Fraud Analytics: Taking Data Analytics to the Next Level

Size: px
Start display at page:

Download "Fraud Analytics: Taking Data Analytics to the Next Level"

Transcription

1 Fraud Analytics: Taking Data Analytics to the Next Level

2 The Need for a Formal Process The ability of data analysis tests to help detect fraud depends greatly on what is done before and after the actual data analysis techniques are applied.

3 The Haystack Information is created electronically. Millions of transactions of legal relevance are being conducted electronically. Over 70 percent of electronic documents are never printed.

4 The Data Analysis Process Planning phase Preparation phase Testing and interpretation phase Post-analysis phase

5 Planning Phase Planning is essential and can help avoid: Inefficient data analysis A lack of focus or direction for the engagement Avoidable technical difficulties Overlooking key areas for exploration

6 Planning: Understanding the Data Review database schema and technical documentation. Consult with data administrator. Learn what fields and records exist. Learn what tables house data and how tables are linked together.

7 Planning: Articulate the Objective and Scope Consider: The impetus for the engagement The structure and size of the business The target area of examination, if restricted The resources available for the engagement Whether any predication of fraud exists Any existing materiality thresholds or preferences

8 Planning: Build a Profile of Potential Frauds Identify: The organization s risk areas The types of frauds possible in those risk areas The resulting exposure to those frauds Refer to previous fraud risk assessments.

9 Preparation Phase The results of a data analysis test will only be as good as the data used for the analysis.

10 Preparation: Identify Relevant Data Use profile of potential frauds as a guide. For each fraud scenario, identify which fields and records would be affected.

11 Preparation: Identify Relevant Data Determine: What specific data is available Who generates and maintains the data Where the data is stored Timing of the data extraction How the examiner will receive and store the data Control totals needed for verification Potential corroborating sources of data

12 Preparation: Obtain the Data Prepare and submit a formal request for the desired data. Receive file containing data or access to data within system.

13 Preparation: Verify the Data Ensure data analysis software is able to open and read the data as provided. Validate that data received contains all requested fields and records. Confirm control totals.

14 Preparation: Verify the Data Confirm time period covered by data. Sort the file to test for leading or lagging errors. Check for gaps in applicable fields. Confirm format of data in specific fields.

15 Preparation: Verify the Data Check for blank fields where information should be. Check for inappropriate duplicate fields or records. Test logical relationships in the data.

16 Preparation: Cleanse and Normalize the Data Cleanse and convert data to a format suitable for analysis before executing any tests. Normalize the data so that all data can be analyzed consistently.

17 Preparation: Cleanse and Normalize the Data Address inconsistencies in the data: Known errors Blanks or missing data Duplicated data Special/unreadable characters in the data Other unusable entries

18 Testing and Interpretation Phase Data is now ready to be analyzed to uncover patterns consistent with specific fraud scenarios previously identified. Group the data into homogenous categories to help spot outliers.

19 Testing and Interpretation: Analyze the Data High-level tests vs. targeted tests The role of concealment Addressing false positives

20 Post-Analysis Phase Respond to analysis findings Monitor the data

21 SOME EXAMPLES

22 Transaction Flow

23 Social Network Analysis

24 Fraud Analytics: Taking Data Analytics to the Next Level Janet M. McHard, CPA, CFE, CFFA, CFF McHard Accounting Consulting LLC Albuquerque, NM

25 Association of Certified Fraud Examiners, Certified Fraud Examiner, CFE, ACFE, and the ACFE Logo are trademarks owned by the Association of Certified Fraud Examiners, Inc. The contents of this paper may not be transmitted, re-published, modified, reproduced, distributed, copied, or sold without the prior consent of the author.

PECB Change Log Form

PECB Change Log Form GENERAL INFORMATION Owner / Department* Approver / Department * Training Development Department Quality Assurance Department Date of Approval* 2018/03/21 Course name: Language: New Version: Previous Version:

More information

Alberta Reliability Standards Compliance Monitoring Program. Version 1.1

Alberta Reliability Standards Compliance Monitoring Program. Version 1.1 Version 1.1 Effective: January 14, 2011 Table of Contents 1. Introduction... 1 2. Purpose... 1 3. Applicability... 1 4. Definitions... 1 5. Compliance Monitoring Overview... 2 6. Monitoring Tools... 1

More information

Service Organization Control (SOC) Reports: What they are and what to do with them MARCH 21, 2017

Service Organization Control (SOC) Reports: What they are and what to do with them MARCH 21, 2017 Service Organization Control (SOC) Reports: What they are and what to do with them MARCH 21, 2017 Presenter Colin Wallace, CPA/CFF, CFE, CIA, CISA Partner Colin has provided management consulting and internal

More information

comprehensive guide toı ACCOUNTINGı CERTIFICATIONSı cpa, cfe, cia, cisa & more ı The Bean Counter, LLC All Rights Reservedı

comprehensive guide toı ACCOUNTINGı CERTIFICATIONSı cpa, cfe, cia, cisa & more ı The Bean Counter, LLC All Rights Reservedı ACCOUNTING comprehensive guide to CERTIFICATIONS cpa, cfe, cia, cisa & more The Bean Counter, LLC All Rights Reserved The Bean Counter, LLC All Rights Reserved Certified Public Accountant This is what

More information

PayThankYou LLC Privacy Policy

PayThankYou LLC Privacy Policy PayThankYou LLC Privacy Policy Last Revised: August 7, 2017. The most current version of this Privacy Policy may be viewed at any time on the PayThankYou website. Summary This Privacy Policy covers the

More information

2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification

2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification 2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification Presenters Jared Hamilton CISSP CCSK, CCSFP, MCSE:S Healthcare Cybersecurity Leader, Crowe Horwath Erika Del Giudice CISA, CRISC,

More information

Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts.

Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts. Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts. BY SCOTT A. BARNES, CPA, CFF, CGMA The adversarial nature of the American legal system creates a natural conflict between

More information

Featured Articles AI Services and Platforms A Practical Approach to Increasing Business Sophistication

Featured Articles AI Services and Platforms A Practical Approach to Increasing Business Sophistication 118 Hitachi Review Vol. 65 (2016), No. 6 Featured Articles AI Services and Platforms A Practical Approach to Increasing Business Sophistication Yasuharu Namba, Dr. Eng. Jun Yoshida Kazuaki Tokunaga Takuya

More information

Certified Fraud Examiner Study Guide 2017

Certified Fraud Examiner Study Guide 2017 Certified Fraud Examiner Study Guide 2017 EnCE Certification Program - Guidance Software - EnCase Certified Examiner (EnCE) Requirements and Process STEP 1. Register for Test and Study Guide. Once the

More information

ID THE RIGHT RECIPE. Discover the right mix of digital identity data to serve different business needs

ID THE RIGHT RECIPE. Discover the right mix of digital identity data to serve different business needs ID THE RIGHT RECIPE Discover the right mix of digital identity data to serve different business needs An abstract from the LexisNexis Risk Solutions 2018 State of Risk in Communications, Mobile & Media

More information

International Standard on Auditing (Ireland) 505 External Confirmations

International Standard on Auditing (Ireland) 505 External Confirmations International Standard on Auditing (Ireland) 505 External Confirmations MISSION To contribute to Ireland having a strong regulatory environment in which to do business by supervising and promoting high

More information

HKIB Continuing Professional Development (CPD) Scheme

HKIB Continuing Professional Development (CPD) Scheme HKIB Continuing Professional Development (CPD) Scheme 1. Objectives 1.1 Fellow Certified Bankers (Fellow CB) and Professional Members are required to comply with the Continuing Professional Development

More information

INTERNATIONAL STANDARD ON AUDITING 505 EXTERNAL CONFIRMATIONS CONTENTS

INTERNATIONAL STANDARD ON AUDITING 505 EXTERNAL CONFIRMATIONS CONTENTS INTERNATIONAL STANDARD ON AUDITING 505 EXTERNAL CONFIRMATIONS (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction Scope of

More information

- OQSF - Occupational Qualifications Sub-framework

- OQSF - Occupational Qualifications Sub-framework All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is

More information

People risk. Capital risk. Technology risk

People risk. Capital risk. Technology risk Decode secure. People risk Capital risk Technology risk Cybersecurity needs a new battle plan. A better plan that deals with the full spectrum of your company s cybersecurity not just your technology.

More information

Automated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk

Automated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk Automated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk Skybox Security Whitepaper January 2015 Executive Summary Firewall management has

More information

Opportunities to Integrate Technology Into the Classroom. Presented by:

Opportunities to Integrate Technology Into the Classroom. Presented by: Opportunities to Integrate Technology Into the Classroom Presented by: Mark Salamasick, CIA, CISA, CRMA, CSP Executive Director of Audit University of Texas System Discussion Topics Internal Audit Textbook

More information

CERTIFICATION POLICY

CERTIFICATION POLICY CERTIFICATION POLICY Table of contents 1. Background... 3 1.2 Definitions... 3 1.3 Application and Scope... 5 2. Statement of Policy Intent... 6 3. General requirement... 7 4. Issue of certificates...

More information

SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions

SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions DISCLAIMER: The contents of this publication do not necessarily reflect the position or opinion of the American

More information

Investigation. City of Edmonton Office of the City Auditor. ETS Workforce Development. January 14, 2019

Investigation. City of Edmonton Office of the City Auditor. ETS Workforce Development. January 14, 2019 City of Edmonton Office of the City Auditor Investigation ETS Workforce Development January 14, 2019 1200, Scotia Place, Tower 1 10060 Jasper Ave Edmonton, AB T5J 3R8 Phone: 780-496-8300 edmonton.ca/auditor

More information

STATE OF NORTH CAROLINA OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA FAYETTEVILLE STATE UNIVERSITY

STATE OF NORTH CAROLINA OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA FAYETTEVILLE STATE UNIVERSITY STATE OF NORTH CAROLINA OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA FAYETTEVILLE STATE UNIVERSITY INFORMATION TECHNOLOGY GENERAL CONTROLS INFORMATION SYSTEMS AUDIT JANUARY 2016 EXECUTIVE SUMMARY PURPOSE

More information

HIMSS Successful Patient Matching Without A National ID. Eric Heflin, CTO/CIO

HIMSS Successful Patient Matching Without A National ID. Eric Heflin, CTO/CIO HIMSS 2018 Successful Patient Matching Without A National ID Eric Heflin, CTO/CIO The Sequoia Project s Role The Sequoia Project is a trusted, independent convener of industry and government Works to address

More information

Internal Audit Department

Internal Audit Department O C B o a r d o f S u p e r v i s o r s 1 st District - Janet Nguyen 2 nd District - John M.W. Moorlach, Vice Chairman 3 rd District - Bill Campbell Chairman 4 th District Shawn Nelson 5 th District -

More information

AsureQuality Limited. CodeMark Programme. Certificate Holder Responsibilities and Requirements

AsureQuality Limited. CodeMark Programme. Certificate Holder Responsibilities and Requirements AsureQuality Limited CodeMark Programme Certificate Holder Responsibilities and Requirements Page 1 of 6 1. SCOPE This document describes the responsibilities and requirements of Certificate Holders for

More information

EXTERNAL CONFIRMATIONS SRI LANKA AUDITING STANDARD 505 EXTERNAL CONFIRMATIONS

EXTERNAL CONFIRMATIONS SRI LANKA AUDITING STANDARD 505 EXTERNAL CONFIRMATIONS SRI LANKA STANDARD 505 EXTERNAL CONFIRMATIONS (Effective for audits of financial statements for periods beginning on or after 01 January 2014) CONTENTS Paragraph Introduction Scope of this SLAuS... 1 External

More information

Shielding the Organization from Data Risk & E- Discovery Failures

Shielding the Organization from Data Risk & E- Discovery Failures Shielding the Organization from Data Risk & E- Discovery Failures Ignatius Grande, Senior Discovery Attorney, Hughes Hubbard Jordan Razza, Senior Counsel and Director of U.S. Litigation, Diageo North America,

More information

Cyber Secure Dashboard Cyber Insurance Portfolio Analysis of Risk (CIPAR) Cyber insurance Legal Analytics Database (CLAD)

Cyber Secure Dashboard Cyber Insurance Portfolio Analysis of Risk (CIPAR) Cyber insurance Legal Analytics Database (CLAD) Randall Sandone, CCISO Executive Director Critical Infrastructure Resilience Institute rsandone@illinois.edu Cyber Secure Dashboard Cyber Insurance Portfolio Analysis of Risk (CIPAR) Cyber insurance Legal

More information

ADP Online Retirement Savings Account User s Guide

ADP Online Retirement Savings Account User s Guide Retirement Services ADP Online Retirement Savings Account User s Guide Registering for Single Sign-On ID Who should use this guide? Before you get started, let s make sure this guide is right for you.

More information

Security Gap Analysis: Aggregrated Results

Security Gap Analysis: Aggregrated Results Email Security Gap Analysis: Aggregrated Results Average rates at which enterprise email security systems miss spam, phishing and malware attachments November 2017 www.cyren.com 1 Email Security Gap Analysis:

More information

EMERGING TRENDS AND ISSUES

EMERGING TRENDS AND ISSUES EMERGING TRENDS AND ISSUES ADVANCED ONLINE INVESTIGATIONS Due diligence in fraud investigations requires intense concentration, intelligence, and the right tools. This interactive session will identify

More information

While many are starting to fully understand the value of fonts and risk of moving fonts in this way, font migration is still an issue.

While many are starting to fully understand the value of fonts and risk of moving fonts in this way, font migration is still an issue. The Obsession is Where it All Begins Creative professionals love fonts, there s no doubt about it. Fonts to the Graphic Designer are the same as paints are to the Painter: essential tools for their creative

More information

Successfully Filing Broadband Deployment Data with USAC

Successfully Filing Broadband Deployment Data with USAC Successfully Filing Broadband Deployment Data with USAC Meet our Team Alex Wolff Manager of Project and Product Management alex.wolff@usac.org Bill Johnson Director of Geographic Information Systems (GIS)

More information

Record Clone User Guide

Record Clone User Guide IOTAP s Record Clone add-on for Microsoft Dynamics CRM allows users to create copy of records for not only System & Standard entities but also Custom and their related entities. Record Clone Version: 3.1

More information

CA Nimsoft Monitor. Probe Guide for DHCP Server Response Monitoring. dhcp_response v3.2 series

CA Nimsoft Monitor. Probe Guide for DHCP Server Response Monitoring. dhcp_response v3.2 series CA Nimsoft Monitor Probe Guide for DHCP Server Response Monitoring dhcp_response v3.2 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject

More information

Exam : C : IBM InfoSphere Quality Stage v8 Examination. Title. Version : DEMO

Exam : C : IBM InfoSphere Quality Stage v8 Examination. Title. Version : DEMO Exam : C2090-419 Title : IBM InfoSphere Quality Stage v8 Examination Version : DEMO 1. When running Word Investigation, producing a pattern report will help you do what? A. Refine a standardization rule

More information

This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry

This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry At a Glance With offices across the country, this gaming company has been in operation for decades.

More information

Protect Your Organization from Cyber Attacks

Protect Your Organization from Cyber Attacks Protect Your Organization from Cyber Attacks Leverage the advanced skills of our consultants to uncover vulnerabilities our competitors overlook. READY FOR MORE THAN A VA SCAN? Cyber Attacks by the Numbers

More information

DIPLOMA COURSE IN INTERNAL AUDIT

DIPLOMA COURSE IN INTERNAL AUDIT DIPLOMA COURSE IN INTERNAL AUDIT Course Objective: Internal Audit is an assurance and consulting service that reviews the efficiency and effectiveness of the internal control.. It assists management at

More information

Certified Fraud Examiner Study Guide 2016 READ ONLINE

Certified Fraud Examiner Study Guide 2016 READ ONLINE Certified Fraud Examiner Study Guide 2016 READ ONLINE If you are searched for a ebook Certified fraud examiner study guide 2016 in pdf format, then you have come on to the correct website. We present full

More information

CA Nimsoft Monitor Snap

CA Nimsoft Monitor Snap CA Nimsoft Monitor Snap Configuration Guide for Network Connectivity Monitoring net_connect v2.9 series Legal Notices This online help system (the "System") is for your informational purposes only and

More information

Creating and Checking the PIRLS International Database

Creating and Checking the PIRLS International Database Chapter 8 Creating and Checking the PIRLS International Database Juliane Barth and Oliver Neuschmidt 8.1 Overview The PIRLS 2006 International Database is a unique resource for policy makers and analysts,

More information

Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures

Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures Next 1 What we see happening today. The amount of data businesses must cope with on a daily basis is getting

More information

On Premise. Service Pack

On Premise. Service Pack On Premise Service Pack 02.0.01 - This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational

More information

On Premise. Service Pack

On Premise. Service Pack On Premise Service Pack 02.0.01 - This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational

More information

Ethics: An Overview for Texas CPAs

Ethics: An Overview for Texas CPAs Ethics: An Overview for Texas CPAs Course Instructions and Final Examination Ethics: An Overview for Texas CPAs By Colleen Neuharth McClain, CPA CPE Edition Distributed by The CPE Store www.cpestore.com

More information

LAWGIX LAWYERS, LLC. External Privacy Policy Policy ID: 3214 Date Last Revised: January 16, Internal Use Only 1

LAWGIX LAWYERS, LLC. External Privacy Policy Policy ID: 3214 Date Last Revised: January 16, Internal Use Only 1 LAWGIX LAWYERS, LLC External Privacy Policy Policy ID: 3214 Date Last Revised: January 16, 2019 1 Document Summary Policy Title: Procedure Owner: External Privacy Policy Steering Committee Effective Date:

More information

The Great TOGAF Scavenger Hunt. Enterprise Architecture Using TOGAF 9 Course Preparation Guide

The Great TOGAF Scavenger Hunt. Enterprise Architecture Using TOGAF 9 Course Preparation Guide Enterprise Architecture Using TOGAF 9 Course Preparation Guide 2011 Metaplexity Associates LLC All Rights Reserved Version 2.0 January 2, 2011 The Open Group Certification Mark logo and TOGAF are trademarks,

More information

Certified Fraud Examiner Study Guide 2017

Certified Fraud Examiner Study Guide 2017 Certified Fraud Examiner Study Guide 2017 If you are searched for the book Certified fraud examiner study guide 2017 in pdf format, in that case you come on to faithful website. We present the utter variant

More information

CAPM & PMP Exam Preparation Boot Camp

CAPM & PMP Exam Preparation Boot Camp CAPM & PMP Exam Preparation Boot Camp About This Course In this course, you will gain the essential knowledge and preparation needed to pass either the Certified Associate in Project Management (CAPM)

More information

The ACFE Law Enforcement and Government Alliance

The ACFE Law Enforcement and Government Alliance What is the ACFE? The Association of Certified Fraud Examiners (ACFE) is the world s largest anti-fraud organization and premier provider of anti-fraud training and education with more than 80,000 members

More information

SWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ

SWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ SWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ 1 SWIFT Customer Security Controls Framework Why has SWIFT launched new security

More information

ISACA Survey Results. 27 April Ms. Nancy M. Morris, Secretary Securities and Exchange Commission 100 F Street NE Washington, DC

ISACA Survey Results. 27 April Ms. Nancy M. Morris, Secretary Securities and Exchange Commission 100 F Street NE Washington, DC 3701 Algonquin Road, Suite 1010 Telephone: 847.253.1545 Rolling Meadows, Illinois 60008, USA Facsimile: 847.253.1443 Web Sites: www.isaca.org and www.itgi.org 27 April 2006 Ms. Nancy M. Morris, Secretary

More information

Full file at

Full file at Chapter 2 Data Warehousing True-False Questions 1. A real-time, enterprise-level data warehouse combined with a strategy for its use in decision support can leverage data to provide massive financial benefits

More information

GCI D CLENZ HEALTH DATA CLEANSING SOLUTIONS

GCI D CLENZ HEALTH DATA CLEANSING SOLUTIONS GCI D CLENZ HEALTH DATA CLEANSING SOLUTIONS Enhance Care, Optimize Health Outcomes and Minimize Loss of Reimbursements with High Quality Data www.gcinfosys.com GCI D CLENZ HEALTH DATA CLEANSING SOLUTIONS

More information

ServiceNow Certified System Administrator Exam Specification

ServiceNow Certified System Administrator Exam Specification ServiceNow Certified System Administrator Exam Specification 3Q2017 Introduction This ServiceNow Certified System Administrator Exam Specification (Blueprint) defines the purpose, audience, testing options,

More information

Learning with the IIA Refreshing the profession: The New Internal Auditor. Jan Olivier 6 February 2019

Learning with the IIA Refreshing the profession: The New Internal Auditor. Jan Olivier 6 February 2019 Learning with the IIA Refreshing the profession: The New Internal Auditor Jan Olivier 6 February 2019 Contents title Qualifications framework CIA syllabus update Learning support Qualifications framework

More information

iii) Activity Definitions

iii) Activity Definitions iii) Activity Definitions A0, Preserve Electronic Records Under the control of Archival and Institutional Requirements, and limited by the possibilities available within the State of the Art of Information

More information

ADVANCED AUDIT AND ASSURANCE

ADVANCED AUDIT AND ASSURANCE ADVANCED AUDIT AND ASSURANCE CPA PROGRAM SUBJECT OUTLINE The Advanced Audit and Assurance subject provides a body of knowledge for you to understand the nature and diversity of audit and assurance engagements.

More information

Instruction. Rules for Use of Logo

Instruction. Rules for Use of Logo Page 1/7 Purpose: The purpose of this instructions to provide the requirements for the use of Accreditation and certification Mark/Logo to the certified Client organization. General Accreditation mark

More information

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information

More information

SEE WHAT OTHERS DON T

SEE WHAT OTHERS DON T THE DATABERG REPORT: SEE WHAT OTHERS DON T IDENTIFY THE VALUE, RISK AND COST OF YOUR DATA THE STATE OF INFORMATION MANAGEMENT: UNITED KINGDOM & IRELAND UNLOCKING IT AND INFORMATION Extracting greater value

More information

We offer background check and identity verification services to employers, businesses, and individuals. For example, we provide:

We offer background check and identity verification services to employers, businesses, and individuals. For example, we provide: This Privacy Policy applies to the websites, screening platforms, mobile applications, and APIs (each, a Service ) owned and/or operated by Background Research Solutions, LLC ("we"/ BRS ). It also describes

More information

Regulatory Notice 09-64

Regulatory Notice 09-64 Regulatory Notice 09-64 Customer Assets Verification of Instructions to Transmit or Withdraw Assets from Customer Accounts Executive Summary As part of their duty to safeguard customer assets and to meet

More information

RSA ADVANCED SOC SERVICES

RSA ADVANCED SOC SERVICES RSA ADVANCED SOC SERVICES Consulting services to improve threat detection and response EXECUTIVE SUMMARY A holistic approach to enhanced cybersecurity operations This service is for organizations needing

More information

Handling Large Data Sets

Handling Large Data Sets Handling Large Data Sets Computer Forensics & Electronic Discovery Rob Weston My Background Police Forensic Consultancy Kroll Ontrack Palmer Legal Technologies Today s Talk Forensics and E-Discovery Modern

More information

A Global Look at IT Audit Best Practices

A Global Look at IT Audit Best Practices A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory

More information

RSA Cybersecurity Poverty Index : APJ

RSA Cybersecurity Poverty Index : APJ RSA Cybersecurity Poverty Index : APJ 2016 Overview Welcome to RSA s second annual Cybersecurity Poverty Index. The RSA Cybersecurity Poverty Index is the result of an annual maturity self-assessment completed

More information

Printer Systems-Based Separations

Printer Systems-Based Separations Printer Systems-Based Separations Adobe Developers Association 9 October 1997 Technical Note #5606 LanguageLevel 3 Corporate Headquarters 345 Park Avenue San Jose, CA 95110-2704 (408) 536-6000 Eastern

More information

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password The way digital enterprises connect with their

More information

A Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum

A Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum A Better Approach to Leveraging an OpenStack Private Cloud David Linthicum A Better Approach to Leveraging an OpenStack Private Cloud 1 Executive Summary The latest bi-annual survey data of OpenStack users

More information

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr. THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.FFa) BROCHURE Contents INTRODUCTION... 3 THE IICFA... 4 Basic Entry qualifications...

More information

Lahore University of Management Sciences. ACCT 250 Auditing Spring Semester 2018

Lahore University of Management Sciences. ACCT 250 Auditing Spring Semester 2018 Lahore University of Management Sciences ACCT 250 Auditing Spring Semester 2018 Instructor Syed Zain ul Abideen / Waqar Ali Room No. SDSB room no. 442, 422 Office Hours TBA Email syed.zain@lums.edu.pk;

More information

7 The Protection of Certification Marks under the Trademark Act (*)

7 The Protection of Certification Marks under the Trademark Act (*) 7 The Protection of Certification Marks under the Trademark Act (*) In this research, I examined the certification and verification business practices of certification bodies, the use of certification

More information

SOC for cybersecurity

SOC for cybersecurity April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Auditor www.pecb.com The objective of the Certified ISO 22000 Lead Auditor examination is to ensure that the candidate has

More information

Internet of Things. Internet of Everything. Presented By: Louis McNeil Tom Costin

Internet of Things. Internet of Everything. Presented By: Louis McNeil Tom Costin Internet of Things Internet of Everything Presented By: Louis McNeil Tom Costin Agenda Session Topics What is the IoT (Internet of Things) Key characteristics & components of the IoT Top 10 IoT Risks OWASP

More information

Keep the Door Open for Users and Closed to Hackers

Keep the Door Open for Users and Closed to Hackers Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM COLDWELL BANKER-D ANN HARPER REALTY PROPERTY MANAGEMENT JULY 1, 2013 COLDWELL BANKER-D ANN HARPER REALTY PROPERTY MANAGEMENT, located in SAN ANTONIO, TX 78258 developed

More information

RSA INCIDENT RESPONSE SERVICES

RSA INCIDENT RESPONSE SERVICES RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access

More information

ACCREDITATION COMMISSION FOR CONFORMITY ASSESSMENT BODIES

ACCREDITATION COMMISSION FOR CONFORMITY ASSESSMENT BODIES ACCREDITATION COMMISSION FOR CONFORMITY ASSESSMENT BODIES ACCREDITATION SCHEME MANUAL Document Title: Document Number: Various Accreditation Schemes ACCAB-ASM-7.0 CONTROLLED COPY Revision Number Revision

More information

Streamline SDTM Development and QC

Streamline SDTM Development and QC Paper SI09 Streamline SDTM Development and QC Stephen Gormley, Amgen, United Kingdom ABSTRACT Amgen s Global Statistical Programming ( GSP ) function have one centralised team (The CDISC Consultancy and

More information

General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant

General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant General Data Protection Regulation April 3, 2018 Sarah Ackerman, Managing Director Ross Patz, Consultant Introductions Sarah Ackerman, CISSP, CISA Managing Director, Cincinnati Responsible for overall

More information

Minimum Requirements For The Operation of Management System Certification Bodies

Minimum Requirements For The Operation of Management System Certification Bodies ETHIOPIAN NATIONAL ACCREDITATION OFFICE Minimum Requirements For The Operation of Management System Certification Bodies April 2011 Page 1 of 11 No. Content Page 1. Introduction 2 2. Scope 2 3. Definitions

More information

Technical Working Session on Profiling Equity Focused Information

Technical Working Session on Profiling Equity Focused Information Technical Working Session on Profiling Equity Focused Information Using to create, knowledge and wisdom (with a particular focus on meta) 23 26 June, 2015 UN ESCAP, Bangkok 24/06/2015 1 Aims 1. Outline

More information

Data Quality Assessment Tool for health and social care. October 2018

Data Quality Assessment Tool for health and social care. October 2018 Data Quality Assessment Tool for health and social care October 2018 Introduction This interactive data quality assessment tool has been developed to meet the needs of a broad range of health and social

More information

HA150. SAP HANA 2.0 SPS02 - SQL and SQLScript for SAP HANA COURSE OUTLINE. Course Version: 14 Course Duration: 3 Day(s)

HA150. SAP HANA 2.0 SPS02 - SQL and SQLScript for SAP HANA COURSE OUTLINE. Course Version: 14 Course Duration: 3 Day(s) HA150 SAP HANA 2.0 SPS02 - SQL and SQLScript for SAP HANA. COURSE OUTLINE Course Version: 14 Course Duration: 3 Day(s) SAP Copyrights and Trademarks 2018 SAP SE or an SAP affiliate company. All rights

More information

Managing Personally Identifiable Information in P6 Professional

Managing Personally Identifiable Information in P6 Professional P6 Professional Administration Guide Version 17 April 2018 Contents About This Guide... 5 Managing Personally Identifiable Information in P6 Professional... 5 About Consent Notices... 5 About Personally

More information

RSA INCIDENT RESPONSE SERVICES

RSA INCIDENT RESPONSE SERVICES RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access

More information

Emsi Privacy Shield Policy

Emsi Privacy Shield Policy Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (

More information

Skills Assessor Notification Service Installation Guide

Skills Assessor Notification Service Installation Guide Skills Assessor 8.1.127 Email Notification Service Installation Guide The information contained herein is proprietary and confidential and cannot be disclosed or duplicated without the prior written consent

More information

CAREERBUILDER.COM - PRIVACY POLICY

CAREERBUILDER.COM - PRIVACY POLICY Effective Date: September 15, 2010 CareerBuilder, LLC and its subsidiaries and divisions (collectively, CareerBuilder, We or Our ) has drafted its Privacy Policy to ensure that you can use CareerBuilder

More information

REAL-TIME SOLUTIONS TO REAL-TIME PROBLEMS FUZZY MATCHING IN FRAUD ANALYTICS

REAL-TIME SOLUTIONS TO REAL-TIME PROBLEMS FUZZY MATCHING IN FRAUD ANALYTICS REAL-TIME SOLUTIONS TO REAL-TIME PROBLEMS FUZZY MATCHING IN FRAUD ANALYTICS Technology that allows you to look for inexact but close matches (fuzzy matching) has been around for many years. As sophistication

More information

CPD ACTIVITY GUIDELINES AND REQUIREMENTS

CPD ACTIVITY GUIDELINES AND REQUIREMENTS Introduction After obtaining the Internal Audit Technician (IAT) and / or Professional Internal Auditor (PIA)* designations, members must maintain their knowledge and skills and stay abreast of improvements

More information

Assessment Report Independent Review of Security and Non-repudiation of the Szrek2Solutions Electronic Draw System (EDS) Szrek2Solutions

Assessment Report Independent Review of Security and Non-repudiation of the Szrek2Solutions Electronic Draw System (EDS) Szrek2Solutions Assessment Report Independent Review of Security and Non-repudiation of the Szrek2Solutions Electronic Draw System (EDS) Prepared for: Szrek2Solutions 60 Spencer Avenue, East Greenwich, RI 02818 U.S.A.

More information

Data Governance. Mark Plessinger / Julie Evans December /7/2017

Data Governance. Mark Plessinger / Julie Evans December /7/2017 Data Governance Mark Plessinger / Julie Evans December 2017 12/7/2017 Agenda Introductions (15) Background (30) Definitions Fundamentals Roadmap (15) Break (15) Framework (60) Foundation Disciplines Engagements

More information

10/12/17. CPA Alberta Professional and Public Accounting Practice Varied Registration Model CPA FORUM NORTH OCTOBER 23 RD, 2017 JASPER, ALBERTA

10/12/17. CPA Alberta Professional and Public Accounting Practice Varied Registration Model CPA FORUM NORTH OCTOBER 23 RD, 2017 JASPER, ALBERTA CPA Alberta Professional and Public Accounting Practice Varied Registration Model CPA FORUM NORTH OCTOBER 23 RD, 2017 JASPER, ALBERTA Larry Brownoff CPA, CA Director, Professional and Career Services Professional

More information

Guide to IREE Certification

Guide to IREE Certification Guide to IREE Certification Certification Congratulations on your decision to pursue Investor Ready Energy Efficiency (IREE) Certification for your project! As a building owner, by choosing to pursue IREE

More information

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE PROJECT MANAGEMENT CERTIFICATE PROGRAM Further your career and gain an understanding of what it takes to lead a project to successful completion functional skills,

More information

Gathering Network Requirements

Gathering Network Requirements Gathering Network Requirements Designing and Supporting Computer Networks Chapter 2.2 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Creative Commons License 3.0 By-Sa Cisco name, logo

More information

Detecting Outliers in Column Profile Results in Informatica Analyst

Detecting Outliers in Column Profile Results in Informatica Analyst Detecting Outliers in Column Profile Results in Informatica Analyst 1993, 2016 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying,

More information