10/13/2015 THE SAGA CONTINUES. An Update on Fraud Issues. Angela R. Morelock, CPA, CFE, CFF, ABV Partner

Size: px
Start display at page:

Download "10/13/2015 THE SAGA CONTINUES. An Update on Fraud Issues. Angela R. Morelock, CPA, CFE, CFF, ABV Partner amorelock@bkd.com."

Transcription

1 THE SAGA CONTINUES An Update on Fraud Issues October 14, 2015 Angela R. Morelock, CPA, CFE, CFF, ABV Partner 1

2 TO RECEIVE CPE CREDIT Participate in entire webinar Answer polls when they are provided If you are viewing this webinar in a group Complete group attendance form with Title & date of live webinar Your company name Your printed name, signature & address All group attendance sheets must be submitted to within 24 hours of live webinar Answer polls when they are provided If all eligibility requirements are met, each participant will be ed their CPE certificates within 15 business days of live webinar TODAY S AGENDA The high cost of fraud Faces of fraud Three hot topics in fraud schemes Examples of real schemes 2

3 ARE WE MAKING PROGRESS? An analysis...would indicate that the factors most frequently present in embezzlement cases are gambling, extravagant living standards, unusual family expenses, undesirable associates and inadequate income. Why Honest People Steal, Virgil W. Peterson, Journal of Criminal Law, 1947 TOP FIVE FRAUD TRENDS Source: 2014 ACFE Report to the Nations 3

4 #1: THE HIGH COST OF FRAUD 5% of Revenue Lost due to fraud & abuse each year Source: 2014 ACFE Report to the Nations #2: INDUSTRIES MOST VICTIMIZED Industry Frequency Banking 17.8% Government 10.3% Manufacturing 8.5% Health care 7.3% Education 5.9% Source: 2014 Report to the Nations - Association of Certified Fraud Examiners, Inc. 4

5 #3: RECOVERING FUNDS IS THE EXCEPTION NOT THE RULE 60% recover nothing after finding fraud Source: 2014 Report to the Nations - Association of Certified Fraud Examiners, Inc. #4: ALMOST ALL HAVE NO PRIOR CRIMINAL HISTORY 87% have no criminal history Reminder: Background checks are good, but don t depend on them to evaluate someone s likelihood to commit fraud after hiring them Source: 2014 Report to the Nations - Association of Certified Fraud Examiners, Inc. 5

6 #5: TIPS ARE TOP METHOD OF DETECTION 42% of all frauds detected by tip Solution: Get a hotline if you don t already have one. If you have one, make sure you promote it Source: 2014 Report to the Nations - Association of Certified Fraud Examiners, Inc. WHICH ONE LOOKS SUSPICIOUS? 6

7 Source: 2014 Report to the Nations - Association of Certified Fraud Examiners, Inc. AP MANIPULATION COLLIN STREET BAKERY 7

8 WHERE DID THE MONEY GO? 8

9 Statement for Account xxxxxxx 09/01/13-09/30/13 Income Summary Detail' Description Current Year to Date Interest Income Credit Balance Qualified Dividends $ ,193.0(1 'Thllaect1ondisplayanent lnd rear 10 cjalt luallon valuh torthiticcou'il The curenl tctalsmay no1 equate to1m10t11 paymtntlllltod on this statement as c:crredidrll to tax reponij'isi mav also bt 'TMse tortectk:l'illl:atl Include changes mad to pt'e'llcus payments nremovat repcrtablein prt'i!oui W: year lpilloverdmdetkss), lht year to- date lol:all- wiu K :U "ittly reflect Account Positions Symbol! Current Market Purchase Cost Average Unrealized Estimated $ Investment OescrlpUons CUSIP Quantity Price Value Date Basis Cost Gain(Loss) Income Yield Stocks- Margin 3M CO MMM 4,800 $ $ 573, /09/09 $ 199, $ $ 374, $ 12, % t COM BOEING CO BA 5, , /12 352, , , % COM BAROCRINC BCR 13, ,544, /00 301, , , % COM CATERPILLAR INC CAT 2, , /17/08 94, , , % COM CHEVRON CORP cvx 4, , /16/12 404, , , % COM JOHNSON & JOHNSON JNJ 10, , /27/12 687, , , % COM NORFOLK SOUTHERN COl NSC 6, , /15/12 343, , , % COM UNION PACIFIC CORP UNP 5, , / , , , % COM WHOLE FOODS MRK INC WFM 10, , /08 44, , , % COM Total Stocks $6,124, $3,011, $3,113, $114,638,76 1.9% page2of4 9

10 CYBERSECURITY NOT JUST A BANK ISSUE K.I.S.S. method applies to hackers, too Though sophisticated schemes still exist, relatively simple schemes becoming more prevalent Technical attacks not needed Business compromise or masquerading attacks account is taken over or a spoofed domain closely resembling a legitimate domain is used Use of social engineering CYBERSECURITY NOT JUST A BANK ISSUE Banks are not focus of simpler schemes Not only deep pockets anymore Impostors focusing more on accounting or financial departments of companies, regardless of size From October December 2014, nonbank businesses lost $215 million through compromised attacks 10

11 TARGET BREACH NOVEMBER 2013 Largest data security breach in U.S. at the time Approximately 110 million credit & debit card exposure Infected by a malware strain ( BlackPOS ) designed to siphon data from cards when swiped Hackers commandeered Target server to store card info Infected POS system running on Microsoft Windows Hackers uploaded exfiltration malware to remove data from server Target had recently spent $1.6 million for a malware detection tool Detection company caught exfiltration malware & reported to security team at Target HQ Target HQ did nothing in response TARGET BREACH NOVEMBER 2013 Target initial cost: $252 million (insurance recovery: $90 million) Card issuer reimbursement Target & Visa agree to approx. $67 million settlement Target & Mastercard may reach similar per card settlement Additional costs to reimburse issuers for any fraud losses related to certain debit transactions that resulted from breach Class action suit still active with other issuers Changed landscape regarding per card amounts in future settlements from data breaches (i.e., was $2.50/card standard before) 11

12 UNDERGROUND MARKETPLACES Hackers sell information packages containing Verified health insurance credentials Bank account numbers/logins SSNs Other personally identifiable information on victims Sold as kitz with counterfeit physical documents such as Credit cards Social security cards Driver s license Insurance cards UNDERGROUND MARKETPLACES Kitz can sell for between $1,200 & $1,300 each Additional fees for adding items, such as U.S. credit card with CVV code Online bank account Game accounts Paypal, verified balance 12

13 FTC ENFORCEMENT Section 5 (a) of FTC Act main provision for enforcement Unfair trade practice or deceptive acts More than 40 data security enforcement actions since 2000 In FTC v. Wyndham Worldwide, et al. & at least one other case, defendants have argued for dismissal arguing lack of statutory enforcement by FTC Courts & appellate courts have continued to uphold FTC s authority, even though other laws exist (e.g., Gramm- Leach-Bliley) FTC ENFORCEMENT Reasonableness approach to enforcement Focus on representations to consumers 13

14 FIRST EXAMPLE OF CYBER ATTACK WIRE FRAUD Vendor was not typical vendor profile Majority of vendors for this retailer were in North America Retailer did not prefer wire transfers Usually connected with bank rep by phone prior to transfer Impostor intercepted communication between retailer & vendor Sent request to change vendor bank information, which retailer changed without further confirmation 14

15 FIRST EXAMPLE OF CYBER ATTACK WIRE FRAUD Israeli bank U.S. bank Israeli manufacturer U.S. retailer Product FIRST EXAMPLE OF CYBER ATTACK WIRE FRAUD Israeli bank What money?? U.S. bank Kuala Lumpur bank Got it Where is my money?!? Sent it, I thought?? Impostor Israeli manufacturer U.S. retailer Product 15

16 FIRST EXAMPLE OF CYBER ATTACK WIRE FRAUD Total loss almost $400,000 One from impostor came 15 minutes after legitimate retailer sent purchase order, with same purchase order information (in different format) Numerous grammatical & spelling errors in communications from impostor, including first name of retailer representative Impostor was through a Yahoo account, yet initial communication between vendor & retailer representative was via company-specific address SECOND EXAMPLE OF CYBER ATTACK WIRE FRAUD Accounting department receives requesting change in bank account information was believed to be from customer Receives an additional requesting release of cash collateral Collateral wire transferred Receiving bank rejects wire due to an issue with receiving account number/name 16

17 UBIQUITI NETWORKS 2015 Accounting department receives s requesting wire transfers s came from an impersonator, acting as an executive Transfer of funds requested held by company subsidiary in Hong Kong to accounts held by impersonator(s) Potentially more than $40 million loss Around $14 million currently expected to be recovered through legal proceedings in foreign jurisdictions No insurance recovery available PREVENTION ACCOUNTING DEPT Training for accounting & bookkeeping personnel Have some form of verification process For example, call customer/vendor to verify change in account info or wire transfer instructions Double check addresses In previous examples, instructions involved or came from a different provider or domain than legitimate s 17

18 Buy Data Breach Insurance Coverage Today! QUESTIONS? 18

19 BKD FORENSICS INSTITUTE SCHEDULE Financial Games Played in Divorce Wednesday, October 21 Julia Mast, CPA, CFE Communicating Complex Data Effectively Wednesday, October 28 Jeremy R. Clopton, CPA, CFE, ACDA, CIDA Register at bkd.com/forensicsinstitute CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS BKD, LLP is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: The information in BKD webinars is presented by BKD professionals, but applying specific information to your situation requires careful consideration of facts & circumstances. Consult your BKD advisor before acting on any matters covered in these webinars. 19

20 CPE CREDIT CPE credit may be awarded upon verification of participant attendance For questions, concerns or comments regarding CPE credit, please the BKD Learning & Development Department at THANK YOU! FOR MORE INFORMATION Angela R. Morelock, CPA, CFE, CFF, ABV Partner 20

21 21

CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE 12/16/2015. December 17, 2015

CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE 12/16/2015. December 17, 2015 12/16/2015 CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE December 17, 2015 Angela R. Morelock, CPA, CFE, CFF, ABV Partner, BKD, LLP amorelock@bkd.com Jeff Eiserman

More information

THE EVOLUTION OF CYBERSECURITY

THE EVOLUTION OF CYBERSECURITY THE EVOLUTION OF CYBERSECURITY Identifying Best Practices June 2, 2015 Cerone F. Cy Sturdivant Managing Consultant Nashville, TN 1 TO RECEIVE CPE CREDIT Participate in entire webinar Answer polls when

More information

DATA ANALYTICS. Finding Data from Farm to Fork February 11, 2016 2/10/2016

DATA ANALYTICS. Finding Data from Farm to Fork February 11, 2016 2/10/2016 DATA ANALYTICS Finding Data from Farm to Fork February 11, 2016 Jeremy R. Clopton, CPA, CFE, ACDA, CIDA Director Forensics & Valuation Services jclopton@bkd.com 1 TO RECEIVE CPE CREDIT Participate in entire

More information

FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE

FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE CPAs & ADVISORS experience reach // S. Todd Burchett, CPA, ABV, ASA, CFF, CFE Partner tburchett@bkd.com 210.268.1932 AGENDA

More information

CYBERSECURITY & EXPECTATIONS FOR INDEPENDENT GROCERS

CYBERSECURITY & EXPECTATIONS FOR INDEPENDENT GROCERS October 21, 2015 CYBERSECURITY & EXPECTATIONS FOR INDEPENDENT GROCERS Cerone F. Cy Sturdivant Managing Consultant csturdivant@bkd.com 1 TO RECEIVE CPE CREDIT Participate in entire webinar Answer polls

More information

CYBERSECURITY INVESTIGATIONS

CYBERSECURITY INVESTIGATIONS CYBERSECURITY INVESTIGATIONS Planning & Best Practices May 4, 2016 Lanny Morrow, EnCE Managing Consultant lmorrow@bkd.com Cy Sturdivant, CISA Managing Consultant csturdivant@bkd.com Michal Ploskonka, CPA

More information

Perp Poetry. Fraud & Embezzlement: Lessons From the Trenches. Presented by. acumen insight. ideas attention reach. expertise depth agility talent

Perp Poetry. Fraud & Embezzlement: Lessons From the Trenches. Presented by. acumen insight. ideas attention reach. expertise depth agility talent acumen insight Fraud & Embezzlement: Lessons From the Trenches ideas attention reach Presented by Angela Morelock, CPA, CFE, CFF, ABV, Certified Forensic Accountant www.bkdforensics.com expertise depth

More information

Your Single Source. for credit, debit and pre-paid services. Fraud Risk and Mitigation

Your Single Source. for credit, debit and pre-paid services. Fraud Risk and Mitigation Your Single Source for credit, debit and pre-paid services Fraud Risk and Mitigation Agenda Types of Fraud Fraud Identification Notifications Next Steps 11/8/2013 2 Types of Fraud Lost and Stolen Cards

More information

ACA IRS INFORMATION REPORTING: WHAT DO I NEED TO KNOW?

ACA IRS INFORMATION REPORTING: WHAT DO I NEED TO KNOW? CPAs & ADVISORS ACA IRS INFORMATION REPORTING: WHAT DO I NEED TO KNOW? TO RECEIVE CPE CREDIT Participate in entire webinar Answer polls when they are provided If you are viewing this webinar in a group

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

To Receive CPE Credit

To Receive CPE Credit Outcome Metrics for National Associations November 17, 2015 To Receive CPE Credit Participate in entire webinar Answer attendance checks & polls when they are provided If you are viewing this webinar in

More information

The need for a secure & trusted payment instrument in e-commerce. Ali AlMeshal

The need for a secure & trusted payment instrument in e-commerce. Ali AlMeshal The need for a secure & trusted payment instrument in e-commerce Ali AlMeshal In Physical/Real World Hand over card Visual check Swipe in POS Online authorization Receipt with signature panel Sign or Pin

More information

Top Ten Fraud Risks That Impact Your Financial Institution. Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC.

Top Ten Fraud Risks That Impact Your Financial Institution. Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC. Top Ten Fraud Risks That Impact Your Financial Institution Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC Agenda Education on understanding the fraud risk Take away.. Education to

More information

Deception scams drive increase in financial fraud

Deception scams drive increase in financial fraud ADDRESS 2 Thomas More Square London E1W 1YN WEBSITE www.financialfraudaction.org.uk DIRECT LINE 020 3217 8436 NEWS RELEASE EMAIL press@ukcards-ffauk.org.uk Deception scams drive increase in financial fraud

More information

SNF Medicare Billing Frequently Asked Questions

SNF Medicare Billing Frequently Asked Questions CPAs & ADVISORS experience clarity // SNF Medicare Billing Frequently Asked Questions HEALTH CARE GROUP Julie Bilyeu, Director Lisa McIntire, CPA, Senior Managing Consultant TO RECEIVE CPE CREDIT Individual

More information

Cybersecurity: Protecting Your Business. March 11, 2015

Cybersecurity: Protecting Your Business. March 11, 2015 Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks

More information

Anatomy of a Hotel Breach

Anatomy of a Hotel Breach Page 1 of 6 Anatomy of a Hotel Breach Written by Sandy B. Garfinkel Monday, 09 June 2014 15:22 Like 0 Tweet 0 0 Data breach incidents have dominated the news in 2014, and they are only becoming more frequent

More information

DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH

DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH Andy Watson Grant Thornton LLP. All rights reserved. CYBERSECURITY 2 SURVEY OF CHIEF AUDIT EXECUTIVES (CAEs) GRANT THORNTON'S 2014 CAE SURVEY Data privacy and

More information

Leveraging Big Data to Mitigate Health Care Fraud Risk

Leveraging Big Data to Mitigate Health Care Fraud Risk Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud

More information

The Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016

The Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016 The Future of Data Breach Risk Management Response and Recovery Increasing electronic product life and reliability The Cybersecurity Forum April 14, 2016 Today s Topics About Merchants Information Solutions,

More information

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123 Cybersecurity: A Growing Concern for Small Businesses Copyright Materials This presentation is protected by US and International Copyright

More information

Making Your Fraud Vision 20 / 20. Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner FOS tstrause@fosaudit.

Making Your Fraud Vision 20 / 20. Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner FOS tstrause@fosaudit. Making Your Fraud Vision 20 / 20 Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner tstrause@fosaudit.com 610-603-5603 Topics to be Covered + Summary of Fraud Statistics ACFE 2014 Report + Current

More information

CYBERCRIME: What your Bank should be doing to Protect your Business. David Pollino Senior Vice President Fraud Prevention Officer

CYBERCRIME: What your Bank should be doing to Protect your Business. David Pollino Senior Vice President Fraud Prevention Officer CYBERCRIME: What your Bank should be doing to Protect your Business David Pollino Senior Vice President Fraud Prevention Officer Agenda Changing Landscape Case of Efficient Services Escrow Group Six key

More information

How To Help Protect Yourself From Identity Theft

How To Help Protect Yourself From Identity Theft How To Help Protect Yourself From Identity Theft January 20, 2015 Bryan Strong Senior Vice President and Director Information Security This complimentary interactive webinar is sponsored by Zions Bank

More information

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. RECENT DATA BREACHES This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. Data security is a number one priority at Northwest. We take every

More information

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015 Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders

More information

Click to edit Master title style

Click to edit Master title style EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity

More information

THIRD-PARTY RISK: HOW TO BETTER UTILIZE ENERGY VENDOR AUDITS 8/25/2015. August 27, 2015

THIRD-PARTY RISK: HOW TO BETTER UTILIZE ENERGY VENDOR AUDITS 8/25/2015. August 27, 2015 8/25/2015 THIRD-PARTY RISK: HOW TO BETTER UTILIZE ENERGY VENDOR AUDITS August 27, 2015 Shane Torkelson, CPE, CISA, CIA Director Enterprise Risk Solutions storkelson@bkd.com 1 TO RECEIVE CPE CREDIT Participate

More information

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow Anatomy of a Breach: A case study in how to protect your organization Presented By Greg Sparrow Agenda Background & Threat landscape Breach: A Case Study Incident Response Best Practices Lessons Learned

More information

Why Data Security is Critical to Your Brand

Why Data Security is Critical to Your Brand Why Data Security is Critical to Your Brand Why security is critical to your brand Cybercriminals do not discriminate based on industry or business size. Security is expensive. At least, it is if you wait

More information

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations

More information

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 Cybersecurity: A Growing Concern for All Businesses RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 RLI Design Professionals is a Registered Provider with The American

More information

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008 Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities

More information

Using Navigation List Builder with Dynamics GP. Charles Allen Managing Consultant BKD Technologies callen@bkd.com

Using Navigation List Builder with Dynamics GP. Charles Allen Managing Consultant BKD Technologies callen@bkd.com Using Navigation List Builder with Dynamics GP Charles Allen Managing Consultant BKD Technologies callen@bkd.com To Receive CPE Credit Participate in entire webinar Answer polls when they are provided

More information

IRS & Partners Combat Tax-Related Identity Theft What s New for 2016

IRS & Partners Combat Tax-Related Identity Theft What s New for 2016 IRS & Partners Combat Tax-Related Identity Theft What s New for 2016 General Scope of Identity Theft Identity theft costs U.S. victims more than all property crimes combined Identity theft remains number

More information

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account

More information

Top Fraud Trends Facing Financial Institutions

Top Fraud Trends Facing Financial Institutions Top Fraud Trends Facing Financial Institutions Presented on: October 7, 2015, 2-3 ET Presented by: Ann Davidson - VP of Risk Consulting at Allied Solutions Webinar Agenda 1. Fraud trends in 2015 and beyond

More information

Reclaiming your identity

Reclaiming your identity Reclaiming your identity A resource for victims of identity theft If you think you are the victim of identity theft, use this resource guide to assist you in reclaiming your identity. You will find a checklist

More information

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit

More information

IT Security Community

IT Security Community IT Security Community Who are we? The CompTIA IT Security is a group focused on the changing security issues of today. Who should join? Anyone looking to stay current with the ever- changing security landscape.

More information

Cybersecurity Best Practices in Mortgage Banking. Article by Jim Deitch October 2015

Cybersecurity Best Practices in Mortgage Banking. Article by Jim Deitch October 2015 Cybersecurity Best Practices in Mortgage Banking Article by Jim Deitch Cybersecurity Best Practices in Mortgage Banking BY JIM DEITCH Jim Deitch Recent high-profile cyberattacks have clearly demonstrated

More information

PREPARING FOR EMR PROGRAM SUCCESS IN 2016 12/10/2015. December 15, 2015. Travis Skinner, CPA Senior Managing Consultant tskinner@bkd.

PREPARING FOR EMR PROGRAM SUCCESS IN 2016 12/10/2015. December 15, 2015. Travis Skinner, CPA Senior Managing Consultant tskinner@bkd. PREPARING FOR EMR PROGRAM SUCCESS IN 2016 December 15, 2015 Travis Skinner, CPA Senior Managing Consultant tskinner@bkd.com Michael Orr, CPA Director morr@bkd.com David McDonald, CPA Director dmcdonald@bkd.com

More information

EMERGING TRENDS IN FRAUD: CRIMINALS HAVE FOUND THE WEAKEST LINK

EMERGING TRENDS IN FRAUD: CRIMINALS HAVE FOUND THE WEAKEST LINK EMERGING TRENDS IN FRAUD: CRIMINALS HAVE FOUND THE WEAKEST LINK Fraud Investigations Division: Global Security & Investigations Ed Cook Executive Director Regional Investigations Objectives: Provide a

More information

Data Security, Fraud Prevention, and Cost Control. Mike Dorland, CPP Regional Marketing Representative Michigan Retailers Association

Data Security, Fraud Prevention, and Cost Control. Mike Dorland, CPP Regional Marketing Representative Michigan Retailers Association Data Security, Fraud Prevention, and Cost Control Mike Dorland, CPP Regional Marketing Representative Michigan Retailers Association Michigan Retailers Association Incorporated in 1940 Represent retail

More information

http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html

http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html Identity Theft: Steps to Take if You are a Victim We understand the stress, time and effort required as a result of having your identity stolen and used fraudulently. While there are many resources available

More information

Langara College PCI Awareness Training

Langara College PCI Awareness Training Langara College PCI Awareness Training Have you heard of PCI? Due to the increase of credit card fraud and identity theft, major credit card companies like Visa, MasterCard and Amex have formed a security

More information

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days) Course introduction It is vital to ensure that your business is protected against the threats of fraud and cyber crime and that operational risk processes are in place. This three-day course provides an

More information

Cybersecurity. Are you prepared?

Cybersecurity. Are you prepared? Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data

More information

Don t Fall Victim to Cybercrime:

Don t Fall Victim to Cybercrime: Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security

More information

Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc.

Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc. Payment Methods The cost of doing business Michelle Powell - BASYS Processing, Inc. You ve got to spend money, to make money Major Industry Topics Industry Process Flow PCI DSS Compliance Risks of Non-Compliance

More information

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE?

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE? 1. WHAT HAPPENED (2015 UPDATE)? Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 2. WHAT IS THE ARCHDIOCESE DOING ABOUT THIS? 3. WHAT WERE THE RESULTS OF THE INVESTIGATIONS?

More information

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014 CYBER LIABILITY Network Security and Privacy Bring on tomorrow May 15, 2014 1 AGENDA I. Identify Exposures II. Identify how a breach can occur III. The Coverage (Third Party Liability + First Party Losses)

More information

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA IT TRENDS AND FUTURE CONSIDERATIONS Paul Rainbow CPA, CISA, CIA, CISSP, CTGA AGENDA BYOD Cloud Computing PCI Fraud Internet Banking Questions The Mobile Explosion Mobile traffic data in 2011 was nearly

More information

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved

More information

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009 AIS Webinar Payment Application Security Hap Huynh Business Leader Visa Inc. 1 April 2009 1 Agenda Security Environment Payment Application Security Overview Questions and Comments Payment Application

More information

IBN Financial Services, Inc. Identity Theft Prevention Program(ITPP) under the FTCFACTActRedFlagsRule

IBN Financial Services, Inc. Identity Theft Prevention Program(ITPP) under the FTCFACTActRedFlagsRule IBN Financial Services, Inc. Identity Theft Prevention Program(ITPP) under the FTCFACTActRedFlagsRule I. Firm Policy Our firm s policy is to protect our customers and their accounts from identity theft

More information

To Receive CPE Credit

To Receive CPE Credit Revisions to Loan Originator Compensation & Qualifications Under TILA Nancy Schoolman Senior Managing Consultant nschoolman@bkd.com 314.231.9844 Sheldon Hendrix Managing Consultant shendrix@bkd.com 713.499.4600

More information

Sending money abroad. Plain text guide

Sending money abroad. Plain text guide Sending money abroad Plain text guide Contents Introduction 2 Ways to make international payments 3 Commonly asked questions 5 What is the cost to me of sending money abroad? 5 What is the cost to the

More information

AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA

AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA Australian Payments Clearing Association AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA 214 Australian Payments Clearing Association Limited ABN 12 55 136 519 CONTENTS OVERVIEW 1 SECTION 1 Fraud rates 4 SECTION

More information

Identity Theft Repair Kit

Identity Theft Repair Kit Identity Theft Repair Kit The Identity Theft Repair Kit contains a resolution checklist and resolution worksheets. The checklist will help you keep track of the companies and organizations you should contact

More information

Phishing for Fraud: Don't Let your Company Get Hooked!

Phishing for Fraud: Don't Let your Company Get Hooked! Phishing for Fraud: Don't Let your Company Get Hooked! March 2009 Approved for 1 CTP/CCM recertification credit by the Association for Financial Professionals 1 Today s Speakers: Joe Potuzak is Senior

More information

Fraud and Identity Theft. Megan Stearns, Credit Counselor

Fraud and Identity Theft. Megan Stearns, Credit Counselor Fraud and Identity Theft Megan Stearns, Credit Counselor Agenda Fraud and identity theft statistics Fraud Identity theft Identity theft prevention Protecting your Social Security Number Online prevention

More information

Common Data Breach Threats Facing Financial Institutions

Common Data Breach Threats Facing Financial Institutions Last Updated: February 25, 2015 Common Data Breach Threats Facing Financial s Although exact figures are elusive, there is no question that the number of data security breaches both reported and unreported

More information

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies

More information

Cybersecurity Workshop

Cybersecurity Workshop Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153

More information

Payment Card Industry Update and Cyber Risk Management

Payment Card Industry Update and Cyber Risk Management Payment Card Industry Update and Cyber Risk Management CRAIG A. HOFFMAN, ESQ. BAKERHOSTETLER ADAM COTTINI, MANAGING DIRECTOR, CYBER LIABILITY PRACTICE, ARTHUR J GALLAGHER & CO. OCTOBER 22, 2015 2014 ARTHUR

More information

Visa global Compromised Account

Visa global Compromised Account Visa global Compromised Account RECOVERY PROGRAM WHAT EVERY MERCHANT SHOULD KNOW ABOUT GCAR WHAT EVERY MERCHANT SHOULD KNOW ABOUT GCAR WHAT The Visa Global Compromised Account Recovery (GCAR) program offers

More information

How To File An Identity Theft Complaint And Affidavit

How To File An Identity Theft Complaint And Affidavit Average time to complete: 10 minutes Identity Theft Victims Complaint and Affidavit A voluntary form for filing a report with law enforcement and disputes with credit reporting agencies and creditors about

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

Questions You Should be Asking NOW to Protect Your Business!

Questions You Should be Asking NOW to Protect Your Business! Questions You Should be Asking NOW to Protect Your Business! Angi Farren, AAP Senior Director Jen Wasmund, AAP Compliance Services Specialist 31 st Annual Conference SHAPE YOUR FUTURE April 23, 2013 Regional

More information

Payment Card Security

Payment Card Security Payment Card Security January 31, 2008 Kieran Norton, Senior Manager Security & Privacy Services, Deloitte & Touche LLP Focus of the Presentation PCI Overview Background Current Environment Key Considerations

More information

Identity Theft Victims Universal Complaint Form (FTC)

Identity Theft Victims Universal Complaint Form (FTC) Average time to complete: 10 minutes A voluntary form for filing a report with law enforcement and disputes with credit reporting agencies and creditors about identity theft-related problems. Visit ftc.gov/idtheft

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

OIG Fraud Alert Phishing

OIG Fraud Alert Phishing U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a

More information

Payments Fraud: It's Not Fun & Games

Payments Fraud: It's Not Fun & Games Payments Fraud: It's Not Fun & Games Claudia Swendseid Senior Vice President Payments Information & Outreach Office Federal Reserve Bank of Minneapolis NACHA Payments 2015 Claudia Swendseid Senior Vice

More information

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Jeremy Ong Divisional Vice-President Great American Insurance Company November 13, 2010 1 Agenda Overview of data breach statistics

More information

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.

More information

White Paper: Are there Payment Threats Lurking in Your Hospital?

White Paper: Are there Payment Threats Lurking in Your Hospital? White Paper: Are there Payment Threats Lurking in Your Hospital? With all the recent high profile stories about data breaches, payment security is a hot topic in healthcare today. There s been a steep

More information

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP Changing Legal Landscape in Cybersecurity: Implications for Business Delaware Cyber Security Workshop September 29, 2015 William R. Denny, Esquire Potter Anderson & Corroon LLP Agenda Growing Cyber Threats

More information

Evaluating DMARC Effectiveness for the Financial Services Industry

Evaluating DMARC Effectiveness for the Financial Services Industry Evaluating DMARC Effectiveness for the Financial Services Industry by Robert Holmes General Manager, Email Fraud Protection Return Path Executive Summary Email spoofing steadily increases annually. DMARC

More information

Fraud Prevention Checklist for Small Businesses

Fraud Prevention Checklist for Small Businesses Fraud Prevention Checklist for Small Businesses 11 Ways to Minimize the Risk and Impact PAYMENT SOLUTIONS Fraud can have a devastating impact on small businesses. Prevention and mitigation strategies can

More information

INTERNET AUCTIONS A G FOR BUYERS AND SELLERS. www.ftc.gov 1-877-FTC-HELP FEDERAL TRADE COMMISSION FOR THE CONSUMER

INTERNET AUCTIONS A G FOR BUYERS AND SELLERS. www.ftc.gov 1-877-FTC-HELP FEDERAL TRADE COMMISSION FOR THE CONSUMER AUCTIONS INTERNET A G A GUIDE FOR BUYERS AND SELLERS FEDERAL TRADE COMMISSION FOR THE CONSUMER 1-877-FTC-HELP www.ftc.gov Inside Auction Rules... 2 Payment Options... 3 Online Payment Services... 4 Online

More information

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Maggie Romaniello SL Field Area Manger

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Maggie Romaniello SL Field Area Manger Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Glenn Gizzi Senior Stakeholder Liaison Robert Glantz Criminal Investigator Maggie Romaniello SL Field Area Manger What is

More information

RETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015

RETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015 RETHINKING ORC: NRF S CYBER SECURITY EFFORTS OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015 No Organization is Secure Source: http://www.informationisbeautiful.net An Average

More information

Preventing, Insuring, and Surviving Fund Transfer Fraud... and Other Cyber Attacks

Preventing, Insuring, and Surviving Fund Transfer Fraud... and Other Cyber Attacks Preventing, Insuring, and Surviving Fund Transfer Fraud... and Other Cyber Attacks Nick Merker, CISSP, CIPT Stephen Reynolds, CISSP, CIPP/US Nick Reuhs Attorneys at Ice Miller LLP IceonFire Fund Transfer

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC Cyber Security CHAD KNUTSON SECURE BANKING SOLUTIONS 2014 SECURE BANKING SOLUTIONS, LLC Presenter Chad Knutson Senior Information Security Consultant Masters in Information Assurance CISSP (Certified Information

More information

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more

More information

2015 Visa Payment Security Symposium Webinar

2015 Visa Payment Security Symposium Webinar The Power of Partnership AUGUST 12-13 HYATT REGENCY BURLINGAME, CA 2015 Visa Payment Security Symposium Webinar Diana Greenhaw Sr. Director, Global Data Security and Third Party Risk Lester Chan Director,

More information

BENEFITS OF A CLOUD ERP SYSTEM April 12, 2016

BENEFITS OF A CLOUD ERP SYSTEM April 12, 2016 BENEFITS OF A CLOUD ERP SYSTEM April 12, 2016 Ricardo de Rojas Senior Managing Consultant rderojas@bkd.com Colleen Gutirrez Senior Consultant II cgutirrez@bkd.com 1 TO RECEIVE CPE CREDIT Participate in

More information

1. Ask what your financial institution knows or has personally experienced with regard to internal and external data breaches.

1. Ask what your financial institution knows or has personally experienced with regard to internal and external data breaches. Part 1: Internal & External Data Breach Vulnerabilities Presented on: Thursday, February 12, 2 3 ET Co presented by: Ann Davidson VP of Risk Consulting at Allied Solutions Joe Majka CSO at Verifone 1 Breakdown

More information

HOME DEPOT DATA BREACH

HOME DEPOT DATA BREACH HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data

More information

Target Security Breach

Target Security Breach Target Security Breach Lessons Learned for Retailers and Consumers 2014 Pointe Solutions, Inc. PO Box 41, Exton, PA 19341 USA +1 610 524 1230 Background In the aftermath of the Target breach that affected

More information

Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner

Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner Check Fraud Hand-Out Despite the heavy use of credit cards and

More information

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title

More information

NATIONAL ASSOCIATION OF MANUFACTURERS END OF THE YEAR TAX UPDATE

NATIONAL ASSOCIATION OF MANUFACTURERS END OF THE YEAR TAX UPDATE Wednesday December 17, 2014 2 3 PM Central Time NATIONAL ASSOCIATION OF MANUFACTURERS END OF THE YEAR TAX UPDATE Carolyn Lee Senior Director, Tax Policy National Association of Manufacturers CLee@nam.org

More information

5 Important Controls to Mitigate Employee Fraud

5 Important Controls to Mitigate Employee Fraud 5 Important Controls to Mitigate Employee Fraud LMCIT WEBINAR : FEBRUARY 10, 2015 IN PARTNERSHIP WITH EIDE BAILLY Presenter: Jason Olson, MBA, CPA/CFF, CFE, CFI Presentation Disclaimer These seminar materials

More information

STATE INTERNAL AUDIT ADVISORY BOARD

STATE INTERNAL AUDIT ADVISORY BOARD CPAs & ADVISORS experience perspective // STATE INTERNAL AUDIT ADVISORY BOARD Presented by Jeremy Clopton, CPA, CFE, ACDA DATA ANALYTICS FOR FRAUD DETECTION CPAs & ADVISORS experience perspective // 2//

More information

US House Energy and Commerce Committee. Commerce, Manufacturing, and Trade Subcommittee

US House Energy and Commerce Committee. Commerce, Manufacturing, and Trade Subcommittee US House Energy and Commerce Committee Commerce, Manufacturing, and Trade Subcommittee Protecting Consumer Information: Can Data Braches Be Prevented? February 5, 2014 Congressmen in Attendance: Rep. Lee

More information