The Hunt for Fraud. September 25, Seminar / Training. September 26, 2014
|
|
- Josephine Perry
- 8 years ago
- Views:
Transcription
1 BYOD and Securing Mobile Devices September 25, 2014 The Hunt for Fraud September 26, 2014 Seminar / Training Central Arkansas Chapter Information Systems Audit and Control Association, Arkansas Division of Legislative Audit & Business Automation Consultants Instructor: Albert Marcella Jr., Ph.D., CISA, CISM Victory Building (Capitol & Victory Streets) Room 445 Little Rock, AR Cost $350 Per person both days $175 Per person one day CPE Credit (Qualifies for CPA continuing education) 8 hours CPE BYOD 7 hours CPE Fraud 15 Hours Total September 25 and 26, 2014 Further information please contact: Kurt Cover Ext 4111 Kurt.cover@arklegaudit.gov Registration form below
2 CPE Credits 8 BYOD & Securing Mobile Technologies Description: As the world becomes more interconnected, integrated and intelligent, mobile devices are playing an ever-increasing role in changing the way people live, work and communicate. Personal computing devices are becoming more and more portable laptops, tablets, smart phones, USB thumb drives, etc., securing the sensitive information stored on those devices is more important than ever. The small size and portability of these devices mean they can be easily lost or stolen, placing both personal as well as corporate data at risk. This program will address the challenges in securing data and processing, limiting communication to designated parties, protecting sensitive data from the loss of a mobile device and methodologies for designing and implementing a viable, controlled and sustainable enterprise-wide BYOD policy. Audience: IT Managers, auditors, and system administrators, managers of telecommunications, info security professionals, HR managers, financial officers (CEO, CFO, COO), senior management (CIO, CXO, CSO) and IT professionals who through their involvement in managing or directing the IT infrastructure have responsibility for mobile technology management. This particular two-day program would also be of value to financial and operational audit professionals as well as non-it audit professionals tasked with the responsibility for assessing their organization's BYOD and mobile technology strategies. Prerequisites: There is no prerequisite for this seminar. Learning Level: Basic to Intermediate Instructional Method: Group-live Objectives: After completing this course, participants will: 1. Identify the unique risks associated with mobile technologies and the necessity of a viable mobile risk management initiative. 2. Recognize the essential elements in a comprehensive, enterprise-wide, BBYOD policy, the importance of protecting end user privacy and securing enterprise data. 3. Understand the critical importance for security and controls over employee and enterprise devices accessing sensitive systems and protected data. 4. Be better prepared to assist their organization in securing its operations, minimizing its security exposure, and mitigating the possibility of data loss via mobile devices. 5. Identify existing exposures and weaknesses within their organization's mobile communication operations, which would make the organization a potential target for cyber terrorists, cyber criminals, data thieves. 6. Have a better appreciation of the steps and elements required to develop an audit ICQ and program for assessing BYOD and mobile technology internal controls. Course Outline: Introduction Mobile Technologies Are Evolving BYOD Network and Productivity Concerns Securing Mobile Technology
3 BYOD Program Goals BYOD Issues & Concerns Policy and Guidelines Mobile Security Policy Mobile Risk Management BYOD Risk Mitigation Objectives Who s Responsible for Mobile Risk Management? Implementing Mobile Risk Management Mobile Technology - Risk Assessment BYOD & Compliance with Regulations Compliance & Social Media Websites and the Use of Personal Devices for Business Communications The Cost Of Compliance Network Access Control Secure Access BYOD to Company Networks And Data Network Security DHCP/DNS Management and Monitoring Tracking Down Rogue or Suspicious BYOD Devices Mobile Wireless Technologies Quick Response Codes Augmented Reality Near Field Communication Mobile Device Management Key Core Features of an MDM System MDM Issues Jailbreaking ios Android: Rooting Technical Risks General Mobile Technical Risks ios Technical Risks Android Mobile Device Management Security Controls Mobile Device Application Development Why Mobile? What are Apps? The Five Considerations for App Evaluation What Is A Good Mobile Application? Mobile application metrics What is Mobile Social Networking? What Is A Good Mobile Application?
4 Securing Mobile Technologies Security & Controls Overview Mobile Security Six Security Essentials Mobile Security - Bonus Security Essentials Security Baselines Key Issues to Consider When Evaluating the Security of Wireless Solutions Mobile Security Resources Summary Keys to a Successful BYOD Implementation Best Practices Supplemental Materials Available as Course Takeaways : 1. Mobile Technologies ICQ - Mobile Content Management 2. Mobile Technologies ICQ - Mobile Application Management 3. Mobile Technologies ICQ - Mobile Device Management 4. Mobile Technologies ICQ Security 5. Mobile Technologies ICQ BYOD General Policies The Hunt for Fraud: Prevention and Detection Techniques CPE Credits: 7 Description: This seminar provides attendees with a general overview of basic fraud concepts, as well as a review of specific areas such as statutes and standards related to the recording, reporting, and prosecution of fraudulent activities, internal auditor responsibilities in the audit for fraud, and fraud detection and prevention techniques. Also addressed during this seminar is the classification of frauds, investigation techniques, and fraud within information technology. The seminar will incorporate several case analyses of frauds perpetrated by employees and how such frauds were identified and investigated. The seminar will also introduce and incorporate the basic concepts of forensic analysis as a means of further investigating fraudulent activities by organization personnel, third party providers, and contractors. Audience: This seminar is intended for internal and external audit professionals, security investigators, General Counsels, Chief Security Officers, Controllers, InfoSec professionals, and anyone interested in obtaining a better understanding of and general introduction to auditing and controlling fraud with workplace environments. Prerequisites: There is no prerequisite for this seminar. Learning Level: Basic to Intermediate Instructional Method: Group-live
5 Objectives: After completing this seminar, participants will be able to: Provide organization decision-makers with enough information so that a business decision, consistent with policy and the entity's best interests, can be made regarding the identification and prevention of fraud Define and explain the differences among several kinds of errors frauds and illegal acts that might occur in an organization Increase individual fraud awareness within ongoing operations on how to minimize potential fraudulent activities from occurring Explain the various auditing standards related to fraud and illegal acts List and explain some conditions that can lead to frauds Comprehend basic aspects of fraud detection Obtain insight on fraud prevention and identifying weaknesses in internal control systems Describe some extended procedures for finding fraud Identify the importance of and differences between interviews and interrogations Describe forensic accounting techniques Identify evidence and documentary evidence Understand the roles which people, physical environment, and observation play in the investigation of fraud Course Outline: Conditions & Reasons Leading to Fraud Business circumstances requiring fraud auditing Conditions Which Create an Opportunity to Commit Fraud Reasons for Committing Fraud Fraud by the Numbers Fraud Statutes & Standards General Definition of Fraud and Applicable Law Federal Statutes Major Codified Standards on Fraud Auditing Fraud Audit Standards Overview Reducing Organizational Risk Fraud Policy Compliance Program to Reduce Organizational Risk Deterrence of Fraud - Audit Considerations Auditor s Role in Auditing for Fraud Detection of Fraud - Auditor Responsibilities Reporting of Fraud - Auditor Responsibilities Reasons Why Auditors Fail to Detect Fraud Pitfalls for Auditors Engaged in Auditing for Fraud Fraud - Warning Signs Personality Characteristics Organizational Characteristics Transactional Characteristics
6 Fraud Related Activities for Auditors High-Risk Areas for Fraud Health Care Advance Fee Scheme Impersonation Fraud Receipts Payables Payroll Inventories Purchasing Letter of Credit Fraud "Ponzi" Scheme Pyramid Scheme Retail Operations Web-based Fraud Telephone Fraud Auditing for Fraud: Tips & Techniques General Fraud Audit Checklist Fraud Detection Methods Checklist The Fraud Audit Process Reasons for Investigations How IT Can Spot Accounting Fraud Computerized Fraud Auditing: Crunching the Data How to Lock Out Fraud The Environment for Fraud Elements to Commit Fraud Factors that Change Nature of Risks
7 INSTRUCTOR Albert J. Marcella Jr., Ph.D., CISA, CISM President, Business Automation Consultants, LLC An internationally recognized public speaker, researcher, workshop and seminar leader with 36 years of experience in IT audit, security and assessing internal controls, Dr. Marcella, has authored numerous articles and 28 books on various IT, audit and security related subjects. Dr. Marcella s most recent book, Cyber Forensics: From Data to Digital Evidence, provides the reader with insights into how data are stored, processed, identified, analyzed, and eventually end up as evidential matter. This leading to a more thorough and detailed understanding of which data are relevant, significant, and most critical in a cyber-forensic investigation, and why. Which ultimately is the basis for and foundation of a comprehensive, well executed cyber forensic investigation. Research conducted by Dr. Marcella on cyber extortion, workplace violence, personal privacy, Electronic Stored Information (ESI), privacy risks in multifunctional devices (MFDs), cyber forensics, disaster and incident management planning and ethics, has appeared in the ISACA Journal, Disaster Recovery Journal, Journal of Forensic & Investigative Accounting, EDPACS, ISSA Journal, Continuity Insights, and the Internal Auditor Magazine. Dr. Marcella is the Institute of Internal Auditors Leon R. Radde Educator of the Year, 2000, Award recipient. Dr. Marcella has taught IT audit seminar courses for the Institute of Internal Auditors (IIA), continues to teach for the Information Systems Audit and Control Association (ISACA), and has been recognized by the IIA as a Distinguished Adjunct Faculty Member.
8 BYOD and Securing Mobile Devices The Hunt for Fraud Registration Form Date: September 25, 2014 BYOD 8:00 5:00pm September 26, 2014 Fraud 8:00 4:00 pm Place: Victory Building, Room 445, Capitol and Victory Streets, Little Rock, Arkansas Cost: Two days $ per person One day $175 per person (please check) BYOD Fraud Please make check payable to Central Arkansas ISACA (if payment by credit card please contact individual at bottom of form for instructions) Remit to: Central Arkansas ISACA, P.O. Box 2305, Little Rock, AR Registration form can be ed to: Lunch will be provided both days Please contact name at bottom of application if your organization requires to be billed. Name: Job Title: Organization/Company: address: Address: City: State & Zip Code: Phone: CPE credit hours: BYOD 8 Hours; Fraud 7 Hours (Does qualify for Certified Public Accountant CPE) Cancelation Policy: Registration ends September 19, Cancelations can be made until September 23, Full refunds will be given until September 12, If cancelling after September 12, a $65 administration fee will apply to the refund. Parking: We will reimburse for covered parking in the Victory Building deck. Daily fee is $5. Please request parking fee reimbursement at the seminar. Parking deck entrance on 6 th street (one way west). Turn right at the entrance gates in the deck, park in daily fee parking. Sky bridge to building is on the 2 nd level. If you need any further information or have special dietary requirements please contact: Kurt Cover at ext 4111 or kurt.cover@arklegaudit.gov
2014 Training Programs
2014 Training Programs Courses & Workshops Course Title Dates Venue Fees(BHD) 1- IT Security Workshop 16-18 March 5 Star Hotel 600 2- IT GRC Workshop 13-14 April 5 Star Hotel 400 3- COBIT 5 Foundation
More informationCertification and Training
Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel
More informationJanuary IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director
January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security
More informationWhat if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization?
What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization? What if you could not only maintain, but update and upgrade
More informationStepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
More informationTechnical Professionals
THE ARC TRAINING GROUP A Division of The ARC Consulting Group, Inc. A Profit Enhancement Firm Providing Educational and Consultative Services to the International Business Community SEMINAR FACT SHEET
More informationSuccessful Application Design: Auditing the Process Development Life Cycle
Successful Application Design: Auditing the Process Development Life Cycle CPE Credits: 7 CODE C2 Managing software projects is difficult under the best circumstances. You can reduce the difficulty and
More informationMobile Medical Devices and BYOD: Latest Legal Threat for Providers
Presenting a live 90-minute webinar with interactive Q&A Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Developing a Comprehensive Usage Strategy to Safeguard Health Information and
More informationExecutive Cyber Security Training. One Day Training Course
Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand
More informationA FRAUD EXAMINATION COURSE: PREPARATION FOR THE INTERNATIONAL CFE EXAMINATION (EQUIVALENT TO THE ADVANCE CERTIFICATE FRAUD EXAMINATION: SAQA NQF
A FRAUD EXAMINATION COURSE: PREPARATION FOR THE INTERNATIONAL CFE EXAMINATION (EQUIVALENT TO THE ADVANCE CERTIFICATE FRAUD EXAMINATION: SAQA NQF 6) Course 1: 12-16 March 2012 and 26-30 March 2012 Course
More informationWelcome to the 1 st Annual Executive Seminar & Workshop in Predictive Analytics + Big Data
International Association for the Management of Digital Analytics Standards, Training and Certification for Digital Analytics Management Managed Analytic Services Inc. Data Analysis Expertise Insight Value
More informationLeveraging Big Data to Mitigate Health Care Fraud Risk
Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud
More informationAll about CPEs. David Gittens CISA CISM CISSP CRISC HISP
All about CPEs David Gittens CISA CISM CISSP CRISC HISP The Designer David Gittens ISSA Barbados Past President Certified in ethical hacking and computer forensics Certified in security management and
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
More informationBusiness Forecasting and Analytics Forum
#JPKGroup Business Forecasting and Analytics Forum Financial Forecasting and Planning Finance Transformation S&OP and Demand Forecasting Sales and Market Forecasting and Analytics Collaborative Forecasting
More informationMobile Computing: A Study of Internal Auditors Awareness. 2013 Research Committee
Mobile Computing: A Study of Internal Auditors Awareness 2013 Research Committee Table of Contents INTRODUCTION... 3 MOBILE COMPUTING... 4 LITERATURE REVIEW... 4 DEFINITION... 4 MOBILE DEVICE TYPES AND
More informationISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore
With ever-increasing data volumes, more sophisticated fraud patterns, and a drive for strong corporate governance, how can organisations build a culture of integrity and compliance? Learn how data analytics
More informationForensic Analytics and Employee Fraud
Chapter Meeting Announcement Forensic Analytics and Employee Fraud Presented by Mark J. Nigrini, Ph.D. DATE: Friday, April 24, 2015 PLACE: Education Service Center Region 19 6611 Boeing Drive El Paso,
More informationAdvanced IT Audit Training
Advanced IT Audit Training Date: 28 th 30 th October 2014 Time: 8.30 am to 5.30 pm Venue: Iverson Associates, Center Point, Bandar Utama, Kuala Lumpur Advanced IT Audit Training Workshop Overview ISACA
More information2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP
2010 AICPA Top Technology Initiatives Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP Georgia Society of CPAs Annual Convention June 16, 2010 About the Presenter Partner-in-Charge, Habif,
More informationMICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, CPA, CIA AUDITOR GENERAL DATA SECURITY USING MOBILE DEVICES PERFORMANCE AUDIT OF
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT PERFORMANCE AUDIT OF DATA SECURITY USING MOBILE DEVICES DEPARTMENT OF TECHNOLOGY, MANAGEMENT, AND BUDGET January 2015 Doug A. Ringler, CPA, CIA AUDITOR
More information03/06/2014. Bring Your Own Device: A Framework for Audit. Acknowledgement
Bring Your Own Device: A Framework for Audit Emily A Knopp, CPA, CISA Audit Director Angelo State University, Member of Texas Tech University System March 6, 2014 Texas Association of College of University
More informationISACA Tools Help Develop Cybersecurity Expertise
Volume 21, 8 October 2014 ISACA Tools Help Develop Cybersecurity Expertise Nominate Qualified Candidates for the ISACA Board of Directors Tips for Solving Data Classification Challenges Earn CPE at Professional
More informationSarbanes-Oxley Compliance for Cloud Applications
Sarbanes-Oxley Compliance for Cloud Applications What Is Sarbanes-Oxley? Sarbanes-Oxley Act (SOX) aims to protect investors and the general public from accounting errors and fraudulent practices. For this
More informationDatabase Security and Auditing
Database Security and Auditing COURSE DESCRIPTION: This seminar aims to provide the Database Administrators, System Administrators, Auditors and IT Security Officers an overview on how to secure and audit
More informationCybersecurity@RTD Program Overview and 2015 Outlook
Cybersecurity@RTD Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD Information Technology Department of Finance & Administration
More informationDomain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
More informationAsset Management In A Consumerized World
Asset Management In A Consumerized World Generously sponsored by: August 28, 2012 Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London Welcome Conference Moderator Allan Wall ISSA Web Conference Committee
More informationIT Auditing and. Discussion Topics. What is IT Auditing?
IT Auditing and Computer Forensics Kevin H. Doar, CISA Auditor Discussion Topics What is IT Auditing? IT Auditor Skillset IT Auditing Standards & Frameworks IT Controls with Case Examples The Direction
More informationHow To Protect Your Organization From Liability From A Cell Phone (For Business)
Bring Your Own Device: A Framework for Audit March 6, 2013 1 Webinar Moderator Phil Hurd ACUA President 2 Your Presenters Mike Cullen, Senior Manager CISA, CISSP, CIPP/US > Leads the firm s Technology
More informationInto the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
More informationONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014
ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program
More informationWHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
More informationFRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE
FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE CPAs & ADVISORS experience reach // S. Todd Burchett, CPA, ABV, ASA, CFF, CFE Partner tburchett@bkd.com 210.268.1932 AGENDA
More informationHow-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationAuditing & Securing Enterprise Mobility Management
Auditing & Securing Enterprise Mobility Management Date: 30 th September and 1 st October 2014 Time: 9.00am to 5.00pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur Auditing & Securing
More informationHans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA
Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA HANS HENRIK BERTHING Married with Louise and dad for Dagmar and Johannes CPA, CRISC, CGEIT, CISA and CIA ISO 9000 Lead Auditor Partner and owner for Verifica
More informationStrategic IT audit. Develop an IT Strategic IT Assurance Plan
Strategic IT audit Develop an IT Strategic IT Assurance Plan Speaker Biography Hans Henrik Berthing is Partner at Verifica and Senior Advisor & Associated Professor at Aalborg University. He is specialized
More informationCybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015
Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key
More informationCyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA
More informationIntroduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors
Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Importance of Effective Internal Controls and COSO COSO
More informationAalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014
Aalborg Universitet Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication
More informationEducation and Training in Fraud and Forensic Accounting: A Guide for Educational Institutions, Stakeholder Organizations, Faculty and Students
NIJ Special Report Education and Training in Fraud and Forensic Accounting: A Guide for Educational Institutions, Stakeholder Organizations, Faculty and Students NOTE: The following is based on an exposure
More informationOFFICE OF AUDITS & ADVISORY SERVICES MOBILE DEVICE MANAGEMENT COUNTYWIDE AUDIT FINAL REPORT. County of San Diego Auditor and Controller
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES MOBILE DEVICE MANAGEMENT COUNTYWIDE AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA,
More informationThe Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee
More informationFifth Third Bank Center Charlotte, NC
CURRENT RISK ISSUES SEMINAR Sponsored By September 17 & 18, 2015 Fifth Third Bank Center Charlotte, NC The Fiduciary & Investment Risk Management Association, Inc. (FIRMA ) is registered with the National
More informationEnabling Information PREVIEW VERSION
Enabling Information These following pages provide a preview of the information contained in COBIT 5: Enabling Information. The main benefit of this publication is that it provides COBIT 5 users with a
More informationKeeping watch over your best business interests.
Keeping watch over your best business interests. 0101010 1010101 0101010 1010101 IT Security Services Regulatory Compliance Services IT Audit Services Forensic Services Risk Management Services Attestation
More informationERM Symposium April 2009. Moderator Nancy Bennett
ERM Symposium April 2009 RI4-Implementing a Comprehensive Privacy Program John Kelly Joseph Nocera Moderator Nancy Bennett Data & Identity Theft: Keeping sensitive data out of the wrong hands Presented
More informationHow To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
More informationAdvanced Performance Measures
Advanced Performance Measures Establish a performance measurement system to guide decision making Presented By: Developing and utilizing: performance measures, data, & reporting for organization results
More informationKevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor
IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there
More informationSECURITY MANAGEMENT PRACTICES
FAULKNER SECURITY MANAGEMENT PRACTICES Insightful, real-world reports for meeting today s complex security and business continuity challenges FREE PREVIEW AVAILABLE See inside for details guest authors
More informationCybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
More informationMobile Devices in Healthcare: Managing Risk. June 2012
Mobile Devices in Healthcare: Managing Risk June 2012 1 Table of Contents Introduction 3 Mobile Device Risks 4 Managing Risks and Complexities 5 Emerging Solutions 7 Conclusion 7 References 8 About the
More informationSave. Learn more or register cpa2biz.com/conferences 888.777.7077. How to Identify and Manage IT Risk in Assurance Services
IT Audit Training Schools Added Value for Attendees Free Trial of ActiveData and IDEA Early Bird Registration Save $ 75 IT Audit Training School How to Identify and Manage IT Risk in Assurance Services
More informationRefresher on cloud computing
Refresher on cloud computing Cloud computing is a form of outsourcing where the organization outsources data processing to computers owned by the vendor. Outsourcing may also include utilizing the vendor
More informationDemand Planning. & Forecasting. Predictive Intelligence Summit. October 10-11, 2012 San Diego, CA
Demand Planning & Forecasting 2012 Predictive Intelligence Summit October 10-11, 2012 San Diego, CA Leverage demand planning to improve forecasting accuracy and drive decision making Enhance sales and
More informationSECURING YOUR ENTERPRISE MOBILITY
SECURING YOUR ENTERPRISE MOBILITY STRATEGY, OPERATION & TECHNOLOGY INTERACTIVE TRAINING WORKSHOP Burj Al Arab, Dubai th th th 16, 17 & 18 March 2015 ABOUT LUCIDEUS Lucideus is a cyber space security leader
More informationSECURITY CONSIDERATIONS FOR LAW FIRMS
SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,
More information2014 Spring Conference DIRECT FROM THE NATIONAL ACFE. Intro to Digital Forensics: Gathering and Preserving Electronic Evidence Presented by Cary Moore
The Lansing Chapter of the Association of Certified Fraud Examiners 2014 Spring Conference DIRECT FROM THE NATIONAL ACFE Intro to Digital Forensics: Gathering and Presented by Cary Moore Tuesday, April
More informationNeoscope www.neoscopeit.com 888.810.9077
Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine your practice without IT. Today,
More informationInfoSec Academy Forensics Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
More informationCorporate Compliance Programs - Industry Best Practices. November 18, 2010 (Thursday) 8:00 a.m. to 12:00p.m.
The Healthcare Financial Management Association of Northeastern New York is pleased to present the following education session: Event Forum: Where: When: Corporate Compliance Programs - Industry Best Practices
More informationThe Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T
The Cost of Insecure Mobile Devices in the Workplace! Sponsored by AT&T Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Part 1. Introduction The Cost of Insecure Mobile Devices
More informationSecuring your Corporate Infrastructure What is really needed to keep your assets protected
Securing your Corporate Infrastructure What is really needed to keep your assets protected Joseph Burkard CISA, CISSP October 3, 2002 1 Securing your Corporate Infrastructure Management Dilemma or Technical
More informationAuditor General's Office
City Purchasing Card Expense Report - January 2012 01/03/2012 The Institute of Internal Auditors 96.25 Vendor double billed, refund due. Original purchase Dec 1, 2011 for Professional Development Training:
More informationState Governments at Risk: The Data Breach Reality
State Governments at Risk: The Data Breach Reality NCSL Legislative Summit August 5, 2015 Doug Robinson, Executive Director National Association of State Chief Information Officers (NASCIO) About NASCIO
More informationDATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH
DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH Andy Watson Grant Thornton LLP. All rights reserved. CYBERSECURITY 2 SURVEY OF CHIEF AUDIT EXECUTIVES (CAEs) GRANT THORNTON'S 2014 CAE SURVEY Data privacy and
More informationR4 1 453. Continuing Professional Education
R4 1 453. Continuing Professional Education A. Measurement Standards. The Board shall use the following standards to measure the hours of credit given for CPE programs completed by an individual registrant.
More informationMobile Security Standard
Mobile Security Standard Title Mobile Security Standard Mobile Device Security Category Version: 18/07/2013 PUBLISHED Author:, IT Services Contact: itsecurity@contacts.bham.ac.uk Mobile Security Standard
More informationMY PUBLIC ACCOUNTANT PRACTICE PROGRAM 2015. Preparation for practice success
MY PUBLIC ACCOUNTANT PRACTICE PROGRAM 2015 Preparation for practice success The My Public Accountant (MPA) Practice Program is a fully interactive workshop which provides members with the tools needed
More informationUMAN RESOURCES ND TRAINING PROGRAM AND COURSE GUIDE
UMAN RESOURCES ND TRAINING PROGRAM AND COURSE GUIDE THE CENTER FOR HUMAN RESOURCES AND TRAINING For more than 15 years, DePaul University has helped human resource (HR) practitioners and consultants gain
More informationFeature. Developing an Information Security and Risk Management Strategy
Feature Developing an Information Security and Risk Management Strategy John P. Pironti, CISA, CISM, CGEIT, CISSP, ISSAP, ISSMP, is the president of IP Architects LLC. He has designed and implemented enterprisewide
More informationTHE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES. Department of Rehabilitation Report No. 14-15
THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES Report No. 14-15 OFFICE OF INTERNAL AUDITS THE UNIVERSITY OF TEXAS - PAN AMERICAN 1201 West University Drive Edinburg, Texas
More informationBrown Smith Wallace, LLC
Brown Smith Wallace, LLC Successful Software Selection Whitepaper Series How to Adhere to Payment Card Industry Data Security Standards By Ron Schmittling, CPA/CITP, QSA, CISA, CIA To learn more about
More informationBest practices and insight to protect your firm today against tomorrow s cybersecurity breach
Best practices and insight to protect your firm today against tomorrow s cybersecurity breach July 8, 2015 Baker Tilly Virchow Krause, LLP Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently
More informationApplication for CISM Certification
Application for CISM Certification 4/2015 Requirements to Become a Certified Information Security Manager become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade
More informationCertified Information Security Manager (CISM)
Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security
More informationCybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
More informationHow To Protect Your Data From Theft
Understanding the Effectiveness of a Data Protection Program IIA: Almost Free Seminar 21 June 2011 Agenda Data protection overview Case studies Ernst & Young s point of view Understanding the effectiveness
More informationSecurity Management Program Development:
Security Management Program Development: A Critical Infrastructure Protection Model July 15 16, 2015 Earn up to 15 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Are
More informationCertified Red Flag Specialist (CRFS) Program Overview & Curriculum
CRFS Overview The Certified Red Flag Specialist (CRFS) program is designed and administered by Identity Management Institute (IMI) to train employees, consultants and auditors of companies affected by
More informationIs There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Learning Objectives: Understand how fraud can occur Learn procedures you can implement to prevent fraud Learn how to detect fraud Common Situations
More informationGLOBAL STRATEGIC FINANCIAL ANALYSIS. A Graduate Elective Course for MBA, MSA, MACC, and MA Students. Belverd E. Needles, Jr., Ph.D.
GLOBAL STRATEGIC FINANCIAL ANALYSIS A Graduate Elective Course for MBA, MSA, MACC, and MA Students Belverd E. Needles, Jr., Ph.D., CPA, CMA ACC 557 Summer 2013 2013 GLOBAL STRATEGIC FINANCIAL ANALYSIS
More informationAudit Capabilities: Beyond the Checklist. Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32
Audit Capabilities: Beyond the Checklist Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32 Agenda Beyond the Checklist Visa Overview Visa Internal Audit Overview
More informationEXECUTIVE DECISION NOTICE. ICT, Communications and Media. Councillor John Taylor. Deputy Executive Leader
EXECUTIVE DECISION NOTICE SERVICE AREA: SUBJECT MATTER: DECISION: DECISION TAKER(S): DESIGNATION OF DECISION TAKER(S): GOVERNANCE ICT, Communications and Media PERSONAL DEVICE POLICY That the Personal
More informationIdentity Theft - Problems and Prevention Steps
Identity Theft and the Tax Practice Edward K. Zollars, CPA www.cperesources.com www.currentfederaltaxdevelopments.com New Mexico Tax Conference Today s Session Identity Theft in General Size of the Problem
More informationLogging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
More informationBYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012
BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.
More informationNetwork Marketing Strategy - Overview of the Colorado Cyber Security Program
COLORADO S CYBERSECURITY ASSESSMENT APPROACH Matt Devlin, CISA, CISM Deputy State Auditor September 30, 2014 Overview Colorado OSA and IT Audit Background State of Colorado IT and InfoSec Organizational
More informationIT Security Testing Services
Context Information Security T +44 (0)207 537 7515 W www.contextis.com E gcloud@contextis.co.uk IT Security Testing Services Context Information Security Contents 1 Introduction to Context Information
More informationAdams County, Colorado
Colorado Independent Consultants Network, LLC Adams County, Colorado Bring-Your-Own-Device Policy Prepared by: Colorado Independent Consultants Network, LLC Denver, Colorado March 20, 2014 Table of Contents
More informationBig Data Analytics Using CAATs
Big Data Analytics Using CAATs Date: 28 th 29 th January 2015 Time: 9.00am to 5.00pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur Big Data Analytics Using CAATs Big Data Analytics
More informationPolicy-Standard heading. Fraud and Corruption Policy
Policy-Standard heading Fraud and Corruption Policy September 2013 Table of contents Introduction 3 Purpose 3 Scope 3 Related Policies and Processes 3 Definition of Fraud and Corruption 4 Policy 4 Code
More informationSecurity Risk Management Strategy in a Mobile and Consumerised World
Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key
More information2012 Business Continuity Conference Friday, November 9, 2012
South Central PA Regional Business Preparedness Campaign 2012 Conference Friday, November 9, 2012 The South Central PA Task Force will hold a Regional Conference on Friday, November 9, 2012, at the C.
More informationCertified Forensic Accounting Professional
Certified Forensic Accounting Professional Insurance Specialization Certification in Insurance Frauds Certified Forensic Accounting Professional is the premier certification in India in the antifraud domain.
More informationRISK ASSESSMENT REPORT Internal Audit Department
RISK ASSESSMENT REPORT Internal Audit Department June 2013 Internal Audit Department Analyzes Risk and Prioritizes Audit Work About This Report Professional auditing standards require the County Auditor
More information