misconduct. Such objectives can be reached through strong and effective internal controls. Your existing anti-fraud control environment can be assessed based on an internationally accepted control framework (COBIT, COSO, etc.). Existing policies and procedures tackling fraud risk will be examined to understand which component of your control framework (control environment, risk assessment, control activities, etc.) they do address. The matrix derived from this exercise (see example below) will help you identify components of your control framework that are not addressed by your existing control environment (in our example, Fraud Risk Assessment in light blue). An action plan will then be drafted to progressively fill in the gaps. Document Type Title Operational risk Bank Admission Policy Bank Sponsorship Policy Conflicts of Interest - Board Policy Entity scope when specified All All All All All Type of document Board Policy Board policy Board Policy Board Policy Board Policy Date janv-09 janv-09 mars-09 juin-09 nov-08 Fraud related policies Control Environment Internal Controls Components Board Policies Ethical Conduct, Legal and Compliance Risk Management Accountability (Oversight) x x Audit Committee (Oversight) x x Code of conduct / Ethics x Ethics hotline x x Hiring and Promotion Procedures Investigation/ Remediation x Fraud Risk Assessment Process for assessing risk Fraud considered Likelihood and significance of fraud Level within organization Risk of management override Asset Management Investment process Funds allocation Control Activities Back Office In-/Outsourcing No fraud related document identified for this sub-process. Credit Commitments x Documentation x x x x x Reconciliation Signature Refinancing Payment x Prevention Fraud Risk Map – Visualize the risks of your activities The Fraud Risk Map presents the fraud risk assessment of a series of your activities (to be selected by you) against various fraud types selected by PwC as being potentially relevant to the activities under scrutiny. The map links the activities to the different fraud types with a coloured cell (green, yellow, red). Based on this visual, you will have an overview of uncovered risks per activity and per fraud types: vertical and horizontal trends will appear. This tool helps to identify those processes where specific fraud prevention should be performed in order to lower the risk. intern extern intern extern intern Breach of Postal Confidentiality Betrayal of Company Secrets Property Damage/ Computer Sabotage/ Alteration of Data Computer Fraud Activity / Department Misuse of Information Misuse of Insider Information IT Manipulations Fraud Type extern intern extern extern User ID account management Access Management User registration x user password management x password use x x log-on procedures x x user identification and authentication x x x x password management system x x x x Terminal Time-out x x x x Business requirements for access control and sensitive system isolation x x x x privilege management x Logical access management x Re-certification of user access rights x Logical security incident review and reporting Monitoring system access and use Reporting of Security incidents Reporting pre-project feasibility analysis x x x x x x x x x x Project Development Project delivery Initiation project delivery/Requirements Project delivery/Design Project delivery/development Project delivery/test Deploy (operational ready) Post-project warranty evaluation x x x x Prevention Fraud Heat Map – Capture the human factor Fraud Risk Management is a multi-faceted concern that seems very hard to embody into one single approach. Products Competition Psychology Context Administration Governance IT Opportunity Behaviour The Fraud Heat Map completes our set of approaches and produces a contextual view that is essential when talking about fraud(s). Indeed, fraud is often the consequence of many disruptions and/or temptations and, consequently, context is important. The purpose of our Fraud Heat Map is hence to crystallise into one visual all these elements that may contribute to a weakening of the context in which one person/a number of people operate and as such, represent potential opportunities to perpetrate fraud. Our level of analysis is the individual who is ultimately the triggering factor. The outcome of such an analysis is expected to be based both on facts and perceptions/intuitions, and the visual outcome should allow you to better anticipate fraudulent behaviours and thus reinforce controls where needed. Fraudulent behaviour consists of three conditions generally present where fraud occurs. They are summarized in the well-known Fraud Triangle. The link between those elements and the organisation is perfectly reflected in the Heat Map highlighting the key risk areas in a practical manner. Fraud Triangle Good for the company Others do it No alternative employment opportunity No ‘visible’ harm Rationalisation Belief systems / boundary systems can break the triangle Fraud Diagnostic / Interactive control systems can break the triangle Pressure Market pressure Incentive comp. Impossible targets Opportunity Weak Internal controls Powerless internal Audit Auditor complacent Analysts go along Need internal controls to break the triangle An example: Financial Markets Trading Activities Trading activities are an interesting example because they encompasses many elements that expose the financial sector to risk. • It is a highly competitive environment that is particularly results-driven, which places the trader under constant pressure. • The complexity of the products and of the process makes it more difficult to detect prohibited activities and facilitates opportunities for fraud. • In most rogue trading cases, the traders were either acting as they were because they felt trapped in the losses made or were seeing their fraudulent activity as something good for the company because of the gains generated. To identify the “High Risks Zones” in the organisation, many questions need to be raised: - Are the IT systems secured (password and system access management etc.)? - What processes have been automated, and what operations require manual intervention by the operator? - Is the administration checking whether traders take all their holidays and for at least 10 consecutive days? - Are some adequate control procedures such as timely confirmation in place? - What controls are in place to detect abnormal behaviour? - What is the risk awareness of the supervisors? -Etc. Encompassing all the these elements in one framework, the Heat Map enables management to identify the areas at risk directly and to act accordingly. The approach developed with the Heat Map is complementary to the ones tackling the matter from the human angle. Prevention Background checks – Know who you are dealing with Reputation is critical within the Financial Services Sector. Therefore, hiring reliable management and building up relationships with sound clients, suppliers and partners are of the utmost importance. The lack of correct background information creates both reputation and business risks. As gathering the necessary and complete information at short notice appears to be challenging in practice, we can provide you with a background investigation of the reliability and reputation of these potential business relations. Our ‘Open Source Intelligence Centre’ has access to a variety of sources of financial and other kinds of information. We are experts in informationgathering procedures and will provide you with the key information you need to know. Being well-informed enables you to better manage your reputation and business risks. Customised training – Get your people aware of fraud risk On a regular basis, clients ask us to design fraud awareness training covering their specific needs. It goes from the simple off-the-shelf fraud awareness training session to the most sophisticated training package derived from a ‘Fraud Risks Assessment’ exercise performed over a few weeks, with the input of our client’s top management and specialised staff. Occasionally, we design specific supporting documentation that our clients can use internally to train their staff or as guidance to refer to on a daily basis. Fraud Risk Management Manual - Table of Content Chapter 1 Introduction Chapter 2 Existing Fraud Management Framework Chapter 3 Typology of possible Fraud types Chapter 4 Initial Fraud Risk Assessment Chapter 5 Elements of Fraud Auditing Chapter 6 Proposed Fraud Risk Auditing Model Chapter 7 What to do when Fraud is suspected Detection Detection orensic Technology – F Benefit from the latest forensic technologies Forensic Technology incorporates cutting-edge technology in fraud examinations. While business becomes increasingly dependent on Information Technology, and information and knowledge is progressively stored electronically, fraud is often buried in massive amounts of digital data. Forensic Technology can help capture, secure and deal with substantial volumes of information, identify which systems and personnel are critical, and recover hidden or lost data. Furthermore, it provides the tools and knowledge to analyse this data and fit the results into meaningful fraud assessment reports. Below are some examples of the way we use Forensic Technology. One of the business areas often affected by fraud is Procurement. By using Data Analysis (DA) and Data Mining (DM), any indicators, trends or hidden patterns relating to Procurement Fraud can be uncovered from the financial system. The DA and DM reports will be customised to the business and IT environment and specific fraud risks of the company. Financial institutions are confronted with large amounts of supporting data, both paper and electronic. Paper documents are scanned and archived resulting in a significant workload to manually review them and/or to maintain data quality. E-Discovery techniques now combine paper files and any digital information into document management allowing efficient data quality reviews. Security concerns related to applications and databases containing critical data have to be proactively addressed to mitigate considerable fraud risk. The current user access management procedures will be mapped against the key objectives and industry best practice standards in order to identify gaps and areas for improvement. Insurance companies can be confronted with enormous amounts of claims or litigations (e.g. due to natural disaster or class actions). At PwC, we have the expertise to assist you with document management for large-scale, multiparty, multi-jurisdictional litigations or claims. If any significant fraud risk is uncovered in the access management review, more in-depth investigation can be performed into actual access management, such as reviewing and analysing outliers of access to critical information, trend analysis (peaks in manual entries), subsequent transactions made by the same user (e.g. invoice booked and paid by the same person) etc. Moreover, our team can provide you with advice and assistance in the management and prioritisation of these claims. We bring together experts and specialists in claims, forensic investigation, forensic technology services and other relevant disciplines, combining the technical skills, industry knowledge and geographical coverage to investigate, analyse, prioritise and resolve complex and massive amounts of claims. Detection Fraud Due Diligence – Set the scene Business is ever-changing and the organisational frameworks are moving targets. Mergers, acquisitions and employee turnover have become a part of our way of life. We know that the new challenges you are willing to take are often very exciting but, in the end, can you say you have a full comfort when taking over a target or taking up a new role in your company? Could there be any concealed risks present? Indeed, whilst long-term strategies can be designed with hindsight, you are immediately exposed to key risks in the day-to-day business. Short-term exposure can considerably damage your image and ruin your ambitions for the future. The recent nature of your involvement will not – believe us – prevent the deterioration of your reputation. Life is unfair! To assist you in assessing such risks, we have elaborated, in a joint effort of our forensic and financial risk experts, a methodology and checklist that can help you ‘set the scene’ in a fast and efficient way. We are happy to tailor investigations to best suit your needs and expectations. More than others, we know how easily you can be exposed to civil or even criminal liability! Investigation Investigation Fraud Incidence Plan – An action plan when fraud has been detected Whatever the type of fraud, whoever the perpetrator, any form of fraud raises a number of questions and issues for management; issues and questions they have probably never dealt with before. Our specialists are highly-trained and discreet. They are used to operating in sensitive circumstances, and their range of skills and methodologies allows them to discover information that is often outside the scope of normal accounting or auditing procedures. Assistance may include sorting out evidence for prosecution. We support management to allow them to carry on with the day-to-day business, and avoid them having to spend valuable time dealing with matters that may distract them and put their business in an even worse position. Asset Tracing and Recovery – Get back what you were defrauded Financial institutions are often confronted with significant losses on credit or insurance files due to misconduct or even sometimes fraud by the client. Our Asset Tracing and Recovery service is designed to answer the questions you have in the aftermath: • What went wrong? • Where is the money/asset now and how can we get it back? • Who is responsible? • Which controls failed? • What steps need to be taken? These questions will be answered with a combination of investigation and highly refined asset recovery skills drawing on the PwC expertise and advanced Forensic Technology. Such an investigation is the starting point for the recovery of stolen assets. Our ability to unravel complex international fraud schemes may result in such assets being identified, frozen and then recovered. Foreword Contact Place foreword for your publication here at 10.5/12pt. PlaceRudy foreword for your publication here at 10.5/12pt. Hoskens Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. PlaceDirector foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. PlaceDispute foreword for your&publication here at 10.5/12pt. Place Analysis Investigations foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place +32 (0) 2 710 43 07 foreword for your publication here at 10.5/12pt. rudy.hoskens@pwc.be Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for Louchard your publication here at 10.5/12pt. Place Cécile foreword for your publication here at 10.5/12pt. Senior Manager Place foreword for your publication here at 10.5/12pt. PlaceDispute foreword for your&publication here at 10.5/12pt. Analysis Investigations Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. (0) 2 710 44 24publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place+32 foreword for your Place foreword for your publication here at 10.5/12pt. Placececile.louchard@pwc.be foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Author’s signature Foreword Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Author’s signature www.pwc.be © 2009 PricewaterhouseCoopers. All rights reserved. “PricewaterhouseCoopers” refers to the network of member firmsof PricewaterhouseCoopers International Limited, each of which is a separate and independent legal entity. *connectedthinking is a trademark of PricewaterhouseCoopers. The firms of the PricewaterhouseCoopers global network (www.pwc.com) provide industry-focused assurance, tax andadvisory services to build public trust and enhance value for clients and their stakeholders. More than 155,000 people in 153countries across our network share their thinking, experience and solutions to develop fresh perspectives and practical advice.