It’s Almost Midnight, Do You Know Where Your Assets Are?

Slides:



Advertisements
Similar presentations
Chapter 4 Risk Assessment McGraw-Hill/Irwin
Advertisements

Chapter 14 Fraud Risk Assessment.
Cash and Internal Control.  Fraud Triangle  STRESS  OPPORTUNITY PRESSURE.
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
1 Non-Cash Assets Chapter 9. 2 List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash.
© 2003 by the AICPA SAS 99: Consideration of Fraud in a Financial Statement Audit.
© The McGraw-Hill Companies, Inc., 2006 Slide 10-1 Cash and Financial Investments.
Chapter 2 Skimming.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
Chapter 3 Cash Larceny.
AUDIT OF CASH.
McGraw-Hill/Irwin ©2007 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 3 Management Fraud and Audit Risk "It takes 20 years to build a.
Chapter 3 Cash Larceny.
SAS 99: Consideration of Fraud in a Financial Statement Audit Based upon AICPA 2003 overview available at
Cash and Financial Investments. McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved Internal Control Over --Cash Receipts.
Presented By: Donna Denker, CPA Donna Denker & Associates.
Chapter 4 Risk Assessment.
Chapter 10 Cash and Financial Investments McGraw-Hill/Irwin
AUDIT RESPONSIBILITIES AND OBJECTIVES
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 3-1 Chapter Three Risk Assessment and Materiality Chapter Three.
Developing An Internal Control Plan For Your LEA
Chapter 16: Audit of Cash Balances
CASH RISK ASSESSMENT. Fraud OverviewFraud SchemesWhen & How Fraud HappensOur Approach to Fraud Deterrence Overview.
Where’s the Money Going? 10 Things You Should Know about Internal Controls and Fraud Donna S. Brown, CPA Bob Powell, CPA November 12, 2010.
IT Auditing & Assurance, 2e, Hall & Singleton C hapter 12: Fraud Schemes & Fraud Detection.
Chapter 4 Risk Assessment McGraw-Hill/Irwin
Chapter 7 Internal Control and Cash
Justin K. Kiddy, CPA/PFS, CFE Fraud in your Charter School: Is it possible? How to defend against it?
1 Planning and Control of Cash and Short term Investments ACCT7320-Dr. Bailey-Fall 2009 Thanks for the contributions of Michelle Strickland and Michelle.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 12: Fraud Schemes & Fraud Detection IT Auditing & Assurance, 2e, Hall & Singleton.
The “F” Word: Fraud Presented by: Donna Mayes, CPA.
Auditing Internal Control Studies & Risk Assessment Chapter 9 Internal Control Studies & Risk Assessment Chapter 9.
Copyright © 2007 Pearson Education Canada 1 Chapter 10: Fraud Auditing.
Experience perspective // CPAs & ADVISORS CLUB FINANCIAL MANAGEMENT BEST PRACTICES Presented by Rick Wittgren, CPA, partner.
SAS 99: Consideration of Fraud in a Financial Statement Audit.
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
SAS 99: Consideration of Fraud in a Financial Statement Audit.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
Internal Control Chapter 7. McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-2 Summary of Internal Control Definition.
Auditing Cash
Auditing Concepts.
PROFESSIONAL LIABILITY & QUALITY CONTROL
Types of fraud Fraudulent Financial Reporting—An intentional misstatement or omission of amounts or disclosures with the intent to deceive users. Most.
Chapter 9 Non-Cash Assets.
Internal Control Procedures
Fraud & Internal Controls
WHO IS STEALING FROM YOU
Materiality and Risk Chapter 8.
Reporting and Interpreting Sales Revenue, Receivables, and Cash
MIE Conference Session: Telling your Financial Story
LATIHAN MID SEMINAR AUDIT hiday.
Chapter 7 Part 1 Internal Control
Chapter 9 Non-Cash Assets.
Cash and Financial Investments
Cindy Seipel PhD CPA CFE Professor of Accounting (Auditing) NMSU
Management Fraud and Audit Risk
Internal Control Procedures and Bank Reconciliation Preparation
AU-C Section 240 Consideration of fraud in a financial statement
Chapter 12: Fraud Schemes & Fraud Detection
Problem EP 12-9 Listed below is a selection of items from the internal control questionnaire on payables in Appendix 12A, Page 694. Are invoices, receiving.
Virginia Sheriffs’ Institute New Sheriff Orientation
Welcome to Special programs night!
UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT Topic 5.
ACC 492 TUTOR Dreams Come True / acc492tutor.com.
ACC 492 TUTOR best future education / acc492tutor.com.
Presentation transcript:

It’s Almost Midnight, Do You Know Where Your Assets Are? January 18, 2018 Association of Government Accountants – Boston Chapter 2018 Annual Winter Seminar

Session Objectives Identify and summarize fraud risks and control strengths and weaknesses through team brainstorming sessions Recognize how to evaluate fraud schemes and modify planned audit tests to determine if fraud is occurring

Session Agenda Fraud discussions (brainstorming) Let’s play “Protect Those Assets”

Fraud Brainstorming

Discussions Among Engagement Personnel During audit planning Interactive exchange of ideas … brainstorming Insights of more experienced team members How and where the financial statements might be susceptible to fraud within the framework Motive Opportunity Rationalization Emphasize importance of proper state of mind (professional skepticism) during the audit Include the risk of management override of controls Thoroughly probe the issues Consider audit responses to fraud susceptibility

Discussions Among Engagement Personnel Summarize known fraud risks and control strengths and weaknesses Brainstorm ways that fraud might be committed by someone within the entity (by management or employees) or on the entity (by an outsider) Evaluate fraud schemes deemed viable or possible React by modifying planned audit tests to ascertain if fraud is occurring

The purpose of brainstorming … …is to get as many ideas as possible from a group of people in the shortest possible time. Quantity and not quality is the order of the day. It does not matter if the ideas are thought to be unworkable, or crazy, or outlandish by anybody within the group. Sometimes these ideas are the very ones that are adapted into other forms that solve the problem adequately. --http://www.mindbloom.net/brain.html

The rules for effective brainstorming … There should be no criticism of any idea from any member of the group There should be no evaluation of the ideas generated The more ideas generated, the better Combination or modification of the ideas generated is encouraged --http://www.mindbloom.net/brain.html

Discussions Among Engagement Personnel Brainstorm the following:  Specific ways in which the entity’s financial statements might be susceptible to material misstatement due to fraud.   Focus on how management could perpetrate and conceal fraudulent financial reporting. For each potential fraud scheme discussed, identify Likely perpetrators  The likely perpetrators’ possible motives or pressures that might induce them to commit fraud  The opportunities that might exist to enable the scheme to occur  The likely perpetrators’ possible rationalizations 

Discussions Among Engagement Personnel Focus on misappropriation of assets. For each potential fraud scheme discussed, identify: Likely perpetrators  The likely perpetrators’ possible motives or pressures that might induce them to commit fraud  The opportunities that might exist to enable the scheme to occur  The likely perpetrators’ possible rationalizations

Let’s play “Protect Those Assets”

What are Assets?

What are assets? Cash Accounts Receivable Marketable Equity Securities Other Investments Plant, Property & Equipment Inventory

What are assets? Intellectual Property Human Resources Reputation Market Share Systems and Software Taxpayer Base Donor Base Contracts/Grants

Let’s Play “Protect Those Assets” Divide into teams of 5 to 10 players Select a scribe Teams on the debit side of the room will be the defenders Teams on the credit side of the room will be the attackers Teams may pick their assets, or I will assign the assets to be protected and defended

Let’s Play “Protect Those Assets” Defenders: you have 20 minutes to design and define as many control procedures as you deem cost-effective and necessary to protect your assigned assets Record your controls

Money is no object! Let’s Play “Protect Those Assets” Defenders: you have 20 minutes to design and define as many control procedures as you deem cost-effective and necessary to protect your assigned assets Record your controls Money is no object!

Let’s Play “Protect Those Assets” Attackers: you have 20 minutes to devise fraud schemes designed to obtain (or damage) some or all of the assets you are assigned to attack Record your fraud schemes

The purpose of brainstorming … …is to get as many ideas as possible from a group of people in the shortest possible time. Quantity and not quality is the order of the day. It does not matter if the ideas are thought to be unworkable, or crazy, or outlandish by anybody within the group. Sometimes these ideas are the very ones that are adapted into other forms that solve the problem adequately. --http://www.mindbloom.net/brain.html

The rules for effective brainstorming … There should be no criticism of any idea from any member of the group There should be no evaluation of the ideas generated The more ideas generated, the better Combination or modification of the ideas generated is encouraged --http://www.mindbloom.net/brain.html

Rules of Engagement The defender team will read the group its list of controls The attacker team will then read its list of fraud schemes Our panel of judges will decide who wins each encounter

Sample: Cash Controls: Cash receipts under dual control at all times Cash deposited into bank within 4 hours of receipt Persons who receive and deposit cash do not have access to accounting records Two signatures required on all checks Check signers do not have access to accounting records Bank statements go to reconciler who does not have routine access to checkbook or accounting records Reconciliations completed within 3 days of receipt of statements

Sample: Cash Schemes: Diversion of cash receipts (person who receives cash pockets some cash or alters/diverts checks for own use) Kiting (after diverting cash, move cash from account to account) Lapping (record follow-on receipts to cover up diversion) Forge signature on checks, records checks as “void” Set up dummy supply company; process payments to that company The two people assigned to record receipts collude to divert receipts for their own use

Consider this … Designing and maintaining internal controls to protect assets is ….boring Fraud perpetrators usually are more creative than asset protectors Maybe a better approach to protecting assets is to: Try thinking like the fraud perpetrators Devise ways to steal assets—use brainstorming Once you have identified the schemes, THEN design controls that would prevent or detect those schemes

Speaker Contact Information Melinda J. DeCorte CPA, CFE, CGFM, PMP Direct (703) 725-8559 melindadecorte@gmail.com