Fraud Prevention and Detection In an Automated World. Nicholas Barone, Instructor November 17 th, 2011

Size: px
Start display at page:

Download "Fraud Prevention and Detection In an Automated World. Nicholas Barone, Instructor November 17 th, 2011"

Transcription

1 SIFMA - IT Fraud Risk Presentation Fraud Prevention and Detection In an Automated World Nicholas Barone, Instructor November 17 th, 2011

2 What We Will Cover Identifying IT fraud risks and schemes Implementing IT fraud risk assessments Fraud Diamond - Capability -What Kind of Mind does it take Behavioral Profiles Using technology to prevent and detect fraud Utilize data analysis to detect fraud

3 What is Fraud? any illegal act characterized by deceit, concealment, or violation of trust. These acts are not dependent upon the threat of violence or physical force. Frauds are perpetrated by parties and organizations to obtain money, property, or services; to avoid payment or loss of services; or to secure personal or business advantage. IIA s International Professional Practices Framework (IPPF)

4 IT Fraud Risks s Access to systems or data for personal gain Changes to system programs or data for personal gain Fraudulent activity by an independent contractor or offshore programmer Conflicts of interest with suppliers or third parties Copyright infringement

5 Independent Contractor Fraud Scenario Fraud An IT consultant under contract After the company declined to offer an illegally accesses the company s IT contractor permanent employment, computer systems. he illegally accessed the company s computer systems and caused damage by impairing the integrity and availability of data. He was indicted on federal charges, a charge that carries a maximum statutory penalty of 10 years in federal prison. Source: U.S. Department of Justice, Computer Crime and Intellectual Property Section

6 Access to systems or data for personal gain Scenario A database analyst for a major check authorization and credit card processing company, exceeds his authorized computer access. Source: U.S. Department of Justice, Computer Crime and Intellectual Property Section Fraud The employee uses his computer access to unlawfully steal consumer information of 8.4 million individuals. The information stolen included names and addresses, bank account information, and credit and debit card information. He sold the data to telemarketers over a five year period. A U.S. District Judge sentenced him to 57 months' imprisonment i and a $3.2 million in restitution for conspiracy and computer fraud

7 Access to systems or data for personal gain Scenario An employee in the payroll department moved to a new position. Upon switching gp positions, the employee s access rights were left unchanged. Source: 2010 Insider Threat Study, US Secret Service and CERT/SEI Fraud Using the retained privileged access rights, the employee provided an associate with confidential information for 1,500 of the firm s employees, including 401k account numbers, credit card account numbers, and social security numbers, which was then used to commit over 100 cases of identity theft. The insider s actions caused over $1 million in damage to the company and its employees.

8 Changes to system programs or data for personal gain Phase Fraud Oversights Requirements Definition 195 illegitimate drivers licenses were created and sold by a police communications officer who accidentally discovers she can create them. Ill-defined authentication and role-based access control requirements. Ill-defined security requirements for automated business processes. Lack of segregation of duties. Source: 2010 Insider Threat Study, US Secret Service and CERT/SEI

9 Changes to system programs or data for personal gain Phase Fraud Oversights System Design An employee realizes there is no oversight in his company s system and business processes, so he works with organized crime to enter and profit from $20 million in fake health insurance claims. Insufficient attention to security details in automated workflow processes. Lack of consideration for security vulnerabilities posed by authorized system overrides. Source: 2010 Insider Threat Study, US Secret Service and CERT/SEI

10 Changes to system programs or data for personal gain Phase Fraud Oversights System Implementation An 18-year-old former Web developer uses backdoors he inserted into his code to access his former company s network, spam its customers, alter its applications, and ultimately put the company out of business. Lack of code reviews. Source: 2010 Insider Threat Study, US Secret Service and CERT/SEI

11 Changes to system programs or data for personal gain Phase Fraud Oversights System Maintenance A foreign currency trader covers up losses of $691 million over a five-year period by making unauthorized changes to the source code. Lack of code reviews. End-user access to source code. Source: 2010 Insider Threat Study, US Secret Service and CERT/SEI

12 Impact of Cybercrime Issues For a Typical Company Cybercrime Issues Opportunity Approach Benefits Cybercrime-related challenges: Escalating cybercrime rates and losses End-to-end d approach to risk Monitoring to detect Cybercrime Protecting integrity of computer data Maintenance of Shareholder Value Ability to respond to and investigate incidents in a timely fashion High cost of maintaining security inhouse Legal liabilities RISKS If Cybercrime issues are not addressed, companies risk: Mismanagement of Security Devices No Coverage Outside Business hours Inability to Detect a Security Breach Ineffective Response to an Attack Inability to Assess Damages Mishandle Electronic Evidence Failure to meet regulatory requirements Reduce on-going risk in a digital economy by implementing state-of-the art procedures around: prevention detection response remediation 1) Device Management (e.g., IDS) 2) 7x24 incident monitoring Incident response to remediate and minimize impact 3) Incident Response Plan/Team 4) Assessment of Monitoring, Incident Response and Forensics Forensics to investigate, remediate, and recover damages Investigative readiness 5) Information technology investigation 6) Litigation Electronic discovery evidence orders handling 7) Expert Litigation witness support testimony Secure business infrastructure Increased protection of information assets through rapid response Mitigated e-business risk Reduced security cost Protect Shareholder Value Security Staff Augmentation 12

13 Hacker Profiles Employees Contractors and Consultants Partners, Customers Temps Short-Term Long-Term Former Employees 13

14 Perpetrator t Typology Explorer Hacker Golden Parachuter Exception Proprietor Good Samaritan Machiavellian Avenger Career Thief Mole 14

15 Explorer Motivated by curiosity Rarely damages Tests abilities unauthorized access to learn more lacks good judgement re: unmarked files often picked-up by sys admin but no policy so no consequences 15

16 Hacker Prior history of hacking Needs to challenge system and authority Derives significant self-esteem from victories Generally not destructive but may need to leave mark Hacks to show-off, off, impress peers More dangerous if part of hacker peer group 16

17 Hacker Subtype: Golden Parachuters Insert logic bombs or other system booby traps, which they are uniquely qualified to diffuse, in exchange for a generous consulting fee or severance package. Rarely reported Often more cost effective for company to pay off the employee 17

18 Exception View themselves as special, deserving of extraordinary recognition Consider themselves above the rules Often deflect blame to others and have a grandiose view of their importance beneath fragile self-esteem 18

19 Hacker Subtype: Proprietor Feels he/she owns system Entitled to special privileges Hacks to protect control of system Hacks to deter rivals May create problems only he can solve 19

20 Good Samaritan Hacks episodically to fulfill duties more effectively or responsibly Doesn t see violation Ends justify means May show-off, off save-the-day hack system to fix it in emergency situation copy files to save time Makes great rationale testing security 20

21 Machiavellian Covertly hacks to advance career, increase status, damage rival, establish future business (Intl Prop) consultant steals proprietary data subordinate frames boss employees destroy rival group s network card time bomb to establish consulting job program outages to facilitate t travel 21

22 Avenger Angry act in retaliation for real or perceived wrong Revenge Associated with termination, demotion, assignment changes, perceived setbacks Any group subject to disgruntlement 22

23 Career Thief Computer is tool for criminal scheme Pure anti-social version vs. disgruntled mixed breed lack of loyalty y to employer greater identification with profession 23

24 Mole Joins organization to commit espionage for the benefit of a company or foreign government Different from Avengers, who commit espionage out of revenge 24

25 A Typology of Malicious Acts Abuse/Fraud Extortion Sabotage Espionage 25

26 IT Fraud Risk Assessment Key Elements Types of frauds Inherent risk of fraud Existing controls Control gaps Likelihood Business impact

27 IT Fraud Risk Assessment - Example Business Owner- Fraud Risks Controls Preventive or Detective Monitoring Likelihood Impact IT - CIO Access to systems or data for personal gain. (Logical Access) Access to customers' or employees' personal information (e.g., credit card information, payroll information) Access to confidential company information (e.g., financial reporting, supplier data, strategic plans) Identity management (e.g. individual user IDs, automated password complexity rules, password rotation) Access controls Authentication controls Authorization controls Access control lists Network controls Both Information security System administrators Business owners Internal auditing Medium High Copying and use of software or data for distribution Anti-virus and patch management Restricted access to software code

28 Fraud Detection Using Data Analytics Why use data analysis? Analytical techniques Types of fraud tests Analyzing full data populations Fraud detection program strategies Fraud audit program components

29 Why Data Analytics? Internal control system weaknesses Examine 100% of transactions Compare data from different applications Perform tests designed for fraud detection and control verification Automate tests in high-risk areas Maintain logs of analytics performed

30 Fraud Audit Program Components Profile of potential fraud Test transactional data Implement continuous auditing and/or monitoring Review results of data testing Respond with recommendations

31 IT Fraud Risk Assessments Diversified Data Sources

32 IT Fraud Risk Assessments Analytical techniques Calculate statistical parameters Classify to find patterns Stratify to identify unusual values Digital it analysis, to identify unlikely occurrences Duplicates testing Gaps testing to identify missing data Summing and totaling to check control totals that may be falsified Graphing to provide visual identificationof of anomalous transactions Joining or matching data between systems

33 Application of Data Analytics in Fraud Detection Accounts Payable Accounts Receivable Cash Disbursements Conflict of Interest Credit Card Management Deposits General Ledger Kickbacks Loans Materials Management Inventory Control Purchase Order Management Loans Salaries and Payroll Claims Vendor Management Insurance claims li

34 Types of Fraud Tests - Examples Type Fictitious vendors Altered invoices Tests used Run checks to uncover post office boxes used as addresses and to find any matches between vendor and employee addresses and/or phone numbers. Search for duplicates. Check for invoice i amounts not matching thi contracts t or purchase order amounts. Duplicate invoices Duplicate payments Payroll fraud Source: U.S. Department of Justice, Computer Crime and Intellectual Property Section Review for duplicate invoice numbers, duplicate dates, and duplicate invoice amounts. Search for identical invoice numbers and payment amounts. Check whether a terminated employee is still on payroll by comparing the date of termination with the pay period covered by the paycheck, and extract all pay transactions for departure date less than the date of the current pay period.

35 Key considerations when testing for fraud 1. Build a profile of potential frauds to be tested 2. Analyze data for possible indicators of fraud 3. Automate the detection process through continuous auditing/monitoring of high-risk business functions to improve controls 4. Investigate t and drill down into emerging patterns 5. Expand scope and repeat as necessary 6. Report

36 Questions? Contact Info: Phone [email protected]

IPPF Practice Guide. Fraud Prevention and Detection in an Automated World

IPPF Practice Guide. Fraud Prevention and Detection in an Automated World IPPF Practice Guide Fraud Prevention and Detection in an Automated World Global Technology Audit Guide (GTAG) Written in straightforward business language to address a timely issue related to IT management,

More information

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President

More information

Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA

Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the

More information

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients

More information

Enterprise PrivaProtector 9.0

Enterprise PrivaProtector 9.0 IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS

More information

How-To Guide: Cyber Security. Content Provided by

How-To Guide: Cyber Security. Content Provided by How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses

More information

THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK

THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK SECURITY AND THEFT OF DATA COVERAGE APPLICATION Name of Insurance Company to which application is made NOTICE: THIS POLICY PROVIDES CLAIMS MADE COVERAGE.

More information

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview

More information

Procurement Fraud Identification & Role of Data Mining

Procurement Fraud Identification & Role of Data Mining The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

716 West Ave Austin, TX 78701-2727 USA

716 West Ave Austin, TX 78701-2727 USA Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the

More information

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING

More information

FRAUD RISK ASSESSMENT

FRAUD RISK ASSESSMENT FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by

More information

Stay ahead of insiderthreats with predictive,intelligent security

Stay ahead of insiderthreats with predictive,intelligent security Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent

More information

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1 Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:

More information

Fraud Prevention Checklist for Small Businesses

Fraud Prevention Checklist for Small Businesses Fraud Prevention Checklist for Small Businesses 11 Ways to Minimize the Risk and Impact PAYMENT SOLUTIONS Fraud can have a devastating impact on small businesses. Prevention and mitigation strategies can

More information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.

More information

Information Security Program

Information Security Program Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Seven Things To Consider When Evaluating Privileged Account Security Solutions Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?

More information

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

Data Privacy and Gramm- Leach-Bliley Act Section 501(b) Data Privacy and Gramm- Leach-Bliley Act Section 501(b) October 2007 2007 Enterprise Risk Management, Inc. Agenda Introduction and Fundamentals Gramm-Leach-Bliley Act, Section 501(b) GLBA Life Cycle Enforcement

More information

Privilege Gone Wild: The State of Privileged Account Management in 2015

Privilege Gone Wild: The State of Privileged Account Management in 2015 Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...

More information

Accounts Payable Best Practices

Accounts Payable Best Practices Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can

More information

Data Security Incident Response Plan. [Insert Organization Name]

Data Security Incident Response Plan. [Insert Organization Name] Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security

More information

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? Gregg Sommer, CAIA Head of Operational Risk Assessments St. Louis MERCER 2015 0 CYBERSECURITY BREACHES

More information

Cyber Liability Insurance: It May Surprise You

Cyber Liability Insurance: It May Surprise You Cyber Liability Insurance: It May Surprise You Moderator Eugene Montgomery, President & CEO Community Financial Insurance Center Panelists Antonio Trotta, Senior Claim Counsel, CNA Specialty William Heinbokel,

More information

The Key to Successful Monitoring for Detection of Insider Attacks

The Key to Successful Monitoring for Detection of Insider Attacks The Key to Successful Monitoring for Detection of Insider Attacks Dawn M. Cappelli Randall F. Trzeciak Robert Floodeen Software Engineering Institute CERT Program Session ID: GRC-302 Session Classification:

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004 A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:

More information

Zurich Security And Privacy Protection Policy Application

Zurich Security And Privacy Protection Policy Application Zurich Security And Privacy Protection Policy Application COVERAGE A. AND COVERAGE F. OF THE POLICY FOR WHICH YOU ARE APPLYING IS WRITTEN ON A CLAIMS FIRST MADE AND REPORTED BASIS. ONLY CLAIMS FIRST MADE

More information

Preventing Identity Theft National City Bank. How to protect your identity

Preventing Identity Theft National City Bank. How to protect your identity Preventing Identity Theft National City Bank How to protect your identity Understanding and Preventing Identity Theft Identity Theft is the fastest growing crime in America 500,000 people fall victim to

More information

Advanced Data Analytics, the Fraudsters Worst Enemy

Advanced Data Analytics, the Fraudsters Worst Enemy Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability

More information

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 Introduction THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS (Effective for audits of financial statements for

More information

Questions You Should be Asking NOW to Protect Your Business!

Questions You Should be Asking NOW to Protect Your Business! Questions You Should be Asking NOW to Protect Your Business! Angi Farren, AAP Senior Director Jen Wasmund, AAP Compliance Services Specialist 31 st Annual Conference SHAPE YOUR FUTURE April 23, 2013 Regional

More information

10 Smart Ideas for. Keeping Data Safe. From Hackers

10 Smart Ideas for. Keeping Data Safe. From Hackers 0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000

More information

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can

More information

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP [email protected]. Copyright 2015 Edward S.

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP eferrara@forrester.com. Copyright 2015 Edward S. MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP [email protected] Fraud Awareness & Internal Controls Awareness Internal

More information

ACE Advantage PRIVACY & NETWORK SECURITY

ACE Advantage PRIVACY & NETWORK SECURITY ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with

More information

Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.

Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication. Polling Question Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication. Please type in your response. This poll will close promptly at 1:00 pm CDT Getting the

More information

Network Security: Policies and Guidelines for Effective Network Management

Network Security: Policies and Guidelines for Effective Network Management Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. [email protected], [email protected]

More information

SUPPLIER SECURITY STANDARD

SUPPLIER SECURITY STANDARD SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard

More information

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary Charles Doyle Senior Specialist American Law Division The federal computer

More information

Managing IT Security with Penetration Testing

Managing IT Security with Penetration Testing Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to

More information

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat

More information

TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending)

TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending) PAGE 1 of 5 TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending) ORIGINAL: 11/03 REVISED: 10/07, 09/10, 04/13 REVIEWED: EFFECTIVE DATE Acute Care

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

Cyber Liability. What School Districts Need to Know

Cyber Liability. What School Districts Need to Know Cyber Liability What School Districts Need to Know Data Breaches Growing In Number Between January 1, 2008 and April 4, 2012 314,216,842 reported records containing sensitive personal information have

More information

Steven Boyer Vice-President, Gallagher Bassett Services Inc.

Steven Boyer Vice-President, Gallagher Bassett Services Inc. Employee Dishonesty and Fraud Motive, Rationale & Opportunity Steven Boyer Vice-President, Gallagher Bassett Services Inc. Randall Wilson, CPA/CFF, CFE, Cr.FA Partner, National Practice Director Fraud

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department

More information

Music Recording Studio Security Program Security Assessment Version 1.1

Music Recording Studio Security Program Security Assessment Version 1.1 Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND

More information

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Leveraging Privileged Identity Governance to Improve Security Posture

Leveraging Privileged Identity Governance to Improve Security Posture Leveraging Privileged Identity Governance to Improve Security Posture Understanding the Privileged Insider Threat It s no secret that attacks on IT systems and information breaches have increased in both

More information

CHAPTER 5 COMPUTER FRAUD AND SECURITY

CHAPTER 5 COMPUTER FRAUD AND SECURITY CHAPTER 5 COMPUTER FRAUD AND SECURITY Overview Information systems are becoming increasingly more complex and society is becoming increasingly more dependent on these systems. Companies also face a growing

More information

Leonard W. Vona, CPA, CFE

Leonard W. Vona, CPA, CFE Leonard W. Vona, CPA, CFE Certified Public Accountant Certified Fraud Examiner 3331 Route 9 Valatie, NY 12184 Tel: (518) 784-2250 Fax: (518) 784-2251 e-mail: [email protected] Part of an auditor s job is

More information

How To Handle A Fraud At Psc

How To Handle A Fraud At Psc FRAUD POLICY Purpose and Background PSC is committed to the highest standards of moral and ethical behavior. The purpose of PSC s Fraud Policy is to foster an environment that promotes awareness to fraudulent

More information

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS Paragraphs Introduction... 1-3 Characteristics of Fraud...

More information

Mobile Deposit Policy

Mobile Deposit Policy Mobile Deposit Policy Mobile Deposit, a deposit transaction delivery system, allows the Credit Union to receive digital information from deposit documents captured at remote locations (i.e., the Credit

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

OCIE Technology Controls Program

OCIE Technology Controls Program OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview

More information

Attachment A. Identification of Risks/Cybersecurity Governance

Attachment A. Identification of Risks/Cybersecurity Governance Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year

More information

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

defending against advanced persistent threats: strategies for a new era of attacks agility made possible defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been

More information

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS? HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS? FREEMAN WOOD HEAD OF MERCER SENTINEL NORTH AMERICA GREGG SOMMER HEAD OF OPERATIONAL RISK ASSESSMENTS MERCER

More information

Fraud-Related Compliance

Fraud-Related Compliance Fraud-Related Compliance Investigating and Reporting 2015 Association of Certified Fraud Examiners, Inc. Investigations, Reporting, and Compliance Investigations benefit victim organizations by: Recovering

More information

IPPF Practice Guide. Internal Auditing and Fraud

IPPF Practice Guide. Internal Auditing and Fraud IPPF Practice Guide Internal Auditing and Fraud December 2009 IPPF Practice Guide Table of Contents Introduction... 1 Executive Summary... 2 Definition of Fraud... 4 Fraud Awareness... 5 A. Reasons for

More information

LGMA Qld Governance and Corporate Planning Village Forum

LGMA Qld Governance and Corporate Planning Village Forum www.pwc.com.au Fraud Risk Management Fraud Risk Assessments LGMA Qld Governance and Corporate Planning Village Forum March 2015 Agenda Introductions Fraud Risk Management Fraud Statistics s Global Economic

More information

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current

More information

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception

More information

Best Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP

Best Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP Best Practices in Incident Response SF ISACA April 1 st 2009 Kieran Norton, Senior Manager Deloitte & Touch LLP Current Landscape What Large scale breaches and losses involving credit card data and PII

More information

TechDefender SM. Tech E&O, Network Security, Privacy, Internet Media, and MPL Insurance Application

TechDefender SM. Tech E&O, Network Security, Privacy, Internet Media, and MPL Insurance Application IRONSHORE INSURANCE COMPANIES One State Street Plaza New York, NY 10004 Tel: 646-826-6600 Toll Free: 877-IRON411 TechDefender SM Tech E&O, Network Security, Privacy, Internet Media, and MPL Insurance Application

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

FACTA Identity Theft Red Flags Program. www.chs.acfei.com

FACTA Identity Theft Red Flags Program. www.chs.acfei.com 1 FACTA Identity Theft Red Flags Program Module 1 Fair and Accurate Credit Transactions Act Overview Identity thieves use individual s personal identifiable information to open new accounts and misuse

More information

Policy-Standard heading. Fraud and Corruption Policy

Policy-Standard heading. Fraud and Corruption Policy Policy-Standard heading Fraud and Corruption Policy September 2013 Table of contents Introduction 3 Purpose 3 Scope 3 Related Policies and Processes 3 Definition of Fraud and Corruption 4 Policy 4 Code

More information

Risk and Controls 101

Risk and Controls 101 Risk and Controls 101 Agenda What is a Risk and Control? Controls 101 What is Risk and Control? Control Types Control Execution Control Categories A-123 Process here at LBNL Wrap-up Process Risk Map Control

More information

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister Using COBiT For Sarbanes Oxley Japan November 18 th 2006 Gary A Bannister Who Am I? Who am I & What I Do? I am an accountant with 28 years experience working in various International Control & IT roles.

More information

Service Schedule for CLOUD SERVICES

Service Schedule for CLOUD SERVICES Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements

The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements ISA 240 February 2008 International Standard on Auditing The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements INTERNATIONAL STANDARD ON AUDITING 240 The Auditor s Responsibilities

More information