Emerging Trends in Fraud Analytics:

Size: px
Start display at page:

Download "Emerging Trends in Fraud Analytics:"

Transcription

1 Global Risk Advisory Services Emerging Trends in Fraud Analytics: Accounting for Words Text Analytics is a promising new forensic technique for the investigator 4 th Annual Text Analytics Summit Vincent Walden, CFE, CPA Pavan Jankiraman, CFE 2008 Ernst & Young LLP. All rights reserved. For Internal Use Within E&Y Only; Not for Distribution to Clients.

2 Topics About Unstructured (Text) Data Text Analytics Defined Practical Applications Proposed Methodology Risk Advisory Services 1

3 About Unstructured (Text) Data Risk Advisory Services 2

4 Data: Electronically Stored Information ( ESI ) Structured Databases Accounting Systems / GL CRM Numbers-Based Unstructured Documents Presentations & Graphics Text-Based Risk Advisory Services 3

5 ESI in Today s Organization Text Graphics CRM Databases Accounting Systems Spreadsheets 80% Unstructured Data Presentations Source: Gartner Research 20% 80% Risk Advisory Services 4

6 Risk Considerations Brand or reputation damage due to leak of unstructured data Legal implications as a result of a data breach containing customer information Personal Data Privacy & Security Act and the Notification of Risk to Personal Data Act Increased risk of legal exposure due to discovery Federal Rules of Civil Procedures (ediscovery) Loss or misuse of confidential or trade secret data due to inappropriate protection Risk Advisory Services 5

7 How Important is Text? O.K. let s review what you didn t know and when you didn t know it. Risk Advisory Services 6

8 Text Analytics Defined Risk Advisory Services 7

9 Text Analytics: Tools & technologies that seek to identify, classify and parse words in electronic documents. Native (original electronic) documents Scanned (including paper) documents Text Analytics Cataloguing Indexing Filtering Audit Trail Central Repository Risk Advisory Services 8 Analysis & Reports

10 Practical Applications Risk Advisory Services 9

11 Practical Applications Pro-Active Fraud Detection FCPA Mergers & Acquisitions Transaction Due Diligence Identification of High Risk Departments Journal Entry Analysis Cost Accounting Data Repository Audits / Compliance Testing Risk Advisory Services 10

12 Data Repository Audits / Compliance Testing Create rules from ERM Policies and Procedures Enterprise Records Management Policies & Procedures Remediation CLASSIFICATION CATEGORIES Test Categories With Text Analytics Environment Retention Policy Legal Retention Policy Accounting Retention Policy Human Resources Retention Policy Engineering Retention Policy Determine Root Cause Identify Data Categorized Incorrectly Risk Advisory Services 11

13 Proposed Methodology & Analytics Risk Advisory Services 12

14 Text Analytics Methodology Step 1: Step 2: Step 3: Step 4: Step 5: Assess Key Business Risks & Co-Develop Expectations Identify & Collect Key Custodian Data Sources Process Text Data & Stage for Analysis Conduct Online Review of Text Communicate Results Week: One - Two Three Four Five Risk Advisory Services 13

15 Text Analytics Methodology Step 1: Step 2: Step 3: Step 4: Step 5: Assess Key Business Risks & Co-Develop Expectations Identify & Collect Key Custodian Data Sources Process Text Data & Stage for Analysis Conduct Online Review of Text Communicate Results Week: One - Two Three Four Five Risk Advisory Services 14

16 Risk Assessment Heat Map Prioritize by: Likelihood of Occurrence Business Impact Risk Advisory Services 15

17 Text Analytics Methodology Step 1: Step 2: Step 3: Step 4: Step 5: Assess Key Business Risks & Co-Develop Expectations Identify & Collect Key Custodian Data Sources Process Text Data & Stage for Analysis Conduct Online Review of Text Communicate Results Week: One - Two Three Four Five Risk Advisory Services 16

18 Identify Key Data Sources Drill Down Risk Advisory Services 17

19 Text Analytics Methodology Step 1: Step 2: Step 3: Step 4: Step 5: Assess Key Business Risks & Co-Develop Expectations Identify & Collect Key Custodian Data Sources Process Text Data & Stage for Analysis Conduct Online Review of Text Communicate Results Week: One - Two Three Four Five Risk Advisory Services 18

20 Text Analytics Methodology Step 1: Step 2: Step 3: Step 4: Step 5: Assess Key Business Risks & Co-Develop Expectations Identify & Collect Key Custodian Data Sources Process Text Data & Stage for Analysis Conduct Online Review of Text Communicate Results Week: One - Two Three Four Five Risk Advisory Services 19

21 Text Analytics Identifies the Who, What & When WHO? WHAT? WHEN? Risk Advisory Services 20

22 Text Analytics Identifies the Who, What & When WHO? WHAT? WHEN? Risk Advisory Services 21

23 Who is Communicating With Whom? Who is communicating with whom the most? Risk Advisory Services 22 Who is Joe talking to related to a particular subject matter?

24 Sentiment Analysis Sentiment by Concept Sentiment by Keyword and Person Risk Advisory Services 23

25 Text Analytics Identifies the Who, What & When WHO? WHAT? WHEN? Risk Advisory Services 24

26 What is Being Communicated? Term frequency within the data. Entity Extraction: Top dollar amounts, people, places, names, phone numbers, etc. Risk Advisory Services 25

27 What is Being Communicated? Real life example of clustering for an FCPA investigation Risk Advisory Services 26

28 What is Being Communicated? Real life example of clustering for an FCPA investigation Risk Advisory Services 27

29 What is Being Communicated? List of Key Concepts Frequency of Key Concepts Mentioned In Risk Advisory Services 28

30 More Like This ML Select interesting content Pull back similar documents More Like This Risk Advisory Services 29

31 Text Analytics Identifies the Who, What & When WHO? WHAT? WHEN? Risk Advisory Services 30

32 When are Key Communications Occurring Communication frequency by topic and/or individuals Risk Advisory Services 31

33 Text Analytics Methodology Step 1: Step 2: Step 3: Step 4: Step 5: Assess Key Business Risks & Co-Develop Expectations Identify & Collect Key Custodian Data Sources Process Text Data & Stage for Analysis Conduct Online Review of Text Communicate Results Week: One - Two Three Four Five Risk Advisory Services 32

34 Don t Let This Happen To You Still, I think we can all take some pride in being one of the signature bankruptcies of our time. Risk Advisory Services 33

35 Questions & Answers Vincent Walden ERNST & YOUNG LLP Ernst & Young All Rights Reserved. Ernst & Young is a registered trademark.

Taking Data Analytics to the Next Level

Taking Data Analytics to the Next Level Taking Data Analytics to the Next Level Implementing and Supporting Big Data Initiatives What Is Big Data and How Is It Applicable to Anti-Fraud Efforts? 2 of 20 Definition Gartner: Big data is high-volume,

More information

Demystifying Big Data Analytics

Demystifying Big Data Analytics Demystifying Big Data Analytics Practical approaches to business intelligence and forensic analytics 9 May 2013 Discussion topics Big Data & Big Data Analytics Current fraud risks - industry research Components

More information

ERM Symposium April 2009. Moderator Nancy Bennett

ERM Symposium April 2009. Moderator Nancy Bennett ERM Symposium April 2009 RI4-Implementing a Comprehensive Privacy Program John Kelly Joseph Nocera Moderator Nancy Bennett Data & Identity Theft: Keeping sensitive data out of the wrong hands Presented

More information

Using Data Analytics to Detect Fraud. Other Data Analysis Techniques

Using Data Analytics to Detect Fraud. Other Data Analysis Techniques Using Data Analytics to Detect Fraud Other Data Analysis Techniques Qualitative Data Analysis Most data analysis techniques require the use of data in the form of numbers. Qualitative data analysis is

More information

IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk

IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk Amir Jaibaji - Product Management Program Director IBM Information Lifecycle Governance IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk Enterprise big

More information

Understanding How Service Providers Charge for ediscovery Services

Understanding How Service Providers Charge for ediscovery Services ediscovery SERVICES Understanding How Service Providers Charge for ediscovery Services The objective of this document is to briefly define the prominent phases of the ediscovery lifecycle, the fees associated

More information

Using Data Analytics to Detect Fraud

Using Data Analytics to Detect Fraud Using Data Analytics to Detect Fraud Gerard M. Zack, CFE, CPA, CIA, CCEP Introduction to Data Analytics CPE Instructions Course Objectives How data analytics can be used to detect fraud Different tools

More information

Neil Meikle, Associate Director, Forensic Technology, PwC

Neil Meikle, Associate Director, Forensic Technology, PwC Case Study: Big Data Forensics Neil Meikle, Associate Director, Forensic Technology, PwC 6 November 2012 About me Transferred to Kuala Lumpur from PwC s Forensic Technology practice in London, England

More information

Fraud Triangle Analytics Anti-Fraud Research and Methodologies

Fraud Triangle Analytics Anti-Fraud Research and Methodologies Fraud Triangle Analytics Anti-Fraud Research and Methodologies Risk Management Committee Meeting American Hotel & Lodging Association November 18, 2009 Topics for discussion Why incorporate fraud detection

More information

IBM Policy Assessment and Compliance

IBM Policy Assessment and Compliance IBM Policy Assessment and Compliance Powerful data governance based on deep data intelligence Highlights Manage data in-place according to information governance policy. Data topology map provides a clear

More information

Improving Unstructured Data Governance. Ryan Jancaitis Product Management Symantec

Improving Unstructured Data Governance. Ryan Jancaitis Product Management Symantec Improving Unstructured Data Governance Ryan Jancaitis Product Management Symantec Agenda 1 2 3 4 Overview Data Management Data Protection and Compliance Summary Unstructured Information Growth Leads to

More information

Global EY FIDS Forensic Data Analytics Survey 2014

Global EY FIDS Forensic Data Analytics Survey 2014 Global EY FIDS Forensic Data Analytics Survey 2014 Big risks require big data thinking The Eighth International Pharmaceutical Compliance Congress Dubai, United Arab Emirates Vincent Walden Partner, EY

More information

E-Discovery Basics For the RIM Professional. Learning Objectives 5/18/2015. What is Electronic Discovery?

E-Discovery Basics For the RIM Professional. Learning Objectives 5/18/2015. What is Electronic Discovery? E-Discovery Basics For the RIM Professional By: Andy Sokol, CEDS, CSDS Adding A New Service Offering For Your Legal & Corporate Clients Learning Objectives What is Electronic Discovery? How Does E-Discovery

More information

From ESI to EDRM. An Overview of Electronic Discovery

From ESI to EDRM. An Overview of Electronic Discovery From ESI to EDRM An Overview of Electronic Discovery From ESI to EDRM An Overview of Electronic Discovery Understanding ESI Defini&ons, Descrip&ons, and Drivers Understanding Electronic Discovery Tasks,

More information

Deloitte Analytics. Trusting big data: Perspective on data governance as a customer analytics investment

Deloitte Analytics. Trusting big data: Perspective on data governance as a customer analytics investment Deloitte Analytics Trusting big data: Perspective on data governance as a customer analytics investment Many companies are investing significant amounts in customer analytics to drive their business and

More information

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security

More information

Integrated Governance, Risk and Compliance (igrc) Approach

Integrated Governance, Risk and Compliance (igrc) Approach U.S. Department of Homeland Security (DHS) United States Secret Service (USSS) Integrated Governance, Risk and Compliance (igrc) Approach Concept Paper* *connectedthinking Provided to: Provided by: Mrs.

More information

ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS

ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS WELCOME Thank you for joining Numerous diverse attendees Today s topic and presenters This is an interactive presentation You will receive

More information

Information Lifecycle Governance. Surabhi Kapoor & Jan Lambrechts

Information Lifecycle Governance. Surabhi Kapoor & Jan Lambrechts Information Lifecycle Governance Surabhi Kapoor & Jan Lambrechts Information Lifecycle Governance Executive Overview 1 Introduction to Information Lifecycle Governance 2 It s no longer about one thing

More information

IBM ediscovery Identification and Collection

IBM ediscovery Identification and Collection IBM ediscovery Identification and Collection Turning unstructured data into relevant data for intelligent ediscovery Highlights Analyze data in-place with detailed data explorers to gain insight into data

More information

HiSoftware Policy Sheriff. SP HiSoftware Security Sheriff SP. Content-aware. Compliance and Security Solutions for. Microsoft SharePoint

HiSoftware Policy Sheriff. SP HiSoftware Security Sheriff SP. Content-aware. Compliance and Security Solutions for. Microsoft SharePoint HiSoftware Policy Sheriff SP HiSoftware Security Sheriff SP Content-aware Compliance and Security Solutions for Microsoft SharePoint SharePoint and the ECM Challenge The numbers tell the story. According

More information

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can

More information

IBM Unstructured Data Identification and Management

IBM Unstructured Data Identification and Management IBM Unstructured Data Identification and Management Discover, recognize, and act on unstructured data in-place Highlights Identify data in place that is relevant for legal collections or regulatory retention.

More information

Data Loss Prevention Program

Data Loss Prevention Program Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional

More information

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients

More information

ARMA CENTRAL IOWA APRIL 25, 2013 MAKING THE BUSINESS CASE FOR INFORMATION GOVERNANCE: MORE CARROT, LESS STICK

ARMA CENTRAL IOWA APRIL 25, 2013 MAKING THE BUSINESS CASE FOR INFORMATION GOVERNANCE: MORE CARROT, LESS STICK ARMA CENTRAL IOWA APRIL 25, 2013 MAKING THE BUSINESS CASE FOR INFORMATION GOVERNANCE: MORE CARROT, LESS STICK AGENDA The information imperative The time is NOW Why RIM Making the case for IG 2 THE INFORMATION

More information

3 MUST-HAVES IN PUBLIC SECTOR INFORMATION GOVERNANCE

3 MUST-HAVES IN PUBLIC SECTOR INFORMATION GOVERNANCE EXECUTIVE SUMMARY Information governance incorporates the policies, controls and information lifecycle management processes organizations and government agencies utilize to control cost and risk. With

More information

Integrating Data Analytics into Internal Audit

Integrating Data Analytics into Internal Audit Integrating Data Analytics into Internal Audit IIA Beach Cities Meeting May 19, 2011 Agenda Introductions Background Industry Perspective Benefits of Challenges in Examples / Case Studies Tools Of The

More information

WHITE PAPER. Stay ahead (of data leak) with Data Classification and Data Loss Prevention

WHITE PAPER. Stay ahead (of data leak) with Data Classification and Data Loss Prevention WHITE PAPER Stay ahead (of leak) with Data Classification and Data Loss Prevention STAY AHEAD (OF DATA LEAK) WITH RIGHTSWATCH AND DLP 2 Executive Summary Information breaches resulting from the disclosure

More information

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief RSA Solution Brief RSA Managing Data Loss the Lifecycle of Prevention Encryption Suite Keys with Uncover your risk, establish control. RSA Key Manager RSA Solution Brief 1 Executive Summary RSA Data Loss

More information

Gain control over all enterprise content

Gain control over all enterprise content Brochure Gain control over all enterprise content HP Autonomy ControlPoint Turning Big Data into little data Most organizations today store data in a number of business systems and information repositories.

More information

Delivering Smart Answers!

Delivering Smart Answers! Companion for SharePoint Topic Analyst Companion for SharePoint All Your Information Enterprise-ready Enrich SharePoint, your central place for document and workflow management, not only with an improved

More information

E- Discovery in Criminal Law

E- Discovery in Criminal Law E- Discovery in Criminal Law ! An e-discovery Solution for the Criminal Context Criminal lawyers often lack formal procedures to guide them through preservation, collection and analysis of electronically

More information

Information Technology: This Year s Hot Issue - Cloud Computing

Information Technology: This Year s Hot Issue - Cloud Computing Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.

More information

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review Accelerate e-discovery and simplify review Overview provides IT/Legal liaisons, investigators, lawyers, paralegals and HR professionals the ability to search, preserve and review information across the

More information

10 Building Blocks for Securing File Data

10 Building Blocks for Securing File Data hite Paper 10 Building Blocks for Securing File Data Introduction Securing file data has never been more important or more challenging for organizations. Files dominate the data center, with analyst firm

More information

How To Protect Your Data From Theft

How To Protect Your Data From Theft Understanding the Effectiveness of a Data Protection Program IIA: Almost Free Seminar 21 June 2011 Agenda Data protection overview Case studies Ernst & Young s point of view Understanding the effectiveness

More information

LGMA Qld Governance and Corporate Planning Village Forum

LGMA Qld Governance and Corporate Planning Village Forum www.pwc.com.au Fraud Risk Management Fraud Risk Assessments LGMA Qld Governance and Corporate Planning Village Forum March 2015 Agenda Introductions Fraud Risk Management Fraud Statistics s Global Economic

More information

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents WhitePaper Concise Guide to E-discovery Contents i. Overview ii. Importance of e-discovery iii. How to prepare for e-discovery? iv. Key processes & issues v. The next step vi. Conclusion Overview E-discovery

More information

Information Governance Manage in Place Use Cases Workshop

Information Governance Manage in Place Use Cases Workshop Information Governance Manage in Place Use Cases Workshop James Seeley Vice President, Governance Sales threat protection compliance archiving & governance secure communication Information Governance -

More information

WHITE PAPER IT S ALL ABOUT THE DATA

WHITE PAPER IT S ALL ABOUT THE DATA NUIX WHITE PAPER IT S ALL ABOUT THE DATA Applying a data-centric approach to ediscovery, investigation, cybersecurity, privacy and other enterprise information challenges by Angela Bunting, Director of

More information

HCCA Compliance Institute 2013 Privacy & Security

HCCA Compliance Institute 2013 Privacy & Security HCCA Compliance Institute 2013 Privacy & Security 704 Conducting a Privacy Risk Assessment A Practical Guide to the Performance, Evaluation and Response April 23, 2013 Presented By Eric Dieterich Session

More information

Forensic Audit Building a World Class Program

Forensic Audit Building a World Class Program Forensic Audit Building a World Class Program PAUL E. ZIKMUND DIRECTOR GLOBAL INTEGRITY AND FORENSIC AUDIT 1 2012 ACFE ANNUAL FRAUD CONFERENCE ORLANDO, FL Why the Need for Forensic Audit Program In response

More information

Putting IT at e s: Considerations for ediscovery, ECM, & ERM

Putting IT at e s: Considerations for ediscovery, ECM, & ERM Government IT June 25, 2008 Putting IT at e s: Considerations for ediscovery, ECM, & ERM Julie Gable Baron Gemmer Gable Consulting, ICS 2008 1 ESI: Not just documents Record Record Types Types File File

More information

Voice. listen, understand and respond. enherent. wish, choice, or opinion. openly or formally expressed. May 2010. - Merriam Webster. www.enherent.

Voice. listen, understand and respond. enherent. wish, choice, or opinion. openly or formally expressed. May 2010. - Merriam Webster. www.enherent. Voice wish, choice, or opinion openly or formally expressed - Merriam Webster listen, understand and respond May 2010 2010 Corp. All rights reserved. www..com Overwhelming Dialog Consumers are leading

More information

Information Governance for Social Business. Unleashing the Full Potential of Enterprise Social

Information Governance for Social Business. Unleashing the Full Potential of Enterprise Social Information Governance for Social Business Unleashing the Full Potential of Enterprise Social Executive Summary The Emergence Of Social Business Social business platforms have exploded onto the scene the

More information

Antifraud program and controls assessment grid*

Antifraud program and controls assessment grid* Advisory Services Antifraud program and * Fraud risks & controls February 2008 *connectedthinking 2008 PricewaterhouseCoopers LLP. All rights reserved. PricewaterhouseCoopers refers to PricewaterhouseCoopers

More information

Cohasset Associates, Inc. NOTES. 2014 Managing Electronic Records Conference 1.1. The discipline of analyzing the. Value Costs and Risks

Cohasset Associates, Inc. NOTES. 2014 Managing Electronic Records Conference 1.1. The discipline of analyzing the. Value Costs and Risks Understanding Today s Economics of Information Get Your Act Together Now! Sylvan Sibito H Morley III IBM Worldwide Director Information Lifecycle Governance Information Economics: The discipline of analyzing

More information

Information Technology General Controls And Best Practices

Information Technology General Controls And Best Practices Paul M. Perry, FHFMA, CITP, CPA Alabama CyberNow Conference April 5, 2016 Information Technology General Controls And Best Practices 1. IT General Controls - Why? 2. IT General Control Objectives 3. Documentation

More information

Cybersecurity and internal audit. August 15, 2014

Cybersecurity and internal audit. August 15, 2014 Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices

More information

The Impact of HIPAA and HITECH

The Impact of HIPAA and HITECH The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients

More information

EnCase ediscovery. Automatically search, identify, collect, preserve, and process electronically stored information across the network.

EnCase ediscovery. Automatically search, identify, collect, preserve, and process electronically stored information across the network. TM GUIDANCE SOFTWARE EnCASE ediscovery EnCase ediscovery Automatically search, identify, collect, preserve, and process electronically stored information across the network. GUIDANCE SOFTWARE EnCASE ediscovery

More information

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data

More information

From Chaos to Clarity.

From Chaos to Clarity. LITIGATION READINESS 3 PRESERVATION & COLLECTION 3 PROCESSING 3 DATA ANALYTICS 3 DOCUMENT REVIEW 3 PRODUCTION 3 POST PRODUCTION From Chaos to Clarity. The AlixPartners Difference Experienced. AlixPartners

More information

How To Understand And Understand Forensic Accounting

How To Understand And Understand Forensic Accounting Forensic Accounting and Investigations University of Texas at Arlington 14 August 2013 Overview What is Forensic Accounting? Definition and Services The Forensic Accountant History Roles Within Organizations

More information

The SharePoint Customer Journey Turn SharePoint into a Broadly Adopted Compliance and Security Asset

The SharePoint Customer Journey Turn SharePoint into a Broadly Adopted Compliance and Security Asset The SharePoint Customer Journey Turn SharePoint into a Broadly Adopted Compliance and Security Asset Eric Darbe Vice President of Marketing HiSoftware Agenda What if? The compliance and security case for

More information

EMC SourceOne Email Management and ediscovery Overview

EMC SourceOne Email Management and ediscovery Overview EMC SourceOne Email Management and ediscovery Overview Deanna Hoover EMC SourceOne Systems Engineer 1 Agenda Value of Good Information Governance Introduction to EMC SourceOne Information Governance Email

More information

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA Compliance: Are you prepared for the new regulatory changes? HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed

More information

Web Protection for Your Business, Customers and Data

Web Protection for Your Business, Customers and Data WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision

More information

E-Discovery Best Practices

E-Discovery Best Practices José Ramón González-Magaz jrgonzalez@steptoe.com E-Discovery Best Practices www.steptoe.com November 10, 2010 Importance of E-Discovery 92% of all data is ESI. Source: Berkeley Study. 97 billion e-mails

More information

The Importance of Information Governance and Risk Management

The Importance of Information Governance and Risk Management Information Governance what it is and how it relates to your customers Julie J. Colgan, IGP, CRM 2015 PRISM Annual Conference How much of the world s data was created in the last 2 years? 30% 50% 70% 90%

More information

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview

More information

DIGITAL PRINTING/ DEMONSTRATIVE EVIDENCE PRODUCTION SUPPORT FACILITY

DIGITAL PRINTING/ DEMONSTRATIVE EVIDENCE PRODUCTION SUPPORT FACILITY DIGITAL PRINTING/ DEMONSTRATIVE EVIDENCE DIGITAL PRINTING Our Digital Printing tools include: To assist with bringing a visual element to your litigation or your marketing efforts, VDS has a full service

More information

STI GROUP DISCUSSION WRITTEN PROJECT

STI GROUP DISCUSSION WRITTEN PROJECT STI GROUP DISCUSSION WRITTEN PROJECT ediscovery FOR GIAC ENTERPRISES - DATA CLASSIFICATION, RETENTION, AND LITIGATION POLICIES AND PROCEDURES Version 1.1 September 22, 2007 Team: Russell Meyer, Brad Ruppert

More information

TEXT ANALYTICS INTEGRATION

TEXT ANALYTICS INTEGRATION TEXT ANALYTICS INTEGRATION A TELECOMMUNICATIONS BEST PRACTICES CASE STUDY VISION COMMON ANALYTICAL ENVIRONMENT Structured Unstructured Analytical Mining Text Discovery Text Categorization Text Sentiment

More information

Social Business Intelligence Framework. Copyright 2012 Deloitte Development LLC. All rights reserved.

Social Business Intelligence Framework. Copyright 2012 Deloitte Development LLC. All rights reserved. Social Business Intelligence Framework Key Insight / Takeaways Business Outcomes Insightful Brand Analysis Improved Customer Experience Benchmarked Performance Revelation of Market Trends/Opportunities

More information

Board of Directors Meeting 12/04/2010. Operational Risk Management Charter

Board of Directors Meeting 12/04/2010. Operational Risk Management Charter Board of Directors Meeting 12/04/2010 Document approved Operational Risk Management Charter Table of contents A. INTRODUCTION...3 I. Background...3 II. Purpose and Scope...3 III. Definitions...3 B. GOVERNANCE...4

More information

SharePoint Governance & Security: Where to Start

SharePoint Governance & Security: Where to Start WHITE PAPER SharePoint Governance & Security: Where to Start 82% The percentage of organizations using SharePoint for sensitive content. AIIM 2012 By 2016, 20 percent of CIOs in regulated industries will

More information

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY 2016 CLM Annual Conference April 6-8, 2016 Orlando, FL Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY Understanding e-discovery definitions and concepts is critical to working with vendors,

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER The IT Manager's Role in Proactive Information Retention and Disposition Management: Balancing ediscovery and Compliance Obligations with IT Operational and Budget Constraints Sponsored by:

More information

SM B13: Symantec Data Insight Ketan Shah, Principal Product Manager John Dodds, Director Technical Product Manager

SM B13: Symantec Data Insight Ketan Shah, Principal Product Manager John Dodds, Director Technical Product Manager Ketan Shah, Principal Product Manager John Dodds, Director Technical Product Manager 1 Agenda 1 2 3 4 Overview Data Management Data Protection and Compliance What s New and Futures SYMANTEC VISION 2012

More information

IBM Security Intelligence Strategy

IBM Security Intelligence Strategy IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational

More information

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from

More information

White Paper. Managing Risk to Sensitive Data with SecureSphere

White Paper. Managing Risk to Sensitive Data with SecureSphere Managing Risk to Sensitive Data with SecureSphere White Paper Sensitive information is typically scattered across heterogeneous systems throughout various physical locations around the globe. The rate

More information

White Paper: The Seven Elements of an Effective Compliance and Ethics Program

White Paper: The Seven Elements of an Effective Compliance and Ethics Program White Paper: The Seven Elements of an Effective Compliance and Ethics Program Executive Summary Recently, the United States Sentencing Commission voted to modify the Federal Sentencing Guidelines, including

More information

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners INTRODUCTION Virtually all modern discovery involves electronically stored information (ESI). The production and

More information

EMAIL ARCHIVING: A BUYER S CHECKLIST

EMAIL ARCHIVING: A BUYER S CHECKLIST EMAIL ARCHIVING: A BUYER S CHECKLIST Email is the backbone of today s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers,

More information

Courtney H. Fletcher

Courtney H. Fletcher Courtney H. Fletcher OmniVere, LLC 8000 Towers Crescent Drive, Suite 1350 Vienna, VA 22182 703.760.7838 courtney.fletcher@omnivere.com www.omnivere.com SUMMARY: Mr. Fletcher serves as a Managing Director

More information

KPMG Forensic Technology Services

KPMG Forensic Technology Services KPMG Forensic Technology Services Managing Costs in e-discoverye October 14, 2010 1 Agenda: Strategies to Manage Costs in e-discovery Pre-collection Strategies Filtering Strategies Review and Production

More information

DATA ANALYTICS. Finding Data from Farm to Fork February 11, 2016 2/10/2016

DATA ANALYTICS. Finding Data from Farm to Fork February 11, 2016 2/10/2016 DATA ANALYTICS Finding Data from Farm to Fork February 11, 2016 Jeremy R. Clopton, CPA, CFE, ACDA, CIDA Director Forensics & Valuation Services jclopton@bkd.com 1 TO RECEIVE CPE CREDIT Participate in entire

More information

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations

More information

Intelligent Vendor Risk Management

Intelligent Vendor Risk Management Intelligent Vendor Risk Management Cliff Baker, Managing Partner, Meditology Services LeeAnn Foltz, JD Compliance Resource Consultant, WoltersKluwer Law & Business Agenda Why it s Needed Regulatory Breach

More information

The Future of Information

The Future of Information Place image here The Future of Information Management Bill Tolson Iron Mountain In the face of an ongoing electronic information explosion, information management becomes an imperative. Organizations need

More information

Leveraging Data Analytics and Continuous Auditing. Internal Audit. January 9, 2014

Leveraging Data Analytics and Continuous Auditing. Internal Audit. January 9, 2014 Leveraging Data Analytics and Continuous Auditing to Transform Internal Audit January 9, 2014 Presenter Introductions John Isenberg, Director KPMG Risk Consulting Dallas Cortnye King, Manager KPMG Risk

More information

Multichannel Customer Listening and Social Media Analytics

Multichannel Customer Listening and Social Media Analytics ( Multichannel Customer Listening and Social Media Analytics KANA Experience Analytics Lite is a multichannel customer listening and social media analytics solution that delivers sentiment, meaning and

More information

Where the Rubber Meets the Road: The Evolution of ESI Discovery Readiness When IT Resources are Limited

Where the Rubber Meets the Road: The Evolution of ESI Discovery Readiness When IT Resources are Limited November 17, 2010 Where the Rubber Meets the Road: The Evolution of ESI Discovery Readiness When IT Resources are Limited Wayne Wong, Managing ESI Consultant, Kroll Ontrack Tom McCaffrey, Director of Archiving,

More information

Document Storage Tips: Inside the Email Vault

Document Storage Tips: Inside the Email Vault Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Document Storage Tips: Inside the Email Vault Law360,

More information

Functions & Importance of a Strategic Business Plan

Functions & Importance of a Strategic Business Plan Functions & Importance of a Strategic Business Plan Komal A Gulich, CRM, IGP Manager, Enterprise Records Management FirstEnergy Service Co April 15, 2014 Agenda Brief recap of Workshop Look at Function

More information

Viewpoint ediscovery Services

Viewpoint ediscovery Services Xerox Legal Services Viewpoint ediscovery Platform Technical Brief Viewpoint ediscovery Services Viewpoint by Xerox delivers a flexible approach to ediscovery designed to help you manage your litigation,

More information

Introducing the product

Introducing the product Introducing the product The challenge Database Activity Monitoring provides privileged user and application access monitoring that is independent of native database logging and audit functions. It can

More information

Get More Out of Your Risk Assessment. Austin Chapter of the IIA

Get More Out of Your Risk Assessment. Austin Chapter of the IIA Get More Out of Your Risk Assessment Austin Chapter of the IIA Speakers Alyssa G. Martin, CPA Dallas Executive Partner, Advisory Services 25 years of public accounting experience, with a practice emphasis

More information

E-discovery: Federal Rules of Civil Procedure and their Implications for Public Sector Corrections Departments

E-discovery: Federal Rules of Civil Procedure and their Implications for Public Sector Corrections Departments E-discovery: Federal Rules of Civil Procedure and their Implications for Public Sector Corrections Departments Andres De Aguero, Senior Lead, Deloitte Consulting LLP David F. Axelrod, Director, Deloitte

More information

How ediscovery Technology Can Accelerate Information Governance for Corporations

How ediscovery Technology Can Accelerate Information Governance for Corporations Nuix Insight Paper How ediscovery Technology Can Accelerate Information Governance for Corporations With risk management and operational efficiencies becoming strategic priorities for both private and

More information

Business Associate Management Methodology

Business Associate Management Methodology Methodology auxilioinc.com 844.874.0684 Table of Contents Methodology Overview 3 Use Case 1: Upstream of s I manage business associates 4 System 5 Use Case 2: Eco System of s I manage business associates

More information

Integration of E-Discovery and FOIA

Integration of E-Discovery and FOIA Integration of E-Discovery and FOIA April 4, 2013 Tom Kennedy Director, Symantec Archiving and E-Discovery Team Digital Government Institute s E-Discovery, Records & Information Management Conference,

More information

Securing your IT infrastructure with SOC/NOC collaboration

Securing your IT infrastructure with SOC/NOC collaboration Technical white paper Securing your IT infrastructure with SOC/NOC collaboration Universal log management for IT operations Table of contents Executive summary 2 IT operations: Handle IT incidents and

More information

Proactive Data Management for ediscovery

Proactive Data Management for ediscovery Proactive Data Management for ediscovery Simon Taylor Snr. Director Information Management CommVault Systems Inc. Why ediscovery sucks for IT The US Federal Rules of Civil Procedure Rule 34(a), (b) Definition

More information

IBM Software Top tips for securing big data environments

IBM Software Top tips for securing big data environments IBM Software Top tips for securing big data environments Why big data doesn t have to mean big security challenges 2 Top Comprehensive tips for securing data big protection data environments for physical,

More information

Compliance and Security Solutions

Compliance and Security Solutions Content-aware Compliance and Security Solutions for Microsoft SharePoint SharePoint and the ECM Challenge The numbers tell the story. According to the consulting firm Doculabs, 80 percent of the information

More information

Symantec to Acquire Clearwell Systems, Inc. May 19, 2011

Symantec to Acquire Clearwell Systems, Inc. May 19, 2011 Symantec to Acquire Clearwell Systems, Inc. May 19, 2011 1 Forward-Looking Statements This presentation contains forward-looking statements within the meaning of U.S. federal securities laws, including

More information