10/13/2015 THE SAGA CONTINUES. An Update on Fraud Issues. Angela R. Morelock, CPA, CFE, CFF, ABV Partner
|
|
- Horatio Short
- 8 years ago
- Views:
Transcription
1 THE SAGA CONTINUES An Update on Fraud Issues October 14, 2015 Angela R. Morelock, CPA, CFE, CFF, ABV Partner 1
2 TO RECEIVE CPE CREDIT Participate in entire webinar Answer polls when they are provided If you are viewing this webinar in a group Complete group attendance form with Title & date of live webinar Your company name Your printed name, signature & address All group attendance sheets must be submitted to within 24 hours of live webinar Answer polls when they are provided If all eligibility requirements are met, each participant will be ed their CPE certificates within 15 business days of live webinar TODAY S AGENDA The high cost of fraud Faces of fraud Three hot topics in fraud schemes Examples of real schemes 2
3 ARE WE MAKING PROGRESS? An analysis...would indicate that the factors most frequently present in embezzlement cases are gambling, extravagant living standards, unusual family expenses, undesirable associates and inadequate income. Why Honest People Steal, Virgil W. Peterson, Journal of Criminal Law, 1947 TOP FIVE FRAUD TRENDS Source: 2014 ACFE Report to the Nations 3
4 #1: THE HIGH COST OF FRAUD 5% of Revenue Lost due to fraud & abuse each year Source: 2014 ACFE Report to the Nations #2: INDUSTRIES MOST VICTIMIZED Industry Frequency Banking 17.8% Government 10.3% Manufacturing 8.5% Health care 7.3% Education 5.9% Source: 2014 Report to the Nations - Association of Certified Fraud Examiners, Inc. 4
5 #3: RECOVERING FUNDS IS THE EXCEPTION NOT THE RULE 60% recover nothing after finding fraud Source: 2014 Report to the Nations - Association of Certified Fraud Examiners, Inc. #4: ALMOST ALL HAVE NO PRIOR CRIMINAL HISTORY 87% have no criminal history Reminder: Background checks are good, but don t depend on them to evaluate someone s likelihood to commit fraud after hiring them Source: 2014 Report to the Nations - Association of Certified Fraud Examiners, Inc. 5
6 #5: TIPS ARE TOP METHOD OF DETECTION 42% of all frauds detected by tip Solution: Get a hotline if you don t already have one. If you have one, make sure you promote it Source: 2014 Report to the Nations - Association of Certified Fraud Examiners, Inc. WHICH ONE LOOKS SUSPICIOUS? 6
7 Source: 2014 Report to the Nations - Association of Certified Fraud Examiners, Inc. AP MANIPULATION COLLIN STREET BAKERY 7
8 WHERE DID THE MONEY GO? 8
9 Statement for Account xxxxxxx 09/01/13-09/30/13 Income Summary Detail' Description Current Year to Date Interest Income Credit Balance Qualified Dividends $ ,193.0(1 'Thllaect1ondisplayanent lnd rear 10 cjalt luallon valuh torthiticcou'il The curenl tctalsmay no1 equate to1m10t11 paymtntlllltod on this statement as c:crredidrll to tax reponij'isi mav also bt 'TMse tortectk:l'illl:atl Include changes mad to pt'e'llcus payments nremovat repcrtablein prt'i!oui W: year lpilloverdmdetkss), lht year to- date lol:all- wiu K :U "ittly reflect Account Positions Symbol! Current Market Purchase Cost Average Unrealized Estimated $ Investment OescrlpUons CUSIP Quantity Price Value Date Basis Cost Gain(Loss) Income Yield Stocks- Margin 3M CO MMM 4,800 $ $ 573, /09/09 $ 199, $ $ 374, $ 12, % t COM BOEING CO BA 5, , /12 352, , , % COM BAROCRINC BCR 13, ,544, /00 301, , , % COM CATERPILLAR INC CAT 2, , /17/08 94, , , % COM CHEVRON CORP cvx 4, , /16/12 404, , , % COM JOHNSON & JOHNSON JNJ 10, , /27/12 687, , , % COM NORFOLK SOUTHERN COl NSC 6, , /15/12 343, , , % COM UNION PACIFIC CORP UNP 5, , / , , , % COM WHOLE FOODS MRK INC WFM 10, , /08 44, , , % COM Total Stocks $6,124, $3,011, $3,113, $114,638,76 1.9% page2of4 9
10 CYBERSECURITY NOT JUST A BANK ISSUE K.I.S.S. method applies to hackers, too Though sophisticated schemes still exist, relatively simple schemes becoming more prevalent Technical attacks not needed Business compromise or masquerading attacks account is taken over or a spoofed domain closely resembling a legitimate domain is used Use of social engineering CYBERSECURITY NOT JUST A BANK ISSUE Banks are not focus of simpler schemes Not only deep pockets anymore Impostors focusing more on accounting or financial departments of companies, regardless of size From October December 2014, nonbank businesses lost $215 million through compromised attacks 10
11 TARGET BREACH NOVEMBER 2013 Largest data security breach in U.S. at the time Approximately 110 million credit & debit card exposure Infected by a malware strain ( BlackPOS ) designed to siphon data from cards when swiped Hackers commandeered Target server to store card info Infected POS system running on Microsoft Windows Hackers uploaded exfiltration malware to remove data from server Target had recently spent $1.6 million for a malware detection tool Detection company caught exfiltration malware & reported to security team at Target HQ Target HQ did nothing in response TARGET BREACH NOVEMBER 2013 Target initial cost: $252 million (insurance recovery: $90 million) Card issuer reimbursement Target & Visa agree to approx. $67 million settlement Target & Mastercard may reach similar per card settlement Additional costs to reimburse issuers for any fraud losses related to certain debit transactions that resulted from breach Class action suit still active with other issuers Changed landscape regarding per card amounts in future settlements from data breaches (i.e., was $2.50/card standard before) 11
12 UNDERGROUND MARKETPLACES Hackers sell information packages containing Verified health insurance credentials Bank account numbers/logins SSNs Other personally identifiable information on victims Sold as kitz with counterfeit physical documents such as Credit cards Social security cards Driver s license Insurance cards UNDERGROUND MARKETPLACES Kitz can sell for between $1,200 & $1,300 each Additional fees for adding items, such as U.S. credit card with CVV code Online bank account Game accounts Paypal, verified balance 12
13 FTC ENFORCEMENT Section 5 (a) of FTC Act main provision for enforcement Unfair trade practice or deceptive acts More than 40 data security enforcement actions since 2000 In FTC v. Wyndham Worldwide, et al. & at least one other case, defendants have argued for dismissal arguing lack of statutory enforcement by FTC Courts & appellate courts have continued to uphold FTC s authority, even though other laws exist (e.g., Gramm- Leach-Bliley) FTC ENFORCEMENT Reasonableness approach to enforcement Focus on representations to consumers 13
14 FIRST EXAMPLE OF CYBER ATTACK WIRE FRAUD Vendor was not typical vendor profile Majority of vendors for this retailer were in North America Retailer did not prefer wire transfers Usually connected with bank rep by phone prior to transfer Impostor intercepted communication between retailer & vendor Sent request to change vendor bank information, which retailer changed without further confirmation 14
15 FIRST EXAMPLE OF CYBER ATTACK WIRE FRAUD Israeli bank U.S. bank Israeli manufacturer U.S. retailer Product FIRST EXAMPLE OF CYBER ATTACK WIRE FRAUD Israeli bank What money?? U.S. bank Kuala Lumpur bank Got it Where is my money?!? Sent it, I thought?? Impostor Israeli manufacturer U.S. retailer Product 15
16 FIRST EXAMPLE OF CYBER ATTACK WIRE FRAUD Total loss almost $400,000 One from impostor came 15 minutes after legitimate retailer sent purchase order, with same purchase order information (in different format) Numerous grammatical & spelling errors in communications from impostor, including first name of retailer representative Impostor was through a Yahoo account, yet initial communication between vendor & retailer representative was via company-specific address SECOND EXAMPLE OF CYBER ATTACK WIRE FRAUD Accounting department receives requesting change in bank account information was believed to be from customer Receives an additional requesting release of cash collateral Collateral wire transferred Receiving bank rejects wire due to an issue with receiving account number/name 16
17 UBIQUITI NETWORKS 2015 Accounting department receives s requesting wire transfers s came from an impersonator, acting as an executive Transfer of funds requested held by company subsidiary in Hong Kong to accounts held by impersonator(s) Potentially more than $40 million loss Around $14 million currently expected to be recovered through legal proceedings in foreign jurisdictions No insurance recovery available PREVENTION ACCOUNTING DEPT Training for accounting & bookkeeping personnel Have some form of verification process For example, call customer/vendor to verify change in account info or wire transfer instructions Double check addresses In previous examples, instructions involved or came from a different provider or domain than legitimate s 17
18 Buy Data Breach Insurance Coverage Today! QUESTIONS? 18
19 BKD FORENSICS INSTITUTE SCHEDULE Financial Games Played in Divorce Wednesday, October 21 Julia Mast, CPA, CFE Communicating Complex Data Effectively Wednesday, October 28 Jeremy R. Clopton, CPA, CFE, ACDA, CIDA Register at bkd.com/forensicsinstitute CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS BKD, LLP is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: The information in BKD webinars is presented by BKD professionals, but applying specific information to your situation requires careful consideration of facts & circumstances. Consult your BKD advisor before acting on any matters covered in these webinars. 19
20 CPE CREDIT CPE credit may be awarded upon verification of participant attendance For questions, concerns or comments regarding CPE credit, please the BKD Learning & Development Department at THANK YOU! FOR MORE INFORMATION Angela R. Morelock, CPA, CFE, CFF, ABV Partner 20
21 21
CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE 12/16/2015. December 17, 2015
12/16/2015 CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE December 17, 2015 Angela R. Morelock, CPA, CFE, CFF, ABV Partner, BKD, LLP amorelock@bkd.com Jeff Eiserman
More informationTHE EVOLUTION OF CYBERSECURITY
THE EVOLUTION OF CYBERSECURITY Identifying Best Practices June 2, 2015 Cerone F. Cy Sturdivant Managing Consultant Nashville, TN 1 TO RECEIVE CPE CREDIT Participate in entire webinar Answer polls when
More informationDATA ANALYTICS. Finding Data from Farm to Fork February 11, 2016 2/10/2016
DATA ANALYTICS Finding Data from Farm to Fork February 11, 2016 Jeremy R. Clopton, CPA, CFE, ACDA, CIDA Director Forensics & Valuation Services jclopton@bkd.com 1 TO RECEIVE CPE CREDIT Participate in entire
More informationFRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE
FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE CPAs & ADVISORS experience reach // S. Todd Burchett, CPA, ABV, ASA, CFF, CFE Partner tburchett@bkd.com 210.268.1932 AGENDA
More informationCYBERSECURITY & EXPECTATIONS FOR INDEPENDENT GROCERS
October 21, 2015 CYBERSECURITY & EXPECTATIONS FOR INDEPENDENT GROCERS Cerone F. Cy Sturdivant Managing Consultant csturdivant@bkd.com 1 TO RECEIVE CPE CREDIT Participate in entire webinar Answer polls
More informationCYBERSECURITY INVESTIGATIONS
CYBERSECURITY INVESTIGATIONS Planning & Best Practices May 4, 2016 Lanny Morrow, EnCE Managing Consultant lmorrow@bkd.com Cy Sturdivant, CISA Managing Consultant csturdivant@bkd.com Michal Ploskonka, CPA
More informationPerp Poetry. Fraud & Embezzlement: Lessons From the Trenches. Presented by. acumen insight. ideas attention reach. expertise depth agility talent
acumen insight Fraud & Embezzlement: Lessons From the Trenches ideas attention reach Presented by Angela Morelock, CPA, CFE, CFF, ABV, Certified Forensic Accountant www.bkdforensics.com expertise depth
More informationYour Single Source. for credit, debit and pre-paid services. Fraud Risk and Mitigation
Your Single Source for credit, debit and pre-paid services Fraud Risk and Mitigation Agenda Types of Fraud Fraud Identification Notifications Next Steps 11/8/2013 2 Types of Fraud Lost and Stolen Cards
More informationACA IRS INFORMATION REPORTING: WHAT DO I NEED TO KNOW?
CPAs & ADVISORS ACA IRS INFORMATION REPORTING: WHAT DO I NEED TO KNOW? TO RECEIVE CPE CREDIT Participate in entire webinar Answer polls when they are provided If you are viewing this webinar in a group
More informationNATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
More informationTo Receive CPE Credit
Outcome Metrics for National Associations November 17, 2015 To Receive CPE Credit Participate in entire webinar Answer attendance checks & polls when they are provided If you are viewing this webinar in
More informationThe need for a secure & trusted payment instrument in e-commerce. Ali AlMeshal
The need for a secure & trusted payment instrument in e-commerce Ali AlMeshal In Physical/Real World Hand over card Visual check Swipe in POS Online authorization Receipt with signature panel Sign or Pin
More informationTop Ten Fraud Risks That Impact Your Financial Institution. Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC.
Top Ten Fraud Risks That Impact Your Financial Institution Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC Agenda Education on understanding the fraud risk Take away.. Education to
More informationDeception scams drive increase in financial fraud
ADDRESS 2 Thomas More Square London E1W 1YN WEBSITE www.financialfraudaction.org.uk DIRECT LINE 020 3217 8436 NEWS RELEASE EMAIL press@ukcards-ffauk.org.uk Deception scams drive increase in financial fraud
More informationSNF Medicare Billing Frequently Asked Questions
CPAs & ADVISORS experience clarity // SNF Medicare Billing Frequently Asked Questions HEALTH CARE GROUP Julie Bilyeu, Director Lisa McIntire, CPA, Senior Managing Consultant TO RECEIVE CPE CREDIT Individual
More informationCybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
More informationAnatomy of a Hotel Breach
Page 1 of 6 Anatomy of a Hotel Breach Written by Sandy B. Garfinkel Monday, 09 June 2014 15:22 Like 0 Tweet 0 0 Data breach incidents have dominated the news in 2014, and they are only becoming more frequent
More informationDATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH
DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH Andy Watson Grant Thornton LLP. All rights reserved. CYBERSECURITY 2 SURVEY OF CHIEF AUDIT EXECUTIVES (CAEs) GRANT THORNTON'S 2014 CAE SURVEY Data privacy and
More informationLeveraging Big Data to Mitigate Health Care Fraud Risk
Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud
More informationThe Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016
The Future of Data Breach Risk Management Response and Recovery Increasing electronic product life and reliability The Cybersecurity Forum April 14, 2016 Today s Topics About Merchants Information Solutions,
More informationRLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses
RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123 Cybersecurity: A Growing Concern for Small Businesses Copyright Materials This presentation is protected by US and International Copyright
More informationMaking Your Fraud Vision 20 / 20. Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner FOS tstrause@fosaudit.
Making Your Fraud Vision 20 / 20 Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner tstrause@fosaudit.com 610-603-5603 Topics to be Covered + Summary of Fraud Statistics ACFE 2014 Report + Current
More informationCYBERCRIME: What your Bank should be doing to Protect your Business. David Pollino Senior Vice President Fraud Prevention Officer
CYBERCRIME: What your Bank should be doing to Protect your Business David Pollino Senior Vice President Fraud Prevention Officer Agenda Changing Landscape Case of Efficient Services Escrow Group Six key
More informationHow To Help Protect Yourself From Identity Theft
How To Help Protect Yourself From Identity Theft January 20, 2015 Bryan Strong Senior Vice President and Director Information Security This complimentary interactive webinar is sponsored by Zions Bank
More informationThis notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.
RECENT DATA BREACHES This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. Data security is a number one priority at Northwest. We take every
More informationWho Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
More informationClick to edit Master title style
EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity
More informationTHIRD-PARTY RISK: HOW TO BETTER UTILIZE ENERGY VENDOR AUDITS 8/25/2015. August 27, 2015
8/25/2015 THIRD-PARTY RISK: HOW TO BETTER UTILIZE ENERGY VENDOR AUDITS August 27, 2015 Shane Torkelson, CPE, CISA, CIA Director Enterprise Risk Solutions storkelson@bkd.com 1 TO RECEIVE CPE CREDIT Participate
More informationAnatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow
Anatomy of a Breach: A case study in how to protect your organization Presented By Greg Sparrow Agenda Background & Threat landscape Breach: A Case Study Incident Response Best Practices Lessons Learned
More informationWhy Data Security is Critical to Your Brand
Why Data Security is Critical to Your Brand Why security is critical to your brand Cybercriminals do not discriminate based on industry or business size. Security is expensive. At least, it is if you wait
More informationCYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations
More informationCybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015
Cybersecurity: A Growing Concern for All Businesses RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 RLI Design Professionals is a Registered Provider with The American
More informationCyber - Security and Investigations. Ingrid Beierly August 18, 2008
Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities
More informationUsing Navigation List Builder with Dynamics GP. Charles Allen Managing Consultant BKD Technologies callen@bkd.com
Using Navigation List Builder with Dynamics GP Charles Allen Managing Consultant BKD Technologies callen@bkd.com To Receive CPE Credit Participate in entire webinar Answer polls when they are provided
More informationIRS & Partners Combat Tax-Related Identity Theft What s New for 2016
IRS & Partners Combat Tax-Related Identity Theft What s New for 2016 General Scope of Identity Theft Identity theft costs U.S. victims more than all property crimes combined Identity theft remains number
More informationPROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit
PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account
More informationTop Fraud Trends Facing Financial Institutions
Top Fraud Trends Facing Financial Institutions Presented on: October 7, 2015, 2-3 ET Presented by: Ann Davidson - VP of Risk Consulting at Allied Solutions Webinar Agenda 1. Fraud trends in 2015 and beyond
More informationReclaiming your identity
Reclaiming your identity A resource for victims of identity theft If you think you are the victim of identity theft, use this resource guide to assist you in reclaiming your identity. You will find a checklist
More informationTHE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit
More informationIT Security Community
IT Security Community Who are we? The CompTIA IT Security is a group focused on the changing security issues of today. Who should join? Anyone looking to stay current with the ever- changing security landscape.
More informationCybersecurity Best Practices in Mortgage Banking. Article by Jim Deitch October 2015
Cybersecurity Best Practices in Mortgage Banking Article by Jim Deitch Cybersecurity Best Practices in Mortgage Banking BY JIM DEITCH Jim Deitch Recent high-profile cyberattacks have clearly demonstrated
More informationPREPARING FOR EMR PROGRAM SUCCESS IN 2016 12/10/2015. December 15, 2015. Travis Skinner, CPA Senior Managing Consultant tskinner@bkd.
PREPARING FOR EMR PROGRAM SUCCESS IN 2016 December 15, 2015 Travis Skinner, CPA Senior Managing Consultant tskinner@bkd.com Michael Orr, CPA Director morr@bkd.com David McDonald, CPA Director dmcdonald@bkd.com
More informationEMERGING TRENDS IN FRAUD: CRIMINALS HAVE FOUND THE WEAKEST LINK
EMERGING TRENDS IN FRAUD: CRIMINALS HAVE FOUND THE WEAKEST LINK Fraud Investigations Division: Global Security & Investigations Ed Cook Executive Director Regional Investigations Objectives: Provide a
More informationData Security, Fraud Prevention, and Cost Control. Mike Dorland, CPP Regional Marketing Representative Michigan Retailers Association
Data Security, Fraud Prevention, and Cost Control Mike Dorland, CPP Regional Marketing Representative Michigan Retailers Association Michigan Retailers Association Incorporated in 1940 Represent retail
More informationhttp://www.ftc.gov/bcp/edu/microsites/idtheft/index.html
Identity Theft: Steps to Take if You are a Victim We understand the stress, time and effort required as a result of having your identity stolen and used fraudulently. While there are many resources available
More informationLangara College PCI Awareness Training
Langara College PCI Awareness Training Have you heard of PCI? Due to the increase of credit card fraud and identity theft, major credit card companies like Visa, MasterCard and Amex have formed a security
More informationCourse 4202: Fraud Awareness and Cyber Security Workshop (3 days)
Course introduction It is vital to ensure that your business is protected against the threats of fraud and cyber crime and that operational risk processes are in place. This three-day course provides an
More informationCybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
More informationDon t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
More informationPayment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc.
Payment Methods The cost of doing business Michelle Powell - BASYS Processing, Inc. You ve got to spend money, to make money Major Industry Topics Industry Process Flow PCI DSS Compliance Risks of Non-Compliance
More informationTax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE?
1. WHAT HAPPENED (2015 UPDATE)? Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 2. WHAT IS THE ARCHDIOCESE DOING ABOUT THIS? 3. WHAT WERE THE RESULTS OF THE INVESTIGATIONS?
More informationCYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014
CYBER LIABILITY Network Security and Privacy Bring on tomorrow May 15, 2014 1 AGENDA I. Identify Exposures II. Identify how a breach can occur III. The Coverage (Third Party Liability + First Party Losses)
More informationIT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA
IT TRENDS AND FUTURE CONSIDERATIONS Paul Rainbow CPA, CISA, CIA, CISSP, CTGA AGENDA BYOD Cloud Computing PCI Fraud Internet Banking Questions The Mobile Explosion Mobile traffic data in 2011 was nearly
More informationEMV and Chip Cards Key Information On What This Is, How It Works and What It Means
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved
More informationAIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009
AIS Webinar Payment Application Security Hap Huynh Business Leader Visa Inc. 1 April 2009 1 Agenda Security Environment Payment Application Security Overview Questions and Comments Payment Application
More informationIBN Financial Services, Inc. Identity Theft Prevention Program(ITPP) under the FTCFACTActRedFlagsRule
IBN Financial Services, Inc. Identity Theft Prevention Program(ITPP) under the FTCFACTActRedFlagsRule I. Firm Policy Our firm s policy is to protect our customers and their accounts from identity theft
More informationTo Receive CPE Credit
Revisions to Loan Originator Compensation & Qualifications Under TILA Nancy Schoolman Senior Managing Consultant nschoolman@bkd.com 314.231.9844 Sheldon Hendrix Managing Consultant shendrix@bkd.com 713.499.4600
More informationSending money abroad. Plain text guide
Sending money abroad Plain text guide Contents Introduction 2 Ways to make international payments 3 Commonly asked questions 5 What is the cost to me of sending money abroad? 5 What is the cost to the
More informationAUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA
Australian Payments Clearing Association AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA 214 Australian Payments Clearing Association Limited ABN 12 55 136 519 CONTENTS OVERVIEW 1 SECTION 1 Fraud rates 4 SECTION
More informationIdentity Theft Repair Kit
Identity Theft Repair Kit The Identity Theft Repair Kit contains a resolution checklist and resolution worksheets. The checklist will help you keep track of the companies and organizations you should contact
More informationPhishing for Fraud: Don't Let your Company Get Hooked!
Phishing for Fraud: Don't Let your Company Get Hooked! March 2009 Approved for 1 CTP/CCM recertification credit by the Association for Financial Professionals 1 Today s Speakers: Joe Potuzak is Senior
More informationFraud and Identity Theft. Megan Stearns, Credit Counselor
Fraud and Identity Theft Megan Stearns, Credit Counselor Agenda Fraud and identity theft statistics Fraud Identity theft Identity theft prevention Protecting your Social Security Number Online prevention
More informationCommon Data Breach Threats Facing Financial Institutions
Last Updated: February 25, 2015 Common Data Breach Threats Facing Financial s Although exact figures are elusive, there is no question that the number of data security breaches both reported and unreported
More informationData breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC
Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you
More informationNetwork Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
More informationCybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
More informationPayment Card Industry Update and Cyber Risk Management
Payment Card Industry Update and Cyber Risk Management CRAIG A. HOFFMAN, ESQ. BAKERHOSTETLER ADAM COTTINI, MANAGING DIRECTOR, CYBER LIABILITY PRACTICE, ARTHUR J GALLAGHER & CO. OCTOBER 22, 2015 2014 ARTHUR
More informationVisa global Compromised Account
Visa global Compromised Account RECOVERY PROGRAM WHAT EVERY MERCHANT SHOULD KNOW ABOUT GCAR WHAT EVERY MERCHANT SHOULD KNOW ABOUT GCAR WHAT The Visa Global Compromised Account Recovery (GCAR) program offers
More informationHow To File An Identity Theft Complaint And Affidavit
Average time to complete: 10 minutes Identity Theft Victims Complaint and Affidavit A voluntary form for filing a report with law enforcement and disputes with credit reporting agencies and creditors about
More informationSAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity
SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get
More informationQuestions You Should be Asking NOW to Protect Your Business!
Questions You Should be Asking NOW to Protect Your Business! Angi Farren, AAP Senior Director Jen Wasmund, AAP Compliance Services Specialist 31 st Annual Conference SHAPE YOUR FUTURE April 23, 2013 Regional
More informationPayment Card Security
Payment Card Security January 31, 2008 Kieran Norton, Senior Manager Security & Privacy Services, Deloitte & Touche LLP Focus of the Presentation PCI Overview Background Current Environment Key Considerations
More informationIdentity Theft Victims Universal Complaint Form (FTC)
Average time to complete: 10 minutes A voluntary form for filing a report with law enforcement and disputes with credit reporting agencies and creditors about identity theft-related problems. Visit ftc.gov/idtheft
More informationProtecting your business from fraud
Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.
More informationOIG Fraud Alert Phishing
U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a
More informationPayments Fraud: It's Not Fun & Games
Payments Fraud: It's Not Fun & Games Claudia Swendseid Senior Vice President Payments Information & Outreach Office Federal Reserve Bank of Minneapolis NACHA Payments 2015 Claudia Swendseid Senior Vice
More informationManaging Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec
Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Jeremy Ong Divisional Vice-President Great American Insurance Company November 13, 2010 1 Agenda Overview of data breach statistics
More informationSound Business Practices for Businesses to Mitigate Corporate Account Takeover
Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.
More informationWhite Paper: Are there Payment Threats Lurking in Your Hospital?
White Paper: Are there Payment Threats Lurking in Your Hospital? With all the recent high profile stories about data breaches, payment security is a hot topic in healthcare today. There s been a steep
More informationDelaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP
Changing Legal Landscape in Cybersecurity: Implications for Business Delaware Cyber Security Workshop September 29, 2015 William R. Denny, Esquire Potter Anderson & Corroon LLP Agenda Growing Cyber Threats
More informationEvaluating DMARC Effectiveness for the Financial Services Industry
Evaluating DMARC Effectiveness for the Financial Services Industry by Robert Holmes General Manager, Email Fraud Protection Return Path Executive Summary Email spoofing steadily increases annually. DMARC
More informationFraud Prevention Checklist for Small Businesses
Fraud Prevention Checklist for Small Businesses 11 Ways to Minimize the Risk and Impact PAYMENT SOLUTIONS Fraud can have a devastating impact on small businesses. Prevention and mitigation strategies can
More informationINTERNET AUCTIONS A G FOR BUYERS AND SELLERS. www.ftc.gov 1-877-FTC-HELP FEDERAL TRADE COMMISSION FOR THE CONSUMER
AUCTIONS INTERNET A G A GUIDE FOR BUYERS AND SELLERS FEDERAL TRADE COMMISSION FOR THE CONSUMER 1-877-FTC-HELP www.ftc.gov Inside Auction Rules... 2 Payment Options... 3 Online Payment Services... 4 Online
More informationTax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Maggie Romaniello SL Field Area Manger
Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Glenn Gizzi Senior Stakeholder Liaison Robert Glantz Criminal Investigator Maggie Romaniello SL Field Area Manger What is
More informationRETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015
RETHINKING ORC: NRF S CYBER SECURITY EFFORTS OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015 No Organization is Secure Source: http://www.informationisbeautiful.net An Average
More informationPreventing, Insuring, and Surviving Fund Transfer Fraud... and Other Cyber Attacks
Preventing, Insuring, and Surviving Fund Transfer Fraud... and Other Cyber Attacks Nick Merker, CISSP, CIPT Stephen Reynolds, CISSP, CIPP/US Nick Reuhs Attorneys at Ice Miller LLP IceonFire Fund Transfer
More informationWHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
More informationCyber Security 2014 SECURE BANKING SOLUTIONS, LLC
Cyber Security CHAD KNUTSON SECURE BANKING SOLUTIONS 2014 SECURE BANKING SOLUTIONS, LLC Presenter Chad Knutson Senior Information Security Consultant Masters in Information Assurance CISSP (Certified Information
More informationWith the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more
More information2015 Visa Payment Security Symposium Webinar
The Power of Partnership AUGUST 12-13 HYATT REGENCY BURLINGAME, CA 2015 Visa Payment Security Symposium Webinar Diana Greenhaw Sr. Director, Global Data Security and Third Party Risk Lester Chan Director,
More informationBENEFITS OF A CLOUD ERP SYSTEM April 12, 2016
BENEFITS OF A CLOUD ERP SYSTEM April 12, 2016 Ricardo de Rojas Senior Managing Consultant rderojas@bkd.com Colleen Gutirrez Senior Consultant II cgutirrez@bkd.com 1 TO RECEIVE CPE CREDIT Participate in
More information1. Ask what your financial institution knows or has personally experienced with regard to internal and external data breaches.
Part 1: Internal & External Data Breach Vulnerabilities Presented on: Thursday, February 12, 2 3 ET Co presented by: Ann Davidson VP of Risk Consulting at Allied Solutions Joe Majka CSO at Verifone 1 Breakdown
More informationHOME DEPOT DATA BREACH
HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data
More informationTarget Security Breach
Target Security Breach Lessons Learned for Retailers and Consumers 2014 Pointe Solutions, Inc. PO Box 41, Exton, PA 19341 USA +1 610 524 1230 Background In the aftermath of the Target breach that affected
More informationUnderstanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner
Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner Check Fraud Hand-Out Despite the heavy use of credit cards and
More informationOctober 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
More informationNATIONAL ASSOCIATION OF MANUFACTURERS END OF THE YEAR TAX UPDATE
Wednesday December 17, 2014 2 3 PM Central Time NATIONAL ASSOCIATION OF MANUFACTURERS END OF THE YEAR TAX UPDATE Carolyn Lee Senior Director, Tax Policy National Association of Manufacturers CLee@nam.org
More information5 Important Controls to Mitigate Employee Fraud
5 Important Controls to Mitigate Employee Fraud LMCIT WEBINAR : FEBRUARY 10, 2015 IN PARTNERSHIP WITH EIDE BAILLY Presenter: Jason Olson, MBA, CPA/CFF, CFE, CFI Presentation Disclaimer These seminar materials
More informationSTATE INTERNAL AUDIT ADVISORY BOARD
CPAs & ADVISORS experience perspective // STATE INTERNAL AUDIT ADVISORY BOARD Presented by Jeremy Clopton, CPA, CFE, ACDA DATA ANALYTICS FOR FRAUD DETECTION CPAs & ADVISORS experience perspective // 2//
More informationUS House Energy and Commerce Committee. Commerce, Manufacturing, and Trade Subcommittee
US House Energy and Commerce Committee Commerce, Manufacturing, and Trade Subcommittee Protecting Consumer Information: Can Data Braches Be Prevented? February 5, 2014 Congressmen in Attendance: Rep. Lee
More information