Fraud Risks & Controls in the Financial Sector*

Size: px
Start display at page:

Download "Fraud Risks & Controls in the Financial Sector*"

Transcription

1 March 2009 Fraud Risks & Controls in the Financial Sector* *connectedthinking

2 Foreword

3 Purchase IT Staff Finance F-Scan Security Administrative Organisation & Internal control Management Production Ethics & Integrity Financial Crime is a prominent issue that financial institutions need to tackle with great care. It is known to be more prevalent in the financial sector than in any other: in our last Global Economic Crime Survey (2007), the insurance sector was the most frequent victim (57% of insurance respondents had suffered fraud in the last two years), closely followed by the other Financial Services (46%), whilst the overall average was 43%. The current economic crisis also impacts fraud risk management as many financial institutions are currently launching cost reduction plans (sometimes involving reduction of staff), potentially resulting in weakening of the control environment as controls will be performed by less experienced staff or, in the worst, not performed anymore. Moreover, back-office staff is currently facing significant increases in workload on issuing valuations statistics due to the difficult economic environment, leading to decreased focus on the execution of controls that are there to mitigate fraud risk. Finally, the closing down of certain activities within financial institutions could impact the incentive to commit fraud for those who will leave the company in the near future. Therefore, whilst the legal environment and regulators have obviously pushed the Financial Sector in the right direction, it is now time to take the lead in protecting your earnings and your reputation in these troubled times. In this respect, the PwC Forensic Team, together with our Financial Sector specialists, has designed a dedicated Top 10 service offering to support you in the timely detection and efficient prevention of your fraud risk.

4 Prevention

5 Prevention Fraud scan Realise the quick wins Our F-Scan is a competitive sector-oriented benchmarking solution aimed at assessing the fraud vulnerability of your business. Within a week, we assess your key risk areas against best practice for institutions of a similar size. We focus on fraud considerations made by management in order to detect fraud risks and weaknesses within your organisation. The outcome includes a targeted and cost-effective action plan. Identification of fraud warning signs Fraud warning signs identified or fraud risky business Decision wether fraud scan is required Selection by management of at least 4 domains to be included in fraud scan Determination of company characteristics Completion of question list on company characteristics Remittance of question list to PwC Forensic team Execution of fraud scan on site Interviews with key management based on selected risk domains The scan is executed by members of PwC Forensic team Analysis of results At least 4 risk zones are analysed Score by risk zone and category Reporting Findings Recommendations Urgent actions

6 Prevention Fraud Internal Controls Matrix Know where you are today Best practice indicates that the key elements of an anti-fraud program are prevention and timely detection of fraud and misconduct. Such objectives can be reached through strong and effective internal controls. Your existing anti-fraud control environment can be assessed based on an internationally accepted control framework (COBIT, COSO, etc.). Existing policies and procedures tackling fraud risk will be examined to understand which component of your control framework (control environment, risk assessment, control activities, etc.) they do address. The matrix derived from this exercise (see example below) will help you identify components of your control framework that are not addressed by your existing control environment (in our example, Fraud Risk Assessment in light blue). An action plan will then be drafted to progressively fill in the gaps. Internal Controls Components Control Environment Document Type Title Entity scope when specified Ethical Conduct, Legal and Compliance Risk Operational risk Management Accountability (Oversight) x x Audit Committee (Oversight) x x Board Policies Bank Admission Policy Bank Sponsorship Policy Conflicts of Interest - Board Policy All All All All All Type of document Board Policy Board policy Board Policy Board Policy Board Policy Date janv-09 janv-09 mars-09 juin-09 nov-08 Code of conduct / Ethics x x Ethics hotline Hiring and Promotion Procedures Investigation/ Remediation Fraud related policies x x Process for assessing risk Fraud Risk Assessment Fraud considered Likelihood and significance of fraud Level within organization Risk of management override Asset Management Investment process Funds allocation Back Office Control Activities In-/Outsourcing No fraud related document identified for this sub-process. Credit Commitments x x x Documentation x Reconciliation Signature Refinancing Payment x x x

7 Prevention Fraud Risk Map Visualize the risks of your activities The Fraud Risk Map presents the fraud risk assessment of a series of your activities (to be selected by you) against various fraud types selected by PwC as being potentially relevant to the activities under scrutiny. The map links the activities to the different fraud types with a coloured cell (green, yellow, red). Based on this visual, you will have an overview of uncovered risks per activity and per fraud types: vertical and horizontal trends will appear. This tool helps to identify those processes where specific fraud prevention should be performed in order to lower the risk. Activity / Department Access Management Fraud Type Computer Fraud IT Manipulations Property Damage/ Computer Sabotage/ Alteration of Data Misuse of Insider Information Misuse of Information Betrayal of Company Secrets Breach of Postal Confidentiality intern extern intern extern intern extern intern extern extern User ID account management User registration x user password management x x password use x log-on procedures x x user identification and authentication x x x x password management system x x x x Terminal Time-out x x x x Logical access management Business requirements for access control and sensitive system isolation x x x x privilege management x x Re-certification of user access rights x Logical security incident review and reporting Monitoring system access and use Reporting of Security incidents Reporting pre-project feasibility analysis x x x x Project delivery Project Development Initiation project delivery/requirements Project delivery/design x x Project delivery/development x x x x Project delivery/test x x x x Deploy (operational ready) Post-project warranty evaluation

8 Prevention Fraud Heat Map Capture the human factor Products Context Competition Administration Psychology Governance Fraud Risk Management is a multi-faceted concern that seems very hard to embody into one single approach. The Fraud Heat Map completes our set of approaches and produces a contextual view that is essential when talking about fraud(s). Indeed, fraud is often the consequence of many disruptions and/or temptations and, consequently, context is important. The purpose of our Fraud Heat Map is hence to crystallise into one visual all these elements that may contribute to a weakening of the context in which one person/a number of people operate and as such, represent potential opportunities to perpetrate fraud. IT Opportunity Behaviour Our level of analysis is the individual who is ultimately the triggering factor. The outcome of such an analysis is expected to be based both on facts and perceptions/intuitions, and the visual outcome should allow you to better anticipate fraudulent behaviours and thus reinforce controls where needed. Fraudulent behaviour consists of three conditions generally present where fraud occurs. They are summarized in the well-known Fraud Triangle. The link between those elements and the organisation is perfectly reflected in the Heat Map highlighting the key risk areas in a practical manner. Fraud Triangle Good for the company Others do it No alternative employment opportunity No visible harm Rationalisation Belief systems / boundary systems can break the triangle Fraud Diagnostic / Interactive control systems can break the triangle Pressure Market pressure Incentive comp. Impossible targets Opportunity Weak Internal controls Powerless internal Audit Auditor complacent Analysts go along Need internal controls to break the triangle

9 An example: Financial Markets Trading Activities Trading activities are an interesting example because they encompasses many elements that expose the financial sector to risk. It is a highly competitive environment that is particularly results-driven, which places the trader under constant pressure. The complexity of the products and of the process makes it more difficult to detect prohibited activities and facilitates opportunities for fraud. In most rogue trading cases, the traders were either acting as they were because they felt trapped in the losses made or were seeing their fraudulent activity as something good for the company because of the gains generated. To identify the High Risks Zones in the organisation, many questions need to be raised: - Are the IT systems secured (password and system access management etc.)? - What processes have been automated, and what operations require manual intervention by the operator? - Is the administration checking whether traders take all their holidays and for at least 10 consecutive days? - Are some adequate control procedures such as timely confirmation in place? - What controls are in place to detect abnormal behaviour? - What is the risk awareness of the supervisors? - Etc. Encompassing all the these elements in one framework, the Heat Map enables management to identify the areas at risk directly and to act accordingly. The approach developed with the Heat Map is complementary to the ones tackling the matter from the human angle.

10 Prevention Background checks Know who you are dealing with Reputation is critical within the Financial Services Sector. Therefore, hiring reliable management and building up relationships with sound clients, suppliers and partners are of the utmost importance. The lack of correct background information creates both reputation and business risks. As gathering the necessary and complete information at short notice appears to be challenging in practice, we can provide you with a background investigation of the reliability and reputation of these potential business relations. Our Open Source Intelligence Centre has access to a variety of sources of financial and other kinds of information. We are experts in informationgathering procedures and will provide you with the key information you need to know. Being well-informed enables you to better manage your reputation and business risks. Customised training Get your people aware of fraud risk On a regular basis, clients ask us to design fraud awareness training covering their specific needs. It goes from the simple off-the-shelf fraud awareness training session to the most sophisticated training package derived from a Fraud Risks Assessment exercise performed over a few weeks, with the input of our client s top management and specialised staff. Occasionally, we design specific supporting documentation that our clients can use internally to train their staff or as guidance to refer to on a daily basis. Fraud Risk Management Manual - Table of Content Chapter 1 Introduction Chapter 2 Existing Fraud Management Framework Chapter 3 Typology of possible Fraud types Chapter 4 Initial Fraud Risk Assessment Chapter 5 Elements of Fraud Auditing Chapter 6 Proposed Fraud Risk Auditing Model Chapter 7 What to do when Fraud is suspected

11

12 Detection

13 Detection Forensic Technology Benefit from the latest forensic technologies Forensic Technology incorporates cutting-edge technology in fraud examinations. While business becomes increasingly dependent on Information Technology, and information and knowledge is progressively stored electronically, fraud is often buried in massive amounts of digital data. Forensic Technology can help capture, secure and deal with substantial volumes of information, identify which systems and personnel are critical, and recover hidden or lost data. Furthermore, it provides the tools and knowledge to analyse this data and fit the results into meaningful fraud assessment reports. Below are some examples of the way we use Forensic Technology. One of the business areas often affected by fraud is Procurement. By using Data Analysis (DA) and Data Mining (DM), any indicators, trends or hidden patterns relating to Procurement Fraud can be uncovered from the financial system. The DA and DM reports will be customised to the business and IT environment and specific fraud risks of the company. Security concerns related to applications and databases containing critical data have to be proactively addressed to mitigate considerable fraud risk. The current user access management procedures will be mapped against the key objectives and industry best practice standards in order to identify gaps and areas for improvement. If any significant fraud risk is uncovered in the access management review, more in-depth investigation can be performed into actual access management, such as reviewing and analysing outliers of access to critical information, trend analysis (peaks in manual entries), subsequent transactions made by the same user (e.g. invoice booked and paid by the same person) etc. Financial institutions are confronted with large amounts of supporting data, both paper and electronic. Paper documents are scanned and archived resulting in a significant workload to manually review them and/or to maintain data quality. E-Discovery techniques now combine paper files and any digital information into document management allowing efficient data quality reviews. Insurance companies can be confronted with enormous amounts of claims or litigations (e.g. due to natural disaster or class actions). At PwC, we have the expertise to assist you with document management for large-scale, multiparty, multi-jurisdictional litigations or claims. Moreover, our team can provide you with advice and assistance in the management and prioritisation of these claims. We bring together experts and specialists in claims, forensic investigation, forensic technology services and other relevant disciplines, combining the technical skills, industry knowledge and geographical coverage to investigate, analyse, prioritise and resolve complex and massive amounts of claims.

14 Detection Fraud Due Diligence Set the scene Business is ever-changing and the organisational frameworks are moving targets. Mergers, acquisitions and employee turnover have become a part of our way of life. We know that the new challenges you are willing to take are often very exciting but, in the end, can you say you have a full comfort when taking over a target or taking up a new role in your company? Could there be any concealed risks present? Indeed, whilst long-term strategies can be designed with hindsight, you are immediately exposed to key risks in the day-to-day business. Short-term exposure can considerably damage your image and ruin your ambitions for the future. The recent nature of your involvement will not believe us prevent the deterioration of your reputation. Life is unfair! To assist you in assessing such risks, we have elaborated, in a joint effort of our forensic and financial risk experts, a methodology and checklist that can help you set the scene in a fast and efficient way. We are happy to tailor investigations to best suit your needs and expectations. More than others, we know how easily you can be exposed to civil or even criminal liability!

15

16 Investigation

17 Investigation Fraud Incidence Plan An action plan when fraud has been detected Whatever the type of fraud, whoever the perpetrator, any form of fraud raises a number of questions and issues for management; issues and questions they have probably never dealt with before. Our specialists are highly-trained and discreet. They are used to operating in sensitive circumstances, and their range of skills and methodologies allows them to discover information that is often outside the scope of normal accounting or auditing procedures. Assistance may include sorting out evidence for prosecution. We support management to allow them to carry on with the day-to-day business, and avoid them having to spend valuable time dealing with matters that may distract them and put their business in an even worse position. Asset Tracing and Recovery Get back what you were defrauded Financial institutions are often confronted with significant losses on credit or insurance files due to misconduct or even sometimes fraud by the client. Our Asset Tracing and Recovery service is designed to answer the questions you have in the aftermath: What went wrong? Where is the money/asset now and how can we get it back? Who is responsible? Which controls failed? What steps need to be taken? These questions will be answered with a combination of investigation and highly refined asset recovery skills drawing on the PwC expertise and advanced Forensic Technology. Such an investigation is the starting point for the recovery of stolen assets. Our ability to unravel complex international fraud schemes may result in such assets being identified, frozen and then recovered.

18 Foreword Contact Place foreword for your publication here at 10.5/12pt. Place Rudy foreword Hoskens for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place Director foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place Dispute foreword Analysis for your & publication Investigations here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. +32 (0) rudy.hoskens@pwc.be Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword Cécile for Louchard your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Senior Manager Place foreword for your publication here at 10.5/12pt. Place Dispute foreword Analysis for your & publication Investigations here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place +32 foreword (0) for your 44 24publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place cecile.louchard@pwc.be foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Author s signature

19 Foreword Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Place foreword for your publication here at 10.5/12pt. Author s signature

20 PricewaterhouseCoopers. All rights reserved. PricewaterhouseCoopers refers to the network of member firmsof PricewaterhouseCoopers International Limited, each of which is a separate and independent legal entity. *connectedthinking is a trademark of PricewaterhouseCoopers. The firms of the PricewaterhouseCoopers global network ( provide industry-focused assurance, tax andadvisory services to build public trust and enhance value for clients and their stakeholders. More than 155,000 people in 153countries across our network share their thinking, experience and solutions to develop fresh perspectives and practical advice.

BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better.

BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better. BDO NORDIC Investigation, fraud prevention and computer forensics You can guess. You can assume. Or you can know. And knowing is always better. CONTENT OUR SERVICES 3 Investigation - Identifying the facts

More information

THE MATH OF FRAUD PREVENTION PESENTATION TO COMPANIES/CO-OPERATIVES ON A FRAUD PREVENTION STRATEGY

THE MATH OF FRAUD PREVENTION PESENTATION TO COMPANIES/CO-OPERATIVES ON A FRAUD PREVENTION STRATEGY THE MATH OF FRAUD PREVENTION PESENTATION TO COMPANIES/CO-OPERATIVES ON A FRAUD PREVENTION STRATEGY BY DR PHILIP THEUNISSEN COMPUTUS BESTUURSBURO NOVEMBER 2008 - 2 - INTRODUCTION Fraud is by far the most

More information

Antifraud program and controls assessment grid*

Antifraud program and controls assessment grid* Advisory Services Antifraud program and * Fraud risks & controls February 2008 *connectedthinking 2008 PricewaterhouseCoopers LLP. All rights reserved. PricewaterhouseCoopers refers to PricewaterhouseCoopers

More information

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients

More information

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012 GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

Introduction. Corporate Investigation & Litigation Support

Introduction. Corporate Investigation & Litigation Support Introduction Established in 2014 two companies, Carratu and MLI came together to create CarratuMLI Risk Management. In the joining of these two companies, we have created one of the UK s premier providers

More information

Deloitte Adriatic Forensic Services Save 5% of your income. Say NO to fraud.

Deloitte Adriatic Forensic Services Save 5% of your income. Say NO to fraud. Deloitte Adriatic Forensic Services Save 5% of your income. Say NO to fraud. The only way to know your future is to create it. Let s do it together! Dear Clients, As a result of the economic recession,

More information

www.pwc.com Being protected Using data analytics to detect fraud

www.pwc.com Being protected Using data analytics to detect fraud www.pwc.com Being protected Using data analytics to detect fraud Are you currently exposed to fraudulent activities? It will surprise few to learn that occupational fraud, IP infringement, corruption,

More information

Compliance and Ethics at the Federal Reserve Bank of New York

Compliance and Ethics at the Federal Reserve Bank of New York Compliance and Ethics at the Federal Reserve Bank of New York Operational Risk and Internal Audit Course Marina Adams, Compliance Officer and AVP David K. Clune, Compliance and Ethics Officer Kevin White,

More information

Fraud Prevention and Deterrence

Fraud Prevention and Deterrence Fraud Prevention and Deterrence Fraud Risk Assessment 2016 Association of Certified Fraud Examiners, Inc. What Is Fraud Risk? The vulnerability that an organization faces from individuals capable of combining

More information

Internet Reputation Management Guidelines Building a Roadmap for Continued Success

Internet Reputation Management Guidelines Building a Roadmap for Continued Success Internet Reputation Management Guidelines Building a Roadmap for Continued Success Table of Contents Page INTERNET REPUTATION MANAGEMENT GUIDELINES 1. Background 3 2. Reputation Management Roadmap 5 3.

More information

Forensic Services. kpmg.hu

Forensic Services. kpmg.hu Forensic Services kpmg.hu We help you curb your losses. Our forensic team provides services designed to assist you in matters of a commercial or financial nature that may result in a legal or regulatory

More information

Kroll Ontrack Data Analytics. Forensic analysis and visualization of complex data sets to provide intelligence around investigations

Kroll Ontrack Data Analytics. Forensic analysis and visualization of complex data sets to provide intelligence around investigations Trade Date: 2013-08-14 11:57:00 Sum of Total Value: 287,663,728 Trade Date: 2013-08-14 11:51:00 Trader Name: Susan Wright Sum of Total Value: 443,382,018 Kroll Ontrack Data Analytics Trade Date: 2013-08-14

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

Internet Reputation Management Guide. Building a Roadmap for Continued Success

Internet Reputation Management Guide. Building a Roadmap for Continued Success Internet Reputation Management Guide Building a Roadmap for Continued Success About BrandProtect BrandProtect is the leader in multi-channel Internet threat monitoring and risk mitigation. The company

More information

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can

More information

FRAUD PREVENTION STRATEGY FOR UGU DISTRICT MUNICIPALITY (UGU)

FRAUD PREVENTION STRATEGY FOR UGU DISTRICT MUNICIPALITY (UGU) FRAUD PREVENTION STRATEGY FOR UGU DISTRICT MUNICIPALITY (UGU) CONTENTS 1. Introduction.. 3 2. Characteristics of Fraud.. 5 3. Fraud Strategy..... 6 4. Building the Fraud Prevention Plan........ 8 Fraud

More information

www.pwc.be Are you prepared? Forensic services Protecting your business against economic crime

www.pwc.be Are you prepared? Forensic services Protecting your business against economic crime www.pwc.be Are you prepared? Forensic services Protecting your business against economic crime Are you prepared? Protecting your business against economic crime You cannot control unexpected events, however

More information

Fraud Control Theory

Fraud Control Theory 13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

LGMA Qld Governance and Corporate Planning Village Forum

LGMA Qld Governance and Corporate Planning Village Forum www.pwc.com.au Fraud Risk Management Fraud Risk Assessments LGMA Qld Governance and Corporate Planning Village Forum March 2015 Agenda Introductions Fraud Risk Management Fraud Statistics s Global Economic

More information

INFORMATION SECURITY TESTING

INFORMATION SECURITY TESTING INFORMATION SECURITY TESTING SERVICE DESCRIPTION Penetration testing identifies potential weaknesses in a technical infrastructure and provides a level of assurance in the security of that infrastructure.

More information

For Private circulation only www.deloitte.com/in. Creative. Clear. Focused. Forensic Services

For Private circulation only www.deloitte.com/in. Creative. Clear. Focused. Forensic Services For Private circulation only www.deloitte.com/in Creative. Clear. Focused. Forensic Services Do you conduct background checks on employees and vendors? Do you educate employees about the importance of

More information

FTI Consulting insurance services

FTI Consulting insurance services INSURANCE SERVICES FTI Consulting insurance services The insurance industry is operating in a complex and dynamic global environment. Low interest rates, the demand on capital and ever-changing regulation

More information

RISK AND INVESTIGATIVE SERVICES. Audit Tax Advisory Risk. www.crowehorwath.ae

RISK AND INVESTIGATIVE SERVICES. Audit Tax Advisory Risk. www.crowehorwath.ae RISK AND INVESTIGATIVE SERVICES Risk Consulting Services As an international business, you manage a challenging array of risk on multiple fronts: strategic, operations, compliance, and reporting. Today

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

Fraud-Related Compliance

Fraud-Related Compliance Fraud-Related Compliance R. A. (Andy) Wilson, CFE, CPP VP Fraud & Compliance Sedgwick Claims Management Services, Inc. Introduction: Why Compliance Is Essential 2015 Association of Certified Fraud Examiners,

More information

Forensic Accounting: An Introduction

Forensic Accounting: An Introduction Forensic Accounting: An Introduction Forensic Accounting Forensic Accountants are part investigator, part auditor, part solicitor and part accountant. Forensic Accountants utilise an understanding of business

More information

Under control 2015 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint

Under control 2015 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint Under control 2015 Hot topics for IT internal audit in financial services An Internal Audit viewpoint Introduction Welcome to our fourth annual review of the IT hot topics for IT internal audit in financial

More information

RISK MITIGATION SERVICES. Take-and-Use Guidelines for Chubb Crime Insurance Customers

RISK MITIGATION SERVICES. Take-and-Use Guidelines for Chubb Crime Insurance Customers RISK MITIGATION SERVICES Take-and-Use Guidelines for Chubb Crime Insurance Customers RISK MITIGATION SERVICES Take-and-Use Guidelines For Chubb Crime Insurance Customers Prepared by Stephen Yesko, ARM

More information

GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK

GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK SUPERVISORY AND REGULATORY GUIDELINES: PU-0412 Operational Risk 25 th November, 2013 GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK 1. INTRODUCTION 1.1. The Central Bank of The Bahamas ( the Central

More information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and

More information

SCHOOLS FRAUD RESPONSE PLAN

SCHOOLS FRAUD RESPONSE PLAN SCHOOLS FRAUD RESPONSE PLAN Author Jean Gleave, Chief Internal Auditor Date Last Agreed May 2012 Review Date May 2014 1 WARRINGTON BOROUGH COUNCIL SCHOOLS FRAUD RESPONSE PLAN Introduction The purpose of

More information

Federal Bureau of Investigation s Integrity and Compliance Program

Federal Bureau of Investigation s Integrity and Compliance Program Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established

More information

CAPABILITY STATEMENT CONTROL RISKS MEXICO

CAPABILITY STATEMENT CONTROL RISKS MEXICO CAPABILITY STATEMENT CONTROL RISKS MEXICO GENERAL 15 AUGUST 2012 Control Risks Mexico, S.A. de C.V. Cottons Centre Cottons Lane London SE1 2QG United Kingdom T: +5255 5000 1700 www.controlrisks.com TABLE

More information

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you 3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

CLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD

CLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD CLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD Click on tabs below FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD Food and drink manufacturers

More information

ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES

ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES THIS POLICY SETS OUT THE REQUIREMENTS FOR SAFEGUARDING COMPANY ASSETS AND RESOURCES TO PROTECT PATIENTS, STAFF, PRODUCTS, PROPERTY AND

More information

IT OUTSOURCING SECURITY

IT OUTSOURCING SECURITY IT OUTSOURCING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Strategic Plan On-Demand Services April 2, 2015

Strategic Plan On-Demand Services April 2, 2015 Strategic Plan On-Demand Services April 2, 2015 1 GDCS eliminates the fears and delays that accompany trying to run an organization in an unsecured environment, and ensures that our customers focus on

More information

ACFE FRAUD PREVENTION CHECK-UP

ACFE FRAUD PREVENTION CHECK-UP One of the ACFE s most valuable fraud prevention resources, the ACFE Fraud Prevention Check-Up is a simple yet powerful test of your company s fraud health. Test fraud prevention processes designed to

More information

IBM Counter Fraud Signature Solutions

IBM Counter Fraud Signature Solutions IBM Counter Fraud Signature Solutions November 5th, 2013 Athens Carmen Ene, VP IBM Global Business Services, Europe Leader Counter Fraud & Financial Crimes Provider ID Theft o Claim for routine services

More information

IT Risk & Security Specialist Position Description

IT Risk & Security Specialist Position Description Specialist Position Description February 9, 2015 Specialist Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level

More information

ANTI-FRAUD POLICY Adopted August 13, 2015

ANTI-FRAUD POLICY Adopted August 13, 2015 ANTI-FRAUD POLICY Adopted August 13, 2015 Introduction The Board of Commissioners of the Housing Authority of the City of Muskogee (MHA) has established an anti-fraud policy to enforce controls and to

More information

Penetration Testing Is A Bad Idea. Anton Aylward, CISSP, CISA System Integrity

Penetration Testing Is A Bad Idea. Anton Aylward, CISSP, CISA System Integrity Penetration Testing Is A Bad Idea Anton Aylward, CISSP, CISA System Integrity What are you trying to test? Can hackers break in? You can t prove a -ve Your firewall works? But is it configured? Your IDS

More information

Investigation. Investigations

Investigation. Investigations Investigation The Forensic Services team of PricewaterhouseCoopers has the knowledge and experience necessary to conduct comprehensive fraud investigations. Our team in Poland has jointly performed in

More information

CYBER SECURITY GUIDANCE

CYBER SECURITY GUIDANCE CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires

More information

Audit Committee. Directors Report. Gary Hughes Chairman, Audit Committee. Gary Hughes Chairman, Audit Committee

Audit Committee. Directors Report. Gary Hughes Chairman, Audit Committee. Gary Hughes Chairman, Audit Committee Audit Committee Dear Shareholder, We are satisfied that the business has maintained robust risk management and internal controls, supported by strong overall governance processes, and that management have

More information

PCI White Paper Series. Compliance driven security

PCI White Paper Series. Compliance driven security PCI White Paper Series Compliance driven security Table of contents Compliance driven security... 3 The threat... 3 The solution... 3 Why comply?... 3 The threat... 3 Benefits... 3 Efficiencies... 4 Meeting

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

Information Technology Security Review April 16, 2012

Information Technology Security Review April 16, 2012 Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing

More information

www.pwc.com/hu Power issues A PwC üdvözli PwC s services Győrt for the energy sector PwC welcomes Győr

www.pwc.com/hu Power issues A PwC üdvözli PwC s services Győrt for the energy sector PwC welcomes Győr www.pwc.com/hu Power issues A PwC üdvözli PwC s services Győrt for the energy sector PwC welcomes Győr PwC has a strong presence in the field of energy consulting both in Hungary and in the region. Using

More information

IBM SECURITY QRADAR INCIDENT FORENSICS

IBM SECURITY QRADAR INCIDENT FORENSICS IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise

More information

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister Using COBiT For Sarbanes Oxley Japan November 18 th 2006 Gary A Bannister Who Am I? Who am I & What I Do? I am an accountant with 28 years experience working in various International Control & IT roles.

More information

Optimizing Network Vulnerability

Optimizing Network Vulnerability SOLUTION BRIEF Adding Real-World Exposure Awareness to Vulnerability and Risk Management Optimizing Network Vulnerability Management Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965

More information

RISK ASSESSMENT CHECKLIST

RISK ASSESSMENT CHECKLIST RISK ASSESSMENT CHECKLIST Provided By The Office of the Georgia State Inspector General Produced In Cooperation With The Governor s Office of Texas Fraud Risk Assessment Checklist Performing an agency

More information

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced

More information

MALAYSIAN TECHNOLOGY DEVELOPMENT CORPORATION SDN. BHD.

MALAYSIAN TECHNOLOGY DEVELOPMENT CORPORATION SDN. BHD. MALAYSIAN TECHNOLOGY DEVELOPMENT CORPORATION SDN. BHD. WHISTLEBLOWING POLICY AND GUIDELINES 16 March 2012 Version 1.0 TABLE OF CONTENTS WHISTLEBLOWING POLICY Page WHISTLEBLOWING GUIDELINES B1 DEFINITION

More information

Industrial Security & Compliance Using the Holistic Lifecycle Model

Industrial Security & Compliance Using the Holistic Lifecycle Model Industrial Security & Compliance Using the Holistic Lifecycle Model Clint Bodungen Founder / Lead Analyst CIDG, Corp. (Critical Infrastructure Defense Group) Chris Paul Counsel Joyce & Paul, PLLC Jeff

More information

SPG 223 Fraud Risk Management. June 2015

SPG 223 Fraud Risk Management. June 2015 SPG 223 Fraud Risk Management June 2015 Disclaimer and copyright This prudential practice guide is not legal advice and users are encouraged to obtain professional advice about the application of any legislation

More information

Diploma in Forensic Accounting (Level 4) Course Structure & Contents

Diploma in Forensic Accounting (Level 4) Course Structure & Contents Brentwood Open Learning College Diploma in Forensic Accounting (Level 4) Course Structure & Contents Diploma in Forensic Accounting Course Structure & Contents Page 1 Unit 1 Introduction Forensic Accounting

More information

Managing General Agents (MGAs) Guideline

Managing General Agents (MGAs) Guideline Managing General Agents (MGAs) Guideline JUNE 2013 DRAFT FOR COMMENT BC AUTHORIZED LIFE INSURERS www.fic.gov.bc.ca PURPOSE This draft guideline outlines best practices that the Financial Institutions Commission

More information

The Information Systems Audit

The Information Systems Audit November 25, 2009 e q 1 Institute of of Pakistan ICAP Auditorium, Karachi Sajid H. Khan Executive Director Technology and Security Risk Services e q 2 IS Environment Back Office Batch Apps MIS Online Integrated

More information

The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act*

The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act* The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act* July 2004 *connectedthinking The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act Introduction

More information

FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,

More information

Forensic Audit Building a World Class Program

Forensic Audit Building a World Class Program Forensic Audit Building a World Class Program PAUL E. ZIKMUND DIRECTOR GLOBAL INTEGRITY AND FORENSIC AUDIT 1 2012 ACFE ANNUAL FRAUD CONFERENCE ORLANDO, FL Why the Need for Forensic Audit Program In response

More information

Building a Data Quality Scorecard for Operational Data Governance

Building a Data Quality Scorecard for Operational Data Governance Building a Data Quality Scorecard for Operational Data Governance A White Paper by David Loshin WHITE PAPER Table of Contents Introduction.... 1 Establishing Business Objectives.... 1 Business Drivers...

More information

Audit Quality Thematic Review

Audit Quality Thematic Review Thematic Review Professional discipline Financial Reporting Council January 2014 Audit Quality Thematic Review Fraud risks and laws and regulations The FRC is responsible for promoting high quality corporate

More information

Prevention is Better than Cure: Protect Your Medical Identity

Prevention is Better than Cure: Protect Your Medical Identity Prevention is Better than Cure: Protect Your Medical Identity Center for Program Integrity Centers for Medicare & Medicaid Services Shantanu Agrawal, MD, MPhil Medical Director Washington State Medical

More information

SECURITY. Risk & Compliance Services

SECURITY. Risk & Compliance Services SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

ERM Symposium April 2009. Moderator Nancy Bennett

ERM Symposium April 2009. Moderator Nancy Bennett ERM Symposium April 2009 RI4-Implementing a Comprehensive Privacy Program John Kelly Joseph Nocera Moderator Nancy Bennett Data & Identity Theft: Keeping sensitive data out of the wrong hands Presented

More information

PCI Compliance for Healthcare

PCI Compliance for Healthcare PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?

More information

Schedule 13 - NHS Counter Fraud and Security

Schedule 13 - NHS Counter Fraud and Security 1. In this Schedule 13: Schedule 13 - NHS Counter Fraud and Security 1.1 CFSMS means the Special Health Authority established by the Counter Fraud and Security Management Service (Establishment and Constitution

More information

Active Directory Auditing The Need and Result

Active Directory Auditing The Need and Result Jai hanumaan www.lepide.com Active Directory Auditing The Need and Result Whitepaper 2013 What are IT Audits? Increasing number of cases of malpractices and lackadaisical approach towards handling sensitive

More information

The Value of Vulnerability Management*

The Value of Vulnerability Management* The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda

More information

Global framework. Safety, health and security for work-related international travel and assignments

Global framework. Safety, health and security for work-related international travel and assignments Global framework Safety, health and security for work-related international travel and assignments 3 Global framework Safety, health and security for work-related international travel and assignments International

More information

APRA REVIEW OF UNIT PRICING PRACTICES

APRA REVIEW OF UNIT PRICING PRACTICES APRA REVIEW OF UNIT PRICING PRACTICES Unitisation is the process by which a pool of assets are broken into portions of ownership (units), which are conceptually similar to shares in a company. The process

More information

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY INTRODUCTION Information security has evolved. As the landscape of threats increases and cyber security 1 management becomes

More information

Fraud Risk Management Procedures

Fraud Risk Management Procedures Fraud Risk Management Procedures 1. Introduction KCE Electronics Public Company Limited ( KCE or the Company ) is committed to achieving the highest levels of business integrity, morals and transparency

More information

Procuring Penetration Testing Services

Procuring Penetration Testing Services Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

Aberdeen City Council IT Security (Network and perimeter)

Aberdeen City Council IT Security (Network and perimeter) Aberdeen City Council IT Security (Network and perimeter) Internal Audit Report 2014/2015 for Aberdeen City Council August 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary

More information

Fighting Identity Fraud with Data Mining. Groundbreaking means to prevent fraud in identity management solutions

Fighting Identity Fraud with Data Mining. Groundbreaking means to prevent fraud in identity management solutions Fighting Identity Fraud with Data Mining Groundbreaking means to prevent fraud in identity management solutions Contents Executive summary Executive summary 3 The impact of identity fraud? 4 The forgery

More information

GOVERNANCE, RISK AND COMPLIANCE. Internal Audit. Assessing Fraud Vulnerabilities. kpmg.com/in

GOVERNANCE, RISK AND COMPLIANCE. Internal Audit. Assessing Fraud Vulnerabilities. kpmg.com/in GOVERNANCE, RISK AND COMPLIANCE Internal Audit Assessing Fraud Vulnerabilities kpmg.com/in 1 Internal Audit Assessing Fraud Vulnerabilities Introduction Globalization has increased the scale and complexity

More information

OCC 98-3 OCC BULLETIN

OCC 98-3 OCC BULLETIN To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel

More information

Best Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP

Best Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP Best Practices in Incident Response SF ISACA April 1 st 2009 Kieran Norton, Senior Manager Deloitte & Touch LLP Current Landscape What Large scale breaches and losses involving credit card data and PII

More information

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview

More information

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,

More information

Investigative and Security Consulting Services for Hedge Funds, Venture Capital Funds, Private Equity Firms and other Financial Institutions

Investigative and Security Consulting Services for Hedge Funds, Venture Capital Funds, Private Equity Firms and other Financial Institutions Investigative and Security Consulting Services for Hedge Funds, Venture Capital Funds, Private Equity Firms and other Financial Institutions 575 MADISON AVENUE, SUITE 1006, NEW YORK, NY 10022 T. 212 605

More information