SlideShare uma empresa Scribd logo
1 de 12
By
3 Instances Where E-Mail Mining
For Fraud Detection…
Could’ve Prevented Financial Loss
Do You Recognize Any Of These
Corporate Fraud Headlines?
Breaking News
It’s ok if you don’t
remember…
because we’ll give you all of the details!
The databahn Times
Mike Kail
Senior Netflix executive receives bribesCase # 1:
• Mike Kail was the former VP of Information
Technology Operations
• Kail made a deal with IT service providers to receive
bribes of 12% - 15% of the total deal value
• Kail earned $490,000 in kickbacks
• Netflix uncovered the fraud after Kail left
• Netflix uncovered e-mails discussing “referral fees”
• Kail got away with the crime because he was an
upper-level employee
The databahn Times
British software company, Autonomy,
falsifies numbers
Case # 2:
• HP acquired Autonomy for $11.1 billion in 2012
• HP discovered Autonomy misrepresented its
finances – by $5.55 billion
• HP filed a $5.1 billion lawsuit against Autonomy
• E-mails were discovered between the former CFO
and founder
• Included the phrases “covered up” and
“imaginary deals”
• E-mails were checked and the truth was discovered
after the deal had gone through
The databahn Times
Former law partner shares private
information with opposing attorney
Case # 3:
• A former law partner at Willkie Farr & Gallagher, Keila
Ravelo, had suspicious communications with the
opposing counsel
• Ravelo had an established friendship with the opposing
counselor
• The law firm found e-mails and attachments concerning
the American Express litigation
• The opposing counselor sent Ravelo documents secured
under the American Express litigation protective order
What These Headlines Have In Common…
Besides Fraud
FRAUD
!
?
Proof of Fraud:
Autonomy E-mail
From The Telegraph
E-Mail conversation between the CFO and founder
E-mail Mining Would Have Saved…
Time
Money
Median fraud duration in 2014 was 18 months
Median loss in 2014 was $145,000
*stats from Association of Certified Fraud Examiners’ Report to Nations
Reputation
Your reputation is immeasurable
Internal Fraud Can Happen To Any
Company
Small Company Large Company
You need to implement a proactive approach!
You’ve Seen Enough Fraud In The
News...
YOU
Don’t become the next headline!
For more information, check out our blog at
www.databahn.com/blog
@844databahn
Databahn
databahn

Mais conteúdo relacionado

Mais procurados

Electronic Communications Act (2000)
Electronic Communications Act (2000)Electronic Communications Act (2000)
Electronic Communications Act (2000)
Ed Dickinson
 
Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)
John Nicholson
 
What Is E Commerce
What Is E CommerceWhat Is E Commerce
What Is E Commerce
Ed Dickinson
 
How the FTC Wants You to Change Your Shopping App to be Legal
How the FTC Wants You to Change Your Shopping App to be LegalHow the FTC Wants You to Change Your Shopping App to be Legal
How the FTC Wants You to Change Your Shopping App to be Legal
Brian Heidelberger
 

Mais procurados (13)

Legal and ethical issues in web design
Legal and ethical issues in web designLegal and ethical issues in web design
Legal and ethical issues in web design
 
Investigating & proving cybercrime
Investigating & proving cybercrimeInvestigating & proving cybercrime
Investigating & proving cybercrime
 
Cyber Security Awareness Survey: India
Cyber Security Awareness Survey: IndiaCyber Security Awareness Survey: India
Cyber Security Awareness Survey: India
 
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
 
Electronic Communications Act (2000)
Electronic Communications Act (2000)Electronic Communications Act (2000)
Electronic Communications Act (2000)
 
What is data protection and why it is important for business
What is data protection and why it is important for businessWhat is data protection and why it is important for business
What is data protection and why it is important for business
 
CASL Compliant: It's All About Consent
CASL Compliant: It's All About ConsentCASL Compliant: It's All About Consent
CASL Compliant: It's All About Consent
 
Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)
 
What Is E Commerce
What Is E CommerceWhat Is E Commerce
What Is E Commerce
 
Websites: 10 Things to Consider to Avoid Litigation 3-5
Websites: 10 Things to Consider to Avoid Litigation 3-5Websites: 10 Things to Consider to Avoid Litigation 3-5
Websites: 10 Things to Consider to Avoid Litigation 3-5
 
Your privacy online: Health information at serious risk of abuse, researchers...
Your privacy online: Health information at serious risk of abuse, researchers...Your privacy online: Health information at serious risk of abuse, researchers...
Your privacy online: Health information at serious risk of abuse, researchers...
 
How the FTC Wants You to Change Your Shopping App to be Legal
How the FTC Wants You to Change Your Shopping App to be LegalHow the FTC Wants You to Change Your Shopping App to be Legal
How the FTC Wants You to Change Your Shopping App to be Legal
 
Ppt by
Ppt by Ppt by
Ppt by
 

Semelhante a 3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financial Loss

FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
tomciolkosz
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
vineetkathan
 

Semelhante a 3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financial Loss (20)

FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
ETHICS03 - Equity Funding Scandal - Case Study
ETHICS03 - Equity Funding Scandal - Case StudyETHICS03 - Equity Funding Scandal - Case Study
ETHICS03 - Equity Funding Scandal - Case Study
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft And
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.
 
Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...
Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...
Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...
 
Armour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explainedArmour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explained
 
Business Law Training: Effectively Handling Internal Investigations
Business Law Training: Effectively Handling Internal InvestigationsBusiness Law Training: Effectively Handling Internal Investigations
Business Law Training: Effectively Handling Internal Investigations
 
Not "If" but "When"
Not "If" but "When"Not "If" but "When"
Not "If" but "When"
 
BBB October 2018 Market Monitor
BBB October 2018 Market Monitor BBB October 2018 Market Monitor
BBB October 2018 Market Monitor
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Cybercrime: A Primer
Cybercrime:  A PrimerCybercrime:  A Primer
Cybercrime: A Primer
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
GDPR by Identity Methods
GDPR by Identity MethodsGDPR by Identity Methods
GDPR by Identity Methods
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout History
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2
 

Mais de databahn

Mais de databahn (20)

Manulife Org Chart & Sales Intelligence Presentation.pptx
Manulife Org Chart & Sales Intelligence Presentation.pptxManulife Org Chart & Sales Intelligence Presentation.pptx
Manulife Org Chart & Sales Intelligence Presentation.pptx
 
2020 Fortune 1000 list factoids and findings
2020 Fortune 1000 list factoids and findings2020 Fortune 1000 list factoids and findings
2020 Fortune 1000 list factoids and findings
 
Fortune 1000 companies' response to covid 19
Fortune 1000 companies' response to covid 19Fortune 1000 companies' response to covid 19
Fortune 1000 companies' response to covid 19
 
Industries and Fortune 1000 companies thriving during the global pandemic
Industries and Fortune 1000 companies thriving during the global pandemicIndustries and Fortune 1000 companies thriving during the global pandemic
Industries and Fortune 1000 companies thriving during the global pandemic
 
7 keys to open doors at Cigna
7 keys to open doors at Cigna7 keys to open doors at Cigna
7 keys to open doors at Cigna
 
7 keys to open doors at Goldman Sachs
7 keys to open doors at Goldman Sachs7 keys to open doors at Goldman Sachs
7 keys to open doors at Goldman Sachs
 
7 keys to open doors at Pfizer
7 keys to open doors at Pfizer7 keys to open doors at Pfizer
7 keys to open doors at Pfizer
 
7 keys to open doors at Sysco
7 keys to open doors at Sysco7 keys to open doors at Sysco
7 keys to open doors at Sysco
 
7 keys to open doors at Caterpillar
7 keys to open doors at Caterpillar7 keys to open doors at Caterpillar
7 keys to open doors at Caterpillar
 
7 keys to open doors at Walt Disney
7 keys to open doors at Walt Disney7 keys to open doors at Walt Disney
7 keys to open doors at Walt Disney
 
7 keys to open doors at PepsiCo
7 keys to open doors at PepsiCo7 keys to open doors at PepsiCo
7 keys to open doors at PepsiCo
 
7 keys to open doors at FedEx
7 keys to open doors at FedEx7 keys to open doors at FedEx
7 keys to open doors at FedEx
 
7 keys to open doors at Procter & Gamble
7 keys to open doors at Procter & Gamble7 keys to open doors at Procter & Gamble
7 keys to open doors at Procter & Gamble
 
7 keys to open doors at MetLife
7 keys to open doors at MetLife7 keys to open doors at MetLife
7 keys to open doors at MetLife
 
7 keys to open doors at Lowe's
7 keys to open doors at Lowe's7 keys to open doors at Lowe's
7 keys to open doors at Lowe's
 
7 keys to open doors at UPS
7 keys to open doors at UPS7 keys to open doors at UPS
7 keys to open doors at UPS
 
7 keys to open doors at Wells Fargo
7 keys to open doors at Wells Fargo7 keys to open doors at Wells Fargo
7 keys to open doors at Wells Fargo
 
7 keys to open doors at Microsoft
7 keys to open doors at Microsoft7 keys to open doors at Microsoft
7 keys to open doors at Microsoft
 
7 keys to open doors at Johnson & Johnson
7 keys to open doors at Johnson & Johnson7 keys to open doors at Johnson & Johnson
7 keys to open doors at Johnson & Johnson
 
7 keys to open doors at Starbucks
7 keys to open doors at Starbucks7 keys to open doors at Starbucks
7 keys to open doors at Starbucks
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financial Loss

  • 1. By 3 Instances Where E-Mail Mining For Fraud Detection… Could’ve Prevented Financial Loss
  • 2. Do You Recognize Any Of These Corporate Fraud Headlines? Breaking News
  • 3. It’s ok if you don’t remember… because we’ll give you all of the details!
  • 4. The databahn Times Mike Kail Senior Netflix executive receives bribesCase # 1: • Mike Kail was the former VP of Information Technology Operations • Kail made a deal with IT service providers to receive bribes of 12% - 15% of the total deal value • Kail earned $490,000 in kickbacks • Netflix uncovered the fraud after Kail left • Netflix uncovered e-mails discussing “referral fees” • Kail got away with the crime because he was an upper-level employee
  • 5. The databahn Times British software company, Autonomy, falsifies numbers Case # 2: • HP acquired Autonomy for $11.1 billion in 2012 • HP discovered Autonomy misrepresented its finances – by $5.55 billion • HP filed a $5.1 billion lawsuit against Autonomy • E-mails were discovered between the former CFO and founder • Included the phrases “covered up” and “imaginary deals” • E-mails were checked and the truth was discovered after the deal had gone through
  • 6. The databahn Times Former law partner shares private information with opposing attorney Case # 3: • A former law partner at Willkie Farr & Gallagher, Keila Ravelo, had suspicious communications with the opposing counsel • Ravelo had an established friendship with the opposing counselor • The law firm found e-mails and attachments concerning the American Express litigation • The opposing counselor sent Ravelo documents secured under the American Express litigation protective order
  • 7. What These Headlines Have In Common… Besides Fraud FRAUD ! ?
  • 8. Proof of Fraud: Autonomy E-mail From The Telegraph E-Mail conversation between the CFO and founder
  • 9. E-mail Mining Would Have Saved… Time Money Median fraud duration in 2014 was 18 months Median loss in 2014 was $145,000 *stats from Association of Certified Fraud Examiners’ Report to Nations Reputation Your reputation is immeasurable
  • 10. Internal Fraud Can Happen To Any Company Small Company Large Company You need to implement a proactive approach!
  • 11. You’ve Seen Enough Fraud In The News... YOU Don’t become the next headline!
  • 12. For more information, check out our blog at www.databahn.com/blog @844databahn Databahn databahn