The Hunt for Fraud. September 25, Seminar / Training. September 26, 2014

Size: px
Start display at page:

Download "The Hunt for Fraud. September 25, 2014. Seminar / Training. September 26, 2014"

Transcription

1 BYOD and Securing Mobile Devices September 25, 2014 The Hunt for Fraud September 26, 2014 Seminar / Training Central Arkansas Chapter Information Systems Audit and Control Association, Arkansas Division of Legislative Audit & Business Automation Consultants Instructor: Albert Marcella Jr., Ph.D., CISA, CISM Victory Building (Capitol & Victory Streets) Room 445 Little Rock, AR Cost $350 Per person both days $175 Per person one day CPE Credit (Qualifies for CPA continuing education) 8 hours CPE BYOD 7 hours CPE Fraud 15 Hours Total September 25 and 26, 2014 Further information please contact: Kurt Cover Ext 4111 Kurt.cover@arklegaudit.gov Registration form below

2 CPE Credits 8 BYOD & Securing Mobile Technologies Description: As the world becomes more interconnected, integrated and intelligent, mobile devices are playing an ever-increasing role in changing the way people live, work and communicate. Personal computing devices are becoming more and more portable laptops, tablets, smart phones, USB thumb drives, etc., securing the sensitive information stored on those devices is more important than ever. The small size and portability of these devices mean they can be easily lost or stolen, placing both personal as well as corporate data at risk. This program will address the challenges in securing data and processing, limiting communication to designated parties, protecting sensitive data from the loss of a mobile device and methodologies for designing and implementing a viable, controlled and sustainable enterprise-wide BYOD policy. Audience: IT Managers, auditors, and system administrators, managers of telecommunications, info security professionals, HR managers, financial officers (CEO, CFO, COO), senior management (CIO, CXO, CSO) and IT professionals who through their involvement in managing or directing the IT infrastructure have responsibility for mobile technology management. This particular two-day program would also be of value to financial and operational audit professionals as well as non-it audit professionals tasked with the responsibility for assessing their organization's BYOD and mobile technology strategies. Prerequisites: There is no prerequisite for this seminar. Learning Level: Basic to Intermediate Instructional Method: Group-live Objectives: After completing this course, participants will: 1. Identify the unique risks associated with mobile technologies and the necessity of a viable mobile risk management initiative. 2. Recognize the essential elements in a comprehensive, enterprise-wide, BBYOD policy, the importance of protecting end user privacy and securing enterprise data. 3. Understand the critical importance for security and controls over employee and enterprise devices accessing sensitive systems and protected data. 4. Be better prepared to assist their organization in securing its operations, minimizing its security exposure, and mitigating the possibility of data loss via mobile devices. 5. Identify existing exposures and weaknesses within their organization's mobile communication operations, which would make the organization a potential target for cyber terrorists, cyber criminals, data thieves. 6. Have a better appreciation of the steps and elements required to develop an audit ICQ and program for assessing BYOD and mobile technology internal controls. Course Outline: Introduction Mobile Technologies Are Evolving BYOD Network and Productivity Concerns Securing Mobile Technology

3 BYOD Program Goals BYOD Issues & Concerns Policy and Guidelines Mobile Security Policy Mobile Risk Management BYOD Risk Mitigation Objectives Who s Responsible for Mobile Risk Management? Implementing Mobile Risk Management Mobile Technology - Risk Assessment BYOD & Compliance with Regulations Compliance & Social Media Websites and the Use of Personal Devices for Business Communications The Cost Of Compliance Network Access Control Secure Access BYOD to Company Networks And Data Network Security DHCP/DNS Management and Monitoring Tracking Down Rogue or Suspicious BYOD Devices Mobile Wireless Technologies Quick Response Codes Augmented Reality Near Field Communication Mobile Device Management Key Core Features of an MDM System MDM Issues Jailbreaking ios Android: Rooting Technical Risks General Mobile Technical Risks ios Technical Risks Android Mobile Device Management Security Controls Mobile Device Application Development Why Mobile? What are Apps? The Five Considerations for App Evaluation What Is A Good Mobile Application? Mobile application metrics What is Mobile Social Networking? What Is A Good Mobile Application?

4 Securing Mobile Technologies Security & Controls Overview Mobile Security Six Security Essentials Mobile Security - Bonus Security Essentials Security Baselines Key Issues to Consider When Evaluating the Security of Wireless Solutions Mobile Security Resources Summary Keys to a Successful BYOD Implementation Best Practices Supplemental Materials Available as Course Takeaways : 1. Mobile Technologies ICQ - Mobile Content Management 2. Mobile Technologies ICQ - Mobile Application Management 3. Mobile Technologies ICQ - Mobile Device Management 4. Mobile Technologies ICQ Security 5. Mobile Technologies ICQ BYOD General Policies The Hunt for Fraud: Prevention and Detection Techniques CPE Credits: 7 Description: This seminar provides attendees with a general overview of basic fraud concepts, as well as a review of specific areas such as statutes and standards related to the recording, reporting, and prosecution of fraudulent activities, internal auditor responsibilities in the audit for fraud, and fraud detection and prevention techniques. Also addressed during this seminar is the classification of frauds, investigation techniques, and fraud within information technology. The seminar will incorporate several case analyses of frauds perpetrated by employees and how such frauds were identified and investigated. The seminar will also introduce and incorporate the basic concepts of forensic analysis as a means of further investigating fraudulent activities by organization personnel, third party providers, and contractors. Audience: This seminar is intended for internal and external audit professionals, security investigators, General Counsels, Chief Security Officers, Controllers, InfoSec professionals, and anyone interested in obtaining a better understanding of and general introduction to auditing and controlling fraud with workplace environments. Prerequisites: There is no prerequisite for this seminar. Learning Level: Basic to Intermediate Instructional Method: Group-live

5 Objectives: After completing this seminar, participants will be able to: Provide organization decision-makers with enough information so that a business decision, consistent with policy and the entity's best interests, can be made regarding the identification and prevention of fraud Define and explain the differences among several kinds of errors frauds and illegal acts that might occur in an organization Increase individual fraud awareness within ongoing operations on how to minimize potential fraudulent activities from occurring Explain the various auditing standards related to fraud and illegal acts List and explain some conditions that can lead to frauds Comprehend basic aspects of fraud detection Obtain insight on fraud prevention and identifying weaknesses in internal control systems Describe some extended procedures for finding fraud Identify the importance of and differences between interviews and interrogations Describe forensic accounting techniques Identify evidence and documentary evidence Understand the roles which people, physical environment, and observation play in the investigation of fraud Course Outline: Conditions & Reasons Leading to Fraud Business circumstances requiring fraud auditing Conditions Which Create an Opportunity to Commit Fraud Reasons for Committing Fraud Fraud by the Numbers Fraud Statutes & Standards General Definition of Fraud and Applicable Law Federal Statutes Major Codified Standards on Fraud Auditing Fraud Audit Standards Overview Reducing Organizational Risk Fraud Policy Compliance Program to Reduce Organizational Risk Deterrence of Fraud - Audit Considerations Auditor s Role in Auditing for Fraud Detection of Fraud - Auditor Responsibilities Reporting of Fraud - Auditor Responsibilities Reasons Why Auditors Fail to Detect Fraud Pitfalls for Auditors Engaged in Auditing for Fraud Fraud - Warning Signs Personality Characteristics Organizational Characteristics Transactional Characteristics

6 Fraud Related Activities for Auditors High-Risk Areas for Fraud Health Care Advance Fee Scheme Impersonation Fraud Receipts Payables Payroll Inventories Purchasing Letter of Credit Fraud "Ponzi" Scheme Pyramid Scheme Retail Operations Web-based Fraud Telephone Fraud Auditing for Fraud: Tips & Techniques General Fraud Audit Checklist Fraud Detection Methods Checklist The Fraud Audit Process Reasons for Investigations How IT Can Spot Accounting Fraud Computerized Fraud Auditing: Crunching the Data How to Lock Out Fraud The Environment for Fraud Elements to Commit Fraud Factors that Change Nature of Risks

7 INSTRUCTOR Albert J. Marcella Jr., Ph.D., CISA, CISM President, Business Automation Consultants, LLC An internationally recognized public speaker, researcher, workshop and seminar leader with 36 years of experience in IT audit, security and assessing internal controls, Dr. Marcella, has authored numerous articles and 28 books on various IT, audit and security related subjects. Dr. Marcella s most recent book, Cyber Forensics: From Data to Digital Evidence, provides the reader with insights into how data are stored, processed, identified, analyzed, and eventually end up as evidential matter. This leading to a more thorough and detailed understanding of which data are relevant, significant, and most critical in a cyber-forensic investigation, and why. Which ultimately is the basis for and foundation of a comprehensive, well executed cyber forensic investigation. Research conducted by Dr. Marcella on cyber extortion, workplace violence, personal privacy, Electronic Stored Information (ESI), privacy risks in multifunctional devices (MFDs), cyber forensics, disaster and incident management planning and ethics, has appeared in the ISACA Journal, Disaster Recovery Journal, Journal of Forensic & Investigative Accounting, EDPACS, ISSA Journal, Continuity Insights, and the Internal Auditor Magazine. Dr. Marcella is the Institute of Internal Auditors Leon R. Radde Educator of the Year, 2000, Award recipient. Dr. Marcella has taught IT audit seminar courses for the Institute of Internal Auditors (IIA), continues to teach for the Information Systems Audit and Control Association (ISACA), and has been recognized by the IIA as a Distinguished Adjunct Faculty Member.

8 BYOD and Securing Mobile Devices The Hunt for Fraud Registration Form Date: September 25, 2014 BYOD 8:00 5:00pm September 26, 2014 Fraud 8:00 4:00 pm Place: Victory Building, Room 445, Capitol and Victory Streets, Little Rock, Arkansas Cost: Two days $ per person One day $175 per person (please check) BYOD Fraud Please make check payable to Central Arkansas ISACA (if payment by credit card please contact individual at bottom of form for instructions) Remit to: Central Arkansas ISACA, P.O. Box 2305, Little Rock, AR Registration form can be ed to: Lunch will be provided both days Please contact name at bottom of application if your organization requires to be billed. Name: Job Title: Organization/Company: address: Address: City: State & Zip Code: Phone: CPE credit hours: BYOD 8 Hours; Fraud 7 Hours (Does qualify for Certified Public Accountant CPE) Cancelation Policy: Registration ends September 19, Cancelations can be made until September 23, Full refunds will be given until September 12, If cancelling after September 12, a $65 administration fee will apply to the refund. Parking: We will reimburse for covered parking in the Victory Building deck. Daily fee is $5. Please request parking fee reimbursement at the seminar. Parking deck entrance on 6 th street (one way west). Turn right at the entrance gates in the deck, park in daily fee parking. Sky bridge to building is on the 2 nd level. If you need any further information or have special dietary requirements please contact: Kurt Cover at ext 4111 or kurt.cover@arklegaudit.gov

2014 Training Programs

2014 Training Programs 2014 Training Programs Courses & Workshops Course Title Dates Venue Fees(BHD) 1- IT Security Workshop 16-18 March 5 Star Hotel 600 2- IT GRC Workshop 13-14 April 5 Star Hotel 400 3- COBIT 5 Foundation

More information

Certification and Training

Certification and Training Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel

More information

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security

More information

What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization?

What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization? What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization? What if you could not only maintain, but update and upgrade

More information

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and

More information

Technical Professionals

Technical Professionals THE ARC TRAINING GROUP A Division of The ARC Consulting Group, Inc. A Profit Enhancement Firm Providing Educational and Consultative Services to the International Business Community SEMINAR FACT SHEET

More information

Successful Application Design: Auditing the Process Development Life Cycle

Successful Application Design: Auditing the Process Development Life Cycle Successful Application Design: Auditing the Process Development Life Cycle CPE Credits: 7 CODE C2 Managing software projects is difficult under the best circumstances. You can reduce the difficulty and

More information

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Presenting a live 90-minute webinar with interactive Q&A Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Developing a Comprehensive Usage Strategy to Safeguard Health Information and

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

A FRAUD EXAMINATION COURSE: PREPARATION FOR THE INTERNATIONAL CFE EXAMINATION (EQUIVALENT TO THE ADVANCE CERTIFICATE FRAUD EXAMINATION: SAQA NQF

A FRAUD EXAMINATION COURSE: PREPARATION FOR THE INTERNATIONAL CFE EXAMINATION (EQUIVALENT TO THE ADVANCE CERTIFICATE FRAUD EXAMINATION: SAQA NQF A FRAUD EXAMINATION COURSE: PREPARATION FOR THE INTERNATIONAL CFE EXAMINATION (EQUIVALENT TO THE ADVANCE CERTIFICATE FRAUD EXAMINATION: SAQA NQF 6) Course 1: 12-16 March 2012 and 26-30 March 2012 Course

More information

Welcome to the 1 st Annual Executive Seminar & Workshop in Predictive Analytics + Big Data

Welcome to the 1 st Annual Executive Seminar & Workshop in Predictive Analytics + Big Data International Association for the Management of Digital Analytics Standards, Training and Certification for Digital Analytics Management Managed Analytic Services Inc. Data Analysis Expertise Insight Value

More information

Leveraging Big Data to Mitigate Health Care Fraud Risk

Leveraging Big Data to Mitigate Health Care Fraud Risk Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud

More information

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP All about CPEs David Gittens CISA CISM CISSP CRISC HISP The Designer David Gittens ISSA Barbados Past President Certified in ethical hacking and computer forensics Certified in security management and

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

Business Forecasting and Analytics Forum

Business Forecasting and Analytics Forum #JPKGroup Business Forecasting and Analytics Forum Financial Forecasting and Planning Finance Transformation S&OP and Demand Forecasting Sales and Market Forecasting and Analytics Collaborative Forecasting

More information

Mobile Computing: A Study of Internal Auditors Awareness. 2013 Research Committee

Mobile Computing: A Study of Internal Auditors Awareness. 2013 Research Committee Mobile Computing: A Study of Internal Auditors Awareness 2013 Research Committee Table of Contents INTRODUCTION... 3 MOBILE COMPUTING... 4 LITERATURE REVIEW... 4 DEFINITION... 4 MOBILE DEVICE TYPES AND

More information

ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore

ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore With ever-increasing data volumes, more sophisticated fraud patterns, and a drive for strong corporate governance, how can organisations build a culture of integrity and compliance? Learn how data analytics

More information

Forensic Analytics and Employee Fraud

Forensic Analytics and Employee Fraud Chapter Meeting Announcement Forensic Analytics and Employee Fraud Presented by Mark J. Nigrini, Ph.D. DATE: Friday, April 24, 2015 PLACE: Education Service Center Region 19 6611 Boeing Drive El Paso,

More information

Advanced IT Audit Training

Advanced IT Audit Training Advanced IT Audit Training Date: 28 th 30 th October 2014 Time: 8.30 am to 5.30 pm Venue: Iverson Associates, Center Point, Bandar Utama, Kuala Lumpur Advanced IT Audit Training Workshop Overview ISACA

More information

2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP

2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP 2010 AICPA Top Technology Initiatives Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP Georgia Society of CPAs Annual Convention June 16, 2010 About the Presenter Partner-in-Charge, Habif,

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, CPA, CIA AUDITOR GENERAL DATA SECURITY USING MOBILE DEVICES PERFORMANCE AUDIT OF

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, CPA, CIA AUDITOR GENERAL DATA SECURITY USING MOBILE DEVICES PERFORMANCE AUDIT OF MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT PERFORMANCE AUDIT OF DATA SECURITY USING MOBILE DEVICES DEPARTMENT OF TECHNOLOGY, MANAGEMENT, AND BUDGET January 2015 Doug A. Ringler, CPA, CIA AUDITOR

More information

03/06/2014. Bring Your Own Device: A Framework for Audit. Acknowledgement

03/06/2014. Bring Your Own Device: A Framework for Audit. Acknowledgement Bring Your Own Device: A Framework for Audit Emily A Knopp, CPA, CISA Audit Director Angelo State University, Member of Texas Tech University System March 6, 2014 Texas Association of College of University

More information

ISACA Tools Help Develop Cybersecurity Expertise

ISACA Tools Help Develop Cybersecurity Expertise Volume 21, 8 October 2014 ISACA Tools Help Develop Cybersecurity Expertise Nominate Qualified Candidates for the ISACA Board of Directors Tips for Solving Data Classification Challenges Earn CPE at Professional

More information

Sarbanes-Oxley Compliance for Cloud Applications

Sarbanes-Oxley Compliance for Cloud Applications Sarbanes-Oxley Compliance for Cloud Applications What Is Sarbanes-Oxley? Sarbanes-Oxley Act (SOX) aims to protect investors and the general public from accounting errors and fraudulent practices. For this

More information

Database Security and Auditing

Database Security and Auditing Database Security and Auditing COURSE DESCRIPTION: This seminar aims to provide the Database Administrators, System Administrators, Auditors and IT Security Officers an overview on how to secure and audit

More information

Cybersecurity@RTD Program Overview and 2015 Outlook

Cybersecurity@RTD Program Overview and 2015 Outlook Cybersecurity@RTD Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD Information Technology Department of Finance & Administration

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Asset Management In A Consumerized World

Asset Management In A Consumerized World Asset Management In A Consumerized World Generously sponsored by: August 28, 2012 Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London Welcome Conference Moderator Allan Wall ISSA Web Conference Committee

More information

IT Auditing and. Discussion Topics. What is IT Auditing?

IT Auditing and. Discussion Topics. What is IT Auditing? IT Auditing and Computer Forensics Kevin H. Doar, CISA Auditor Discussion Topics What is IT Auditing? IT Auditor Skillset IT Auditing Standards & Frameworks IT Controls with Case Examples The Direction

More information

How To Protect Your Organization From Liability From A Cell Phone (For Business)

How To Protect Your Organization From Liability From A Cell Phone (For Business) Bring Your Own Device: A Framework for Audit March 6, 2013 1 Webinar Moderator Phil Hurd ACUA President 2 Your Presenters Mike Cullen, Senior Manager CISA, CISSP, CIPP/US > Leads the firm s Technology

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE

FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE CPAs & ADVISORS experience reach // S. Todd Burchett, CPA, ABV, ASA, CFF, CFE Partner tburchett@bkd.com 210.268.1932 AGENDA

More information

How-To Guide: Cyber Security. Content Provided by

How-To Guide: Cyber Security. Content Provided by How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

Auditing & Securing Enterprise Mobility Management

Auditing & Securing Enterprise Mobility Management Auditing & Securing Enterprise Mobility Management Date: 30 th September and 1 st October 2014 Time: 9.00am to 5.00pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur Auditing & Securing

More information

Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA

Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA HANS HENRIK BERTHING Married with Louise and dad for Dagmar and Johannes CPA, CRISC, CGEIT, CISA and CIA ISO 9000 Lead Auditor Partner and owner for Verifica

More information

Strategic IT audit. Develop an IT Strategic IT Assurance Plan

Strategic IT audit. Develop an IT Strategic IT Assurance Plan Strategic IT audit Develop an IT Strategic IT Assurance Plan Speaker Biography Hans Henrik Berthing is Partner at Verifica and Senior Advisor & Associated Professor at Aalborg University. He is specialized

More information

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015 Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key

More information

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA

More information

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Importance of Effective Internal Controls and COSO COSO

More information

Aalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014

Aalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014 Aalborg Universitet Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication

More information

Education and Training in Fraud and Forensic Accounting: A Guide for Educational Institutions, Stakeholder Organizations, Faculty and Students

Education and Training in Fraud and Forensic Accounting: A Guide for Educational Institutions, Stakeholder Organizations, Faculty and Students NIJ Special Report Education and Training in Fraud and Forensic Accounting: A Guide for Educational Institutions, Stakeholder Organizations, Faculty and Students NOTE: The following is based on an exposure

More information

OFFICE OF AUDITS & ADVISORY SERVICES MOBILE DEVICE MANAGEMENT COUNTYWIDE AUDIT FINAL REPORT. County of San Diego Auditor and Controller

OFFICE OF AUDITS & ADVISORY SERVICES MOBILE DEVICE MANAGEMENT COUNTYWIDE AUDIT FINAL REPORT. County of San Diego Auditor and Controller County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES MOBILE DEVICE MANAGEMENT COUNTYWIDE AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA,

More information

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013 The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee

More information

Fifth Third Bank Center Charlotte, NC

Fifth Third Bank Center Charlotte, NC CURRENT RISK ISSUES SEMINAR Sponsored By September 17 & 18, 2015 Fifth Third Bank Center Charlotte, NC The Fiduciary & Investment Risk Management Association, Inc. (FIRMA ) is registered with the National

More information

Enabling Information PREVIEW VERSION

Enabling Information PREVIEW VERSION Enabling Information These following pages provide a preview of the information contained in COBIT 5: Enabling Information. The main benefit of this publication is that it provides COBIT 5 users with a

More information

Keeping watch over your best business interests.

Keeping watch over your best business interests. Keeping watch over your best business interests. 0101010 1010101 0101010 1010101 IT Security Services Regulatory Compliance Services IT Audit Services Forensic Services Risk Management Services Attestation

More information

ERM Symposium April 2009. Moderator Nancy Bennett

ERM Symposium April 2009. Moderator Nancy Bennett ERM Symposium April 2009 RI4-Implementing a Comprehensive Privacy Program John Kelly Joseph Nocera Moderator Nancy Bennett Data & Identity Theft: Keeping sensitive data out of the wrong hands Presented

More information

How To Write A Mobile Device Policy

How To Write A Mobile Device Policy BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

Advanced Performance Measures

Advanced Performance Measures Advanced Performance Measures Establish a performance measurement system to guide decision making Presented By: Developing and utilizing: performance measures, data, & reporting for organization results

More information

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there

More information

SECURITY MANAGEMENT PRACTICES

SECURITY MANAGEMENT PRACTICES FAULKNER SECURITY MANAGEMENT PRACTICES Insightful, real-world reports for meeting today s complex security and business continuity challenges FREE PREVIEW AVAILABLE See inside for details guest authors

More information

Cybersecurity Workshop

Cybersecurity Workshop Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153

More information

Mobile Devices in Healthcare: Managing Risk. June 2012

Mobile Devices in Healthcare: Managing Risk. June 2012 Mobile Devices in Healthcare: Managing Risk June 2012 1 Table of Contents Introduction 3 Mobile Device Risks 4 Managing Risks and Complexities 5 Emerging Solutions 7 Conclusion 7 References 8 About the

More information

Save. Learn more or register cpa2biz.com/conferences 888.777.7077. How to Identify and Manage IT Risk in Assurance Services

Save. Learn more or register cpa2biz.com/conferences 888.777.7077. How to Identify and Manage IT Risk in Assurance Services IT Audit Training Schools Added Value for Attendees Free Trial of ActiveData and IDEA Early Bird Registration Save $ 75 IT Audit Training School How to Identify and Manage IT Risk in Assurance Services

More information

Refresher on cloud computing

Refresher on cloud computing Refresher on cloud computing Cloud computing is a form of outsourcing where the organization outsources data processing to computers owned by the vendor. Outsourcing may also include utilizing the vendor

More information

Demand Planning. & Forecasting. Predictive Intelligence Summit. October 10-11, 2012 San Diego, CA

Demand Planning. & Forecasting. Predictive Intelligence Summit. October 10-11, 2012 San Diego, CA Demand Planning & Forecasting 2012 Predictive Intelligence Summit October 10-11, 2012 San Diego, CA Leverage demand planning to improve forecasting accuracy and drive decision making Enhance sales and

More information

SECURING YOUR ENTERPRISE MOBILITY

SECURING YOUR ENTERPRISE MOBILITY SECURING YOUR ENTERPRISE MOBILITY STRATEGY, OPERATION & TECHNOLOGY INTERACTIVE TRAINING WORKSHOP Burj Al Arab, Dubai th th th 16, 17 & 18 March 2015 ABOUT LUCIDEUS Lucideus is a cyber space security leader

More information

SECURITY CONSIDERATIONS FOR LAW FIRMS

SECURITY CONSIDERATIONS FOR LAW FIRMS SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,

More information

2014 Spring Conference DIRECT FROM THE NATIONAL ACFE. Intro to Digital Forensics: Gathering and Preserving Electronic Evidence Presented by Cary Moore

2014 Spring Conference DIRECT FROM THE NATIONAL ACFE. Intro to Digital Forensics: Gathering and Preserving Electronic Evidence Presented by Cary Moore The Lansing Chapter of the Association of Certified Fraud Examiners 2014 Spring Conference DIRECT FROM THE NATIONAL ACFE Intro to Digital Forensics: Gathering and Presented by Cary Moore Tuesday, April

More information

Neoscope www.neoscopeit.com 888.810.9077

Neoscope www.neoscopeit.com 888.810.9077 Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine your practice without IT. Today,

More information

InfoSec Academy Forensics Track

InfoSec Academy Forensics Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Corporate Compliance Programs - Industry Best Practices. November 18, 2010 (Thursday) 8:00 a.m. to 12:00p.m.

Corporate Compliance Programs - Industry Best Practices. November 18, 2010 (Thursday) 8:00 a.m. to 12:00p.m. The Healthcare Financial Management Association of Northeastern New York is pleased to present the following education session: Event Forum: Where: When: Corporate Compliance Programs - Industry Best Practices

More information

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T The Cost of Insecure Mobile Devices in the Workplace! Sponsored by AT&T Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Part 1. Introduction The Cost of Insecure Mobile Devices

More information

Securing your Corporate Infrastructure What is really needed to keep your assets protected

Securing your Corporate Infrastructure What is really needed to keep your assets protected Securing your Corporate Infrastructure What is really needed to keep your assets protected Joseph Burkard CISA, CISSP October 3, 2002 1 Securing your Corporate Infrastructure Management Dilemma or Technical

More information

Auditor General's Office

Auditor General's Office City Purchasing Card Expense Report - January 2012 01/03/2012 The Institute of Internal Auditors 96.25 Vendor double billed, refund due. Original purchase Dec 1, 2011 for Professional Development Training:

More information

State Governments at Risk: The Data Breach Reality

State Governments at Risk: The Data Breach Reality State Governments at Risk: The Data Breach Reality NCSL Legislative Summit August 5, 2015 Doug Robinson, Executive Director National Association of State Chief Information Officers (NASCIO) About NASCIO

More information

DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH

DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH Andy Watson Grant Thornton LLP. All rights reserved. CYBERSECURITY 2 SURVEY OF CHIEF AUDIT EXECUTIVES (CAEs) GRANT THORNTON'S 2014 CAE SURVEY Data privacy and

More information

R4 1 453. Continuing Professional Education

R4 1 453. Continuing Professional Education R4 1 453. Continuing Professional Education A. Measurement Standards. The Board shall use the following standards to measure the hours of credit given for CPE programs completed by an individual registrant.

More information

Mobile Security Standard

Mobile Security Standard Mobile Security Standard Title Mobile Security Standard Mobile Device Security Category Version: 18/07/2013 PUBLISHED Author:, IT Services Contact: itsecurity@contacts.bham.ac.uk Mobile Security Standard

More information

MY PUBLIC ACCOUNTANT PRACTICE PROGRAM 2015. Preparation for practice success

MY PUBLIC ACCOUNTANT PRACTICE PROGRAM 2015. Preparation for practice success MY PUBLIC ACCOUNTANT PRACTICE PROGRAM 2015 Preparation for practice success The My Public Accountant (MPA) Practice Program is a fully interactive workshop which provides members with the tools needed

More information

UMAN RESOURCES ND TRAINING PROGRAM AND COURSE GUIDE

UMAN RESOURCES ND TRAINING PROGRAM AND COURSE GUIDE UMAN RESOURCES ND TRAINING PROGRAM AND COURSE GUIDE THE CENTER FOR HUMAN RESOURCES AND TRAINING For more than 15 years, DePaul University has helped human resource (HR) practitioners and consultants gain

More information

Feature. Developing an Information Security and Risk Management Strategy

Feature. Developing an Information Security and Risk Management Strategy Feature Developing an Information Security and Risk Management Strategy John P. Pironti, CISA, CISM, CGEIT, CISSP, ISSAP, ISSMP, is the president of IP Architects LLC. He has designed and implemented enterprisewide

More information

THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES. Department of Rehabilitation Report No. 14-15

THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES. Department of Rehabilitation Report No. 14-15 THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES Report No. 14-15 OFFICE OF INTERNAL AUDITS THE UNIVERSITY OF TEXAS - PAN AMERICAN 1201 West University Drive Edinburg, Texas

More information

Brown Smith Wallace, LLC

Brown Smith Wallace, LLC Brown Smith Wallace, LLC Successful Software Selection Whitepaper Series How to Adhere to Payment Card Industry Data Security Standards By Ron Schmittling, CPA/CITP, QSA, CISA, CIA To learn more about

More information

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach Best practices and insight to protect your firm today against tomorrow s cybersecurity breach July 8, 2015 Baker Tilly Virchow Krause, LLP Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently

More information

Application for CISM Certification

Application for CISM Certification Application for CISM Certification 4/2015 Requirements to Become a Certified Information Security Manager become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade

More information

Certified Information Security Manager (CISM)

Certified Information Security Manager (CISM) Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security

More information

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cybersecurity in the States 2012: Priorities, Issues and Trends Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State

More information

How To Protect Your Data From Theft

How To Protect Your Data From Theft Understanding the Effectiveness of a Data Protection Program IIA: Almost Free Seminar 21 June 2011 Agenda Data protection overview Case studies Ernst & Young s point of view Understanding the effectiveness

More information

Security Management Program Development:

Security Management Program Development: Security Management Program Development: A Critical Infrastructure Protection Model July 15 16, 2015 Earn up to 15 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Are

More information

Certified Red Flag Specialist (CRFS) Program Overview & Curriculum

Certified Red Flag Specialist (CRFS) Program Overview & Curriculum CRFS Overview The Certified Red Flag Specialist (CRFS) program is designed and administered by Identity Management Institute (IMI) to train employees, consultants and auditors of companies affected by

More information

Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner

Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Learning Objectives: Understand how fraud can occur Learn procedures you can implement to prevent fraud Learn how to detect fraud Common Situations

More information

GLOBAL STRATEGIC FINANCIAL ANALYSIS. A Graduate Elective Course for MBA, MSA, MACC, and MA Students. Belverd E. Needles, Jr., Ph.D.

GLOBAL STRATEGIC FINANCIAL ANALYSIS. A Graduate Elective Course for MBA, MSA, MACC, and MA Students. Belverd E. Needles, Jr., Ph.D. GLOBAL STRATEGIC FINANCIAL ANALYSIS A Graduate Elective Course for MBA, MSA, MACC, and MA Students Belverd E. Needles, Jr., Ph.D., CPA, CMA ACC 557 Summer 2013 2013 GLOBAL STRATEGIC FINANCIAL ANALYSIS

More information

Audit Capabilities: Beyond the Checklist. Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32

Audit Capabilities: Beyond the Checklist. Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32 Audit Capabilities: Beyond the Checklist Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32 Agenda Beyond the Checklist Visa Overview Visa Internal Audit Overview

More information

EXECUTIVE DECISION NOTICE. ICT, Communications and Media. Councillor John Taylor. Deputy Executive Leader

EXECUTIVE DECISION NOTICE. ICT, Communications and Media. Councillor John Taylor. Deputy Executive Leader EXECUTIVE DECISION NOTICE SERVICE AREA: SUBJECT MATTER: DECISION: DECISION TAKER(S): DESIGNATION OF DECISION TAKER(S): GOVERNANCE ICT, Communications and Media PERSONAL DEVICE POLICY That the Personal

More information

Identity Theft - Problems and Prevention Steps

Identity Theft - Problems and Prevention Steps Identity Theft and the Tax Practice Edward K. Zollars, CPA www.cperesources.com www.currentfederaltaxdevelopments.com New Mexico Tax Conference Today s Session Identity Theft in General Size of the Problem

More information

Logging In: Auditing Cybersecurity in an Unsecure World

Logging In: Auditing Cybersecurity in an Unsecure World About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that

More information

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012 BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.

More information

Network Marketing Strategy - Overview of the Colorado Cyber Security Program

Network Marketing Strategy - Overview of the Colorado Cyber Security Program COLORADO S CYBERSECURITY ASSESSMENT APPROACH Matt Devlin, CISA, CISM Deputy State Auditor September 30, 2014 Overview Colorado OSA and IT Audit Background State of Colorado IT and InfoSec Organizational

More information

IT Security Testing Services

IT Security Testing Services Context Information Security T +44 (0)207 537 7515 W www.contextis.com E gcloud@contextis.co.uk IT Security Testing Services Context Information Security Contents 1 Introduction to Context Information

More information

Adams County, Colorado

Adams County, Colorado Colorado Independent Consultants Network, LLC Adams County, Colorado Bring-Your-Own-Device Policy Prepared by: Colorado Independent Consultants Network, LLC Denver, Colorado March 20, 2014 Table of Contents

More information

Big Data Analytics Using CAATs

Big Data Analytics Using CAATs Big Data Analytics Using CAATs Date: 28 th 29 th January 2015 Time: 9.00am to 5.00pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur Big Data Analytics Using CAATs Big Data Analytics

More information

Policy-Standard heading. Fraud and Corruption Policy

Policy-Standard heading. Fraud and Corruption Policy Policy-Standard heading Fraud and Corruption Policy September 2013 Table of contents Introduction 3 Purpose 3 Scope 3 Related Policies and Processes 3 Definition of Fraud and Corruption 4 Policy 4 Code

More information

Security Risk Management Strategy in a Mobile and Consumerised World

Security Risk Management Strategy in a Mobile and Consumerised World Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key

More information

2012 Business Continuity Conference Friday, November 9, 2012

2012 Business Continuity Conference Friday, November 9, 2012 South Central PA Regional Business Preparedness Campaign 2012 Conference Friday, November 9, 2012 The South Central PA Task Force will hold a Regional Conference on Friday, November 9, 2012, at the C.

More information

Certified Forensic Accounting Professional

Certified Forensic Accounting Professional Certified Forensic Accounting Professional Insurance Specialization Certification in Insurance Frauds Certified Forensic Accounting Professional is the premier certification in India in the antifraud domain.

More information

RISK ASSESSMENT REPORT Internal Audit Department

RISK ASSESSMENT REPORT Internal Audit Department RISK ASSESSMENT REPORT Internal Audit Department June 2013 Internal Audit Department Analyzes Risk and Prioritizes Audit Work About This Report Professional auditing standards require the County Auditor

More information