Cyber-Enabled Fraud Scenarios in Major Business Processes

This document outlines common cyber-enabled fraud scenarios for each major business process in a generic organization, covering vectors like general email phishing, business email compromise (BEC), invoice fraud, and payroll bank account changes.

Procurement and Accounts Payable

This process involves sourcing goods/services, approving purchases, and paying suppliers.

Finance and Treasury

This covers budgeting, cash management, investments, and fund transfers.

Human Resources and Payroll

This includes hiring, employee management, compensation, and benefits administration.

Sales and Accounts Receivable

This process manages customer orders, invoicing clients, and collecting payments.

Supply Chain and Logistics

Involves inventory management, vendor coordination, and distribution.

IT and Data Management

This includes system maintenance, data storage, and cybersecurity oversight.

Customer Service and Support

Handles client interactions, complaints, and refunds.

Executive and Governance

Involves strategic decision-making, compliance, and board communications.

Summary Table

Process Common Cyber Fraud Vectors Mitigation Notes
Procurement/AP BEC for contract alterations, fake invoices Multi-factor invoice verification, vendor portals
Finance/Treasury Wire fraud via exec spoofing Callback confirmations for transfers
HR/Payroll Bank change requests via phishing Secure HRIS with MFA, employee education
Sales/AR Payment rerouting Customer payment confirmation protocols
Supply Chain Shipping invoice scams Blockchain tracking for authenticity