You are on page 1of 6

7-8 JUNE 2012, MUMBAI, Holiday Inn

III

EDITION

Current landscape and trends for fraud and corruption Integration of fraud, audit, risk management and assurance Corporate integrity risks Predicative indications in fraud management and the importance of fraud analytics Fraud Risk Management, Fraud and Modus Operandi Trends & Process Control Updates Sector Case Analysis Getting creative as a fraud investigator Best practices in setting up in setting up, training & managing Fraud Investigation and Forensic Team Surveillance & Business Intelligence Detecting fraud with IT controls and techniques, identifying cybercrime Fraud forensic auditing - The role of fraud forensic auditing from start to finish, the appropriate techniques

LIMITED AVAILABILITY! BOOK BY MAY 28 To register, contact: Anjali Shetty

TO TAKE ADVANTAGE OF OUR EARLYBIRD DISCOUNT! Email: anjali.shetty@itp.com, Call: +91 9619 453737
Conceptualised & Organised by:  Gold Partner Associate Partner Silver Partner

Managing internal and external investigations Fraud management for Retail banking and cards
Official Magazine Partner Media Partners

http://www.itp.net/inevents/events/fraudsummit-third-edition/index.html

SUMMIT Background:

Following two very lively and well-attended discussions last year in Delhi and Mumbai, the third edition of the fraud Investigations and Control Summit will be larger than ever. Through highly focused discussion sessions andinteractive panel debates, the summit will delve deep into the critical and compound issues of managing the complexities of fraud control and investigations. It will benchmark case studies and best practices across a wide range of industries, such as banking, retail and telecoms. The summit is an ideal platform for all those involved in fraud control and follow-up investigations to gain valuable knowledge and share their experiences. Aim for the third edition The aim for this years summit is to analyse the evolving techniques of modern-day fraudsters. It will help the fraud management community by looking at ways to control processes and analyse data to speed up investigations in suspected cases. Interactive and engaging formats Ice-breaker session: This unique session at the start of each day is an interaction between participants to identify their most current and common challenges. It serves to set the tone of discussion for the day and help speakers to assess the subjects that are most relevant for delegates. Group feedback analysis: This session will involve the audience by using their experiences to share understanding. Case study analysis: Case studies from a broad cross-section of the industry will be used to benchmark the techniques of modern-day fraudsters. These will be based on strengths each industry has on fraud control. For example, retail and manufacturing will have a higher susceptibility to fraudulent activity in procurement and their supply chains, while ITES companies need more process controls for preventing data theft, and telecom playersare susceptible to vendor and identify fraud.

Who Should Attend:

Heads of fraud control and investigation CXO Chief risk officers Chief legal counsels Chief compliance officers Chief internal auditors Chief information officers Chief security officers Vice-presidents, general managers, department heads, functional managers and consultants for:

Finance Corporate governance Compliance Accounts Legal and regulatory Ethics Operational risk Audit and internal controls Information technology Information security Management assurance

Fraud Investigation & Controls - GLIMPSES OF THE PREVIOUS YEARS

Conference Agenda: Day One Thursday, 7th June 2012


08.30 09.30 09.45 10.00 11.15 11.30 12.00 12.30 13.00 13.30 Registration and morning refreshments Opening Remarks by Conference Chair ICE BREAKER SESSION The ice breaker session is an interaction between the participants to identify their most current and common challenges in fraud risk management and investigations process to set the tone of discussion for day as also to help speakers share their thoughts on issues most relevant to the attending participants. Key Note Panel: What is the current thoughts and trends in fraud risk management and processes for integration of fraud, audit, risk manage ment and assurance Corporate integrity risks in the current business environment How do you manage integrity risk? Identifying current drivers and enablers of workplace dishonesty Identifying enablers and precursors of fraud and corruption How to you define Fraud Risk Management for your organization? Managing Your Customer Risk Know Your Customer fraud control issues Mitigating the Internal Fraud Risk -Know Your Employee fraud control issues FCPA compliance and how to overcome the real challenges UK Bribery Act FRANK-DODD financial reform act How do you establish a link between tone at the top and fraud risk management? Creating a fraud control culture within your organisation How do you develop and action a fraud response plan from paper to one which really helps in a fraud crisis situation Specific challenges and formulating a proactive strategy for controlling bribes, corruption schemes and kickbacks Whistleblower Policies: key steps in moving them from paper to ones which help in fraud control and understanding why people do not report? Organizational action and response strategy for whistle blowing Investigating top management and board of directors in suspected cases of fraud What are the current updates and thought processes for Integrating Fraud, Audit, Risk Management & Assurance to provide better service to management Group Feedback Analysis : Characteristic of an Ideal Fraud Risk Framework which incorporated as a measure of good governance for providing assurance to auditors, regulators, suppliers, customers and investors Networking and Refreshment Break Predictive Indications in Fraud Management & Importance of Fraud Analytics Identification of red flags or alarms of suspected frauds. Automated system with real time and accurate outcomes. Highlighting process gaps and lacuna through repeated instances. Highlighting policies misinterpretations. Continuous and regular monitoring Partner Presentation Presentation of Research Reports By Knowledge Partner How to Identify and Manage Money Laundering Risk? Brief of money laundering and how it can affect your organisation in case what are the long term implication and losses of being associated with money laundering How does money laundering work with large corporate What are the most venerable areas and process controls for the same Partner Presentation Networking Lunch

14.30

Extended Cross Benchmarking Review Panel Fraud and Modus Operandi Trends Process Control Updates Sector Case Analysis Industry Case Analysis One: Fraud Management for banking and financial services There is an increased incidence of fraud being reported in the banking sector from MNC, Public as well as private players What are the current frauds observed in banking sector and modus operandi of fraudsters targeting banks and financial institutions Common areas venerable to fraud and mitigation strategies Factors which contribute to fraud Technology uses to detect fraud by banking sector Fraud analytics in operations todays Cost benefit evaluation of fraud control and investigation process Identifying Future threat areas where fraud can be perpetuated Banking fraud impact on other industries

Industry Case Analysis Two: Documentation Fraud, Vendor Fraud Management & Technology Solutions Learnings from Telecom Sector 16.00 16.30 Telecom companies have a high number of external touch points that include, subscribers, Channel partners distributors, Service providers - value added service providers, bulk sms, mms etc. In this context, the industry is subject to a number of frauds. This industry case analysis presents on Risks such as Subscriber (Documentation Frauds ) frauds Identity theft Vendor Fraud Unauthorised usage of network Leakage of sensitive information Technology systems for monitoring fraudulent use of networks Accounting and reporting irregularities Challenges associated with internal or external misconduct investiga tions (internal frauds) Trend Analysis: What is the evolving profile of the fraudster in the telecom sector Impact on other industries : Analysing the impact of telecom fraud on corporates and advanced mitigation strategies Industry Case Analysis Three : Data Security and Employee Screening for fraud risk management Learnings from IT / ITES and BPO Sector The typical fraudster in the IT - ITES sector Employee screening techniques Protection of confidential data against thefts Embedding Fraud Management within Enterprise risk framework and Preventive controls to mitigate fraud Networking and Refreshment Break Extended Cross Benchmarking Review Panel (Continued) Industry Case Analysis Four: Supply Chain, Procurement & Warehousing Frauds Learnings from Retail, Pharmaceuticals and Manufacturing Sector Key areas where supply chain is susceptible to frauds Key areas which are susceptible to supply chain fraud Inbound supply Chain Outbound supply chain Reviewing supply chain fraud - purchasing, accounting, manufactuing, distribution, shipping, sales order processing, inventory control, quality assurance, and fixed asset management Case review: examples of supply chain fraud and impact Profiling of fraudster and MO trends in supply chain Procurement Frauds Identifying and mitigating your exposure to procurement fraud threats Characteristics and most common procurement fraud Procurement fraud schemes

16.30 17.15 17.30 17.45

What are the red flags of procurement fraud The red flags of bribes and kickbacks Extended Cross Benchmarking Review Panel Warehousing , Inventory fraud and concealment of assets How managers conceal inventory and capital asset theft? Phantom inventory: How to know whats really in your warehouses and whats not Case studies of inventory/fixed asset frauds Red flags of inventory theft and asset value misstatement Dealing with inventory fraud Participants Feedback Analysis: How do you keep track of the modern day fraudster and share informa tion in a timely manner to minimize copycat impacts on your organization Summation of Learnings of the day one Evaluating if key objectives for the discussion which had been set dur ing the start of the conference have been met and key take backs in learnings for participants End of Day One

12.15 12.45 13.30 14.30 15.00 15.30

Detecting Fraud with IT controls and techniques Partner Presentation Digital Forensics and Investigation This session will explain Digital Forensics and its application to identify, prevent, detect, investigate and report frauds and digital crimes and how investigators are able to gather, reconstruct, process, interpret and use digital evidence from Digital artifacts such as information systems, computers, networks, storage devices, smart phones etc. to provide a conclusive description of frauds and establish credible audit trails of electronic wrongdoing while maintaining chain of custody suitable for inclusion in investigation in conjunction with law enforcement Partner Presentation Networking Lunch Engaging External Investigator Assessing engagement with external investigators When and whom to engage as external investigators? Budget and control cost while engaging external investigators Evaluation RoI for external investigators Fees negotiations and Billing practices Structure engagement letters Dealing with cross border frauds and international crime syndicates Detecting and Investigating international crime syndicates that de fraud your company? Corporation and international support required for fraud investigations which go beyond your operational borders Legal aspects of cross border fraud Recovery legal and Risk Issues As fraud investigators, the end result of the case may lead to a legal recourse for recovery of assets or to pass across a strong message to future perpetrators that organization will take wrong doing to its final conclusion in a court of law. To investigate or audit for fraud, it is critical for investigator to have holistic view an all legal elements of fraud including, intent, direct and indirect proof, and the legal rights of the accused and accuser.

Conference Agenda: Day TWO Thursday, 7th June 2012


08.30 09.30 09.45 10.00 11.15 11.45 Registration and morning refreshments Opening Remarks by Conference Chair ICE BREAKER SESSION Focus: Identifying Top 5 challenges facing Fraud Managers Expert Panel Discussion: Managing Fraud Investigation Getting creative as a fraud investigator Identifying the fraudsters personality type How do you adjust and adapt your investigation to personality type and modus operandi of fraudster? Pattern recognitions How do you get creative as an investigator? Thinking from the fraudsters viewpoint for exploring untouched areas? Investigation setups Critical factors which will affect your investigation Best practices in setting up & managing Fraud Investigation & Forensic Team The need for demystification of role and function at organisational level What is the ideal Environment for an effective functioning of forensic team? What are additional support and benefits required from HR, administra tion and other key stakeholder? Ideal Reporting Structures Collaboration in Investigations Key learnings and case studies from team based fraud investigations involving Internal audit, HR, Legal, IT, Corporate communication Participants Interactive Session Future Outlook: How do you Evolve the Fraud investigation and control function Investigators performance management - why is it necessary? How do you present your performance to your senior management How do you constantly evolve your role and skill sets to future proof your functional representation in an organisation How do you strategize fraud control team as a business partner and revenue enabler? How do you managing your team and engage them in performance improvement and key skill set enhancement Personal Liability Management When it gets a bit too hot Handle? Dealing with organized criminals, gangs, professional con artists, political interference and personal threats to oneself Networking and Refreshment Break

Evidence that stands scrutiny in a court of law What constitutes legal evidence? Evidence collection techniques during fraud investigations what are common mistakes to avoid which can compromise your end result? Legally acceptable evidence presentation Development of exhibits for use in courts Testifying in courts Discussion: Assessing Legal options When and why should you go ahead with legal proceeding? Fiduciary obligations and responsibility to pursue legal action for recovery of assets Are organizations liable for actions by third party in case of non-pursuit of legal options? Legal options during cases of cross border frauds? Assessing what is your real RoI on pursuing legal actions based on evidence at hand, legal counsel fees and time spent in court? What are the options available? Case Analysis: Recent Examples of legal judgments in fraud cases in conviction rations and recovery of assets 16.30 17.00 17.15 The Day After Corrective Action after the investigation is complete Summation of Learnings of the day Two Evaluating if key objectives for the discussion which had been set dur ing the start of the conference have been met and key take backs in learnings for participants End of Day Two

PAST CONFERENCE ATTENDEES 3i Infotech Ltd | ABHi Technologies | Aditya Birla Money | Aditya Birla Retail | AKP Partner Pvt Ltd | Alcatel-Lucent | Ambuja Cements | ATS Infrastructure | Axis Bank | Bank of Tokyo Mitsubishi | Barclays Finance | Bharti Airtel | Birla Sunlife Insurance | Castrol India | Dainik Bhaskar Group | Dalmia Bharat Enterprises | Dr. Reddys Laboratories | Deutsche Bank | Economic Laws Practice | Edelweiss Capital Engineering Projects | Essar Investments | Fullerton India | GAIL | Genpact GlaxoSmithKline Pharmaceuticals | GMR Group | Godrej Group | Gujarat Gas | DCM Shriram Consolidated | HDFC Life Insurance | Hinduja Global Solutions | IBDI Federal Life Insurance | IBM | ICICI Bank | Indian Defence Accounts Service | Indian Overseas Bank | Infosys BPO | IOCL | Karvy Stock Broking | Kotak Mahindra Bank | KPMG | L&T Finance | L&T General Insurance Company | Lanco Infratech | Lex Witness | Mahindra Special Services Group | Max Healthcare Institute | Microsoft Corporation | Ministry of Home Affairs | Moneywise Media | National Commodity & Derivatives Exchange | North Delhi Power | Prizm Payment Services | Pyramid Cyber Security & Forensic | Samsung India Electronics | Sandvik Asia | SEBI | Sony Entertainment Television | Standard Chartered Bank | State Bank of India | HSBC | TMF India | Transparency International India | United Bank of India | UTV Group | Vodafone Essar | Volkswagen Finance

For Conference & Sponsorship Enquiry Contact:  Raghavendra Pandey; Email: raghavendra.pandey@itp.com, Cell: +91-9820283868, Direct Tel.: +91-22-61546012

ITP Publishing India Pvt. Ltd., Turner Road, 898 Notan Plaza, 3rd Floor, Bandra (W), Mumbai - 400 050

You might also like