20 November 2015 Detecting and preventing fraud in the delivery of public services in a digital world.

Slides:



Advertisements
Similar presentations
MDM AP Summit Oakton MDM Health Check 29 April 2009.
Advertisements

George Tubin Senior Analyst Consumer Banking © 2005 The Tower Group, Inc. May not be reproduced by any means without express permission. All rights reserved.
Speakers Vikram Yellampalli Prity Tewary
CANE MEDIA Presented by Akhona Ngwane September 2013.
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
VSCPA Northern Chapter Cloud Accounting Using QuickBooks Online With Not for Profits.
The New Rules of F&I with Peter Jones The New Rules of F&I What are the Rules? Red Flag Rule Graham / Leach / Bliley Act Privacy Notice Safeguard Rule.
C REDIT H ISTORY A ND R ATINGS 1 Copyright © Texas Education Agency, All rights reserved.
1 Payables Efficiency Through… Access Online PAYMENT PLUS.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Four tips to keep ACH fraud in the past. 2 ACH Fraud Prevention Steps Businesses Can Take to Minimize Fraud Risk 1 1 b b c c d d e e f f g g a a Monitor.
© Copyright IBSP – IBSP Hong Kong Ltd Internet Business Service Provider.
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Information contained in this report is strictly confidential and may be subject to legal professional privilege. It is the exclusive property of Australia.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Copyright  2012 McGraw-Hill Australia Pty Ltd PowerPoint Slides t/a Advertising and Promotion 2e by Belch, Belch, Kerr & Powell 6-1 Chapter 6 Branding.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
Retail and Consumer Roadmap to Retailing in the Digital Era Strictly Private and Confidential 17 June 2015.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
© 2011 Autodesk Securing AutoCAD IP in the era of WikiLeaks Presenter: Rahul Kopikar Co-Founder, Seclore Technology.
Rapid Mobile Development Enterprises are having a tough time keeping up with the demand for mobile apps. With these growing demands, businesses are expecting.
©2012 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
AICC Overview November 21, 2011.
Count It Out! Change Makes Cents 1. Copyright Copyright © Texas Education Agency, These Materials are copyrighted © and trademarked ™ as the property.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Why Mobile Bill Payment is Thriving and How Utilities are Responding
Risk Management Reconstructed Implementing fraud risk intelligence practices July 2011 KPMG FORENSIC SM.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
TELUS Work Styles Copyright © TELUS Corporation. All rights reserved. Neither the whole nor any part of this work maybe copied, scanned, reproduced, or.
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication.
Sports and Entertainment Marketing Ethics Copyright © Texas Education Agency, All rights reserved. Copyright © Texas Education Agency, All.
Principles of Business, Marketing, and Finance Production, Distribution, and Other Business Operations Copyright © Texas Education Agency, All rights.
Module 3: Business Information Systems Chapter 8: Electronic and Mobile Commerce.
Economic Resources Marketing Dynamics – Unit 3 Lesson 1 Copyright © Texas Education Agency, All rights reserved.
© 2012 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
Next Generation Partner Program Fady Iskander Symantec Corp.
Copyright  2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Management Accounting: An Australian Perspective 3/e by Langfield-Smith, Thorne & Hilton Slides.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
Virtual Business Virtual Communication Copyright © Texas Education Agency, All rights reserved.
1- 1 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall i t ’s good and good for you Chapter 1 Marketing: Creating and Capturing Customer.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Copyright  2006 McGraw-Hill Australia Pty Ltd PPTs t/a Management Accounting: Information for managing and creating value 4e Slides prepared by Kim Langfield-Smith.
Intellectual Property Rights TrademarksTrademarks: protects novel marks & designs used in marketing & advertising for an indefinite period as long as in.
CYBER SECURITY & ITS IMPACT ON FINANCIAL STATEMENTS AUDITS BOB WAGNER TUESDAY, NOVEMBER FLORIDA SCHOOL FINANCE OFFICERS ASSOCIATION CONFERENCE.
©2012 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
Business Communication Today
A business plan is an essential roadmap for business success. This living document generally projects 3-5 years ahead and outlines the route a company.
CONFIDENTIAL AND PROPRIETARY This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole.
Technology and Banking Banking and Financial Services 1.
©2013 Experian Limited & BII. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
Level 2 Business Studies AS90843 Demonstrate understanding of the internal operations of a large business.
“Card Diversity and Novel Prepaid Card Applications Spur Growth in the Prepaid Cards Market” © Global Industry Analysts, Inc., 6150 Hellyer Ave., San Jose,
Vodafone Business Cloud
MICROSOFT ENTERPRISE SOLUTIONS FOR LEADERS.  Business intelligence and Enterprise Resource Planning With powerful business intelligence and ERP solutions,
Understanding Accounting and Financial Statements Chapter 15 Sections 1-5.
Emerging Payments Market Developments: Trends and Risks James Van Dyke, President and Founder Presented at the Federal Reserve Bank of Atlanta, November.
Copyright © Texas Education Agency, All rights reserved
Red Flags Rule An Introduction County College of Morris
Copyright © Texas Education Agency, All rights reserved
How Is Digital Transformation Accelerating The Banking Industry?
Presentation transcript:

20 November 2015 Detecting and preventing fraud in the delivery of public services in a digital world

2 COPYRIGHT © 2015 OAKTON Australian firms too 'complacent' about corruption The World Today, 17 Sep 2015 “The report argued that, while corruption is low in Australia, other studies suggest the incidence is growing amid recent high profile cases, such as the insider trading scandal involving an employee from the National Australia Bank and a worker from the Australian Bureau of Statistics, who were both acting for their own profit. Other companies that have faced corruption allegations in Australia include former Reserve Bank subsidiaries, Securency and Note Printing Australia, BHP Billiton, AWB, and Leighton Holdings.” The World Today Digital fraud is a strategic threat to our organisations and should be treated accordingly

3 COPYRIGHT © 2015 OAKTON THE DIGITAL LANDSCAPE s – 1990s –

COPYRIGHT © 2016 OAKTON Gartner 2015 Digital technologies — mobile, social, big data and cloud — are disrupting businesses everywhere by revolutionising the role technology plays in our everyday lives.

5 COPYRIGHT © 2015 OAKTON Engagement and experience expectations continue to change

COPYRIGHT © 2016 OAKTON Engagement expectations continue to change “Digital” touchpoints resonate with Consumers more and more everyday. By 2018 Digital Natives (Millennials) will begin to out-number all other types of Consumers. Millennials type consumers have been born into the digital world, not just adopting but driving innovation of new technologies to ‘enhance’ their lives. Decade of Change * % UK Active Adult population

COPYRIGHT © 2016 OAKTON Transformational Government and citizen-focus

8 COPYRIGHT © 2015 OAKTON Government is increasingly seeking digital solutions to service delivery: Customer self-service / e-portals / MyGov e-Tax, e-Health Grants Management Customer Relationship Management Systems Tender and Contract registers ACT – Access Canberra – web and payment solutions Express Plus – mobile apps TRANSFORMING TO CUSTOMER FOCUS

9 COPYRIGHT © 2015 OAKTON The potential of the data we generate and store creates substantial motive and opportunity

10 COPYRIGHT © 2015 OAKTON Findings indicate that the typical fraudster is: 36 to 45 years of age generally acting against his/her own organisation employed in an executive, finance, operations or sales/marketing function holds a senior management position employed in the organisation in excess of six years frequently acted in concert with others Source: KPMG Global profiles of the fraudster PERPETRATORS OF FRAUD

11 COPYRIGHT © 2015 OAKTON Data theft and ransom demands Attacks on payment systems / websites Theft of intellectual property Government credit card fraud Employee identify theft Fake credentials Fake company and invoicing TECHNOLOGY ENABLED FRAUD

12 COPYRIGHT © 2015 OAKTON TECHNOLOGY ENABLED FRAUD CHRISTOPHER PUSCHAK

13 COPYRIGHT © 2015 OAKTON TECHNOLOGY ENABLED FRAUD Has unethical behaviour tarnished the Volkswagen brand forever? CPA Update, Edition 41 28OCT15

14 COPYRIGHT © 2015 OAKTON Public servant who lied about stillbirth to skydive with government money sentenced to weekend detention A Canberra woman who used her government credit card to take a lavish holiday on the Gold Coast has been sentenced in the ACT Magistrates Court. ABC News, 30 Oct 2015 Four people charged for alleged fraud from ACT Public Trustee The suspect transactions took place over seven years and are believed to include debit card fraud, thefts from cash machines, contractor kickbacks, and false paperwork trails. ABC News, 16 Oct 2015 OTHER CASES

15 COPYRIGHT © 2015 OAKTON CALL TO ACTION

16 COPYRIGHT © 2015 OAKTON Declarations of Interest and due diligence Restrict data storage devices (USB, disk, Bluetooth) Access monitoring Behaviour monitoring Secure database, cloud and communications Data analytics / Computer Assisted Audit Tools (CAATS) Listen to customer complaints / concerns -> whistleblower line Audit practices – financial & compliance, use of CAATS Tone at the top – strong statement on fraud prevention PREVENTION IS BETTER THAN DETECTION

THANK YOU © Oakton Services Pty Ltd This work is copyright. Except as permitted under the Copyright Act 1968 (Cth), no part of this publication may be reproduced by any process, electronic or otherwise, without the specific written permission of the copyright owner. Neither may information be stored electronically in any form whatsoever without such permission. This presentation is intended to provide a summary of the subject matter covered. The Owner disclaims all liability in relation to the contents of this presentation and the use to which it may be put. Trademarks used in this document are the property of the owner.