Data synthesis in fraud detection and prevention for telecommunications service providers
|
|
|
- Maryann Holmes
- 10 years ago
- Views:
Transcription
1 Data synthesis in fraud detection and prevention for telecommunications service providers Executive Summary Growing transaction numbers and advances in technology are increasing the potential for fraud attacks on the telecommunications industry. The heavy dependence of telecom service providers (TSPs) on automation, the Internet, IP networks, and wireless networks can provide fraudsters with many opportunities to act. And, suspicion or evidence of fraud, waste, or abuse can present TSPs with numerous legal, compliance, and related issues. Facing such situations, TSPs historically have performed look back analysis to determine how likely and how large an alleged scheme may be. However, the inefficiency of this reactive approach can potentially impede investigation and resolution. This article discusses an alternative approach data synthesis which can help TSPs navigate their complex organizational structures and target and collect relevant fraud data when the need arises. Introduction Large TSPs can face numerous legal actions, compliance requirements, and other issues related to fraud, waste, and abuse. In situations requiring investigation, such as a chance discovery of fraudulent activity or an allegation by a whistleblower, involved parties frequently scramble to collect data or perform legal holds. Historically, many TSPs have responded to such matters by performing look back analysis based on data subsets collected by different departments or geographic locations. For example, when a TSP detects potential fraud, an investigative team may be assigned to determine the likelihood and scope of an alleged scheme, sometimes leading to a damages calculation. For a variety of reasons, this reactive approach can be inefficient and time consuming, potentially impeding thorough investigation and timely resolution. In assisting with several such investigations, Deloitte has observed that many TSPs may not have a clear procedure for collecting needed data. A lack of synthesis or merging of data between a TSP s fraud detection unit and finance department can impair the acquisition and conversion of extensive data sets often required for meaningful analysis. This article discusses potential strategies to help TSPs create a road map for implementing data syntheses on an enterprise level. These strategies are specifically designed to help TSPs navigate their complex organizational structures and help them target and collect relevant data when the need arises. Fraud s Impact on the Telecommunications Industry In 2012, telecommunications was estimated to be a $1.1 trillion business in the United States alone, employing more than 860,000 workers. 1 Over the past two decades, the rapid expansion of broadband and wireless services has fueled the evolution of telecommunications services and supporting technologies. Many TSPs, including local and long-distance phone carriers, cable operators, wireless carriers, and Internet service providers, as well as networking equipment companies, are working to adapt their organizational structures and operational models to this shifting landscape. TSP structures are often intricate, designed to accommodate business functions but engineered for cost efficiency. Such structures can challenge organizations that are pressed to gather data for a fraud-detection investigation, an anticipated or ongoing litigation matter, or a government-mandated compliance review. 1 Introduction to the Telecommunications Industry, Plunkett Research, Ltd. telecommunications-market-research/industry-trends 1
2 With telecom-related fraud estimated to cost approximately U.S. $40 billion 2 per year, detection and prevention remain TSP priorities. However, preparedness for and efficient response to incidences may continue to be a challenge. Meanwhile, fraudsters are likely to continuously evolve and create new ways to exploit weaknesses in TSP internal controls. With dramatically increasing telecom transactions and advances in technology, the industry may become an increasingly attractive target for fraudsters. The heavy dependence of TSPs on automation, the Internet, IP networks, and wireless networks can provide fraudsters with many opportunities to act. One study estimates that more than 200 types of telecom fraud exist, including schemes to manipulate a TSP s operator network or exploit a billing system. 3 Common fraud scenarios include: Billing system related frauds Subscription fraud: up to 10 percent of a carrier s bottom line can be lost to simple subscription fraud and other low-tech scams. 4 Fraudsters may open accounts and sign up for service using fake names and/ or addresses. Personal information exposed to criminals can be used to change existing customers addresses or phone numbers, often resulting in abuse of services. Assaulting security weaknesses in databases: fraudsters may hack a customer database containing billing names and address information, which they can use to send unsolicited commercial or spam mail to unsuspecting end users. The information can also be used to disguise a calling party s identity by falsifying telephone numbers and names relayed as caller ID information. Credit card fraud: fraudsters could make payments using another person s credit card and CVV number. Network related frauds Bypass fraud: unauthorized manipulation or exploitation of an operator s network is one of the latest and most severe threats to a telecom operator s revenue. 5 Hacking IP addresses: by hacking IP addresses behind the phone numbers of VoIP users, fraudsters and hackers can penetrate a company s VoIP system and route calls via its server. Other: Network related fraud schemes are continually being created and may include prison call forwarding, compromised PBX/voic systems, and hijacking of a network device, which could then be used to attack the vulnerabilities of a telecom network. The impact of telecom-related fraud on a TSP may take the form of a reduced financial bottom line. Ultimately, the effects may extend to the TSP s clients as well in the form of degraded services and support, potentially eroding its client base. These risks may compel some TSPs to detect fraudulent activities and protect themselves by developing customized rules and tests for fraud detection. Big Data in Telecom The emerging concept of big data may aptly describe data possessed by a TSP, as well as define the challenges associated with making effective use of these data. TSPs typically collect and maintain massive amounts of data, including telecom service transaction records, finance data, and human resources data. They often decide what data to collect primarily based on internal departmental requirements and geographic data needs. Data are usually separated logically across departments and geographical regions, and the types of data being collected and managed can be quite complex. Data types can include service transactions, customer information, and product and service types, as well as definitions for varying pricing and billing data models with overlapping life cycles. The data themselves may be subject to internal or governmental agency retention requirements. Data may also be shared across a TSP based on departmental needs (Figure 1). Figure 1: A typical model for sharing data across TSP departments: Services and Operations Information Technology Accounting Services Transactional Data Billing Data 2 Telecom frauds cost $40B globally, Swati Prasad,
3 Typically in large organizations, each department with specific functions develops its own criteria for capturing, cleansing, normalizing, storing, searching, sharing, analyzing, and retaining required data. Data that need to be moved and shared across departments or locations are generally provided in a summarized format and are limited to supporting specific functions, such as finance (e.g. customer billing, salaries) or operations (e.g. network traffic enhancements, customer support response time). Data analysis teams are typically composed of subject matter specialists (SMSs) from the TSP s fraud detection unit, who work in conjunction with data analytics specialists. The scope of an investigation can compound data collection challenges, particularly when the investigation requires data residing in decommissioned legacy systems, including those of another company acquired through merger or acquisition. Data Extraction and Analysis Challenges Data extracted and analyzed for fraud investigations typically consist of transactional data (e.g. phone call records), financial data (e.g. AR and AP records), and other reference data. The size and complexity of data sets can make them difficult to manage and process using available database management tools, legacy systems, and related applications. Aggregating and analyzing data reactively can be time consuming due to several factors: Inadequate synthesis between a TSP s fraud detection unit and finance department can make exceptional effort necessary to obtain and convert extensive data sets for meaningful analysis. Much time may be spent attempting to collect complete and useful data, as well as understand data definitions. Mergers and acquisitions may negatively affect the quality and completeness of data collection and interdepartmental information sharing. Understanding business rules and the policies and procedures behind data can be arduous and iterative. Often, data owners and subject matter specialists have to be brought in to gain insight into the multifaceted data. Data analytics specialists may encounter difficulties in reverse engineering complex data collection systems by tracing events through summarized data sets that cross departmental boundaries. Data Synthesis for a More Effective Solution Telecom fraud is prevalent and can have potentially significant financial impact. The collection and strategic distribution of data critical to detecting and preventing fraud across departments should be an enterprise- level effort properly prioritized in a TSP s strategic management initiatives (Figure 2). Prioritizing fraud detection and prevention efforts can begin with a cost/benefit analysis that objectively assesses fraud s true impact on the TSP, along with development of a plan for making the required enterprise-level changes. Figure 2. Proposed model for sharing data across departments Anti-Fraud Business Rules Services and Operations Information Technology Accounting Communications/ Marketing 3
4 Continuous addition of new telephone services and possibly mergers and acquisitions can lead TSPs to maintain disparate customer information databases. This approach can be attributed to the complexity of data collection and the highly customized manner in which large organizations manage data. If databases are not managed properly, each one may contain different information for the same customer. Outdated addresses and misspelled names can create confusion in billing and customer care. Merging data into a single database of accounts for many services may reduce confusion and improve efficiency. Developing an Enterprise Fraud and Misuse Management (EFM) Plan Integrating fraud management efforts under the umbrella of enterprise fraud and misuse management (EFM) can bring the pieces of the fraud puzzle together to provide a clear picture of a carrier's fraud risk and help develop a path to mitigating it. The effectiveness of this overarching solution hinges on how a TSP s departments develop and implement appropriate plans for fraud-related data collection, management, and distribution. A typical TSP organization includes large departments such as telecom services, information technology, accounting, and marketing. Each department possesses a distinct set of institutional knowledge that, when shared across the enterprise, can play a key role in detecting fraud. An example of this would be a sharp rise in fraud calls. According to Pindrop Security, approximately 1.3 million fraudulent calls were made in the first half of 2012, a 29 percent increase from the second half of Fraudsters have been targeting large banks and other financial services providers by calling people and claiming to represent these institutions. Mobilizing resources from different departments to promote interdepartmental collaboration and communication could be an effective approach for TSPs to fully detect this type of fraudulent activity. To help increase the effectiveness and return on investment of its EFM program, a TSP can consider these steps: Establish a results management office (RMO) and steering committee to manage the EFM program and serve as a single point of contact for oversight Develop cost models to identify the true impact of discount abuse, bad debt, and handset fraud and to measure the benefits of the new EFM approach Apply an integrated approach to the use of advanced analytics and continuous monitoring systems for identifying and tracking the different fraud types Enforce discount usage and credit collections recovery policies and procedures through internal-audit backtesting and regular training sessions Track fraud down to specific handset type and taking a multidimensional approach to fraud management, including subscription type, geography, usage characteristics, timing of subscriptions, and discount type An EFM solution can provide benefits beyond the primary goal of mitigating fraud. Establishing designated points of contact for data-collection-related questions within each department can be used for other purposes, such as improving overall operating efficiency. A holistic view and comprehensive catalogue of enterprise data can provide the organization with an opportunity to clean house and reorganize itself as appropriate to improve operations. And, interdepartmental understanding of business rules and policies, which may be niche knowledge within specific departments, can be enhanced. 4
5 An Actionable Solution TSPs may want to consider a four-step process for improving decision making and predictive capabilities in support of early fraud detection and mitigation: 1. Obtain or create relevant information Questionnaires can be distributed to capture detailed listings of information repositories and databases owned by each department within the company. Information to capture can include data dictionaries, data flow and process flow diagrams, data owners, and subject matter specialists. Network analysis diagrams can indicate how information repositories relate to and interact with one another. Issues may arise during the process that could impact timing, such as identifying the proper SMSs to provide applicable business rules and obtaining reference data, even when the data resides on systems owned and maintained by the TSP s IT department. SMSs may also reside outside of the department in which the data is being collected, another potential challenge. Following the initial information gathering, participating departments can periodically inventory their databases and catalog and update information related to the data sources they own. 2. Form an interdepartmental committee of data owners and SMSs After the relevant information is collected from each department, a committee can be assembled to assess the data sources and develop standardized, enterprise-level antifraud business rules. The committee can fairly represent the departments and help connect the dots, especially when many information systems are involved. 3. Conduct joint design sessions Regular meetings between data owners and SMSs can help flesh out antifraud business rules and identify key performance indicators. Organizations should consider potential timing issues that may arise during this process such as identifying the proper SMSs to provide the applicable business rules. Once the committee develops an understanding of existing rules, alerts, and data analytics frameworks, the committee can define business requirements and the analytical processes needed to meet them. Committee members can work closely with business and technical users to identify and document existing business use cases in support of analytical processes. Overviews of technical systems, dependencies, and key assumptions used for each of the business processes may be needed to develop meaningful and effective fraud detection mechanisms. To target areas for enhancement, SMSs can leverage their experience and knowledge of leading practices in data architecture and analytics to evaluate the technical and functional components of existing business rules. Harvested business rules can be independently reviewed and approved by a designated group of organizational stakeholders. Potential antifraud areas to considered include: Payment fraud (duplicate invoices, ghost employees and vendors, and segregation of duties) Telecom fraud (call forwarding and calling card scams) Consumer scams (identity theft and fraud calls) Early case assessment Litigation readiness 4. Develop and document a standard process to collect and catalog data the interdepartmental data committee can implement standard operating procedures (SOPs) to provide rules and oversight for data collection in response to new litigation matters or internal investigations. Along with capturing data sources, data descriptions, and points of contact for relevant information systems, the SOPs can document committee-developed antifraud business rules. The rules can reflect the departmental knowledge that is now being shared across the enterprise as a major component of antifraud initiatives. In planning for deployment of a new antifraud solution, TSPs can benefit from considering the solution s potential effects on employees and operations. Employees in some departments may be concerned that participating in the program could require significant time and resources. Internal politics and job security concerns may restrain SMSs from sharing niche knowledge of specific business rules and policies. Operationally, adding a new process may adversely affect efficiency and flexibility. And, even if SMSs willingly participate in joint design sessions, developing an inclusive roadmap that captures data points and institutional knowledge from various parts of the organization can be difficult. Conclusion The telecom industry has accumulated vast fraud knowledge, often through costly experience. The emergence of big data, combined with advanced and predictive analytics, can provide a powerful fraudprevention weapon. At a high level, TSPs can turn to telecom fraud specialists to help mitigate the challenges 5
6 of capturing, managing, and sharing relevant information from vast data repositories. These specialists can analyze the TSP s current state, provide an extensive gap analysis against recommended industry standards, and offer a plan to close identified gaps. TSPs that embrace telecom-related fraud prevention efforts and business processes and establish a complete set of available data can identify potential instances of known fraud types and ongoing and evolving fraud schemes. While many TSPs continue to use reactionary methods for detecting fraud, forward-looking industry players can reap the benefits of combining experience with technology. They can strengthen fraud reduction and prevention efforts and potentially predict areas of vulnerability. Case Study A TSP engaged Deloitte to assist in identifying potentially fraudulent call routing activities detected by the company s internal fraud detection and prevention unit. Our team consisted of a lead partner with a background in forensic investigations, as well as analytics practitioners. The engagement began with a series of meetings involving the Deloitte project team, the client s in-house counsel, and specialists from the client s fraud detection and prevention unit. The fraud unit provided a high-level understanding of the business processes related to the investigation, as well as offering a hypothesis of how the fraudulent activities were perpetrated. The fraud unit also presented sample data that appeared to show clear examples of anomalous and potentially fraudulent activities. To help define the scope of the investigation, the Deloitte team worked with the client to identify business process subject matter specialists (SMSs) who could offer detailed insights into how the potentially fraudulent activities differed from normal activities. For example, our team wanted to understand how to categorize phone call activities by call type and tariff-zone jurisdiction, as well as leverage available data for the purpose of calculating damages. The analytics practitioners worked with the SMSs to identify key data points to be collected for analysis. The engagement revealed that providing the client s operations team with real-time access to reference data could aid in detecting, and potentially preventing, fraudulent activity. Transactions could be tested against client data and business rules in the accounting department s database to test transactions as they transpire. Because constant monitoring of transactions could come at a performance cost, methods such as sampling were identified as potentially helping meet both performance and risk mitigation goals. Contacts David Wallis Partner, Deloitte Forensic Deloitte Financial Advisory Services LLP [email protected] Dimitri Saad Senior Manager, Analytics Deloitte Transactions & Business Analytics LLP [email protected] Hong Zhou Manager, Analytics Deloitte Transactions & Business Analytics LLP [email protected] Young Lee Analytics Specialist Master Deloitte Transactions & Business Analytics LLP [email protected] As used in this document, Deloitte Advisory means Deloitte & Touche LLP, which provides audit and enterprise risk services; Deloitte Financial Advisory Services LLP, which provides forensic, dispute, and other consulting services; and its affiliate, Deloitte Transactions and Business Analytics LLP, which provides a wide range of advisory and analytics services. Deloitte Transactions and Business Analytics LLP is not a certified public accounting firm. These entities are separate subsidiaries of Deloitte LLP. Please see for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. This publication contains general information only and Deloitte is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this publication. Copyright 2015 Deloitte Development LLC. All rights reserved. Member of Deloitte Touche Tohmatsu Limited
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Legal billing and predictive coding A fresh way to assess your legal spend
Legal billing and predictive coding A fresh way to assess your legal spend The legal technology industry didn t really come through with its promise of useful real-time analytics on a phase and activity
Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan
WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data
NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation
NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation Market Offering: Package(s): Oracle Authors: Rick Olson, Luke Tay Date: January 13, 2012 Contents Executive summary
Deloitte Analytics. Trusting big data: Perspective on data governance as a customer analytics investment
Deloitte Analytics Trusting big data: Perspective on data governance as a customer analytics investment Many companies are investing significant amounts in customer analytics to drive their business and
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Leveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency. kpmg.com
Leveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency kpmg.com Leveraging data analytics and continuous auditing processes 1 Executive
Cyber Security Evolved
Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage
Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report. November 23, 2015
Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report November 23, 2015 Table of contents Background Exercise objectives Quantum Dawn 3 (QD3) cyberattack scenario
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption Toby Bishop, Director, Deloitte Forensic Center Deloitte Financial Advisory Services LLP Contents Why corporate resiliency? What
Advanced Analytics for Better Insights. Part of the Insurance series: Benefits of a New Policy Administration System: Why Going Live is Not Enough
Advanced Analytics for Better Insights Part of the Insurance series: Benefits of a New Policy Administration System: Why Going Live is Not Enough Abstract Insurance professionals agree that data is a key
Information Security Incident Management Guidelines
Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of
Key Cyber Risks at the ERP Level
Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche
Fraud Risk Management providing insight into fraud prevention, detection and response
Fraud Risk Management providing insight into fraud prevention, detection and response For private circulation only www.deloitte.com/in Fraud follows opportunity and attacks weakness. Know where you are
Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
Risk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
Promoting Network Security (A Service Provider Perspective)
Promoting Network Security (A Service Provider Perspective) Prevention is the Foundation H S Gupta DGM (Technical) Data Networks, BSNL [email protected] DNW, BSNL 1 Agenda Importance of Network Security
THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.
THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from
IBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
Antifraud program and controls assessment grid*
Advisory Services Antifraud program and * Fraud risks & controls February 2008 *connectedthinking 2008 PricewaterhouseCoopers LLP. All rights reserved. PricewaterhouseCoopers refers to PricewaterhouseCoopers
CFO Insights How CFOs Can Own Analytics
CFO Insights How CFOs Can Own Analytics Much has been made about the unprecedented quantities of data companies collect these days, from their own operations, supply chains, production processes, and customer
Sustainability Analytics The three-minute guide
Sustainability Analytics The three-minute guide Sustainability Analytics The three-minute guide 1 Why it matters now Sustainability isn t just good for your corporate image and conscience. It s good for
International Dialing and Roaming: Preventing Fraud and Revenue Leakage
page 1 of 7 International Dialing and Roaming: Preventing Fraud and Revenue Leakage Abstract By enhancing global dialing code information management, mobile and fixed operators can reduce unforeseen fraud-related
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
The Path Ahead for Security Leaders
The Path Ahead for Security Leaders Executive Summary What You Will Learn If you asked security leaders five years ago what their primary focus was, you would likely get a resounding: securing our operations.
ISO27032 Guidelines for Cyber Security
ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
Hedge fund launch considerations Reaching new boundaries. Investment Management
Hedge fund launch considerations Reaching new boundaries Investment Management There are people who make things happen, there are people who watch things happen, and there are people who wonder what happened.
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======
VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call
Best Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP
Best Practices in Incident Response SF ISACA April 1 st 2009 Kieran Norton, Senior Manager Deloitte & Touch LLP Current Landscape What Large scale breaches and losses involving credit card data and PII
Fraud Prevention Checklist for Small Businesses
Fraud Prevention Checklist for Small Businesses 11 Ways to Minimize the Risk and Impact PAYMENT SOLUTIONS Fraud can have a devastating impact on small businesses. Prevention and mitigation strategies can
Advanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
Analytics for Shared Services The three-minute guide
Analytics for Shared Services The three-minute guide Don t squint. Select the full-screen option to view at full size. Analytics for Shared Services The three-minute guide 1 2 Why it matters now You may
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
AUDIT REPORT. The Energy Information Administration s Information Technology Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
An Oracle White Paper October 2009. An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions
An Oracle White Paper October 2009 An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions Executive Overview Today s complex financial crime schemes pose
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
From Information Management to Information Governance: The New Paradigm
From Information Management to Information Governance: The New Paradigm By: Laurie Fischer Overview The explosive growth of information presents management challenges to every organization today. Retaining
Fostering Incident Response and Digital Forensics Research
Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel [email protected] September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital
CISM (Certified Information Security Manager) Document version: 6.28.11
CISM (Certified Information Security Manager) Document version: 6.28.11 Important Note About CISM PDF techexams CISM PDF is a comprehensive compilation of questions and answers that have been developed
RSA enables rapid transformation of Identity and Access Governance processes
RSA enables rapid transformation of Identity and Access Governance processes Sean Peasley, Principal Laxman Tathireddy, Senior Manager Deloitte & Touche LLP Cyber Risk Services Identity and Access Governance
FRAUD RISK ASSESSMENT
FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by
Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff
Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff The Challenge IT Executives are challenged with issues around data, compliancy, regulation and making confident decisions on their business
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Deloitte and SuccessFactors Workforce Analytics & Planning for Federal Government
Deloitte and SuccessFactors Workforce Analytics & Planning for Federal Government Introduction Introduction In today s Federal market, the effectiveness of human capital management directly impacts agencies
GOVERNANCE, RISK AND COMPLIANCE. Internal Audit. Assessing Fraud Vulnerabilities. kpmg.com/in
GOVERNANCE, RISK AND COMPLIANCE Internal Audit Assessing Fraud Vulnerabilities kpmg.com/in 1 Internal Audit Assessing Fraud Vulnerabilities Introduction Globalization has increased the scale and complexity
Next Generation Telecom Expense Management
IBM Software Industry Solutions Telecom Expense Management Next Generation Telecom Expense Management Expanding TEM Beyond Invoices to Generate Greater Value and Control for the Global Enterprise Next
Fraud Risk Management
Fraud Risk Management Overview Discussion Questions 1) Does your organization follow a specific risk management model? If so, which one? Do you think this model adequately addresses the risks your organization
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
Addressing Cyber Risk Building robust cyber governance
Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Release Management: Effective practices for IT delivery
Release Management: Effective practices for IT delivery Introduction Today s health plans face a unique combination of technology challenges due to their complex IT environments. These environments serve
SIEM Implementation Approach Discussion. April 2012
SIEM Implementation Approach Discussion April 2012 Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual
Data Privacy and Gramm- Leach-Bliley Act Section 501(b)
Data Privacy and Gramm- Leach-Bliley Act Section 501(b) October 2007 2007 Enterprise Risk Management, Inc. Agenda Introduction and Fundamentals Gramm-Leach-Bliley Act, Section 501(b) GLBA Life Cycle Enforcement
AGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
M&A analytics The three-minute guide
M&A analytics The three-minute guide M&A analytics The three-minute guide 1 Why it matters now Smarter decisions An M&A deal can be one of the biggest decisions a company makes, so it pays to do it right.
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
Table of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise
Best practices in open source governance Managing the selection and proliferation of open source software across your enterprise Table of contents The importance of open source governance... 2 Executive
Fraud and Role of Information Technology. September 2008
Fraud and Role of Information Technology September 2008 Agenda IT Value Proposition Slide 2 Prior Interpretations of Internal Control Structure Have Addressed Three Separate Parts Which Were Audited Somewhat
National Market System (NMS) plan
SEC Rule 613: Consolidated Audit Trail National Market System (NMS) plan Considerations for broker-dealers Contents What is SEC Rule 613? 3 Why was Rule 613 proposed? 3 What does CAT mean to broker-dealers?
NIST Cybersecurity Framework & A Tale of Two Criticalities
NIST Cybersecurity Framework & A Tale of Two Criticalities Vendor Management & Incident Response Presented by: John H Rogers, CISSP Advisory Services Practice Manager [email protected] Presented
SAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF
PRODUCT BRIEF SAS Fraud Management Real-time scoring of all transactions for fast, accurate fraud detection Overview Organizations around the globe lose approximately 5 percent of annual revenues to fraud,
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013
Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
Claims Management Services Get help to analyze the problem and execute an effective remediation plan
Claims Management Services Get help to analyze the problem and execute an effective remediation plan Your Challenge From time to time, a business may face a significant claim (or group of related claims)
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
Internal audit analytics: The journey to 2020 Insights-driven auditing
Internal audit analytics: The journey to 2020 Insights-driven auditing By capitalizing on the wealth of data now available from your own business activities as well as external sources internal audit (IA)
SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.
SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
Telecom Expense Management
Telecom Expense Management WIRELESS EXPENSE MANAGEMENT SMART-BYOD 24/7 HELP DESK mindwireless.com 512.615.7600 866.777.1456 [email protected] Telecom Expense Management, once only the practice of the
Cybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
The Internal Audit fraud challenge Prevention, protection, detection
The Internal Audit fraud challenge Prevention, protection, detection Contents Introduction to survey 1 Key findings 2 What are the views of senior management? 3 Adequately resourced? 6 Current trends and
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
AUTOMATED PENETRATION TESTING PRODUCTS
AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for automated penetration testing software and demonstrate
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector
New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial
