Overview: Sponsored By:

Size: px
Start display at page:

Download "Overview: Sponsored By:"

Transcription

1 Overview: IIA Winnipeg is hosting its third annual full day Fraud Summit on Tuesday, March 15 th. The 2016 Fraud Summit will focus on fraud prevention, deterrence and detection along with topics including cybersecurity and data analytics. In addition, participants will have opportunity network with fraud professionals and hear about valuable real-world examples and strategies that can take your fraud investigations to the next level. Program at-a-glance 7:30 a.m. Registration / Breakfast 8:15 a.m. Welcome Remarks 8:30 a.m. The Devil is in the Data Dave Oswald, Senior Manager, EY 9:50 a.m. Refreshment Break 10:10 a.m. How to Conduct an Effective Fraud Risk Assessment Shawn Hendry, Partner, Sunera 11:00 a.m. Break 11:10 a.m. Cybersecurity State of the Union Scott MacLennan, Senior Manager, KPMG 12:00 p.m. Networking Luncheon 12:50 p.m. Fraud Case Studies from the OAG Jeff Gilbert, Investigations, Office of the Auditor General of Manitoba James Wright, Investigations, Office of the Auditor General of Manitoba 2:10 p.m. Refreshment Break 2:30 p.m. Recent Fraud Trends in Winnipeg Detective Curtis Chiborak, Commercial Crimes Unit, Winnipeg Police Service 3:20 p.m. Break 3:30 p.m. Creating and Maintaining an Effective Anti-Fraud Program Rob Swain, Director Internal Audit (Investigations), Investors Group 4:20 p.m. Closing Remarks / Evaluations *Presentation order subject to change. Sponsored By: Date: Tuesday, March 15, 2016 Time: Registration & Breakfast: 7:30 am 8:15 am Program: 8:30 am 5:00 pm Location: Delta Winnipeg Hotel 350 St Mary Avenue Winnipeg, Manitoba Cost: Early Bird EXTENDED!!! (by Feb 12, 2016) Members: $350 Non-Members: $400 Group (4 or more): $325 Regular (after Feb 12, 2016) Members: $400 Non-Members: $450 Group (4 or more): $375 Register online: Final Registration deadline: Thursday, March 10, 2016 CPE: 7 CPE s For information: IIA Winnipeg Chapter Kelsey.giesbrecht@gwl.ca j.roopra@uwinnipeg.ca 1

2 7:30 a.m. Registration and Continental Breakfast 8:15 a.m. Welcome Remarks 8:30 a.m. The Devil is in the Data Dave M Oswald, CA, CFE, Senior Manager, EY This presentation will include a discussion of data analytics, big data, how to use it, and the footprints of fraud. Dave has performed numerous computer forensics investigations since These investigations were undertaken to determine what evidence resided on electronic storage media, including but not limited to computers, mobile phones, tapes, thumb drives. Some examples of analysis conducted include: Searches for evidence of financial fraud and theft of trade secrets on computer media from desktops, laptops, and server platforms. Searches for evidence of reformatting, dates of reformatting, and utilities used to wipe or copy data from electronic media. Locating evidence of improper removal, duplication, destruction, or transmission of messages or files. Provide expert testimony and investigative support as needed on projects Analysis of stock and warehousing for a multinational metals corporation. Dave has performed engagements for many organizations across many industries including mining & precious metals, hotel & entertainment as well as distribution. Analysis and investigations included reviews for fraud risk, loss of profit, design and operation of internal controls, information technology controls, forensic data analytics and leading and lagging practices. Dave has designed and operated numerous databases for clients to identify the electronic attributes of irregular transactions. Dave has testified as an expert witness in computer forensics and accounting on a number of occasions in arbitration matters as well as in the High and Magistrates Court in South Africa. 9:50 a.m. Refreshment Break 10:10 a.m. How to Conduct an Effective Fraud Risk Assessment Shawn Hendry, CIA, CISA, CGEIT, CRMA, Managing Partner, Sunera Canada With the introduction of the new COSO 2013 Control Framework, many organizations have taken the opportunity to improve their processes surrounding the assessment of risks of fraud risk factors. In this presentation Shawn will discuss the importance of conducting a Fraud Risk Assessment (FRA) and how to make it meaningful to the organization rather than just an exercise to be completed. Shawn will discuss Sunera s typical approach and identify some of the common pitfalls in conducting an FRA. Shawn Hendry, CIA, CISA, CGEIT, CRMA is the Managing Partner, Canada for Sunera LLC a division of Cyber Risk Management LLC. Shawn has led Sunera s services in Canada for nearly 10 years. Shawn has assisted our Sunera clients across many industries with their Internal Audit, IT Audit, corporate governance and cyber risk requirements. 2

3 Shawn and Sunera are seen to be leaders in these fields. Prior to joining Sunera, Shawn was a Senior Manager with KPMG in their Risk Advisory Service practice, and the Director of Audit and Risk Assessment for CanWest Global Communications which was previously Canada s largest media group. With CanWest, Shawn initiated and was responsible for developing and building the Internal Audit and Risk function and leading CanWest to be one of the first organizations in Canada to comply with the requirements of the Sarbanes Oxley Act. Earlier in his career Shawn also initiated the Canadian Audit Department for UtiliCorp Networks Canada (Aquila) and started his career at Arthur Anderson for six years working both in the Audit and Assurance and Advisory practices. 11:00 a.m. Break 11:10 a.m. Cybersecurity State of the Union Scott MacLennan, CISA, CISSP, Senior Manager, Risk Consulting Services, KPMG LLP Scott will lead a discussion on the current state of Cybersecurity threats, using specific examples of incidents that have occurred. Then we'll gaze into the crystal ball to discuss what threats we can expect to see more of in The presentation will include a series of specific examples of security incidents, outline their root causes and identify the top ten mistakes companies make when dealing with security incidents. Scott will also describe the top 10 improvements that companies have made when dealing with cybersecurity incidents over the past year. Scott is a Senior Manager in KPMG s Risk Consulting practice and leads the delivery of IT Advisory (ITA) and Internal Audit and Risk Compliance (IARCS) services in Winnipeg. Scott is a Certified Information System Security Professional (CISSP), a Certified Information Systems Auditor (CISA), certified in ITIL v3 and specializes in IT security, Internal Audit co-sourcing, and IT control evaluation. Scott has over 20 years of experience with Information Technology and has worked with a wide variety of public and private companies, as auditor, advisor and facilitator. Scott has assisted internal audit groups assess IT controls in areas of logical security, physical security, operations, application development, project management and recovery. Scott has hands on experience performing technical and procedural security reviews and general IT control assessments over a wide variety of technology platforms. 12:00 p.m. Networking Luncheon 12:50 p.m. Fraud Case Studies from the OAG Jeff Gilbert, CPA, CA, DIFA, Investigations, Office of the Auditor General of Manitoba & James Wright, CA, DIFA, Investigations, Office of the Auditor General of Manitoba Jeff and James will describe the OAG s process for receiving allegations via the OAG s fraud line along with case studies of investigations and related reports. Included in the presentation will be a dialogue on planning, audit approach, interviews, evidence gathering and report writing. A brief description of survey results from fraud statistics will be discussed along with how this affects the approach taken by the OAG. 3

4 Jeff has worked in the auditing field for over 15 years and is a Principal with the Office of the Auditor General of Manitoba. He has conducted Value for Money, Financial Statement, and Forensic Instigative Audits. Jeff s current focus is in the Forensic Investigations area. Prior to joining the Office of the Auditor General Jeff worked for a number of years in public practice with a national firm. He has also held numerous roles on the executive of a notfor-profit and is currently the President of the board. Jeff has a Master of Professional Accounting degree and obtained his Chartered Accountant designation in He further specialized by obtaining training and experience in forensic auditing. This included a Diploma in Investigative Forensic Accounting. This experience has been beneficial in his teaching role at the University of Manitoba and in drafting business cases for CPA Canada. He has also served as a director on a board related to a national health college. James has been auditing for the past 21 years. He received his Chartered Accountant designation in Ontario in He completed the Diploma in Investigative and Forensic Accounting from the University of Toronto in He has worked for the Office of the Auditor General for the past 16 years, the last 8 years as a Principal in the Investigations Division. Currently, his primary responsibility involved dealing with allegations of fraud, waste and misuse of public funds. These allegations are the starting point for many limited-scope audits, value-for money audits and investigations done by the Office of the Auditor General. 2:10 p.m. Refreshment Break 2:30 p.m. Recent Fraud Trends in Winnipeg Detective Curtis Chiborak, Commercial Crimes Unit, Winnipeg Police Service This presentation will discuss some of the more common external frauds that are targeting businesses in Winnipeg including the Business Compromise and Fraudulent Payment Cards/Gift Cards. Additional discussion will involve the types of internal thefts encountered by the Commercial Crimes Unit and the documentation needed when reporting fraudulent incidents to police. Det. Curtis Chiborak graduated from the University of Winnipeg in 1997 with a Bachelor of Arts with majors in Economics and English. Det. Chiborak joined the Winnipeg Police Service in 2007 and has been assigned to the Commercial Crime Unit for the past four years working various investigations involving Identity Theft/Fraud, Internal Thefts, Mass Market Scams, Fraudulent Payment Cards and Frauds targeting Businesses. 3:20 p.m. Break 3:30 p.m. Creating and Maintaining an Effective Anti-Fraud Program Rob Swain, CFE, Director Internal Audit (Investigations), Investors Group Successful anti-fraud programs within any organization need to be reviewed and assessed on an ongoing basis. The key components of the program must be re-evaluated to keep pace with emerging trends and the risks associated with both internal and external threats. Rob Swain has more than 31 years of experience within the Financial Services industry. Over the past 21 years his focus has been in the area of audit and fraud investigations. During this time he has managed hundreds of fraud investigations. As well he has developed various fraud detection and monitoring processes as part of an overall approach to managing the risks associated with fraud. In twenty years the anti-fraud program has evolved from 4

5 what was very much a reactive process to a specific event to one that is comprised of a number of key components including fraud risk assessments, fraud control reviews, fraud detection and monitoring processes, fraud awareness training that are all key components of an effective anti-fraud program. 4:20 p.m. Closing Remarks / Evaluations IIA Winnipeg would like to thank our event sponsor 5

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN CENTRAL REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN TAKE THE STAGE Members: Register by Feb. 29 to save US$100. Take the Stage The IIA and IIA Nashville Chapter are excited to host the 2016 Central

More information

Present. 5th May - Chennai. Internal. auditing. today: Beginning Auditor Tools and Techniques. 6 CPE hours.

Present. 5th May - Chennai. Internal. auditing. today: Beginning Auditor Tools and Techniques. 6 CPE hours. Present 5th May - Chennai Internal auditing today: Beginning Auditor Tools and Techniques 6 CPE hours www.achromicpoint.com About the Seminar To become a successful auditor, a strong base of knowledge

More information

IT Audit Process Prof. Liang Yao Week Two IT Audit Function

IT Audit Process Prof. Liang Yao Week Two IT Audit Function Week Two IT Audit Function Why we need IT audit A Case Study What You Can Learn about Risk Management from Societe Generale? https://www.cio.com/article/2436790/security0/what-you-can-learn-about-risk-management-fromsociete-generale.html

More information

IT in Healthcare Day

IT in Healthcare Day San Francisco ISACA Chapter Proudly Presents IT in Healthcare Day A Day-Long, Multi-Session Event, being held in Walnut Creek! Where: Walnut Creek Marriott - 2355 North Main Street Walnut Creek, CA 94596

More information

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr. THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.FFa) BROCHURE Contents INTRODUCTION... 3 THE IICFA... 4 Basic Entry qualifications...

More information

New Horizons in Audit & Assurance

New Horizons in Audit & Assurance IIA Hyderabad Chapter brings you a Seminar on New Horizons in Audit & Assurance 6 CPE Hours for IIA Members Date : 04 th January 2018 1 Schedule... SCHEDULE 09:00 AM to 09:30 AM Seminar Registration 09:30

More information

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Table of Contents Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Chapter 1: Significance of Internal Auditing in Enterprises Today: An Update 3 1.1 Internal Auditing History and Background

More information

Memphis Chapter. President s Message. This annual event is designed to provide students with a

Memphis Chapter. President s Message. This annual event is designed to provide students with a Memphis Chapter F E B R U A R Y 2 0 1 5 Remember: Update your IIA profile for the most up-to-date news. RSVP for the Annual Student Day February 24, 2015 This annual event is designed to provide students

More information

Information Security Officer (ISO) Education

Information Security Officer (ISO) Education Information Security Officer (ISO) Education October 16, 2018 TBA Barrett Training Center Nashville, Tenn. Information Security Officer (ISO) Education October 16, 2018 TBA Barrett Training Center Nashville,

More information

IT Auditing and IT Fraud Detection

IT Auditing and IT Fraud Detection IT Auditing and IT Fraud Detection Page 1 of 7 Why Attend In today s world, IT fraud prevention and investigation have become an everyday part of corporate life and auditors must gain expertise in this

More information

Security Program Design:

Security Program Design: Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident

More information

COPYRIGHTED MATERIAL. Index

COPYRIGHTED MATERIAL.   Index Index 2014 revised COSO framework. See COSO internal control framework Association of Certified Fraud Examiners (ACFE), 666 Administrative files workpaper document organization, 402 AICPA fraud standards

More information

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important

More information

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized. Val-EdTM Valiant Technologies Education & Training Services Workshop for CISM aspirants All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting

More information

Risk Advisory Academy Training Brochure

Risk Advisory Academy Training Brochure Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty

More information

2019 Annual Information Technology Audit Conference Friday, March 29, 2018 Melville Marriott 8:30 a.m. 5:00 p.m. (8 CPE/CPD Credits)

2019 Annual Information Technology Audit Conference Friday, March 29, 2018 Melville Marriott 8:30 a.m. 5:00 p.m. (8 CPE/CPD Credits) 2019 Annual Information Technology Audit Conference Friday, March 29, 2018 Melville Marriott 8:30 a.m. 5:00 p.m. (8 CPE/CPD Credits) Event Summary Feeling overwhelmed with all the new technology developments

More information

comprehensive guide toı ACCOUNTINGı CERTIFICATIONSı cpa, cfe, cia, cisa & more ı The Bean Counter, LLC All Rights Reservedı

comprehensive guide toı ACCOUNTINGı CERTIFICATIONSı cpa, cfe, cia, cisa & more ı The Bean Counter, LLC All Rights Reservedı ACCOUNTING comprehensive guide to CERTIFICATIONS cpa, cfe, cia, cisa & more The Bean Counter, LLC All Rights Reserved The Bean Counter, LLC All Rights Reserved Certified Public Accountant This is what

More information

The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018

The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018 The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018 Jeff Hemphill Partner and Central Region Leader, Risk Advisory Services Brian Kirkpatrick Managing Director, Risk Advisory

More information

EARN UP TO 18 CPE CREDITS

EARN UP TO 18 CPE CREDITS Join Us in Nashville, TN, USA 370 Stay at the Heart of the Conference Action! The Omni Nashville 250 5th Avenue South Nashville, TN 37203, USA Hotel Reservations: 615-782-5300 2018 Governance, Risk, and

More information

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Professional Training Course - Cybercrime Investigation Body of Knowledge - Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce

More information

Effective Cyber Incident Response in Insurance Companies

Effective Cyber Incident Response in Insurance Companies August 2017 Effective Cyber Incident Response in Insurance Companies An article by Raj K. Chaudhary, CRISC, CGEIT; Troy M. La Huis; and Lucas J. Morris, CISSP Audit / Tax / Advisory / Risk / Performance

More information

CFE Exam Review Course

CFE Exam Review Course CFE Exam Review Course Leading Excellence in Banking BIBF plays a vital role in the training and development of human capital in the Kingdom of Bahrain. Our commitment to excellence has strengthened our

More information

Opportunities to Integrate Technology Into the Classroom. Presented by:

Opportunities to Integrate Technology Into the Classroom. Presented by: Opportunities to Integrate Technology Into the Classroom Presented by: Mark Salamasick, CIA, CISA, CRMA, CSP Executive Director of Audit University of Texas System Discussion Topics Internal Audit Textbook

More information

Business Process Design and Internal Audit UNIVERSITY OF TEXAS AT DALLAS Course Syllabus Spring 2005

Business Process Design and Internal Audit UNIVERSITY OF TEXAS AT DALLAS Course Syllabus Spring 2005 Business Process Design and Internal Audit UNIVERSITY OF TEXAS AT DALLAS Course Syllabus Spring 2005 Instructor: Mark Salamasick, CIA, CISA, CSP Course Number: AIM 6380 Semester Hours: 3 Location: SOM

More information

COMPUTER FORENSICS (CFRS)

COMPUTER FORENSICS (CFRS) Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics

More information

The Institute of Internal Auditors San Gabriel Valley Chapter

The Institute of Internal Auditors San Gabriel Valley Chapter The Institute of Internal Auditors San Gabriel Valley Chapter Presents INFORMATION TECHNOLOGY (IT) and PERFORMANCE AUDITING SEMINAR February 4 and 5, 2014 The San Gabriel Valley Chapter of the IIA is hosting

More information

PROVIDING INVESTIGATIVE SOLUTIONS

PROVIDING INVESTIGATIVE SOLUTIONS PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely

More information

Cyber Risks in the Boardroom Conference

Cyber Risks in the Boardroom Conference Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks

More information

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During

More information

FramewOrk to DeSign and implement ifc

FramewOrk to DeSign and implement ifc Marketing Partner Hotel Radisson GRT, 15 Leveraging COSO internal COntrOLS FramewOrk to DeSign and implement ifc 8 CPE Hours Networking Opportunities Qualified CIA Faculty about the Seminar The COSO Internal

More information

Helping you understand the impact of GDPR.

Helping you understand the impact of GDPR. Helping you understand the impact of GDPR. GENERAL DATA PROTECTION REGULATION (GDPR) RSM s GDPR experts GREGOR STROBL Munich, Germany Partner Risk Advisory Services (RAS) Master of Arts (M.A.) in Corporate

More information

Cyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa

Cyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa Agenda and Speakers Cyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa Thursday, March 01, 2018 7:30 am Registration and Continental Breakfast 8:00 am Opening Remarks

More information

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com Spread your wings Professional qualifications and development at Deloitte What impact will you make? careers.deloitte.com It s your future. How far will you take it? Do you want to make an impact in your

More information

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC

More information

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power

More information

ACUIA Region 5 Meeting October 3-4, 2011 SEFCU, Albany, NY

ACUIA Region 5 Meeting October 3-4, 2011 SEFCU, Albany, NY AGENDA Monday, October 3, 2011 7:30 am - 8:30 am Registration & Continental Breakfast 8:30 am 8:45 am Welcome & Announcements (1) 8:45 am 10:15 am Auditing Human Resources Auditing the HR Function will

More information

A Framework for Managing Crime and Fraud

A Framework for Managing Crime and Fraud A Framework for Managing Crime and Fraud ASIS International Asia Pacific Security Forum & Exhibition Macau, December 4, 2013 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic

More information

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity

More information

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. In today s escalating cyber risk environment, you need to make sure you re focused on the right priorities by

More information

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every

More information

A Global Look at IT Audit Best Practices

A Global Look at IT Audit Best Practices A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m.

Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Increased use of technologies such as mobile devices, social media and cloud computing has increased

More information

The Evolving Threat to Corporate Cyber & Data Security

The Evolving Threat to Corporate Cyber & Data Security The Evolving Threat to Corporate Cyber & Data Security Presented by: Sara English, CIPP/US Sara.English@KutakRock.com 1 http://blogs.wsj.com/law/2015/12/09/employee error leading cause of data breaches

More information

Canadian Manufacturers & Exporters Leadership makes the difference

Canadian Manufacturers & Exporters Leadership makes the difference Thursday, November 25, 2010 8:30am 3:00pm Halifax Marriott Harbourfront, NS What is LEAF? LEAF is a new program that focuses on increasing energy efficiency and reducing the environmental impact of manufacturing

More information

A MASTER CLASS AUDIT, LEADERSHIP & ADVANCED EXCEL WORKSHOP

A MASTER CLASS AUDIT, LEADERSHIP & ADVANCED EXCEL WORKSHOP A MASTER CLASS AUDIT, LEADERSHIP & ADVANCED EXCEL WORKSHOP NOVEMBER 22-23, 2018 KIGALI SERENA HOTEL For more information www.icparwanda.com BACKGROUND The institute exists to serve within the Public interest

More information

Integrated Assurance Embracing The Three Lines of Defense

Integrated Assurance Embracing The Three Lines of Defense Integrated Assurance Embracing The Three Lines of Defense Stanley Y. Chang, Ph.D. CPA (Texas), CIA, CMA, CCSA, CGAP, CGFM, CRMA Chief Operating Officer, Marcum, Bernstein & Pinchuk, LLP 1 Stanley Chang,

More information

IIA Academy YOUR PARTNER IN PROFESSIONAL DEVELOPMENT

IIA Academy YOUR PARTNER IN PROFESSIONAL DEVELOPMENT www.iia.org.sg IIA Academy YOUR PARTNER IN PROFESSIONAL DEVELOPMENT IIA Academy Professional Development To support you in your career progression as an internal auditor, we have adopted the IIA Global

More information

RISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process

RISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process RISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process Date 24-25 September 2018 Time: 09:00 17:00 Location Hotel Grand, Tirana, Albania Course director: Mr. Konstantinos P. Triantafyllidis,

More information

Data-Driven Policing Summit

Data-Driven Policing Summit Reduce Crime and Manage Risk in Policing with Data Analysis Data-Driven Policing Summit Using Data Analytics and Predictive Modeling to Mitigate Risk and Reduce Crime September 18-19, 2017 Washington,

More information

Seminar Marketing Toolkit - Orlando

Seminar Marketing Toolkit - Orlando We are excited to have you as partner and providing training opportunities in your market. Please use the following marketing toolkit to market these opportunities and earn CAP points! Please contact bill.stewart@theiia.org

More information

Office of the City Auditor 2014 Third Quarter Activity Report November 25, 2014

Office of the City Auditor 2014 Third Quarter Activity Report November 25, 2014 2014 Third Quarter Activity Report November 25, 2014 This page is intentionally blank. 1. Audit Plan Progress Monitoring Bylaw 16097, Audit Committee Bylaw, Section 5 states that the Committee assists

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,

More information

INFORMATION TECHNOLOGY AUDIT &

INFORMATION TECHNOLOGY AUDIT & One day training on INFORMATION TECHNOLOGY AUDIT & 10 th May 2018 - Mövenpick Hotel, Karachi 14 th May 2018 - Sunfort Hotel, Lahore (10:00 AM to 5:00 PM) TRAINING OVERVIEW Every time people get to hear

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

DUNS CAGE 5T5C3

DUNS CAGE 5T5C3 Response to Department of Management Services Cyber Security Assessment, Remediation, and Identity Protection, Monitoring and Restoration Services Request For Information 131 Guilford Road, Bloomfield

More information

2018 Government Professional Accounting Seminar

2018 Government Professional Accounting Seminar 2018 Government Professional Accounting Seminar Thursday September 6, 2018 7:30 a.m. - Registration and Networking 8:00 a.m. 4:50 p.m. (Early Registration by Tuesday, July 31, 2018; Regular by Friday,

More information

IT Audit Essentials. Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur

IT Audit Essentials. Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur IT Audit Essentials Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur IT Audit Essentials Workshop Overview ISACA Malaysia Chapter is

More information

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for

More information

Assessment and Compliance with Sarbanes-Oxley (SOX) Requirements DataGuardZ Whitepaper

Assessment and Compliance with Sarbanes-Oxley (SOX) Requirements DataGuardZ Whitepaper Assessment and Compliance with Sarbanes-Oxley (SOX) Requirements DataGuardZ Whitepaper What is the history behind Sarbanes-Oxley Act (SOX)? In 2002, the U.S. Senate added the Sarbanes-Oxley Act (SOX) to

More information

Article II - Standards Section V - Continuing Education Requirements

Article II - Standards Section V - Continuing Education Requirements Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update

More information

26 February Office of the Secretary Public Company Accounting Oversight Board 1666 K Street, NW Washington, DC

26 February Office of the Secretary Public Company Accounting Oversight Board 1666 K Street, NW Washington, DC 3701 Algonquin Road, Suite 1010 Telephone: 847.253.1545 Rolling Meadows, Illinois 60008, USA Facsimile: 847.253.1443 Web Sites: www.isaca.org and www.itgi.org 26 February 2007 Office of the Secretary Public

More information

Les joies et les peines de la transformation numérique

Les joies et les peines de la transformation numérique Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education

More information

How Secure is Blockchain? June 6 th, 2017

How Secure is Blockchain? June 6 th, 2017 How Secure is Blockchain? June 6 th, 2017 Before we get started... This is a 60 minute webcast For better viewing experience, close all other applications For better sound quality, please use headphones

More information

Agenda-At-A-Glance 3 Sessions & Workshops 3 Management Certificates 4. Professional Certification 4 Registration Form 5 Hotel Accommodations 5

Agenda-At-A-Glance 3 Sessions & Workshops 3 Management Certificates 4. Professional Certification 4 Registration Form 5 Hotel Accommodations 5 Dear Colleague, Unlike any other MAILCOM, the Annual Fall Convention puts you in touch with the leading executives and managers in the mail communication and distribution industry. For three days you will

More information

DIPLOMA COURSE IN INTERNAL AUDIT

DIPLOMA COURSE IN INTERNAL AUDIT DIPLOMA COURSE IN INTERNAL AUDIT Course Objective: Internal Audit is an assurance and consulting service that reviews the efficiency and effectiveness of the internal control.. It assists management at

More information

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment

More information

Volume 2014, Number 4. Volunteers Needed!

Volume 2014, Number 4. Volunteers Needed! Volume 2014, Number 4 Volunteers Needed! Volunteering for NJ ISACA is a great opportunity to expand your professional contacts and your IT knowledge base. NJ ISACA needs talented professionals like you

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)

More information

PIPELINE SECURITY An Overview of TSA Programs

PIPELINE SECURITY An Overview of TSA Programs PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the

More information

You ve Been Hacked Now What? Incident Response Tabletop Exercise

You ve Been Hacked Now What? Incident Response Tabletop Exercise You ve Been Hacked Now What? Incident Response Tabletop Exercise Date or subtitle Jeff Olejnik, Director Cybersecurity Services 1 Agenda Incident Response Planning Mock Tabletop Exercise Exercise Tips

More information

Get Exam Ready. Attention Potential HFMA Certification Candidates! HFMA Certification Candidate

Get Exam Ready. Attention Potential HFMA Certification Candidates! HFMA Certification Candidate Get Exam Ready HFMA Certification Candidate Attention Potential HFMA Certification Candidates! Thursdays February 12, 2015 March 12, 2015 12:00 pm to 2:00 pm cst Course Instructor Christoph Stauder FHFMA,

More information

Cloud Security Certification CCSP Certified Cloud Security Professional

Cloud Security Certification CCSP Certified Cloud Security Professional Cloud Security Certification CCSP Certified Cloud Security Professional Course code: 10006308 Prove You re on the Forefront of Cloud Security In the ever-changing world of the cloud, you face unique security

More information

Cybersecurity The Evolving Landscape

Cybersecurity The Evolving Landscape Cybersecurity The Evolving Landscape 1 Presenter Zach Shelton, CISA Principal DHG IT Advisory Zach.Shelton@DHG.com Raleigh, NC 14+ years of experience in IT Consulting 11+ years of experience with DHG

More information

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers 2017 PORT SECURITY SEMINAR & EXPO ISACA/CISM Information Security Management Training for Security Directors/Managers Agenda Introduction ISACA Information security vs. cybersecurity CISM certification

More information

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY : THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY 18 2017: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) MAY 15 AND 16 o INFORMATION

More information

Continuing Professional Education Policy: Requirements for Certification and Qualification Programs. (formerly known as Administrative Directive #4)

Continuing Professional Education Policy: Requirements for Certification and Qualification Programs. (formerly known as Administrative Directive #4) Continuing Professional Education Policy: Requirements for Certification and Qualification Programs (formerly known as Administrative Directive #4) IIA Professional Certification Board November 2017 Contents

More information

New Zealand Customs Service: Managing Trade Assurance capability risks

New Zealand Customs Service: Managing Trade Assurance capability risks New Zealand Customs Service: Managing Trade Assurance capability risks Progress in responding to the Auditor-General s recommendations This is an independent assurance report about a performance audit

More information

INFORMATION SECURITY OFFICER (ISO) EDUCATION Securing Your Bank s Future. May 17, 2017 TBA Barrett Training Center Nashville, Tenn.

INFORMATION SECURITY OFFICER (ISO) EDUCATION Securing Your Bank s Future. May 17, 2017 TBA Barrett Training Center Nashville, Tenn. INFORMATION SECURITY OFFICER (ISO) EDUCATION Securing Your Bank s Future May 17, 2017 TBA Barrett Training Center Nashville, Tenn. INFORMATION SECURITY OFFICER (ISO) EDUCATION Securing Your Bank s Future

More information

Administrative Directive No. 4: 2011 Continuing Professional Education Requirements for All Certification Programs

Administrative Directive No. 4: 2011 Continuing Professional Education Requirements for All Certification Programs Administrative Directive No. 4: 2011 Continuing Professional Education Requirements for All Certification Programs Purpose This document contains the mandatory Continuing Professional Education (CPE) requirements

More information

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient? Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY

More information

Welcome October, 2013 INSIDE THIS ISSUE. Jesse A. Hanford Greater Cincinnati ISACA President

Welcome   October, 2013 INSIDE THIS ISSUE. Jesse A. Hanford Greater Cincinnati ISACA President October, 2013 INSIDE THIS ISSUE Welcome Message....1 Monthly Meeting......2 Events 3 Education......5 Meet A Board member...8 Editor s Corner....9 About Our Chapter... 10 Welcome Greater Cincinnati ISACA

More information

Background of the North America Top Technology Initiatives Survey

Background of the North America Top Technology Initiatives Survey Kevin M. Martin, CPA.CITP, MCSE, MCP+I The 2013 North America* Top Technology Initiatives Survey *AICPA and CPA Canada The views expressed by the presenters do not necessarily represent the views, positions,

More information

FIRST NATIONS FINANCIAL MANAGEMENT BOARD. FMB Certification: What Auditors Need to Know March 16, 2017

FIRST NATIONS FINANCIAL MANAGEMENT BOARD. FMB Certification: What Auditors Need to Know March 16, 2017 FIRST NATIONS FINANCIAL MANAGEMENT BOARD FMB Certification: What Auditors Need to Know March 16, 2017 Presenter Introductions Scott Munro, CPA, CA, CAFM Director, Standards and Certification Lee Fulla,

More information

Risk Based IT Auditing Master Class. Unlocking your World to a Sea of Opportunities

Risk Based IT Auditing Master Class. Unlocking your World to a Sea of Opportunities Risk Based IT Auditing Master Class Unlocking your World to a Sea of Opportunities The Digital World Information Technology has developed into a nerve center of every organisation. It has become an intrinsic

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

Canada Life Cyber Security Statement 2018

Canada Life Cyber Security Statement 2018 Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability

More information

Handling Complex and Difficult Privacy and Information Security Issues

Handling Complex and Difficult Privacy and Information Security Issues Handling Complex and Difficult Privacy and Information Security Issues Rebecca Herold, CIPP, CISSP, CISM, CISA, FLMI Christopher Grillo, CISM, CISA, CPA, ITIL Presentation Overview: Handling complex and

More information

CCSA, CFSA, CGAP Transition FAQs

CCSA, CFSA, CGAP Transition FAQs CCSA, CFSA, CGAP Transition FAQs July 2018 Frequently Asked Questions (FAQ) Q. How is the Certified Government Auditing Professional (CGAP) certification changing? A. The CGAP certification will be repositioned

More information

Could the BIGGEST Threat to Your Business be INSIDE Your Company?

Could the BIGGEST Threat to Your Business be INSIDE Your Company? Could the BIGGEST Threat to Your Business be INSIDE Your Company? Presented By: Cheryl W. Snead, Banneker Industries, Inc. Rick Avery, Securitas Security Inc. Cheryl W. Snead President/CEO/Facility Security

More information

TRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I.

TRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I. TRAINING WEEK COURSE OUTLINE May 9-13 2016 RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I. Page2 FACILITATOR S BIOGRAPHY John Tannahill, CA, CISM, CGEIT, CRISC is a management consultant specializing

More information

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience

More information

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 Sponsored by: Kansas Municipal Utilities Kansas Municipal Energy Agency Kansas Power Pool CYBERSECURITY TRAINING EXERCISE DATE November

More information

Effective COBIT Learning Solutions Information package Corporate customers

Effective COBIT Learning Solutions Information package Corporate customers Effective COBIT Learning Solutions Information package Corporate customers Thank you f o r y o u r interest Thank you for showing interest in COBIT learning solutions from ITpreneurs. This document provides

More information

Predstavenie štandardu ISO/IEC 27005

Predstavenie štandardu ISO/IEC 27005 PERFORMANCE & TECHNOLOGY - IT ADVISORY Predstavenie štandardu ISO/IEC 27005 ISMS Risk Management 16.02.2011 ADVISORY KPMG details KPMG is a global network of professional services firms providing audit,

More information

BOARD OF COUNTY COMMISSIONERS

BOARD OF COUNTY COMMISSIONERS Auditor I Are you looking to make our government better in an employee-friendly work environment with challenging assignments and a broad range of diverse projects? The Palm Beach County Office of the

More information