Cyber Fraud in 2016 Spring Accounting Expo Dan Ramey, CPA May 17, 2016
|
|
- Meghan Poole
- 6 years ago
- Views:
Transcription
1 Cyber Fraud in 2016 Spring Accounting Expo Dan Ramey, CPA May 17,
2 Dan Ramey, CPA/CFF/CITP/ABV, CFE, CVA, CIA/CRMA, CISA/CISM and CMA Dan is the president and founder of Houston Financial. Dan s professional certifications include: CPA/CFF/CITP/ABV, CFE, CVA, CIA/CRMA, CISA/CISM and CMA. He is the past president of the Houston Chapter of the Institute of Internal Auditors and formerly a member of the board of governors. Dan formerly served as chairman of the Houston CPA Society s Forensic and Valuation Committee for two terms and currently serves as Treasurer of the Houston InfraGard Chapter. He is also active in the Houston FENG Chapter where he was held several leadership roles. Dan is also a member of the University of Houston Bauer School of Business Accounting Advisory Board. He is an adjunct professor in the Graduate Accounting program at the University of Houston Bauer College of Business where he teaches graduate level fraud classes. Dan is also a frequent speaker to business and professional groups on fraud, internal audit, Committee of Sponsoring Organizations (COSO) 2013, valuation methodology, due diligence, third party risk management, and fraudulent financial reporting. Dan is a graduate of Baylor University with a degree in accounting and an executive MBA from Houston Baptist University. He is also a member of Second Baptist Church where he serves as a deacon. Houston Financial Houston Financial is a provider of professional services to corporations, nonprofits, and professional service firms in the areas of internal audit, fraud investigation, enterprise and IT risk assessment, fraud risk assessment, internal controls, forensic accounting, business valuation, litigation support, Sarbanes Oxley 404, internal audit department quality assessment reviews, third party risk management, and due diligence for mergers and acquisitions. Houston Financial Forensics is not a CPA firm. 2
3 Agenda What is Cyber Fraud Cyber Fraud in the News Impact of Cyber Fraud Best Practices and Protecting Your Data Cyber Security References Cyber Fraud 3
4 Cyber Fraud / Cyber Crime Any type of deliberate deception for unfair or unlawful gain that occurs online Cyber Fraud Statistics 7% of US organizations lost $1 million or more due to cybercrime incidents in 2013 Worldwide the average cost to a company for a data breach was $3.5 million in US $ Symantec discovered more than 430 million new and unique pieces of malware in 2015, up 36 percent from the year before 4
5 Categories of Cyber Crimes Computer Break Ins Phishing Attacks Malware / Ransonware Distributed Denial of Service Child Pornography Cyber Fraud Examples Hacking into personal accounts Hacking into corporate databases / information Breaking into competitor databases Various forms of internet theft and fraud Schemes / scams based on fake web sites Credit related thefts 5
6 Cyber Fraud Examples Piracy Advanced Fee Fraud Ransonware Identity Theft Hackers Hackers understand the intense complexity of the World Wide Web, which changes every day. They know the weaknesses of the common browsers, programming languages and operating systems that we all use. Modern cyber criminals might pretend to be a government agency, bank or trusted friend in order to gain access to your personal information. The Law Dictionary 6
7 Who Are the Hackers Nation States Hacktivists Organized Crime Syndicates Insiders 7 Most Expensive Words In Business 7
8 Personally Identifiable Information (PII) Personally identifiable information (PII) is any data that could potentially identify a specific individual. Any information that can be used to distinguish one person from another and can be used for de anonymizing anonymous data can be considered PII. Sensitive PII Non Sensitive PII Non Sensitive PII Name Work and Personal Address Home and Work Addresses Business Phone Number Work and Personal Cell Phone Numbers 8
9 Sensitive PII Ethnicity / Race ID Number (Social Security / Passport) Employment History Date of Birth / Place of Birth Medical History / Medical Conditions Financial Accounts Drivers License Number Mother s Maiden Name Ransomware 9
10 Ransomware Ransomware is a type of malware that prevents or limits users from accessing their system. This type of malware forces its victims to pay the ransom through certain online payment methods in order to grant access to their systems, or to get their data back. Some ransomware encrypts files (called Cryptolocker). Other ransomware use TOR to hide C&C communications (called CTB Locker). TrendMicro Ransomware Ransom $ in Bitcoin Businesses are prime target 35% increase during 2015 Target devices: PCs, smartphones, Mac, and Linux systems 10
11 Target Data Breach Target Data Breach Target booked $162 million of expenses Effected 70 million customers name, address, , and phone number 40 million credit and debit cards stolen Breach occurred between Nov 27 th and Dec 15 th, 2013 CEO terminated 11
12 Target Data Breach $200 million cost for credit unions and community banks to reissue 21.8 million cards $100 million expense Target will spend to upgrade payment system to Chip and PIN enabled cards $ median price range per card resold on the black market 1 3 million cards sold and used on the black market Target Data Breach 12
13 Paymetric Since the Target breach, there has been a major data breach discovered almost every month. Those breaches include Michaels Stores, Sally Beauty Supply, Neiman Marcus, AOL, ebay and P.F. Chang s Chinese Bistro A recent Ponemon Institute survey estimates 47 percent of all American adults have been affected by data breaches in the last year, with an estimated 432 online accounts being affected There were more than 600 reported data breaches in 2013., a 30 % increase over 2012 The retail industry was the number one target, with nearly 22 percent of network intrusions occurring at retailers, according to the Verizon 2013 Data Breach Investigation Report Cybercrime has cost the global economy $575 billion and the U.S. economy $100 billion annually, making the U.S. the hardest hit of any country, according to a report from Intel Security and the Center for Strategic and International Studies Data Breaches Category YTD Breaches Records 67.9 Million Million 2.5 Million Source: Privacy Rights Clearinghouse 13
14 Cyber Security Best Practices Mobile Devices Limit access to work materials on approved devices Used secured networks when accessing work materials on personal devices Protect access with passwords Cyber Security Best Practices Employee Theft Limit access to sensitive information on a need to know basis that s frequently re evaluated Monitor employee usage of sensitive information 14
15 Cyber Security Best Practices Malware and Phishing s Train employees not to click on phishing s or visit suspicious websites Filter access to harmful sites and s Cyber Security Best Practices Third party Vendors Ensure that subcontractors have vigorous data protection systems in place Provide for contractual wording that: Requires specific infrastructure protection Ability to audit prior to contract commencement date Ability to perform audits during the course of the contact Ability to immediately perform an audit when a breach is suspected 15
16 Cyber Security Best Practices Software and Hardware Establish controls to prevent unauthorized access to a organization s systems and data Encrypt data to protect it from unauthorized access Perform penetration testing (internal and external) periodically depending on sensitivity of data Keep data and systems backed up Keep security software current on all devices Cyber Security Best Practices National Cyber Security Awareness Month NCSAM 2016 Weekly Themes Week 1: October 3 7, 2016 General Cybersecurity with the Stop.Think.Connect. Campaign Week 2: October 10 14, 2016 Cyber in the Workplace Week 3: October 17 21, 2016 Cybercrime Week 4: October 24 28, 2016 Cyber and Cutting Edge Technology Week 5: October 31, 2016 Cyber and Critical Infrastructure 16
17 Passwords Passwords A recent study of 11 million passwords found that: 10.3% of users employ the 20 most popular passwords With fewer than 20 tries anyone can log in to roughly 1 out of 10 accounts Top password is and is so common that it makes up 4.1% of all passwords 17
18 Application Requirements for Password Password Recommendations Minimum Length Mobile devices 8 Networked computers 8 Admins and Privileged Accounts Password Difficulty Must contain 1 alphabetic, 1 numeric, and 1 symbol character Passphrases Never forgot that your wife s birthday is on October 23! Nftyw bioo23! 18
19 Passwordmeter.com Cyber Security and IT Risk Assessment Tools IIA GAIT (Guide to the Assessment of IT Risk t/ NIST Cyber Security Framework based on existing standards, guidelines, and practices 19
20 NIST Cyber Security Framework Tools Framework for Improving Critical Infrastructure Cybersecurity ecurity framework pdf Framework for Improving Critical Infrastructure Cybersecurity Roadmap ap pdf NIST Cyber Security Framework Tools Cybersecurity Framework Core XLS work for improving critical infrastructurecybersecurity core.xlsx Industry Tools industry resources.cfm 20
21 Questions 21
22 References 7 Encryption and Privacy Tips: matters/7 encryption and privacy tips 7eee81f3a309?sample_rate=0.1&snippet_name=561 4#.ng3w2v7qh List of Data Breaches: References DataBreach Today: Verizon Data Breach Report: lab/dbir/ Krebs on Security: 22
23 Referencs National Cyber Security Awareness Month: cyber securityawareness month Preparing For and Responding to a Computer Security Incident Mayer Brown Law: guidepreparing for a computer security incident/ Protiviti KnowledgeLeader Protiviti KnowlegeLeader is a repository of audit programs, checklists, tools, resources and best practices: US/Pages/KnowledgeLeader.aspx 23
24 References ISACA Knowledge Center: Center/Pages/default.aspx Ponemon Institute: InfraGard: References Protiviti Resource Guides: US/Pages/Resource Guides.aspx FBI Incidents of Ransomware on the Risk: 4/22/ransomware understanding the risk/ 24
25 References International Fraud Awareness Week: Third Week in November each year: Microsoft Ransonware Understanding the Risk: ansomware understanding the risk/ Microsoft Threat Intelligence Reports Ransomware: ansomware understanding the risk/ References How Secure is My Password: Password Meter: IC3 Internet Crime Complaint Center: 25
26 References ISACA Glossary IT Terminology: Privacy Rights Clearinghouse: Center for Internet Security: Dan Ramey Contact Information Contact Information Dan Ramey CPA/CFF/ABV/CITP, CVA, CIA/CRMA, CISA/CISM, CMA, CFE Houston Financial Cell:
Cyber Fraud and Cyber Security How to Protect Your Business Houston ACFE Conference Dan Ramey, CPA, CFE, CFF, CISA October 18, 2018
Cyber Fraud and Cyber Security How to Protect Your Business Houston ACFE Conference Dan Ramey, CPA, CFE, CFF, CISA October 18, 2018 Dan Ramey, CPA/CFF/CITP/ABV, CFE, CVA, CIA/CRMA, CISA/CISM and CMA Dan
More informationLegal Aspects of Cybersecurity
Legal Aspects of Cybersecurity John W. Mashni Taylor A. Gast (517) 371-8257 (517) 371-8238 jmashni@fosterswift.com tgast@fosterswift.com Alexander A. Ayar (248) 538-6326 AAyar@FosterSwift.com Risks Data
More informationISACA West Florida Chapter - Cybersecurity Event
ISACA West Florida Chapter - Cybersecurity Event Presented by Sri Sridharan Managing Director & Chief Operating Officer Florida Center for Cybersecurity CURRENT TRENDS Top Cybersecurity Trends of 2015
More informationPersonal Cybersecurity
Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions
More informationCombating Cyber Risk in the Supply Chain
SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an
More informationCyber Security in M&A. Joshua Stone, CIA, CFE, CISA
Cyber Security in M&A Joshua Stone, CIA, CFE, CISA Agenda About Whitley Penn, LLP The Threat Landscape Changed Cybersecurity Due Diligence Privacy Practices Cybersecurity Practices Costs of a Data Breach
More information2016 Tri-State CF Partnership Webinar Series. Cyber Crime Trends a State of the Union April 7, 2016
2016 Tri-State CF Partnership Webinar Series Cyber Crime Trends a State of the Union April 7, 2016 Presenter Mark Eich, Principal Information Security Services Group CliftonLarsonAllen 2014 CliftonLarsonAllen
More information4/5/2017. April 5, 2017 CYBER-RISK: WHAT MANAGEMENT & BOARDS NEED TO KNOW
April 5, 2017 CYBER-RISK: WHAT MANAGEMENT & BOARDS NEED TO KNOW 1 TO RECEIVE CPE CREDIT Participate in entire webinar Answer polls when they are provided If you are viewing this webinar in a group Complete
More informationManaging IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services
Managing IT Risk: What Now and What to Look For Presented By Tina Bode IT Assurance Services Agenda 1 2 WHAT TOP TEN IT SECURITY RISKS YOU CAN DO 3 QUESTIONS 2 IT S ALL CONNECTED Introduction All of our
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More information2017 RIMS CYBER SURVEY
2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the
More informationCyber Insurance: What is your bank doing to manage risk? presented by
Cyber Insurance: What is your bank doing to manage risk? David Kitchen presented by Lisa Micciche Today s Agenda Claims Statistics Common Types of Cyber Attacks Typical Costs Incurred to Respond to an
More informationCybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016
Cybersecurity: Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda Key Risks Incorporating Internal Audit Resources Questions 2 San Francisco
More informationCYBER SECURITY RISK ASSESSMENT: WHAT EVERY PENSION GOVERNMENTAL ENTITY NEEDS TO KNOW
CYBER SECURITY RISK ASSESSMENT: WHAT EVERY PENSION GOVERNMENTAL ENTITY NEEDS TO KNOW May 2018 Ed Plawecki General Counsel & Director of Government Relations UHY LLP Jamie See Manager UHY LLP Iowa Public
More informationDHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1
Addressing the Evolving Cybersecurity Tom Tollerton, CISSP, CISA, PCI QSA Manager Cybersecurity Advisory Services DHG presenter Tom Tollerton, Manager DHG IT Advisory 704.367.7061 tom.tollerton@dhgllp.com
More informationCybersecurity and Nonprofit
Cybersecurity and Nonprofit 2 2 Agenda Cybersecurity and Non Profits Scenario #1 Scenario #2 What Makes a Difference Cyber Insurance and How it Helps Question and Answer 3 3 Cybersecurity and Nonprofit
More informationCyber Fraud What can you do about it?
Cyber Fraud What can you do about it? Eric Wright Shareholder June 10, 2014 What is Cyber Fraud? NetLingo definition: Cyber fraud refers to any type of deliberate deception for unfair or unlawful gain
More informationWho We Are! Natalie Timpone
Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who
More informationCybersecurity The Evolving Landscape
Cybersecurity The Evolving Landscape 1 Presenter Zach Shelton, CISA Principal DHG IT Advisory Zach.Shelton@DHG.com Raleigh, NC 14+ years of experience in IT Consulting 11+ years of experience with DHG
More informationA Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016
A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016 Panelists Beverly J. Jones, Esq. Senior Vice President and Chief Legal Officer ASPCA Christin S. McMeley, CIPP-US
More informationTop Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES
Top Ten IT Security Risks - 2017 CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES INTRODUCTION IT S ALL CONNECTED IN 2017. All of our Top 10 risks impact both us as consumers and as professionals
More informationPreparing for a Breach October 14, 2016
Preparing for a Breach October 14, 2016 Jeremy Gilbert, GCFE, GASF, EnCE, CPA Manager, DHG Forensics forensics 1 Agenda Medical data breaches Why? Types? Frequency? Impact of a data breach How to prepare
More informationEmployee Security Awareness Training
Employee Security Awareness Training September 2016 Purpose Employees have access to sensitive data through the work they perform for York. Examples of sensitive data include social security numbers, medical
More informationThe Cyber War on Small Business
The Cyber War on Small Business Dillon Behr Executive Lines Broker Risk Placement Services, Inc. Meet Our Speaker Dillon Behr Executive Lines Broker Risk Placement Services, Inc. Previously worked as Cyber
More informationCybersecurity and Hospitals: A Board Perspective
Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,
More informationTackling Cybersecurity with Data Analytics. Identifying and combatting cyber fraud
Tackling Cybersecurity with Data Analytics Identifying and combatting cyber fraud San Antonio IIA iheartaudit Conference February 24, 2017 What We ll Cover + Current threat landscape + Common security
More informationCybersecurity Fundamentals Paul Jones CIO Clerk & Comptroller Palm Beach County CISSP, ITIL Expert, Security+, Project+
Cybersecurity Fundamentals Paul Jones CIO Clerk & Comptroller Palm Beach County CISSP, ITIL Expert, Security+, Project+ NOT SO LONG AGO 1981 IS IT FUNNY OR WHAT? THE BALANCING ACT Ease of Use Maintenance
More informationRed Flag Regulations
Red Flag Regulations Identity Theft Put In Context Overview of Topics Red Flag Regulations Overview How UM Protects Information What is the Student Workers role in identity theft prevention? What s this
More informationCyber (In)Security. What Business Leaders Need To Know. Roy Luebke Innovation and Growth Consultant. Presented by:
For audio difficulties please use conference number: 515-739-1030 Access: 385039# Cyber (In)Security What Business Leaders Need To Know Presented by: Roy Luebke Innovation and Growth Consultant July 12,
More informationCYBER THREATS: REAL ESTATE FRAUD ADVISORY COUNCIL
CYBER THREATS: REAL ESTATE FRAUD ADVISORY COUNCIL RAHUL GUPTA SENIOR DEPUTY DISTRICT ATTORNEY ORANGE COUNTY DISTRICT ATTORNEYS OFFICE CELL: 714-345-7722 EMAIL: rahul.gupta@da.ocgov.com DAVE WHITE INVESTIGATOR
More informationDeMystifying Data Breaches and Information Security Compliance
May 22-25, 2016 Los Angeles Convention Center Los Angeles, California DeMystifying Data Breaches and Information Security Compliance Presented by James Harrison OM32 5/25/2016 3:00 PM - 4:15 PM The handouts
More informationSecurity Breaches: How to Prepare and Respond
Security Breaches: How to Prepare and Respond BIOS SARAH A. SARGENT Sarah is a CIPP/US- and CIPP/E-certified attorney at Godfrey & Kahn S.C. in Milwaukee, Wisconsin. She specializes in cybersecurity and
More informationSMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE
SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE Small business cybersecurity survival guide By Stephen Cobb, ESET Senior Security Researcher Computers and the internet bring many benefits to small businesses,
More informationInsider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm
Insider Threat Program: Protecting the Crown Jewels Monday, March 2, 2:15 pm - 3:15 pm Take Away Identify your critical information Recognize potential insider threats What happens after your critical
More informationLegal Considerations and Case Studies
Cybersecurity for Small & Mid-Size Businesses Phil Schenkenberg, J.D., CIPP/US Cyrus Malek, J.D., Certification in Cybersecurity and Privacy Law Legal Considerations and Case Studies Copyright, Briggs
More informationBar The Gates: Cyber Threat. Wednesday, August 12, 2015: ISACA Geek Week
Bar The Gates: Cyber Threat Wednesday, August 12, 2015: ISACA Geek Week Speaker Introductions Kimberley Mobley, CPA, CISA Partner kmobley@johnsonlambert.com Jill Cleaveland, CISA Senior Manager jcleaveland@johnsonlambert.com
More informationInformation Technology General Control Review
Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor
More informationmhealth SECURITY: STATS AND SOLUTIONS
mhealth SECURITY: STATS AND SOLUTIONS www.eset.com WHAT IS mhealth? mhealth (also written as m-health) is an abbreviation for mobile health, a term used for the practice of medicine and public health supported
More informationProtecting Your Religious Organization Against Cybercrime
Protecting Your Religious Organization Against Cybercrime A State of the Union CLAconnect.com Disclaimers The information contained herein is general in nature and is not intended, and should not be construed,
More information10 Cybersecurity Questions for Bank CEOs and the Board of Directors
4 th Annual UBA Bank Executive Winter Conference February, 2015 10 Cybersecurity Questions for Bank CEOs and the Board of Directors Dr. Kevin Streff Founder, Secure Banking Solutions 1 Board of Directors
More informationDefensible and Beyond
TELUS Defensible and Beyond Mike Vamvakaris Director and Head of Cyber Security Consulting November 2017 Digital transformation brings many benefits Communication and Collaboration Autonomous and Artificial
More informationISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015
ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters
More informationCybowall Solution Overview
Cybowall Solution Overview 1 EVOLVING SECURITY CHALLENGES 2 EXAMPLES OF CYBER BREACHES INCLUDING CARD DATA 2013: Adobe Systems Hackers raided an Adobe back-up server on which they found and published a
More informationChapter 6 Network and Internet Security and Privacy
Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal
More informationHow Breaches Really Happen
How Breaches Really Happen www.10dsecurity.com About Dedicated Information Security Firm Clients Nationwide, primarily in financial industry Services Penetration Testing Social Engineering Vulnerability
More informationWhat FinAid offices need to know about cyberattacks. Presented by: Chris Chumley, COO at CampusLogic Thursday, March 31, EST
What FinAid offices need to know about cyberattacks Presented by: Chris Chumley, COO at CampusLogic Thursday, March 31, 2016 @12pm EST BY 2014, OVER 1 BILLION PERSONAL DATA RECORDS HAD BEEN COMPROMISED
More informationCyber Attack: Is Your Business at Risk?
15 July 2017 Cyber Attack: Is Your Business at Risk? Stanley Wong Regional Head of Financial Lines, Asia Pacific Agenda Some common misconceptions by SMEs around cyber protection Cyber Claims and Industry
More informationBreaches and Remediation
Breaches and Remediation Ramona Oliver US Department of Labor Personally Identifiable Information Personally Identifiable Information (PII): Any information about an individual maintained by an agency,
More informationEncrypting PHI for HIPAA Compliance on IBM i. All trademarks and registered trademarks are the property of their respective owners.
Encrypting PHI for HIPAA Compliance on IBM i HelpSystems LLC. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Introductions Bob Luebbe, CISSP
More informationSMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE
SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE Small business cybersecurity survival guide By Stephen Cobb, ESET Senior Security Researcher Computers and the internet bring many benefits to small businesses,
More informationCyber Security and Data Protection: Huge Penalties, Nowhere to Hide
Q3 2016 Security Matters Forum Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide Alan Calder Founder & Executive Chair IT Governance Ltd July 2016 www.itgovernance.co.uk Introduction
More informationFTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.
FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who
More informationCaribbean Cyber Security: Not Only Government s Responsibility
Caribbean Cyber Security: Not Only Government s Responsibility AWARENESS AND VIGILANCE IS EVERYBODY S RESPONSIBILITY Preseted at: ICT Symposium Antigua and Barbuda March 2017 Caribbean Cyber Security Events
More informationRansomware A case study of the impact, recovery and remediation events
Ransomware A case study of the impact, recovery and remediation events Palindrome Technologies 100 Village Court Suite 102 Hazlet, NJ 07730 www.palindrometech.com Peter Thermos President & CTO Tel: (732)
More informationSecurity & Phishing
Email Security & Phishing Best Practices In Cybersecurity Presenters Bill Shieh Guest Speaker Staff Engineer Information Security Ellie Mae Supervisory Special Agent Cyber Crime FBI 2 What Is Phishing?
More informationBuilding a Threat Intelligence Program
WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351
More informationCyber-Threats and Countermeasures in Financial Sector
Michael Mavroforakis, PhD Group CISO & CDO SEV: Workshop on Digital Enablers (Cloud & Cybersecurity) 27th March 2018 Agenda: CYBERSECURITY Potential Targets Attack Examples Insider vs Outsider Threats
More informationData Breach Trends: What Local Government Lawyers Need to Know
REUTERS / Firstname Lastname Data Breach Trends: What Local Government Lawyers Need to Know IMLA Annual Conference San Diego, California September 30, 2016 Presenters: Mel Gates, Senior Legal Editor, Privacy
More informationCybersecurity in Higher Ed
Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,
More informationCybersecurity Conference Presentation North Bay Business Journal. September 27, 2016
Cybersecurity Conference Presentation North Bay Business Journal September 27, 2016 1 PRESENTER Francis Tam, CPA, CISM, CISA, CITP, CRISC, PCI QSA Partner Information Security and Infrastructure Practice
More informationCybersecurity. Overview. Define Cyber Security Importance of Cyber Security 2017 Cyber Trends Top 10 Cyber Security Controls
Cybersecurity Hospitality Finance and Technology Professionals June 27, 2017 Presented by: Harvey Johnson, CPA Partner Overview Define Cyber Security Importance of Cyber Security 2017 Cyber Trends 1 About
More informationANNUAL SECURITY AWARENESS TRAINING 2012
UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff ANNUAL SECURITY AWARENESS TRAINING 2012 NETWORK AND COMPUTER USE POLICY Users of information technology
More informationCYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More informationCybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City
1 Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City The opinions expressed are those of the presenters and are not those of the Federal Reserve Banks, the
More informationKeep the Door Open for Users and Closed to Hackers
Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According
More informationTarget Breach Overview
Target Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more specifics? A: Yes, Target has confirmed that it experienced unauthorized access to its systems
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationCyber Security Risk Management and Identity Theft
Cyber Security Risk Management and Identity Theft 2017 MD SHRM State Conference Presented by Robert Bob Olsen, Chief Executive Officer MS ITS, MBA, CISSP, CISM October 16, 2017 This presentation may not
More informationGLBA, information security and incident response a compliance perspective
GLBA, information security and incident response a compliance perspective Introductions How many have experience with IT? How many have responsibilities involving IT? How many have responsibilities involving
More informationCyber Risk & Mitigation Strategies for the Real World
Cyber Risk & Mitigation Strategies for the Real World Inga Goddijn EVP, Managing Director Risk Based Security 2014 FALL CONFERENCE & TRAINING SEMINAR 1 2 A motivated hacker is difficult to stop. Trust
More informationHow to Optimize Cyber Defenses through Risk-Based Governance. Steven Minsky CEO of LogicManager & Author of the RIMS Risk Maturity Model
How to Optimize Cyber Defenses through Risk-Based Governance Steven Minsky CEO of LogicManager & Author of the RIMS Risk Maturity Model The Goal: Risk-Based Operationalization Incident Management IT/IS
More informationYou ve Been Hacked Now What? Incident Response Tabletop Exercise
You ve Been Hacked Now What? Incident Response Tabletop Exercise Date or subtitle Jeff Olejnik, Director Cybersecurity Services 1 Agenda Incident Response Planning Mock Tabletop Exercise Exercise Tips
More informationWhat to do if your business is the victim of a data or security breach?
What to do if your business is the victim of a data or security breach? Introduction The following information is intended to help you decide how to start preparing for and some of the steps you will want
More informationID Theft and Data Breach Mitigation
ID Theft and Data Breach Mitigation Jeremy Gilbert, GCFE, GASF, EnCE, CPA 1 Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk 2 Consumer Identity
More informationSecurity Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment
Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment Ray Colado, Information Security Analyst Raise awareness around information security to help
More informationToday s Security Threats: Emerging Issues Keeping CFOs Up at Night Understanding & Protecting Against Information Security Breaches
Today s Security Threats: Emerging Issues Keeping CFOs Up at Night Understanding & Protecting Against Information Security Breaches Chris Bucolo, PCIP, MBA Today s Speaker Chris Bucolo Sr. Manager, Sikich
More informationProfessional Training Course - Cybercrime Investigation Body of Knowledge -
Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce
More informationPCI Compliance. What is it? Who uses it? Why is it important?
PCI Compliance What is it? Who uses it? Why is it important? Definitions: PCI- Payment Card Industry DSS-Data Security Standard Merchants Anyone who takes a credit card payment 3 rd party processors companies
More informationCyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)
Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,
More informationNYS DFS Cybersecurity Requirements. Stephen Head Senior Manager Risk Advisory Services
NYS DFS Cybersecurity Requirements Stephen Head Senior Manager Risk Advisory Services December 5, 2017 About Me Stephen W. Head Mr. Head is a Senior Manager with Experis Finance, and has over thirty-five
More informationInstitute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI
Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee
More informationDIGITAL FORENSICS. We Place Digital Evidence at Your Fingertips. Cyanre is South Africa's leading provider of computer and digital forensic services
DIGITAL FORENSICS We Place Digital Evidence at Your Fingertips Cyanre is South Africa's leading provider of computer and digital forensic services Cyber Crime taking a Byte out of corporate SA Total Legal
More informationAltitude Software. Data Protection Heading 2018
Altitude Software Data Protection Heading 2018 How to prevent our Contact Centers from Data Leaks? Why is this a priority for Altitude? How does it affect the Contact Center environment? How does this
More informationDigital Crime and Cybersecurity. Scott D. Ramsey, Managing Director May 2017
Digital Crime and Cybersecurity Scott D. Ramsey, Managing Director May 2017 Agenda I. Cybersecurity Issues, Trends & Compliance II. Public Private Partnerships III. FFIEC & NYDFS 500 Rule IV. Third Party
More informationQuestion 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:
Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,
More informationGujarat Forensic Sciences University
Gujarat Forensic Sciences University Knowledge Wisdom Fulfilment Cyber Security Consulting Services Secure Software Engineering Infrastructure Security Digital Forensics SDLC Assurance Review & Threat
More informationTIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE
TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationA Forensic Accountant in Cyber Security
A Forensic Accountant in Cyber Security Gertjan Groen, President ACFE Netherlands Chapter Fraud Awareness Week Event ACFE Belgium 14 November 2017, Brussels Personal Background Started my career in auditing
More informationRed Flags/Identity Theft Prevention Policy: Purpose
Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and
More informationMust Have Items for Your Cybersecurity or IT Budget in 2018
Must Have Items for Your Cybersecurity or IT Budget in 2018 CBAO Regional Meeting Dan Desko (Senior Manager, IT Risk Advisory) Matt Dunn (Senior Security Analyst, IT Risk Advisory) Who is Schneider Downs?
More informationTHE DAILY NEWS THE WORLD S FAVORITE NEWSPAPER - Since 1879
THE DAILY NEWS Cyber Security: United We Stand! Sussex County Today & Tomorrow Conference The Power of Partnerships October 25, 2017 Michael J. Maksymow, Jr., CHCIO, FCHIME, FHIMSS Vice President & Chief
More informationCyber Security Updates and Trends Affecting the Real Estate Industry
Cyber Security Updates and Trends Affecting the Real Estate Industry What, Why, and How? Agenda Cyber Security Today Changes to Security Standards and Trends Protecting Yourself and Your Organization Takeways
More informationPresented by: - Anselm Charles ICT Manager CARICOM IMPACS
Presented by: - Anselm Charles ICT Manager CARICOM IMPACS Outline Introduction to CARICOM IMPACS What is Cybersecurity? CARICOM & Cybersecurity CARICOM Cyber Security and Cybercrime Action Plan (CCSCAP)
More informationIS Today: Managing in a Digital World 9/17/12
IS Today: Managing in a Digital World Chapter 10 Securing Information Systems Worldwide losses due to software piracy in 2005 exceeded $34 billion. Business Software Alliance, 2006 Accessories for war
More informationEMERGING TRENDS IN WHITE COLLAR CRIMES
EMERGING TRENDS IN WHITE COLLAR CRIMES Presented by: Collins Ojiambo Were CISA, CISM, Mciarb, AVSEC PMC Country Lead, Kroll Associates Thursday 24 th October 2018 Credibility. Professionalism. AccountAbility
More informationSecuring Americans Identities: The Future of the Social Security Number
Cha : Testimony, SASC 04 /25 /2017 1 Statement Before the House Ways and Means Subcommittee on Social Security Securing Americans Identities: The Future of the Social Security Number A Testimony by: James
More informationArt of Performing Risk Assessments
Clinical Practice Compliance Conference Art of Performing Risk Assessments October 2016 Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP) Member FBI InfraGard AGENDA Cyber Risk = Disruptive Business Risk Breaches:
More informationThink Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe
Think Oslo 2018 Where Technology Meets Humanity Oslo Felicity March Cyber Resilience - Europe Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity
More informationProtecting your next investment: The importance of cybersecurity due diligence
Protecting your next investment: The importance of cybersecurity due diligence Oct. 11, 2018 Baker Tilly Virchow Krause, LLP. All rights reserved. Baker Tilly refers to Baker Tilly Virchow Krause, LLP,
More information