Why Intrusive Monitoring Technology Is Ineffective

3rd Party Risk Management , Fraud Management & Cybercrime , Fraud Risk Management

Kroll’s Richard Dailly on Better Ways to Fight Supply Chain Fraud


Richard Dailly, managing director at Kroll

Using intrusive technologies to check staff behavior in an effort to fight against supply chain fraud is ineffective, says Richard Dailly, managing director in Hong Kong at the security firm Kroll.

See Also: Live Webinar | App Defined, Autonomous and Delivered from the Cloud

“My sense is that this will be a major step backward in the relationship between senior management and staff,” he says of intrusive employee monitoring efforts.

A better approach, he says, is to create a corporate culture that demonstrates employees are valued and that “senor management is on their side,” which creates a disincentive to commit fraud.

In this video interview with Information Security Media Group, Dailly also discusses:

  • Case studies of supply chain fraud;
  • How supply chain fraud is evolving;
  • Why using intrusive monitoring technologies is ineffective.

Dailly is a managing director at Kroll in Hong Kong. He focuses on complex business intelligence and multijurisdictional cases across the region as well as and client relationships and delivery in Hong Kong. He is a fellow of the Duff & Phelps Institute.

Share this post

Share on facebook
Share on linkedin
Share on print
Share on email

Subscribe to our Monthly Cyber Security Digest

Get monthly content to keep you up to date on the latest news and tips