Identity and Access Management

Size: px
Start display at page:

Download "Identity and Access Management"

Transcription

1 Identity and Access Management Global Technology Audit Guide (GTAG) 9 von,,,, 1. Auflage Identity and Access Management White / Renshaw / Rai / et al. schnell und portofrei erhältlich bei beck-shop.de DIE FACHBUCHHANDLUNG The Institute of Internal Auditors Verlag C.H. Beck im Internet: ISBN

2 1. Executive Summary 2. Introduction 2.1 Business Drivers 2.2 Identity and Access Management Concepts 2.3 Adoption Risks TABLE OF CONTENTS 3. Definition of Key Concepts 3.1 Identity Management vs. Entitlement Management 3.2 Identity and Access Management Components 3.3 Access Rights and Entitlements 3.4 Provisioning Process 3.5 Administration of Identities and Access Rights Process 3.6 Enforcement Process 3.7 Use of Technology in IAM 4. The Role of Internal Auditors 4.1 Current IAM Processes 4.2 Auditing IAM 1

3 Chapter 8 Data Management Data Management Market Example: Setting Up a Claims RDBMS Data Management Overview: Implications for Prevention, Detection, and Investigation References Chapter 9 Normal Infrastructure Normal Profile of a Fraudster What Types of People or Entities Commit Fraud? What Is the Key Element of a Fraudster? Anomalies and Abnormal Patterns Normal Infrastructure Overview: Implications for Prevention, Detection, and Investigation Chapter 10 Normal Infrastructure And Anomaly Tracking Systems The Patient Sample Patient Fraud Scenarios Patient Data Management Considerations The Provider Sample Provider Fraud Scenarios Provider Data Management Considerations The Payer Sample Payer Fraud Scenarios Data Management Implications The Vendor/Other Parties Sample Vendor/Other Fraud Scenarios Data Management Implications Organized Crime Sample Organized Crime Fraud Scenarios Data Management Implications Normal Infrastructure and Anomaly Tracking Systems Overview: Implications for Prevention, Detection, and Investigation Chapter 11 Components of the Data Mapping Process What Is Data Mapping? Data Mapping Overview: Implications for Prevention, Detection, and Investigation Chapter 12 Components of the Data Mining Process What Is Data Mining? Data Mining in Healthcare Components to the Data Mining Process within the HCC Data Mining Overview: Implications for Prevention, Detection, and Investigation 2

4 3

5 Chapter 13 Components of the Data Mapping and Mining Process Forensic Application of Data Mapping and Data Mining Data Mapping and Data Mining Overview: Implications for Prevention, Detection, and Investigation CHAPTER 14 Data Analysis Models Detection Model Pipeline Application Detection Model Application Investigation Model Mitigation Model Prevention Model Response Model Recovery Model Data Analysis Model Overview: Implications for Prevention, Detection, and Investigation CHAPTER 15 Clinical Content Data Analysis CHAPTER 16 Profilers What Is SOAP? The SOAP Methodology Electronic Records Analysis Considerations with Electronic Records Narrative Discourse Analysis Clinical Content Analysis Overview: Implications for Prevention, Detection, and Investigation Fraud and Profilers Medical Errors and Profilers Financial Errors and Profilers Internal Audit and Profilers Recovery and Profilers Anomaly and Profilers Fraud Awareness and Profilers Profiler Overview: Implications for Prevention, Detection, and Investigation CHAPTER 17 Market Implications CHAPTER 18 Conclusions The Myth Persistent Persuasive Unrealistic Market Overview: Implications for Prevention, Detection, and Investigation Micromanagement Perspective Macromanagement Perspective 4

6 Index Overview of Prevention, Detection, and Investigation 5

Project Management for Facility Constructions

Project Management for Facility Constructions Project Management for Facility Constructions A Guide for Engineers and Architects von Alberto De Marco 1. Auflage Springer 2011 Verlag C.H. Beck im Internet: www.beck.de ISBN 978 3 642 17091 1 Zu Leseprobe

More information

Corporate Internal Investigations

Corporate Internal Investigations Corporate Internal Investigations Overview of 13 jurisdictions von Dr. Stephan Spehl, Dr. Thomas Grützner 1. Auflage Corporate Internal Investigations Spehl / Grützner schnell und portofrei erhältlich

More information

Auditing Security and Controls of Windows Active Directory Domains

Auditing Security and Controls of Windows Active Directory Domains von Derek Melber Derek Melber, MCSE, CISM, is one of the leading technical instructors, authors, and consultants in the nation, with an innate understanding of how to decipher, organize, and communicate

More information

Schriftenreihe Logistik der Kühne-Stiftung 13. Managing Innovation. The New Competitive Edge for Logistics Service Providers

Schriftenreihe Logistik der Kühne-Stiftung 13. Managing Innovation. The New Competitive Edge for Logistics Service Providers Schriftenreihe Logistik der Kühne-Stiftung 13 Managing Innovation The New Competitive Edge for Logistics Service Providers von Stephan M Wagner, Christian Busse 1. Auflage Managing Innovation Wagner /

More information

Global Trade Law. von Ulrich Magnus. 1. Auflage. Global Trade Law Magnus schnell und portofrei erhältlich bei beck-shop.de DIE FACHBUCHHANDLUNG

Global Trade Law. von Ulrich Magnus. 1. Auflage. Global Trade Law Magnus schnell und portofrei erhältlich bei beck-shop.de DIE FACHBUCHHANDLUNG Global Trade Law International Business Law of the United Nations and UNIDROIT. Collection of UNCITRAL's and UNIDROIT's Conventions, Model Acts, Guides and Principles von Ulrich Magnus 1. Auflage Global

More information

Project Management. Guideline for the management of projects, project portfolios, programs and project-oriented companies

Project Management. Guideline for the management of projects, project portfolios, programs and project-oriented companies Project Management Guideline for the management of projects, project portfolios, programs and project-oriented companies Bearbeitet von Gerold Patzak, Günter Rattay 1. Auflage 2011 2011. Buch. 512 S. Hardcover

More information

New York Convention. Commentary

New York Convention. Commentary New York Convention Commentary von Dr. Reinmar Wolff, Dr. Christian Borris, Dr. Bernd Ehle, Todd J. Fox, Rudolf Hennecke, Dr. Angela Kölbl, Christoph Liebscher, Dr. David Quinke, Dr. Maxi Scherer, Stephan

More information

Usability Evaluation of Modeling Languages

Usability Evaluation of Modeling Languages Usability Evaluation of Modeling Languages Bearbeitet von Christian Schalles 1. Auflage 2012. Taschenbuch. XXIII, 183 S. Paperback ISBN 978 3 658 00050 9 Format (B x L): 0 x 0 cm Gewicht: 275 g Weitere

More information

The Software Industry

The Software Industry The Software Industry Economic Principles, Strategies, Perspectives Bearbeitet von Peter Buxmann, Heiner Diefenbach, Thomas Hess 1. Auflage 2012. Buch. XII, 223 S. Hardcover ISBN 978 3 642 31509 1 Format

More information

Information Sharing and Data Protection in the Area of Freedom, Security and Justice

Information Sharing and Data Protection in the Area of Freedom, Security and Justice Information Sharing and Data Protection in the Area of Freedom, Security and Justice Towards Harmonised Data Protection Principles for Information Exchange at EU-level Bearbeitet von Franziska Boehm 1.

More information

International Compliance

International Compliance International Compliance Legal Requirements of Business Organisation in over 30 Countries Bearbeitet von Dr. Konstantin Busekist 1. Auflage 2016. Buch. Rund 800 S. In Leinen ISBN 978 3 406 66859 3 Format

More information

Dynamic Pricing and Automated Resource Allocation for Complex Information Services

Dynamic Pricing and Automated Resource Allocation for Complex Information Services Lecture Notes in Economics and Mathematical Systems 589 Dynamic Pricing and Automated Resource Allocation for Complex Information Services Reinforcement Learning and Combinatorial Auctions Bearbeitet von

More information

Modern TRIZ. A Practical Course with EASyTRIZ Technology. Bearbeitet von Michael A. Orloff

Modern TRIZ. A Practical Course with EASyTRIZ Technology. Bearbeitet von Michael A. Orloff Modern TRIZ A Practical Course with EASyTRIZ Technology Bearbeitet von Michael A. Orloff 1. Auflage 2012. Taschenbuch. xvi, 449 S. Paperback ISBN 978 3 642 25217 4 Format (B x L): 15,5 x 23,5 cm Gewicht:

More information

Information and Communication Technologies in Tourism 2003

Information and Communication Technologies in Tourism 2003 Information and Communication Technologies in Tourism 2003 Proceedings of the International Conference in Helsinki, Finland, 2003 von Andrew J Frew, Martin Hitz, Peter O'Connor 1. Auflage Springer Verlag

More information

Project Management with Dynamic Scheduling

Project Management with Dynamic Scheduling Project Management with Dynamic Scheduling Baseline Scheduling, Risk Analysis and Project Control von Mario Vanhoucke 1. Auflage 2012 Project Management with Dynamic Scheduling Vanhoucke schnell und portofrei

More information

Mathematical Risk Analysis

Mathematical Risk Analysis Springer Series in Operations Research and Financial Engineering Mathematical Risk Analysis Dependence, Risk Bounds, Optimal Allocations and Portfolios Bearbeitet von Ludger Rüschendorf 1. Auflage 2013.

More information

Lean Innovation. A Fast Path from Knowledge to Value. Bearbeitet von Claus Sehested, Henrik Sonnenberg

Lean Innovation. A Fast Path from Knowledge to Value. Bearbeitet von Claus Sehested, Henrik Sonnenberg Lean Innovation A Fast Path from Knowledge to Value Bearbeitet von Claus Sehested, Henrik Sonnenberg 1st Edition. 2010. Buch. x, 192 S. Hardcover ISBN 978 3 642 15894 0 Format (B x L): 15,5 x 23,5 cm Gewicht:

More information

Topics in English Linguistics [TiEL] 67. Cardinal Numerals. Old English from a Cross-Linguistic Perspective. Bearbeitet von Ferdinand von Mengden

Topics in English Linguistics [TiEL] 67. Cardinal Numerals. Old English from a Cross-Linguistic Perspective. Bearbeitet von Ferdinand von Mengden Topics in English Linguistics [TiEL] 67 Cardinal Numerals Old English from a Cross-Linguistic Perspective Bearbeitet von Ferdinand von Mengden 1. Auflage 2010. Buch. XIII, 342 S. Hardcover ISBN 978 3 11

More information

Adaptive Business Intelligence

Adaptive Business Intelligence Adaptive Business Intelligence Bearbeitet von Zbigniew Michalewicz, Martin Schmidt, Matthew Michalewicz, Constantin Chiriac 1. Auflage 2006. Buch. xiii, 246 S. Hardcover ISBN 978 3 540 32928 2 Format (B

More information

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you 3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud

More information

Groups of Prime Power Order

Groups of Prime Power Order de Gruyter Expositions in Mathematics 56 Groups of Prime Power Order Volume 3 Bearbeitet von Yakov Berkovich, Zvonimir Janko 1. Auflage 2011. Buch. XXV, 639 S. Hardcover ISBN 978 3 11 020717 0 Format (B

More information

Supply Chain and Logistics in National, International and Governmental Environment

Supply Chain and Logistics in National, International and Governmental Environment Contributions to Management Science Supply Chain and Logistics in National, International and Governmental Environment Concepts and Models Bearbeitet von Reza Zanjirani Farahani, Nasrin Asgari, Hoda Davarzani

More information

Business Process Technology

Business Process Technology Business Process Technology A Unified View on Business Processes, Workflows and Enterprise Applications Bearbeitet von Dirk Draheim, Colin Atkinson 1. Auflage 2010. Buch. xvii, 306 S. Hardcover ISBN 978

More information

A History of the «Concise Oxford Dictionary»

A History of the «Concise Oxford Dictionary» Lodz Studies in Language 34 A History of the «Concise Oxford Dictionary» Bearbeitet von Malgorzata Kaminska 1. Auflage 2014. Buch. 342 S. Hardcover ISBN 978 3 631 65268 8 Format (B x L): 14,8 x 21 cm Gewicht:

More information

Information and Communication Technologies in Tourism 2007

Information and Communication Technologies in Tourism 2007 Information and Communication Technologies in Tourism 2007 von Marianna Sigala, Luisa Mich, Jamie Murphy 1. Auflage Information and Communication Technologies in Tourism 2007 Sigala / Mich / Murphy schnell

More information

Methods and Tools for Effective Knowledge Life-Cycle-Management

Methods and Tools for Effective Knowledge Life-Cycle-Management Methods and Tools for Effective Knowledge Life-Cycle-Management Bearbeitet von Alain Bernard, Serge Tichkiewitch 1. Auflage 2008. Buch. X, 586 S. Hardcover ISBN 978 3 540 78430 2 Format (B x L): 15,5 x

More information

Early Christianity in the Context of Antiquity 13. Recasting Moses

Early Christianity in the Context of Antiquity 13. Recasting Moses Early Christianity in the Context of Antiquity 13 Recasting Moses The Memory of Moses in Biographical and Autobiographical Narratives in Ancient Judaism and 4th-Century Christianity Bearbeitet von Finn

More information

Fundamentals of Relational Database Management Systems

Fundamentals of Relational Database Management Systems Studies in Computational Intelligence 47 Fundamentals of Relational Database Management Systems Bearbeitet von S Sumathi, S Esakkirajan 1. Auflage 2007. Buch. xxvii, 776 S. Hardcover ISBN 978 3 540 48397

More information

Marketing. A Relationship Perspective. von Prof. Svend Hollensen, Prof. Marc Oliver Opresnik. 2. Auflage. Verlag Franz Vahlen München 2015

Marketing. A Relationship Perspective. von Prof. Svend Hollensen, Prof. Marc Oliver Opresnik. 2. Auflage. Verlag Franz Vahlen München 2015 Marketing A Relationship Perspective von Prof. Svend Hollensen, Prof. Marc Oliver Opresnik 2. Auflage Verlag Franz Vahlen München 2015 Verlag Franz Vahlen im Internet: www.vahlen.de ISBN 978 3 8006 4928

More information

Low Power and Reliable SRAM Memory Cell and Array Design

Low Power and Reliable SRAM Memory Cell and Array Design Springer Series in Advanced Microelectronics 31 Low Power and Reliable SRAM Memory Cell and Array Design Bearbeitet von Koichiro Ishibashi, Kenichi Osada 1. Auflage 2011. Buch. XI, 143 S. Hardcover ISBN

More information

Social Media Tools and Platforms in Learning Environments

Social Media Tools and Platforms in Learning Environments Social Media Tools and Platforms in Learning Environments Bearbeitet von Bebo White, Irwin King, Philip Tsang 1. Auflage 2011. Buch. XVIII, 435 S. Hardcover ISBN 978 3 642 20391 6 Format (B x L): 15,5

More information

Qi Liu Rutgers Business School ISACA New York 2013

Qi Liu Rutgers Business School ISACA New York 2013 Qi Liu Rutgers Business School ISACA New York 2013 1 What is Audit Analytics The use of data analysis technology in Auditing. Audit analytics is the process of identifying, gathering, validating, analyzing,

More information

2014 Spring Conference DIRECT FROM THE NATIONAL ACFE. Intro to Digital Forensics: Gathering and Preserving Electronic Evidence Presented by Cary Moore

2014 Spring Conference DIRECT FROM THE NATIONAL ACFE. Intro to Digital Forensics: Gathering and Preserving Electronic Evidence Presented by Cary Moore The Lansing Chapter of the Association of Certified Fraud Examiners 2014 Spring Conference DIRECT FROM THE NATIONAL ACFE Intro to Digital Forensics: Gathering and Presented by Cary Moore Tuesday, April

More information

SERVICES OVERVIEW. Integrating Risk, Technology, People and Process for a sustainable Future CONTACT US. About Us. Our Business Philosophy

SERVICES OVERVIEW. Integrating Risk, Technology, People and Process for a sustainable Future CONTACT US. About Us. Our Business Philosophy About Us Vestinex Pty Ltd is a boutique professional business services provider based in Sydney, Australia. We offer a range of services across two broad categories of Ethics and Investigations and Information

More information

Complexity Management in Supply Chains

Complexity Management in Supply Chains Operations and Technology Management 02 Complexity Management in Supply Chains Concepts, Tools and Methods Bearbeitet von Prof. Dr. Thorsten Blecker, Prof. Dr. Wolfgang Kersten, Nizar Abdelkafi, Alexander

More information

Ophthalmology Review A Case Study Approach

Ophthalmology Review A Case Study Approach Ophthalmology Review A Case Study Approach von William E. Smiddy Kuldev Singh 1. Auflage Ophthalmology Review A Case Study Approach Kuldev Singh schnell und portofrei erhältlich bei beck-shop.de DIE FACHBUCHHANDLUNG

More information

Marketing. A Relationship Perspective. von Prof. Svend Hollensen, Prof. Marc Oliver Opresnik. 1. Auflage

Marketing. A Relationship Perspective. von Prof. Svend Hollensen, Prof. Marc Oliver Opresnik. 1. Auflage Marketing A Relationship Perspective von Prof. Svend Hollensen, Prof. Marc Oliver Opresnik 1. Auflage Marketing Hollensen / Opresnik schnell und portofrei erhältlich bei beck-shop.de DIE FACHBUCHHANDLUNG

More information

Forensic Accounting. A Glimpse Into Forensic Accounting. Portland State University. 10.29.14 Professional Nancy Young, CPA, CISA, CFE Moss Adams, LLP

Forensic Accounting. A Glimpse Into Forensic Accounting. Portland State University. 10.29.14 Professional Nancy Young, CPA, CISA, CFE Moss Adams, LLP Forensic Accounting A Glimpse Into Forensic Accounting 10.29.14 Professional Nancy Young, CPA, CISA, CFE Moss Adams, LLP Summary by Michael Wong Manager of Presentations εα Portland State University Introduction

More information

Preventing Healthcare Fraud through Predictive Modeling. Category: Improving State Operations

Preventing Healthcare Fraud through Predictive Modeling. Category: Improving State Operations Preventing Healthcare Fraud through Predictive Modeling Category: Improving State Operations Commonwealth of Massachusetts Executive Office of Health and Human Services Project initiated: July 2012 Project

More information

Preventing Health Care Fraud

Preventing Health Care Fraud Preventing Health Care Fraud Project: Predictive Modeling for Fraud Detection at MassHealth Category: Improving State Operations Commonwealth of Massachusetts Executive Office of Health and Human Services

More information

High-Performance Logistics

High-Performance Logistics Operations and Technology Management 12 High-Performance Logistics Methods and Technologies Bearbeitet von Prof. Dr. Thorsten Blecker, Prof. Dr. Wolfgang Kersten, Prof. Dr. habil. Matthias Meyer, Dr.-Ing.

More information

VICTIMS. Tend to be smaller companies (<100 employees) *

VICTIMS. Tend to be smaller companies (<100 employees) * ANTI-FRAUD CONTROLS SCOPE According to experts, fraud averages about 6% of revenues for the average entity * Average loss of a fraud is about $160K and goes about 18-24 months before being detected 25%

More information

CIA. international legal+financial bookstore. Certified Internal Auditor: Vorbereitung auf die Prüfung. Irvin N. Gleim. Download

CIA. international legal+financial bookstore. Certified Internal Auditor: Vorbereitung auf die Prüfung. Irvin N. Gleim. Download international legal+financial bookstore Ansprechpartnerin: Sophie Bernhardt Telefon +49 (0) 89 55134-242 s.bernhardt@schweitzer-online.de Schweitzer Sortiment Lenbachplatz 1 80333 München CIA Certified

More information

Studia Graeco-Parthica

Studia Graeco-Parthica Philippika 49 Studia Graeco-Parthica Political and Cultural Relations between Greeks and Parthians Bearbeitet von Edward Dabrowa 1. Auflage 2011. Taschenbuch. 196 S. Paperback ISBN 978 3 447 06585 6 Format

More information

Supply Chain Performance Management

Supply Chain Performance Management Operations and Technology Management 11 Supply Chain Performance Management Current Approaches Bearbeitet von Prof. Dr. Wolfgang Kersten, Prof. Dr. Thorsten Blecker, Prof. Dr. habil. Matthias Meyer, Adel

More information

C21 Introduction to User Access

C21 Introduction to User Access C21 Introduction to User Access Management Introduction to User Access Management What we'll cover today What is it? Why do I care? Current trends in Identity & Access Management How do I audit it? What

More information

Restriction Endonucleases

Restriction Endonucleases Nucleic Acids and Molecular Biology 14 Restriction Endonucleases Bearbeitet von Alfred Pingoud 1. Auflage 2004. Buch. xxvi, 443 S. Hardcover ISBN 978 3 540 20502 9 Format (B x L): 15,5 x 23,5 cm Gewicht:

More information

From Revolution to Migration

From Revolution to Migration Hispanic Studies: Culture and Ideas 8 From Revolution to Migration A Study of Contemporary Cuban and Cuban American Crime Fiction Bearbeitet von Helen Oakley 1. Auflage 2012. Taschenbuch. XIV, 186 S. Paperback

More information

Using CAAT in Compliance

Using CAAT in Compliance Using CAAT in Compliance Auditing Suzann Hall, CPA, ACDA November 12, 2010 CHAN Founded in 1997 through the collaboration of Ascension Health and Catholic Health Initiatives, the two largest not-for-profit

More information

High End Information Security Services

High End Information Security Services High End Information Security Services Welcome Trion Logics Security Solutions was established after understanding the market's need for a high end - End to end security integration and consulting company.

More information

Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG

Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG MACPA Government & Non Profit Conference April 26, 2013 Isaiah Goodall, Director of Business

More information

Ethical Theory and Responsibility Ethics

Ethical Theory and Responsibility Ethics Internationale Theologie / International Theology 15 Ethical Theory and Responsibility Ethics A Metaethical Study of Niebuhr and Levinas Bearbeitet von Kevin Jung 1. Auflage 2011. Buch. 238 S. Hardcover

More information

Supply Chain Governance framework

Supply Chain Governance framework Conflict of Interest within a coherent Supply Chain Governance framework www.inoxico.com What is Conflict of Interest? Tension between multiple competing interests, personal or financial Conflict of Interest

More information

2020 ANALYTICS ANALYTICS IS COMING OF AGE: TURNING AN ACADEMIC TOPIC INTO BUSINESS VALUE

2020 ANALYTICS ANALYTICS IS COMING OF AGE: TURNING AN ACADEMIC TOPIC INTO BUSINESS VALUE 2020 ANALYTICS ANALYTICS IS COMING OF AGE: TURNING AN ACADEMIC TOPIC INTO BUSINESS VALUE IMAM HOQUE 2020 ANALYTICS TOPICS Introduction to the latest techniques o A hybrid approach o Modelling real real-

More information

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

AGA Kansas City Chapter Data Analytics & Continuous Monitoring AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help

More information

The Institute of Internal Auditors 247 Maitland Avenue Altamonte Springs, FL 32701-4201 USA

The Institute of Internal Auditors 247 Maitland Avenue Altamonte Springs, FL 32701-4201 USA INTERNATIONAL Professional Practices Framework (IPPF) Disclosure Copyright 2009 by The Institute of Internal Auditors Research Foundation (IIARF), 247 Maitland Avenue, Altamonte Springs, Florida 32701-4201.

More information

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can

More information

Leveraging Big Data to Mitigate Health Care Fraud Risk

Leveraging Big Data to Mitigate Health Care Fraud Risk Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud

More information

Approaches to Intelligent Agents

Approaches to Intelligent Agents Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence 1733 Approaches to Intelligent Agents Second Pacific Rim International Workshop on Multi-Agents, PRIMA'99, Kyoto, Japan, December

More information

Prof. Dr. Nick Gehrke Alexander Rühle

Prof. Dr. Nick Gehrke Alexander Rühle Prof. Dr. Nick Gehrke Alexander Rühle AGENDA 15:00 16:00 Session 1 1. Introducing Process Mining 2. Case #1: Financial Process Mining 3. Introducing the profiling methodology 4. Case #2: Financial Process

More information

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Certified Identity and Access Manager (CIAM) Overview & Curriculum Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management

More information

Does Fraud Matter? ASIS Middle East Security Conference and Exhibition Dubai, February 16, 2015. Torsten Wolf, CPP Head of Group Security Operations

Does Fraud Matter? ASIS Middle East Security Conference and Exhibition Dubai, February 16, 2015. Torsten Wolf, CPP Head of Group Security Operations Does Fraud Matter? ASIS Middle East Security Conference and Exhibition Dubai, February 16, 2015 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic Crime Landscape Economic

More information

Be Prepared or Be Prey

Be Prepared or Be Prey Be Prepared or Be Prey By Evan M. Gwilliam MBA, DC, CPC, CPC-I, CCPC, CPMA, NCICS, CCCPC, MCS-P SUMMARY Compliance is not a dirty word; it s the opposite. It makes an office cleaner, and it s now mandatory

More information

Modeling and Using Context

Modeling and Using Context Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence 2116 Modeling and Using Context Third International and Interdisciplinary Conference, CONTEXT, 2001, Dundee, UK, July 27-30,

More information

Reduce Audit Time Using Automation, By Example. Jay Gohil Senior Manager

Reduce Audit Time Using Automation, By Example. Jay Gohil Senior Manager Reduce Audit Time Using Automation, By Example Jay Gohil Senior Manager Today s Session Speaker Bio: Jay Gohil, Protiviti Jay is a Senior Manager in the ERP Services practice in Atlanta. In the past seven

More information

A Review of the Disaster Recovery Testing Process

A Review of the Disaster Recovery Testing Process To: LASERS Audit Committee; Cindy Rougeou, Executive Director Cc: Maris LeBlanc, Deputy Director; Lance Armstrong, IT Director; Dan Bowden, IT Deputy Director From: Ryan Babin, Audit Director; Blake Lee,

More information

Software Measurement

Software Measurement Software Measurement Establish - Extract - Evaluate - Execute Bearbeitet von Christof Ebert, Reiner Dumke 1. Auflage 2007. Buch. XI, 561 S. Hardcover ISBN 978 3 540 71648 8 Format (B x L): 15,5 x 23,5

More information

Education and Training in Fraud and Forensic Accounting: A Guide for Educational Institutions, Stakeholder Organizations, Faculty and Students

Education and Training in Fraud and Forensic Accounting: A Guide for Educational Institutions, Stakeholder Organizations, Faculty and Students NIJ Special Report Education and Training in Fraud and Forensic Accounting: A Guide for Educational Institutions, Stakeholder Organizations, Faculty and Students NOTE: The following is based on an exposure

More information

Cost of Police Education and Learning in Canada

Cost of Police Education and Learning in Canada Cost of Police Education and Learning in Canada Rachel Huggins Public Safety Canada September 2013 RDIMS 917369 The results summarized herein reflect the analysis of the author and the nature of the data

More information

Fighting Identity Fraud with Data Mining. Groundbreaking means to prevent fraud in identity management solutions

Fighting Identity Fraud with Data Mining. Groundbreaking means to prevent fraud in identity management solutions Fighting Identity Fraud with Data Mining Groundbreaking means to prevent fraud in identity management solutions Contents Executive summary Executive summary 3 The impact of identity fraud? 4 The forgery

More information

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]

More information

Fraud, Waste & Abuse. UPMC Health Plan Quality Audit, Fraud, Waste & Abuse Department

Fraud, Waste & Abuse. UPMC Health Plan Quality Audit, Fraud, Waste & Abuse Department Fraud, Waste & Abuse UPMC Health Plan Quality Audit, Fraud, Waste & Abuse Department Definitions of Fraud, Waste & Abuse FRAUD: An intentional deception or misrepresentation made by a person or entity,

More information

Corporate IT Forensics in the New Decade. Hong Kong March 2010 Bruce Nikkel

Corporate IT Forensics in the New Decade. Hong Kong March 2010 Bruce Nikkel Corporate IT Forensics in the New Decade Hong Kong March 2010 Bruce Nikkel Presentation Overview The growth and evolution of digital forensics Pre-Y2K computer forensics Post-Y2K digital forensics Factors

More information

Security, and Intelligence

Security, and Intelligence Machine Learning Forensics for Law Enforcement, Security, and Intelligence Jesus Mena CRC Press Taylor &. Francis Group Boca Raton London NewYork CRC Press is an imprint of the Taylor & Francis Croup,

More information

ACE elite fraudprotector

ACE elite fraudprotector ACE elite fraudprotector Commercial Crime Insurance Policy ACE elite fraudprotector Insurance Policy (ed. AU 09/10) It wouldn t happen to us ACE elite fraudprotector Insurance Policy Fraud is a major threat

More information

Big Data / FDAAWARE. Rafi Maslaton President, cresults the maker of Smart-QC/QA/QD & FDAAWARE 30-SEP-2015

Big Data / FDAAWARE. Rafi Maslaton President, cresults the maker of Smart-QC/QA/QD & FDAAWARE 30-SEP-2015 Big Data / FDAAWARE Rafi Maslaton President, cresults the maker of Smart-QC/QA/QD & FDAAWARE 30-SEP-2015 1 Agenda BIG DATA What is Big Data? Characteristics of Big Data Where it is being used? FDAAWARE

More information

Risikomanagement mit der Success Driver Analyse (SDA) - Erfahrungen bei Grossprojekten und Programmen

Risikomanagement mit der Success Driver Analyse (SDA) - Erfahrungen bei Grossprojekten und Programmen Risikomanagement mit der Success Driver Analyse (SDA) - Erfahrungen bei Grossprojekten und Programmen Dr. Ernest Wallmüller QUALITÄT & INFORMATIK Zürich, München, Wien www.itq.ch Dr. E. Wallmüller 1 Qualität

More information

Survey of more than 1,500 Auditors Concludes that Audit Professionals are Not Maximizing Use of Available Audit Technology

Survey of more than 1,500 Auditors Concludes that Audit Professionals are Not Maximizing Use of Available Audit Technology Survey of more than 1,500 Auditors Concludes that Audit Professionals are Not Maximizing Use of Available Audit Technology Key findings from the survey include: while audit software tools have been available

More information

Request for Proposal Research

Request for Proposal Research Governance of Master Data Structured and Unstructured INTRODUCTION AND INSTRUCTIONS The Institute of Internal Auditors Research Foundation (IIARF) is the global leader in providing research and knowledge

More information

Diploma in Forensic Accounting (Level 4) Course Structure & Contents

Diploma in Forensic Accounting (Level 4) Course Structure & Contents Brentwood Open Learning College Diploma in Forensic Accounting (Level 4) Course Structure & Contents Diploma in Forensic Accounting Course Structure & Contents Page 1 Unit 1 Introduction Forensic Accounting

More information

OCR HIPAA Audits. Disclaimer. Message. I am here for your benefit. If you have questions, please ask. 1. Background 2. The Audit 3.

OCR HIPAA Audits. Disclaimer. Message. I am here for your benefit. If you have questions, please ask. 1. Background 2. The Audit 3. OCR HIPAA Audits Roger Brett Short Chief Compliance Officer October 2012 Disclaimer The information provided in this presentation does not constitute legal advice and is intended to be used for guidance.

More information

Cybersecurity. Regional and Community Banks. Inherent Risks and Preparedness. www.bostonfed.org

Cybersecurity. Regional and Community Banks. Inherent Risks and Preparedness. www.bostonfed.org Cybersecurity Inherent Risks and Preparedness Regional and Community Banks www.bostonfed.org Disclaimer The opinions expressed in this presentation are intended for informational purposes, and are not

More information

Scaling Limits in Statistical Mechanics and Microstructures in Continuum Mechanics

Scaling Limits in Statistical Mechanics and Microstructures in Continuum Mechanics Theoretical and Mathematical Physics Scaling Limits in Statistical Mechanics and Microstructures in Continuum Mechanics Bearbeitet von Errico Presutti 1. Auflage 2008. Buch. xvi, 470 S. Hardcover ISBN

More information

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement

More information

Bellingham Control System Cyber Security Case Study

Bellingham Control System Cyber Security Case Study Bellingham Control System Cyber Security Case Study Marshall Abrams Joe Weiss Presented at at 2007 Annual Computer Security Applications Conference Case Study Synopsis Examine actual control system cyber

More information

Accounting Fraud. Case Studies and Practical Implications. Prof. Dr. Klaus Henselmann. Dr. Stefan Hofmann ERICH SCHMIDT VERLAG. Von.

Accounting Fraud. Case Studies and Practical Implications. Prof. Dr. Klaus Henselmann. Dr. Stefan Hofmann ERICH SCHMIDT VERLAG. Von. Accounting Fraud Case Studies and Practical Implications Von Prof. Dr. Klaus Henselmann und Dr. Stefan Hofmann ERICH SCHMIDT VERLAG Weitere Informationen zu diesem Titel finden Sie im Internet unter ESV.

More information

Audit Committee Oversight of Foreign Operations. November 2014

Audit Committee Oversight of Foreign Operations. November 2014 Audit Committee Oversight of Foreign Operations November 2014 The Issue External auditor oversight can be a challenge for audit committees of reporting issuers with operations in foreign jurisdictions.

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

Healthcare Data in the Cloud A Gathering Storm of Governance. Erik Pupo Senior Manager, Deloitte

Healthcare Data in the Cloud A Gathering Storm of Governance. Erik Pupo Senior Manager, Deloitte Healthcare Data in the Cloud A Gathering Storm of Governance Erik Pupo Senior Manager, Deloitte Objectives for this Webinar Explain what the healthcare cloud really means Highlight emerging challenges

More information

Forensic Accounting and Identity Theft. Georgia HFMA Financial Executives Meeting December 12, 2014

Forensic Accounting and Identity Theft. Georgia HFMA Financial Executives Meeting December 12, 2014 Forensic Accounting and Identity Theft Georgia HFMA Financial Executives Meeting December 12, 2014 The Federal Criminal definition of identity theft is when someone knowingly transfers, possesses, or uses,

More information

Medical Informatics: Transforming data into knowledge

Medical Informatics: Transforming data into knowledge Insert photo here The Evolving Role of the Fiscal Intermediary Arriving At an Assessment of Value Jaan Sidorov, MD, MHSA Medical Director, Medical Informatics EDS Camp Hill, PA Medical Informatics: Transforming

More information

Smarter Analytics Leadership Summit Content Review

Smarter Analytics Leadership Summit Content Review Smarter Analytics Leadership Summit Content Review Agenda Fraud Point of View IBM Claims Fraud Solution Overview Infinity Insurance: Combating Fraud with IBM Claims Fraud Solution Building the Business

More information

EPLAN Electric P8 Reference Handbook

EPLAN Electric P8 Reference Handbook EPLAN Electric P8 Reference Handbook Bearbeitet von Bernd Gischel 2. Auflage 2011. Taschenbuch. 552 S. Paperback ISBN 978 3 446 42674 0 Format (B x L): 19,2 x 23,1 cm Gewicht: 1262 g Zu Inhaltsverzeichnis

More information

Peter Hill, Oracle Reveleus & Mantas

Peter Hill, Oracle Reveleus & Mantas Using Risk and Compliance as a Strategic Tool for Growth - Looking for Opportunities in turbulent times to Optimize and Grow your Business Peter Hill, Oracle Reveleus & Mantas Safe

More information

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4 State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes

More information

Using Analytics to detect and prevent Healthcare fraud. Copyright 2010 SAS Institute Inc. All rights reserved.

Using Analytics to detect and prevent Healthcare fraud. Copyright 2010 SAS Institute Inc. All rights reserved. Using Analytics to detect and prevent Healthcare fraud Copyright 2010 SAS Institute Inc. All rights reserved. Agenda Introductions International Fraud Trends Overview of the use of Analytics in Healthcare

More information

Guide to Credit Scoring, Credit Reference and Fraud Prevention Agencies

Guide to Credit Scoring, Credit Reference and Fraud Prevention Agencies Guide to Credit Scoring, Credit Reference and Fraud Prevention Agencies Credit scoring what is it? Assessing applications for credit As a responsible lender, we take into account your personal and/or business

More information

MBA - AVIATION MANAGEMENT SESSION SUBJECT CODE : SUBJECT NAME

MBA - AVIATION MANAGEMENT SESSION SUBJECT CODE : SUBJECT NAME AUGUST - 0 MBA - AVIATION MANAGEMENT 0DBA0 : Principles of Management 0DBA0 : Business Communication Skills 0DBA0 : Statistics for Management 0DBA0 : Economics Analysis for Business 0DBA05 : Accounting

More information

Continuous Auditing and Monitoring Leveraging Your Data for Compliance

Continuous Auditing and Monitoring Leveraging Your Data for Compliance Continuous Auditing and Monitoring Leveraging Your Data for Compliance A Phyllis Patrick & Associates LLC White Paper April 2014 Gail Hormats, B.S., M.B.A., C.I.A., C.I.S.A., C.R.M.A., C.A.D.A. Automated

More information