Overview: Sponsored By:
|
|
- James Scott
- 5 years ago
- Views:
Transcription
1 Overview: IIA Winnipeg is hosting its third annual full day Fraud Summit on Tuesday, March 15 th. The 2016 Fraud Summit will focus on fraud prevention, deterrence and detection along with topics including cybersecurity and data analytics. In addition, participants will have opportunity network with fraud professionals and hear about valuable real-world examples and strategies that can take your fraud investigations to the next level. Program at-a-glance 7:30 a.m. Registration / Breakfast 8:15 a.m. Welcome Remarks 8:30 a.m. The Devil is in the Data Dave Oswald, Senior Manager, EY 9:50 a.m. Refreshment Break 10:10 a.m. How to Conduct an Effective Fraud Risk Assessment Shawn Hendry, Partner, Sunera 11:00 a.m. Break 11:10 a.m. Cybersecurity State of the Union Scott MacLennan, Senior Manager, KPMG 12:00 p.m. Networking Luncheon 12:50 p.m. Fraud Case Studies from the OAG Jeff Gilbert, Investigations, Office of the Auditor General of Manitoba James Wright, Investigations, Office of the Auditor General of Manitoba 2:10 p.m. Refreshment Break 2:30 p.m. Recent Fraud Trends in Winnipeg Detective Curtis Chiborak, Commercial Crimes Unit, Winnipeg Police Service 3:20 p.m. Break 3:30 p.m. Creating and Maintaining an Effective Anti-Fraud Program Rob Swain, Director Internal Audit (Investigations), Investors Group 4:20 p.m. Closing Remarks / Evaluations *Presentation order subject to change. Sponsored By: Date: Tuesday, March 15, 2016 Time: Registration & Breakfast: 7:30 am 8:15 am Program: 8:30 am 5:00 pm Location: Delta Winnipeg Hotel 350 St Mary Avenue Winnipeg, Manitoba Cost: Early Bird EXTENDED!!! (by Feb 12, 2016) Members: $350 Non-Members: $400 Group (4 or more): $325 Regular (after Feb 12, 2016) Members: $400 Non-Members: $450 Group (4 or more): $375 Register online: Final Registration deadline: Thursday, March 10, 2016 CPE: 7 CPE s For information: IIA Winnipeg Chapter Kelsey.giesbrecht@gwl.ca j.roopra@uwinnipeg.ca 1
2 7:30 a.m. Registration and Continental Breakfast 8:15 a.m. Welcome Remarks 8:30 a.m. The Devil is in the Data Dave M Oswald, CA, CFE, Senior Manager, EY This presentation will include a discussion of data analytics, big data, how to use it, and the footprints of fraud. Dave has performed numerous computer forensics investigations since These investigations were undertaken to determine what evidence resided on electronic storage media, including but not limited to computers, mobile phones, tapes, thumb drives. Some examples of analysis conducted include: Searches for evidence of financial fraud and theft of trade secrets on computer media from desktops, laptops, and server platforms. Searches for evidence of reformatting, dates of reformatting, and utilities used to wipe or copy data from electronic media. Locating evidence of improper removal, duplication, destruction, or transmission of messages or files. Provide expert testimony and investigative support as needed on projects Analysis of stock and warehousing for a multinational metals corporation. Dave has performed engagements for many organizations across many industries including mining & precious metals, hotel & entertainment as well as distribution. Analysis and investigations included reviews for fraud risk, loss of profit, design and operation of internal controls, information technology controls, forensic data analytics and leading and lagging practices. Dave has designed and operated numerous databases for clients to identify the electronic attributes of irregular transactions. Dave has testified as an expert witness in computer forensics and accounting on a number of occasions in arbitration matters as well as in the High and Magistrates Court in South Africa. 9:50 a.m. Refreshment Break 10:10 a.m. How to Conduct an Effective Fraud Risk Assessment Shawn Hendry, CIA, CISA, CGEIT, CRMA, Managing Partner, Sunera Canada With the introduction of the new COSO 2013 Control Framework, many organizations have taken the opportunity to improve their processes surrounding the assessment of risks of fraud risk factors. In this presentation Shawn will discuss the importance of conducting a Fraud Risk Assessment (FRA) and how to make it meaningful to the organization rather than just an exercise to be completed. Shawn will discuss Sunera s typical approach and identify some of the common pitfalls in conducting an FRA. Shawn Hendry, CIA, CISA, CGEIT, CRMA is the Managing Partner, Canada for Sunera LLC a division of Cyber Risk Management LLC. Shawn has led Sunera s services in Canada for nearly 10 years. Shawn has assisted our Sunera clients across many industries with their Internal Audit, IT Audit, corporate governance and cyber risk requirements. 2
3 Shawn and Sunera are seen to be leaders in these fields. Prior to joining Sunera, Shawn was a Senior Manager with KPMG in their Risk Advisory Service practice, and the Director of Audit and Risk Assessment for CanWest Global Communications which was previously Canada s largest media group. With CanWest, Shawn initiated and was responsible for developing and building the Internal Audit and Risk function and leading CanWest to be one of the first organizations in Canada to comply with the requirements of the Sarbanes Oxley Act. Earlier in his career Shawn also initiated the Canadian Audit Department for UtiliCorp Networks Canada (Aquila) and started his career at Arthur Anderson for six years working both in the Audit and Assurance and Advisory practices. 11:00 a.m. Break 11:10 a.m. Cybersecurity State of the Union Scott MacLennan, CISA, CISSP, Senior Manager, Risk Consulting Services, KPMG LLP Scott will lead a discussion on the current state of Cybersecurity threats, using specific examples of incidents that have occurred. Then we'll gaze into the crystal ball to discuss what threats we can expect to see more of in The presentation will include a series of specific examples of security incidents, outline their root causes and identify the top ten mistakes companies make when dealing with security incidents. Scott will also describe the top 10 improvements that companies have made when dealing with cybersecurity incidents over the past year. Scott is a Senior Manager in KPMG s Risk Consulting practice and leads the delivery of IT Advisory (ITA) and Internal Audit and Risk Compliance (IARCS) services in Winnipeg. Scott is a Certified Information System Security Professional (CISSP), a Certified Information Systems Auditor (CISA), certified in ITIL v3 and specializes in IT security, Internal Audit co-sourcing, and IT control evaluation. Scott has over 20 years of experience with Information Technology and has worked with a wide variety of public and private companies, as auditor, advisor and facilitator. Scott has assisted internal audit groups assess IT controls in areas of logical security, physical security, operations, application development, project management and recovery. Scott has hands on experience performing technical and procedural security reviews and general IT control assessments over a wide variety of technology platforms. 12:00 p.m. Networking Luncheon 12:50 p.m. Fraud Case Studies from the OAG Jeff Gilbert, CPA, CA, DIFA, Investigations, Office of the Auditor General of Manitoba & James Wright, CA, DIFA, Investigations, Office of the Auditor General of Manitoba Jeff and James will describe the OAG s process for receiving allegations via the OAG s fraud line along with case studies of investigations and related reports. Included in the presentation will be a dialogue on planning, audit approach, interviews, evidence gathering and report writing. A brief description of survey results from fraud statistics will be discussed along with how this affects the approach taken by the OAG. 3
4 Jeff has worked in the auditing field for over 15 years and is a Principal with the Office of the Auditor General of Manitoba. He has conducted Value for Money, Financial Statement, and Forensic Instigative Audits. Jeff s current focus is in the Forensic Investigations area. Prior to joining the Office of the Auditor General Jeff worked for a number of years in public practice with a national firm. He has also held numerous roles on the executive of a notfor-profit and is currently the President of the board. Jeff has a Master of Professional Accounting degree and obtained his Chartered Accountant designation in He further specialized by obtaining training and experience in forensic auditing. This included a Diploma in Investigative Forensic Accounting. This experience has been beneficial in his teaching role at the University of Manitoba and in drafting business cases for CPA Canada. He has also served as a director on a board related to a national health college. James has been auditing for the past 21 years. He received his Chartered Accountant designation in Ontario in He completed the Diploma in Investigative and Forensic Accounting from the University of Toronto in He has worked for the Office of the Auditor General for the past 16 years, the last 8 years as a Principal in the Investigations Division. Currently, his primary responsibility involved dealing with allegations of fraud, waste and misuse of public funds. These allegations are the starting point for many limited-scope audits, value-for money audits and investigations done by the Office of the Auditor General. 2:10 p.m. Refreshment Break 2:30 p.m. Recent Fraud Trends in Winnipeg Detective Curtis Chiborak, Commercial Crimes Unit, Winnipeg Police Service This presentation will discuss some of the more common external frauds that are targeting businesses in Winnipeg including the Business Compromise and Fraudulent Payment Cards/Gift Cards. Additional discussion will involve the types of internal thefts encountered by the Commercial Crimes Unit and the documentation needed when reporting fraudulent incidents to police. Det. Curtis Chiborak graduated from the University of Winnipeg in 1997 with a Bachelor of Arts with majors in Economics and English. Det. Chiborak joined the Winnipeg Police Service in 2007 and has been assigned to the Commercial Crime Unit for the past four years working various investigations involving Identity Theft/Fraud, Internal Thefts, Mass Market Scams, Fraudulent Payment Cards and Frauds targeting Businesses. 3:20 p.m. Break 3:30 p.m. Creating and Maintaining an Effective Anti-Fraud Program Rob Swain, CFE, Director Internal Audit (Investigations), Investors Group Successful anti-fraud programs within any organization need to be reviewed and assessed on an ongoing basis. The key components of the program must be re-evaluated to keep pace with emerging trends and the risks associated with both internal and external threats. Rob Swain has more than 31 years of experience within the Financial Services industry. Over the past 21 years his focus has been in the area of audit and fraud investigations. During this time he has managed hundreds of fraud investigations. As well he has developed various fraud detection and monitoring processes as part of an overall approach to managing the risks associated with fraud. In twenty years the anti-fraud program has evolved from 4
5 what was very much a reactive process to a specific event to one that is comprised of a number of key components including fraud risk assessments, fraud control reviews, fraud detection and monitoring processes, fraud awareness training that are all key components of an effective anti-fraud program. 4:20 p.m. Closing Remarks / Evaluations IIA Winnipeg would like to thank our event sponsor 5
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More informationCENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN
CENTRAL REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN TAKE THE STAGE Members: Register by Feb. 29 to save US$100. Take the Stage The IIA and IIA Nashville Chapter are excited to host the 2016 Central
More informationPresent. 5th May - Chennai. Internal. auditing. today: Beginning Auditor Tools and Techniques. 6 CPE hours.
Present 5th May - Chennai Internal auditing today: Beginning Auditor Tools and Techniques 6 CPE hours www.achromicpoint.com About the Seminar To become a successful auditor, a strong base of knowledge
More informationIT Audit Process Prof. Liang Yao Week Two IT Audit Function
Week Two IT Audit Function Why we need IT audit A Case Study What You Can Learn about Risk Management from Societe Generale? https://www.cio.com/article/2436790/security0/what-you-can-learn-about-risk-management-fromsociete-generale.html
More informationIT in Healthcare Day
San Francisco ISACA Chapter Proudly Presents IT in Healthcare Day A Day-Long, Multi-Session Event, being held in Walnut Creek! Where: Walnut Creek Marriott - 2355 North Main Street Walnut Creek, CA 94596
More informationTHE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.
THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.FFa) BROCHURE Contents INTRODUCTION... 3 THE IICFA... 4 Basic Entry qualifications...
More informationNew Horizons in Audit & Assurance
IIA Hyderabad Chapter brings you a Seminar on New Horizons in Audit & Assurance 6 CPE Hours for IIA Members Date : 04 th January 2018 1 Schedule... SCHEDULE 09:00 AM to 09:30 AM Seminar Registration 09:30
More informationTable of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING
Table of Contents Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Chapter 1: Significance of Internal Auditing in Enterprises Today: An Update 3 1.1 Internal Auditing History and Background
More informationMemphis Chapter. President s Message. This annual event is designed to provide students with a
Memphis Chapter F E B R U A R Y 2 0 1 5 Remember: Update your IIA profile for the most up-to-date news. RSVP for the Annual Student Day February 24, 2015 This annual event is designed to provide students
More informationInformation Security Officer (ISO) Education
Information Security Officer (ISO) Education October 16, 2018 TBA Barrett Training Center Nashville, Tenn. Information Security Officer (ISO) Education October 16, 2018 TBA Barrett Training Center Nashville,
More informationIT Auditing and IT Fraud Detection
IT Auditing and IT Fraud Detection Page 1 of 7 Why Attend In today s world, IT fraud prevention and investigation have become an everyday part of corporate life and auditors must gain expertise in this
More informationSecurity Program Design:
Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident
More informationCOPYRIGHTED MATERIAL. Index
Index 2014 revised COSO framework. See COSO internal control framework Association of Certified Fraud Examiners (ACFE), 666 Administrative files workpaper document organization, 402 AICPA fraud standards
More informationSteps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.
Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important
More informationVal-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.
Val-EdTM Valiant Technologies Education & Training Services Workshop for CISM aspirants All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting
More informationRisk Advisory Academy Training Brochure
Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty
More information2019 Annual Information Technology Audit Conference Friday, March 29, 2018 Melville Marriott 8:30 a.m. 5:00 p.m. (8 CPE/CPD Credits)
2019 Annual Information Technology Audit Conference Friday, March 29, 2018 Melville Marriott 8:30 a.m. 5:00 p.m. (8 CPE/CPD Credits) Event Summary Feeling overwhelmed with all the new technology developments
More informationcomprehensive guide toı ACCOUNTINGı CERTIFICATIONSı cpa, cfe, cia, cisa & more ı The Bean Counter, LLC All Rights Reservedı
ACCOUNTING comprehensive guide to CERTIFICATIONS cpa, cfe, cia, cisa & more The Bean Counter, LLC All Rights Reserved The Bean Counter, LLC All Rights Reserved Certified Public Accountant This is what
More informationThe Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018
The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018 Jeff Hemphill Partner and Central Region Leader, Risk Advisory Services Brian Kirkpatrick Managing Director, Risk Advisory
More informationEARN UP TO 18 CPE CREDITS
Join Us in Nashville, TN, USA 370 Stay at the Heart of the Conference Action! The Omni Nashville 250 5th Avenue South Nashville, TN 37203, USA Hotel Reservations: 615-782-5300 2018 Governance, Risk, and
More informationProfessional Training Course - Cybercrime Investigation Body of Knowledge -
Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce
More informationEffective Cyber Incident Response in Insurance Companies
August 2017 Effective Cyber Incident Response in Insurance Companies An article by Raj K. Chaudhary, CRISC, CGEIT; Troy M. La Huis; and Lucas J. Morris, CISSP Audit / Tax / Advisory / Risk / Performance
More informationCFE Exam Review Course
CFE Exam Review Course Leading Excellence in Banking BIBF plays a vital role in the training and development of human capital in the Kingdom of Bahrain. Our commitment to excellence has strengthened our
More informationOpportunities to Integrate Technology Into the Classroom. Presented by:
Opportunities to Integrate Technology Into the Classroom Presented by: Mark Salamasick, CIA, CISA, CRMA, CSP Executive Director of Audit University of Texas System Discussion Topics Internal Audit Textbook
More informationBusiness Process Design and Internal Audit UNIVERSITY OF TEXAS AT DALLAS Course Syllabus Spring 2005
Business Process Design and Internal Audit UNIVERSITY OF TEXAS AT DALLAS Course Syllabus Spring 2005 Instructor: Mark Salamasick, CIA, CISA, CSP Course Number: AIM 6380 Semester Hours: 3 Location: SOM
More informationCOMPUTER FORENSICS (CFRS)
Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics
More informationThe Institute of Internal Auditors San Gabriel Valley Chapter
The Institute of Internal Auditors San Gabriel Valley Chapter Presents INFORMATION TECHNOLOGY (IT) and PERFORMANCE AUDITING SEMINAR February 4 and 5, 2014 The San Gabriel Valley Chapter of the IIA is hosting
More informationPROVIDING INVESTIGATIVE SOLUTIONS
PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationCybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.
Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During
More informationFramewOrk to DeSign and implement ifc
Marketing Partner Hotel Radisson GRT, 15 Leveraging COSO internal COntrOLS FramewOrk to DeSign and implement ifc 8 CPE Hours Networking Opportunities Qualified CIA Faculty about the Seminar The COSO Internal
More informationHelping you understand the impact of GDPR.
Helping you understand the impact of GDPR. GENERAL DATA PROTECTION REGULATION (GDPR) RSM s GDPR experts GREGOR STROBL Munich, Germany Partner Risk Advisory Services (RAS) Master of Arts (M.A.) in Corporate
More informationCyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa
Agenda and Speakers Cyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa Thursday, March 01, 2018 7:30 am Registration and Continental Breakfast 8:00 am Opening Remarks
More informationSpread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com
Spread your wings Professional qualifications and development at Deloitte What impact will you make? careers.deloitte.com It s your future. How far will you take it? Do you want to make an impact in your
More informationSALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually
SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC
More informationChapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS
Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power
More informationACUIA Region 5 Meeting October 3-4, 2011 SEFCU, Albany, NY
AGENDA Monday, October 3, 2011 7:30 am - 8:30 am Registration & Continental Breakfast 8:30 am 8:45 am Welcome & Announcements (1) 8:45 am 10:15 am Auditing Human Resources Auditing the HR Function will
More informationA Framework for Managing Crime and Fraud
A Framework for Managing Crime and Fraud ASIS International Asia Pacific Security Forum & Exhibition Macau, December 4, 2013 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic
More informationVice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security
Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity
More informationCyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.
Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. In today s escalating cyber risk environment, you need to make sure you re focused on the right priorities by
More informationPlenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.
Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every
More informationA Global Look at IT Audit Best Practices
A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory
More informationCybersecurity and the Board of Directors
Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education
More informationChief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m.
Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Increased use of technologies such as mobile devices, social media and cloud computing has increased
More informationThe Evolving Threat to Corporate Cyber & Data Security
The Evolving Threat to Corporate Cyber & Data Security Presented by: Sara English, CIPP/US Sara.English@KutakRock.com 1 http://blogs.wsj.com/law/2015/12/09/employee error leading cause of data breaches
More informationCanadian Manufacturers & Exporters Leadership makes the difference
Thursday, November 25, 2010 8:30am 3:00pm Halifax Marriott Harbourfront, NS What is LEAF? LEAF is a new program that focuses on increasing energy efficiency and reducing the environmental impact of manufacturing
More informationA MASTER CLASS AUDIT, LEADERSHIP & ADVANCED EXCEL WORKSHOP
A MASTER CLASS AUDIT, LEADERSHIP & ADVANCED EXCEL WORKSHOP NOVEMBER 22-23, 2018 KIGALI SERENA HOTEL For more information www.icparwanda.com BACKGROUND The institute exists to serve within the Public interest
More informationIntegrated Assurance Embracing The Three Lines of Defense
Integrated Assurance Embracing The Three Lines of Defense Stanley Y. Chang, Ph.D. CPA (Texas), CIA, CMA, CCSA, CGAP, CGFM, CRMA Chief Operating Officer, Marcum, Bernstein & Pinchuk, LLP 1 Stanley Chang,
More informationIIA Academy YOUR PARTNER IN PROFESSIONAL DEVELOPMENT
www.iia.org.sg IIA Academy YOUR PARTNER IN PROFESSIONAL DEVELOPMENT IIA Academy Professional Development To support you in your career progression as an internal auditor, we have adopted the IIA Global
More informationRISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process
RISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process Date 24-25 September 2018 Time: 09:00 17:00 Location Hotel Grand, Tirana, Albania Course director: Mr. Konstantinos P. Triantafyllidis,
More informationData-Driven Policing Summit
Reduce Crime and Manage Risk in Policing with Data Analysis Data-Driven Policing Summit Using Data Analytics and Predictive Modeling to Mitigate Risk and Reduce Crime September 18-19, 2017 Washington,
More informationSeminar Marketing Toolkit - Orlando
We are excited to have you as partner and providing training opportunities in your market. Please use the following marketing toolkit to market these opportunities and earn CAP points! Please contact bill.stewart@theiia.org
More informationOffice of the City Auditor 2014 Third Quarter Activity Report November 25, 2014
2014 Third Quarter Activity Report November 25, 2014 This page is intentionally blank. 1. Audit Plan Progress Monitoring Bylaw 16097, Audit Committee Bylaw, Section 5 states that the Committee assists
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More informationQuestion 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:
Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,
More informationINFORMATION TECHNOLOGY AUDIT &
One day training on INFORMATION TECHNOLOGY AUDIT & 10 th May 2018 - Mövenpick Hotel, Karachi 14 th May 2018 - Sunfort Hotel, Lahore (10:00 AM to 5:00 PM) TRAINING OVERVIEW Every time people get to hear
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationDUNS CAGE 5T5C3
Response to Department of Management Services Cyber Security Assessment, Remediation, and Identity Protection, Monitoring and Restoration Services Request For Information 131 Guilford Road, Bloomfield
More information2018 Government Professional Accounting Seminar
2018 Government Professional Accounting Seminar Thursday September 6, 2018 7:30 a.m. - Registration and Networking 8:00 a.m. 4:50 p.m. (Early Registration by Tuesday, July 31, 2018; Regular by Friday,
More informationIT Audit Essentials. Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur
IT Audit Essentials Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur IT Audit Essentials Workshop Overview ISACA Malaysia Chapter is
More informationKENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)
KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for
More informationAssessment and Compliance with Sarbanes-Oxley (SOX) Requirements DataGuardZ Whitepaper
Assessment and Compliance with Sarbanes-Oxley (SOX) Requirements DataGuardZ Whitepaper What is the history behind Sarbanes-Oxley Act (SOX)? In 2002, the U.S. Senate added the Sarbanes-Oxley Act (SOX) to
More informationArticle II - Standards Section V - Continuing Education Requirements
Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update
More information26 February Office of the Secretary Public Company Accounting Oversight Board 1666 K Street, NW Washington, DC
3701 Algonquin Road, Suite 1010 Telephone: 847.253.1545 Rolling Meadows, Illinois 60008, USA Facsimile: 847.253.1443 Web Sites: www.isaca.org and www.itgi.org 26 February 2007 Office of the Secretary Public
More informationLes joies et les peines de la transformation numérique
Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education
More informationHow Secure is Blockchain? June 6 th, 2017
How Secure is Blockchain? June 6 th, 2017 Before we get started... This is a 60 minute webcast For better viewing experience, close all other applications For better sound quality, please use headphones
More informationAgenda-At-A-Glance 3 Sessions & Workshops 3 Management Certificates 4. Professional Certification 4 Registration Form 5 Hotel Accommodations 5
Dear Colleague, Unlike any other MAILCOM, the Annual Fall Convention puts you in touch with the leading executives and managers in the mail communication and distribution industry. For three days you will
More informationDIPLOMA COURSE IN INTERNAL AUDIT
DIPLOMA COURSE IN INTERNAL AUDIT Course Objective: Internal Audit is an assurance and consulting service that reviews the efficiency and effectiveness of the internal control.. It assists management at
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationVolume 2014, Number 4. Volunteers Needed!
Volume 2014, Number 4 Volunteers Needed! Volunteering for NJ ISACA is a great opportunity to expand your professional contacts and your IT knowledge base. NJ ISACA needs talented professionals like you
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationCYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD
CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)
More informationPIPELINE SECURITY An Overview of TSA Programs
PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the
More informationYou ve Been Hacked Now What? Incident Response Tabletop Exercise
You ve Been Hacked Now What? Incident Response Tabletop Exercise Date or subtitle Jeff Olejnik, Director Cybersecurity Services 1 Agenda Incident Response Planning Mock Tabletop Exercise Exercise Tips
More informationGet Exam Ready. Attention Potential HFMA Certification Candidates! HFMA Certification Candidate
Get Exam Ready HFMA Certification Candidate Attention Potential HFMA Certification Candidates! Thursdays February 12, 2015 March 12, 2015 12:00 pm to 2:00 pm cst Course Instructor Christoph Stauder FHFMA,
More informationCloud Security Certification CCSP Certified Cloud Security Professional
Cloud Security Certification CCSP Certified Cloud Security Professional Course code: 10006308 Prove You re on the Forefront of Cloud Security In the ever-changing world of the cloud, you face unique security
More informationCybersecurity The Evolving Landscape
Cybersecurity The Evolving Landscape 1 Presenter Zach Shelton, CISA Principal DHG IT Advisory Zach.Shelton@DHG.com Raleigh, NC 14+ years of experience in IT Consulting 11+ years of experience with DHG
More information2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers
2017 PORT SECURITY SEMINAR & EXPO ISACA/CISM Information Security Management Training for Security Directors/Managers Agenda Introduction ISACA Information security vs. cybersecurity CISM certification
More informationTHE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :
THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY 18 2017: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) MAY 15 AND 16 o INFORMATION
More informationContinuing Professional Education Policy: Requirements for Certification and Qualification Programs. (formerly known as Administrative Directive #4)
Continuing Professional Education Policy: Requirements for Certification and Qualification Programs (formerly known as Administrative Directive #4) IIA Professional Certification Board November 2017 Contents
More informationNew Zealand Customs Service: Managing Trade Assurance capability risks
New Zealand Customs Service: Managing Trade Assurance capability risks Progress in responding to the Auditor-General s recommendations This is an independent assurance report about a performance audit
More informationINFORMATION SECURITY OFFICER (ISO) EDUCATION Securing Your Bank s Future. May 17, 2017 TBA Barrett Training Center Nashville, Tenn.
INFORMATION SECURITY OFFICER (ISO) EDUCATION Securing Your Bank s Future May 17, 2017 TBA Barrett Training Center Nashville, Tenn. INFORMATION SECURITY OFFICER (ISO) EDUCATION Securing Your Bank s Future
More informationAdministrative Directive No. 4: 2011 Continuing Professional Education Requirements for All Certification Programs
Administrative Directive No. 4: 2011 Continuing Professional Education Requirements for All Certification Programs Purpose This document contains the mandatory Continuing Professional Education (CPE) requirements
More informationCanada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?
Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY
More informationWelcome October, 2013 INSIDE THIS ISSUE. Jesse A. Hanford Greater Cincinnati ISACA President
October, 2013 INSIDE THIS ISSUE Welcome Message....1 Monthly Meeting......2 Events 3 Education......5 Meet A Board member...8 Editor s Corner....9 About Our Chapter... 10 Welcome Greater Cincinnati ISACA
More informationBackground of the North America Top Technology Initiatives Survey
Kevin M. Martin, CPA.CITP, MCSE, MCP+I The 2013 North America* Top Technology Initiatives Survey *AICPA and CPA Canada The views expressed by the presenters do not necessarily represent the views, positions,
More informationFIRST NATIONS FINANCIAL MANAGEMENT BOARD. FMB Certification: What Auditors Need to Know March 16, 2017
FIRST NATIONS FINANCIAL MANAGEMENT BOARD FMB Certification: What Auditors Need to Know March 16, 2017 Presenter Introductions Scott Munro, CPA, CA, CAFM Director, Standards and Certification Lee Fulla,
More informationRisk Based IT Auditing Master Class. Unlocking your World to a Sea of Opportunities
Risk Based IT Auditing Master Class Unlocking your World to a Sea of Opportunities The Digital World Information Technology has developed into a nerve center of every organisation. It has become an intrinsic
More informationITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018
GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences
More informationCanada Life Cyber Security Statement 2018
Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability
More informationHandling Complex and Difficult Privacy and Information Security Issues
Handling Complex and Difficult Privacy and Information Security Issues Rebecca Herold, CIPP, CISSP, CISM, CISA, FLMI Christopher Grillo, CISM, CISA, CPA, ITIL Presentation Overview: Handling complex and
More informationCCSA, CFSA, CGAP Transition FAQs
CCSA, CFSA, CGAP Transition FAQs July 2018 Frequently Asked Questions (FAQ) Q. How is the Certified Government Auditing Professional (CGAP) certification changing? A. The CGAP certification will be repositioned
More informationCould the BIGGEST Threat to Your Business be INSIDE Your Company?
Could the BIGGEST Threat to Your Business be INSIDE Your Company? Presented By: Cheryl W. Snead, Banneker Industries, Inc. Rick Avery, Securitas Security Inc. Cheryl W. Snead President/CEO/Facility Security
More informationTRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I.
TRAINING WEEK COURSE OUTLINE May 9-13 2016 RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I. Page2 FACILITATOR S BIOGRAPHY John Tannahill, CA, CISM, CGEIT, CRISC is a management consultant specializing
More informationCybersecurity Risk Mitigation: Protect Your Member Data. Introduction
Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience
More informationCYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017
CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 Sponsored by: Kansas Municipal Utilities Kansas Municipal Energy Agency Kansas Power Pool CYBERSECURITY TRAINING EXERCISE DATE November
More informationEffective COBIT Learning Solutions Information package Corporate customers
Effective COBIT Learning Solutions Information package Corporate customers Thank you f o r y o u r interest Thank you for showing interest in COBIT learning solutions from ITpreneurs. This document provides
More informationPredstavenie štandardu ISO/IEC 27005
PERFORMANCE & TECHNOLOGY - IT ADVISORY Predstavenie štandardu ISO/IEC 27005 ISMS Risk Management 16.02.2011 ADVISORY KPMG details KPMG is a global network of professional services firms providing audit,
More informationBOARD OF COUNTY COMMISSIONERS
Auditor I Are you looking to make our government better in an employee-friendly work environment with challenging assignments and a broad range of diverse projects? The Palm Beach County Office of the
More information