Economic Crime: A Threat to Business Globally
|
|
|
- Clinton Gilmore
- 10 years ago
- Views:
Transcription
1 s 2014 Global Economic Crime Survey Latin America Supplement Economic Crime: A Threat to Business Globally
2 Introduction We are pleased to present the Latin America results of the PricewaterhouseCoopers 2014 global economic crime survey, one of the broadest and most comprehensive economic crime surveys we have ever conducted. Our 2014 survey included 5,128 representatives from 95 countries, comprised of 711 Latin America organizations in 12 countries, including Argentina, Brazil, Chile, Ecuador, Mexico, Peru and Venezuela. Since our first survey in 2001, data shows that at any given time period, at least one in three of those surveyed reported suffering a significant economic crime event. Like a virus, economic crime adapts to the trends that affect all organizations and threaten the basic processes common to all businesses paying and collecting, buying and selling, hiring and firing. This year s report is focused on the economic crime threat to your business processes, eroding the integrity of your employees and tarnishing your reputation. One in three (35%) organizations in Latin America suffered from economic crime in the past two years. The contents of this publication include: 1. Economic crime in Business processes are under attack 3. Under the eye of the enforcement 4. Cybercrime the risks of a networked world 5. The fraudster know your adversary We provide this material with the objective of highlighting the continuing and evolving threats of economic crimes and as a reminder of the importance of periodic risk assessments, revaluation of controls and the need for maintaining an effective internal control system.
3 Economic crime remains a fact of life for every business 1. Economic crime in 2014 This year s survey confirms that economic crime remains a fact of life for every business in all industry sectors 35% of our respondents reported that their organization experienced economic crime during the survey period. 74% This year, we added procurement fraud, human resources fraud and mortgage fraud as new categories of fraud to our survey. Procurement fraud received a significant response (27%), making it the second most type of fraud reported. Higher-thanaverage incidents of procurement fraud were reported in Brazil (44%), Peru (37.5%) and Mexico (31%). We believe this category is primarily driven by two trends more competitive public tender processes from governments and state-owned businesses, and the increasing integration of supply chain into core business activities. The percentage of respondents who experienced bribery and corruption increased from 19% in 2011 to 25% in who reported suffering this type of crime in Higher-than-average incidents of bribery and corruption were reported in Brazil (28%), Mexico (31%) and Venezuela (36%). The industries that reported the highest levels of bribery and corruption in Latin America were energy, utilities and mining, manufacturing, transportation and logistics, retail and consumer and financial services. Figure % 25% 20% 19% Five most prevalent types of economic crime reported in Latin America. The percentage of respondents who reported asset misappropriation and cybercrime incidents increased slightly when compared to the 2011 survey results. Conversely, 25% of respondents reported experiencing bribery and corruption during the current survey period, an increase of 6% from the 19% of respondents Concurrently, the percentage of respondents who experienced accounting fraud increased from 13% in 2011 to 19% in As bribes and related payments are not usually recorded accurately in financial statements, a corruption issue can quickly turn into an accounting issue as well. 1
4 The financial and collateral effects of economic crime 2. Business processes are under attack The most basic business processes- sales, distribution, logistics, vendor selection, procurement, payments, etc.- rest on the basic process of exchange of cash or other consideration. These points of contact are generally the vulnerable points where economic crime can threaten. Processes under threat logistics supply chain procurement tax compliance 2 onboarding data security payments recruitment distribution intellectual property sales marketing international expansion vendor compliance A quarter (24%) of respondents who experienced economic crime in Latin America reported financial losses between USD100,000 and USD1million. Losses between USD1million and USD5million were reported by 10% of the organizations that suffered economic crime, while 3.6% of respondents reported financial losses higher than USD5million. While economic crimes related to a single episode cause losses, having your organization compromised by a bribery and corruption scheme is a more systemic assault on your company and has a greater impact. Not only may these crimes lead to substantial fines and a blemish on your reputation, they can cause a lasting damage. They erode the integrity of employees and exploit weaknesses in internal control structures in a company s sales, marketing, distribution, compliance, supply chain, payments processing, government relationships, and accounting and financial reporting. Our respondents pointed at damage to employee morale, corporate and brand reputation, and business relations as some of the most severe non-financial impacts of economic crime. Employee morale 41% 3% 15% 17% Share price 16% Relations with regulators Reputation/ Brand Business relations Figure 2.1 Collateral effects of economic crime. Percentage of Latin America respondents who experienced economic crime over the survey period. It is worth noting that respondents from Latin America reported a significant higher impact on employee morale (41%) compared to the 31% reported by overall global survey respondents.
5 Bribery and corruption, money laundering and anticompetitive behavior 3. Under the eye of the enforcement Some types of economic crimes- bribery and corruption, money laundering and anticompetitive behaviour- attract significantly more attention from government enforcement agencies than others. In addition to financial losses, the greatest effects perceived by survey respondents across these three areas of economic crime are damage to reputation, as well as disruption and distraction. Financial Loss Disruption/ Distraction Corporate Reputation Figure 3.1 Perceived severe impact, by highlighted economic crime. Anti-Trust/ Competition Law Money Laundering Bribery/Corruption Colombia Article 433 of the Colombian Penal Code, amended by the new Anti-Corruption Statute (Law No of 2011) Effective July 12, 2011 Chile Law No. 19,829, amending the Chilean Criminal Code Effective October 8, 2002 These crimes arise from the failure of businesses to adhere to the expected code of conduct established by countries around the world. Several countries are committed to enforcement programmes with increasingly stringent standards and stiff penalties. In Brazil, a new federal anticorruption law, Brazil s Clean Companies Act (BCCA), came into effect on January , increasing the number of Latin Mexico The Mexican Federal Penal Code and the Mexican Criminal Code Effective June 2009 Brazil Brazil s Clean Companies Act (BCCA) Effective January 29, 2014 Figure 3.2 Latin American countries that adhered to the OECD Anti-Bribery Convention. American countries with specific legislation on this issue. Money laundering continues to be a great concern for the financial services industry. Half (50%) of the money laundering incidents in Latin America were reported by organizations in the financial sector. Only 2.8% of respondents in Latin America reported suffering Anti-Trust/Competition Law incidents, compared to 5.2% of respondents globally. 3
6 Data confidentiality under threat 4. Cybercrime the risks of a networked world Cybercrime continues to rank high on the list of economic crimes reported. One in five respondents (20%) reported experiencing a cybercrime in the last 24 months. It is also important to consider that a significant percentage of those who did not report cybercrime may also have suffered an event and not even known about it. That underscores the challenge of the threat. Many entities do not have clear insight into whether their networks and the data contained therein have been breached, and they don t know what has been lost- or its value. The magnitude of a cybercrime may not be felt for years. If R&D information, intellectual property, trade secrets, or other high level information is compromised, the business impact may not be felt immediately. It may take months or years before the business feels the full effect on competitive advantage or degradation of cash flows. 4 Further complicating the picture is a third aspect of the lack of transparency into cybercrime events: even when it is detected, cybercrime often goes unreported. Outside of privacy breaches in regulated areas such as identity theft, there are few regulatory conventions requiring disclosure. And often- such as in the case of theft of key intellectual propertythere may be compelling competitive reasons for organizations to keep such losses confidential. Sixty per cent (60%) of the cybercrime incidents reported were experienced by organizations in the financial services industry. Why such a large percentage? Large, regulated financial institutions often have more and better system safeguards- which may increase the chance of a breach s being detected. In addition, banks are where the money is. Finally, financial institutions are an appealing target because they provide large amounts of customer and personal financial information Cybercrime threatens technology-enabled business process, including: Expansion into new markets ATM transactions Supply chain Consumer incentives Infrastructure weak points Privacy of customers (health care industry) M&A Research, development and engineering Point of sale purchases (debit and credit cards) E-commerce or on-line sales processes online, which can potentially be accessed- and sold on the black market- as a precursor to organizing a theft of funds.
7 To catch a thief 5. The fraudster know your adversary We asked respondents whose organization experienced economic crime to profile the main perpetrator of the most serious fraud faced. Seventy per cent (70%) of respondents from Latin America reported that the perpetrator was internal, and 23% reported the main perpetrator as external. The financial services sector reported a different profile- 46% of respondents cited external perpetrators as their greatest fraud adversaries, while 21% reported the main perpetrators as internal. This is likely due to the high rate of cybercrime affecting financial services and to the fact that cybercrime tends to involve external fraudsters. Other (hackers, service providers, etc.) Don t know Customer Agents/ Intermediaries Vendor 10% 16% 19% 25% 30% Figure 5.1 Main external Perpetrators. Age Gender 31 to up to 50 Up to 30 Don t years 41% years 28% years 18% know 7% Male Length of service 3 up to 5 years Education Level 1 st degree, graduate Female Not Stated 85% 11% 4% 6 up to 10 years More than 10 years Up to 2 years Older than 50 years 6% Don t know 30% 26% 21% 16% 7% High school or less Postgraduate Don t know 32% 30% 27% 11% Figure 5.2 Age, gender, length of service and education level of internal perpetrator. Respondents from Latin America reported that the main actions taken against external perpetrators were to notify the relevant regulatory authorities (42%), take civil action including recoveries (28%), inform law enforcement (21%) and terminate the business relationship (19%). The main actions reported against internal perpetrators were dismissal (80%), civil action including recoveries (42%) and notification to relevant regulatory authorities (22%). Sixty two per cent (62%) of respondents reported that fraud was detected through the corporate controls, including data analytics, internal audit, suspicious transaction reporting, corporate security and fraud risk assessment. Twenty three per cent (23%) reported that fraud was detected through the corporate culture, including tip-off and whistle-blowing system. Eleven per cent (11%) reported that fraud detection occurred through methods beyond the influence of management, including investigative media, law enforcement and by accident. 5
8 Latin America Forensic Services United States Mona Clayton Miami, FL Frank Badalamenti Managing Director New York, NY [email protected] Vanessa Salinas Beckstrom Director Chicago, IL [email protected] Alberto Orozco Director Houston, TX [email protected] Argentina Jorge Bacher Buenos Aires, Argentina [email protected] Brazil Martin Whitehead Sao Paulo, Brazil [email protected] Canada Peter Vakof Toronto, Canada [email protected] James Pomeroy Director Caribbean/Halifax [email protected] Chile Colin Becker Santiago, Chile [email protected] Colombia Stephen Anderson Manager Bogota, Colombia Ext 363 [email protected] Ecuador Gonzalo Argandona Guayaquil [email protected] Mexico Luis Vite Mexico City, Mexico [email protected] Peru Humberto Salicetti Lima, Peru [email protected] Venezuela Roberto Sanchez Principal Caracas, Venezuela [email protected]
9 2014 PricewaterhouseCoopers LLP. All rights reserved. In this document, refers to PricewaterhouseCoopers LLP, which is a member firm of PricewaterhouseCoopers International Limited, each member firm of which is a separate legal entity.
Confronting the changing face of economic crime
PwC s 2014 Global Economic Crime Survey February 2014 Confronting the changing face of economic crime 4 th South African edition 134 respondents from organisations in 17 industry sectors provide insights
Economic crime: A threat to business globally
PwC s 2014 Global Economic Crime Survey Economic crime: A threat to business globally 37% More than one in three organisations report being victimized by economic crime. 53% More than half of CEOs surveyed
Economic crime: A threat to business globally
PwC s 2014 Global Economic Crime Survey Economic crime: A threat to business globally 37% More than one in three organisations report being victimized by economic crime. 53% More than half of CEOs surveyed
Economic crime is on the rise 76%
PwC s 2014 Global Economic Crime Survey Engineering & construction Canadian supplement Economic crime is on the rise in the engineering & construction sectors 49% Nearly half of respondents reporting economic
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
A Framework for Managing Crime and Fraud
A Framework for Managing Crime and Fraud ASIS European Security Conference & Exhibition Gothenburg, April 15, 2013 Torsten Wolf Group Head of Crime and Fraud Prevention Agenda Introduction Economic Crime
Overall, which types of fraud has your organisation experienced in the past year?
1) Overall, which types of fraud has your organisation experienced in the past year? Insider fraud Corporate Account Takeover Consumer Account Takeover ATM/ABM (skimming, ram raid, etc.) Bill pay Cheque
Our vision. A company where the best people want to work.
Code of Conduct Our vision A company where the best people want to work. The world leader in chemical distribution, providing unparalleled connectivity between customers and suppliers. 2 Univar s guiding
Cybercrime in the spotlight
www.pwc.ch/crimesurvey Cybercrime in the spotlight Swiss Economic Crime Survey 2011 140 organisations provide a Swiss picture of economic crime. November 2011 INSERT IMAGE HERE Compared to the results
Policy-Standard heading. Fraud and Corruption Policy
Policy-Standard heading Fraud and Corruption Policy September 2013 Table of contents Introduction 3 Purpose 3 Scope 3 Related Policies and Processes 3 Definition of Fraud and Corruption 4 Policy 4 Code
FEI Canada. Fraud Prevention. Presented by: Matthew McGuire and Leigh Beijer. Date:
FEI Canada Fraud Prevention Presented by: Date: Matthew McGuire and Leigh Beijer June 11, 2015 Agenda Presenter Introductions Overview Elements of a fraud program Investigating Fraud Page 2 Presenter Introductions
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?
Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies
Exercising Your Enterprise Cyber Response Crisis Management Capabilities
Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.
Ethics and Compliance Training
www.pwc.com Ethics and Compliance Training Keep Up Your Dukes - Benchmarking and Maintaining Your System April 1, 2014 Ethics and Compliance Keep Up Your Dukes - Benchmarking and Maintaining Your System
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
Trends, News and Events that are Shaping the AML Arena in Latin America
Trends, News and Events that are Shaping the AML Arena in Latin America Presented by: Octavio Betancourt- Managing Director 1 MoneyLaundering.com 15 th Annual International Anti-MoneyLaundering Conference
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former
PCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
CYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
LGMA Qld Governance and Corporate Planning Village Forum
www.pwc.com.au Fraud Risk Management Fraud Risk Assessments LGMA Qld Governance and Corporate Planning Village Forum March 2015 Agenda Introductions Fraud Risk Management Fraud Statistics s Global Economic
Assessing the strength of your security operating model
www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy
Presentation for : The New England Board of Higher Education Hot Topics in IT Security and Data Privacy October 22, 2010 Rocco Grillo, CISSP Managing Director Protiviti Inc. Quote of the Day "It takes
Fraud Prevention Checklist for Small Businesses
Fraud Prevention Checklist for Small Businesses 11 Ways to Minimize the Risk and Impact PAYMENT SOLUTIONS Fraud can have a devastating impact on small businesses. Prevention and mitigation strategies can
How To Protect Visa Account Information
Account Information Security Merchant Guide At Visa, protecting our cardholders is at the core of everything we do. One of the many reasons people trust our brand is that we make buying and selling safer
Best Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP
Best Practices in Incident Response SF ISACA April 1 st 2009 Kieran Norton, Senior Manager Deloitte & Touch LLP Current Landscape What Large scale breaches and losses involving credit card data and PII
SPG 223 Fraud Risk Management. June 2015
SPG 223 Fraud Risk Management June 2015 Disclaimer and copyright This prudential practice guide is not legal advice and users are encouraged to obtain professional advice about the application of any legislation
GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK FOR CREDIT UNIONS
SUPERVISORY AND REGULATORY GUIDELINES Guidelines Issued: 22 December 2015 GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK FOR CREDIT UNIONS 1. INTRODUCTION 1.1 The Central Bank of The Bahamas ( the Central
ICC Guidelines on Whistleblowing
ICC Guidelines on Whistleblowing Prepared by the ICC Commission on Anti-Corruption A. Introduction 1. No abatement of corruption and economic fraud Fraud remains one of the most problematic issues for
Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC
Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you
DRAFT. Anti-Bribery and Anti-Corruption Policy. Introduction. Scope. 1. Definitions
DRAFT Change History: Anti-Bribery and Anti-Corruption Policy Control Risks Group Ltd Commercial in confidence Introduction This document defines Control Risks policy on the avoidance of bribery and corruption.
U.S. Foreign Corrupt Practices Act for Beginners
U.S. Foreign Corrupt Practices Act for Beginners This presentation, related materials and subsequent discussion are provided for educational purposes only. They do not constitute legal advice nor do they
Case Study: Hiring a licensed Security Provider
Case Study: Hiring a licensed Security Provider Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge computer forensics
Fraud-Related Compliance
Fraud-Related Compliance Areas of Compliance, Part 1: FCPA, SOX, PCAOB, Dodd-Frank 2015 Association of Certified Fraud Examiners, Inc. Foreign Corrupt Practices Act (FCPA) Enacted to prohibit corrupt payments
FAQs Organised Crime and Anti-corruption Legislation Bill
FAQs Organised Crime and Anti-corruption Legislation Bill What is organised crime? Organised crime normally refers to an organisation of criminals who engage in illegal activity on a large, centralised
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
Cyber/ Network Security. FINEX Global
Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over
Fifth annual survey. Look before you leap Navigating risks in emerging markets
Fifth annual survey Look before you leap Navigating risks in emerging markets Table of contents 1 Executive summary 3 Significant concerns over compliance and integrity-related risks 4 Bribery leads the
Forensic Audit Building a World Class Program
Forensic Audit Building a World Class Program PAUL E. ZIKMUND DIRECTOR GLOBAL INTEGRITY AND FORENSIC AUDIT 1 2012 ACFE ANNUAL FRAUD CONFERENCE ORLANDO, FL Why the Need for Forensic Audit Program In response
Cybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
Forensic Services. kpmg.hu
Forensic Services kpmg.hu We help you curb your losses. Our forensic team provides services designed to assist you in matters of a commercial or financial nature that may result in a legal or regulatory
An Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
Does Fraud Matter? ASIS Middle East Security Conference and Exhibition Dubai, February 16, 2015. Torsten Wolf, CPP Head of Group Security Operations
Does Fraud Matter? ASIS Middle East Security Conference and Exhibition Dubai, February 16, 2015 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic Crime Landscape Economic
Information Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
www.pwc.com Developing a robust cyber security governance framework 16 April 2015
www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October
Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler
Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President [email protected] 2 What s at Risk? $300 billion in
news PROCEED WITH CAUTION First published on the Latin Lawyer website, 8th April 2011 www.latinlawyer.com
PROCEED WITH CAUTION FCPA update Opinion in Latin Lawyer March 2011 Friday, 8th April 2011 Non-US nationals must take care when conducting international business in Latin America and avoid violating the
Answering your cybersecurity questions The need for continued action
www.pwc.com/cybersecurity Answering your cybersecurity questions The need for continued action January 2014 Boards and executives keeping a sustained focus on cybersecurity do more than protect the business:
FCPA and Anti-Corruption in Latin America
FCPA and Anti-Corruption in Latin America May 2011 FCPA Enforcement "FCPA enforcement is stronger than it's ever been and getting stronger. We are in a new era of FCPA enforcement; and we are here to stay."
Financial Services Regulatory Commission Antigua and Barbuda Division of Gaming Customer Due Diligence Guidelines for
Division of Gaming Customer Due Diligence Guidelines for Interactive Gaming & Interactive Wagering Companies November 2005 Customer Due Diligence for Interactive Gaming & Interactive Wagering Companies
Reducing Cyber Risk in Your Organization
Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than
Corporate Code of Conduct
1. Background Corporate Code of Conduct 1.1. For over a century, the Swire group of companies has been recognised as acting responsibly in the course of achieving its commercial success. Our reputation
Identity Theft Security and Compliance: Issues for Business
Identity Theft Security and Compliance: Issues for Business The Facts Six Common Uses for Stolen Information Financial Criminal Medical DMV Social Security Terrorist The Facts A Chronology of Data Breaches
Aftermath of a Data Breach Study
Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath
Impact of Data Breaches
Research Note Impact of Data Breaches By: Divya Yadav Copyright 2014, ASA Institute for Risk & Innovation Applicable Sectors: IT, Retail Keywords: Hacking, Cyber security, Data breach, Malware Abstract:
Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014
Remarks by Thomas J. Curry Comptroller of the Currency Before the 10 th Annual Community Bankers Symposium Chicago November 7, 2014 Good morning, it s a pleasure to be here today and to have this opportunity
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
FOREIGN CORRUPT PRACTICES ACT POLICY for PROJECT PROFESSIONALS GROUP PTY. LTD.
FOREIGN CORRUPT PRACTICES ACT POLICY for PROJECT PROFESSIONALS GROUP PTY. LTD. 1.0 Purpose and Scope of this Manual The purpose of this Policy is to ensure compliance by Project Professionals Group Pty.
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down
Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients
Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd
Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures
Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?
Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for? Authored by Neeraj Sahni and Tim Stapleton Neeraj Sahni is Director, Insurance Channel at Kroll Cyber Investigations
Cyber Security for audit committees
AUDIT COMMITTEE INSTITUTE Cyber Security for audit committees An introduction kpmg.com/globalaci 2 Audit Committee Institute An introduction to cyber security for audit committees Audit committees have
Privacy and the Internet AUSTRALIAN ATTITUDES TOWARDS PRIVACY IN THE ONLINE ENVIRONMENT
APRIL MAY 2011 2012 ISSUE ISBN 40 978-1-922017-02-4 ISBN XXX-X-XX-XXXXXX-X Privacy and the Internet AUSTRALIAN ATTITUDES TOWARDS PRIVACY IN THE ONLINE ENVIRONMENT Key Findings 85% of online Australians
How To Cover A Data Breach In The European Market
SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to
Cyber Security Recommendations October 29, 2002
Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in
CODE OF CONDUCT Ethical rules and guidelines
CODE OF CONDUCT Ethical rules and guidelines CONTENT Introduction... 3 Our customers... 5 Employees... 7 The world around us... 9 Communication & dialog... 11 Security, theft & loss... 13 Environment...
