Outlier Detection With SQL And R. Kevin Feasel, Engineering Manager, ChannelAdvisor Moderated By: Satya Jayanty

Size: px
Start display at page:

Download "Outlier Detection With SQL And R. Kevin Feasel, Engineering Manager, ChannelAdvisor Moderated By: Satya Jayanty"

Transcription

1 Outlier Detection With SQL And R Kevin Feasel, Engineering Manager, ChannelAdvisor Moderated By: Satya Jayanty

2 Technical Assistance If you require assistance during the session, type your inquiry into the question pane on the right side. Maximize your screen with the zoom button on the top of the presentation window. Please fill in the short evaluation following the session. It will appear in your web browser.

3 Thank You to Our Sponsors Empower users with new insights through familiar tools while balancing the need for IT to monitor and manage user created content. Deliver access to all data types across structured and unstructured sources. Redgate Software makes ingeniously simple software used by 650,000 IT professionals who work with SQL Server,.NET, and Oracle. More than 100,000 companies use Redgate products, including 91% of the Fortune 100. Redgate s philosophy is to design highly usable, reliable tools which elegantly solve the problems that developers and DBAs face every day.

4 Join PASS PASS is a not-for-profit organization which offers year-round learning opportunities to data professionals. Access to online training and content Join Local Groups and Virtual Groups Get advance notice of member exclusives Enjoy discounted event rates MEMBERSHIP IS FREE, JOIN TODAY

5 Kevin Feasel Engineering Manager, Predictive Analytics Manager of a predictive analytics team at ChannelAdvisor in the Raleigh-Durham, NC area. Data Platform LinkedIn Curated SQL

6 Outlier Detection with SQL and R Kevin Feasel, Engineering Manager, Predictive Analytics

7 Kevin Feasel Engineering Manager, Predictive Analytics Manager of a predictive analytics team at ChannelAdvisor in the Raleigh-Durham, NC area. Data Platform LinkedIn Curated SQL

8 A Case Study Wake County transportation fraud

9 A Case Study Wake County transportation fraud An auto parts company, working in conjunction with several county employees, defrauded Wake County of at least $5 million over a multi-year period. Participants took advantage of lax vendor policy for small purchases and submitted fraudulent invoices, all under the cutoff for further scrutiny. Fraud went up to the top, to the head of the transportation department.

10 A Case Study Wake County transportation fraud The end result was several guilty pleas and jail time for participants.

11 A Case Study Wake County transportation fraud Wake County was able to claw back $5 million and Barnes Motor & Parts paid back $3 million, including a $2.5 million criminal fine.

12 Outlier Detection Know Your Data This is a quick overview of data samples used in this talk. Ideally, you want to know what the data elements represent and have as detailed an understanding of your data as possible. Patterns on their own are interesting, but are not indicative of malicious or irresponsible behavior.

13 Data Sets Raleigh police incidents Durham crime Wake County transactions FY Durham city budget FY North Carolina population by city 2013 My HOA s budgets

14 Know Your Data Understand the Data For your data sets, you should ideally have a detailed understanding of what data points represent and how valid the data is. Understand Inaccuracies For these open data sets, sometimes the data is purposefully incomplete or inaccurate. For example, police incident data does not include the acting officer or exact incident location, to protect all parties involved. Also, data pulled from Kaggle competitions and the like will have relevant features masked.

15 Outlier Detection Basic Analysis Our basic analysis will focus on a few important areas: Growth Analysis Gaps In Data Duplicates Cardinality Regression Analysis

16 Growth Analysis Growth analysis looks at changes in ratios over time. Our goal is to look for major changes which look to be far outside the norm. Demo upcoming! Typically, we will perform growth analysis against important additive measures: company growth, revenue, cost, number of customers, etc.

17 Gaps Sometimes, it's the lack of a value which is interesting. We want to look for sequences which should be complete but aren't--examples include receipts, purchase orders, check numbers, invoice numbers, etc. There are several T-SQL constructs which can help us find missing values, including the Gaps and Islands solutions and using a tally table. Warning: if you generate invoice numbers (for example) using a SQL Server identity integer, gaps may occur when transactions get rolled back. It may be better to use a surrogate key for storage but generate an invoice number only after the new transaction saves successfully. Demo upcoming!

18 Duplicates True Duplicates Mostly Duplicates Similarity Measures These are exact matches on relevant columns. For true duplicates, are there one-time codes or unenforced unique keys which show duplicates? Ex: internal tracking IDs. These are cases in which there are sometimes-unexpected differences. For "mostly" duplicates, are there combinations of fields which ought to be unique but aren't? Ex: both "Fundation" and "Foundation" showing up in company name. There are several measures for the similarity of two text phrases, including Levenshtein distance, soundex, and even pattern matching using LIKE. Depending upon the level of sophistication necessary, getting the similarity of two items based on text descriptors can take quite a bit of effort!

19 Duplicates: Wake County Tying back to the Wake County fraud case, there were 24 separate days in which the auto supplier submitted 50+ invoices under $2500 to the county. Here, the duplication is in vendor and date and is well outside the expected behavior for a vendor on the up-and-up. An important question to ask in your code base is, what combinations of measures look out of place? This requires a detailed understanding of your data.

20 Outlier Detection Regression Analysis Regression analysis can be extremely complicated, given issues like multicollinearity, serial correlation, and heteroskedasticity. Still, a basic ordinary least squares linear regression can tell us a lot.

21 Outlier Detection Cohort Analysis Looking at top-level aggregates or a single slice (customer, vendor, group) might help us find problems, and looking at a broad-based comparison of these slices may give us a clearer picture. A data set can be sliced many ways, so there could be a large number of relevant cohorts.

22 Box Plots Box plots are valuable for comparing cohorts. Each box plot will show, by group, the following data points: the mean, 25th percentile, 75th percentile, 1.5 * interquartile ranges, and any outliers.

23 Outlier Analysis Outliers Clusters Differences Plotting a trend and looking for outliers (defined either in a technical sense or in the general sense of "well outside the norm") can dig up strange behavior. Real data sets will always have outliers, though, so the existence of outliers is not in itself suspicious. Something interesting when analyzing a cohort is to look for clustering around certain values. Examples: expense reports and invoices. Going back to our Wake County example, there was a cluster around $2500, as that was the cutoff point after which a second person needed to sign off on a payment order. When comparing different members of a cohort, look at differences between groups and differences within a group. Differences between groups may indicate suspicious behavior if one member of the group acts well outside the norm, such as in the number of invoices submitted per day. Looking at differences within a group can help explain anomalous aggregate behavior.

24 DEMO TIME

25 Outlier Detection Time Series Analysis The easiest time series analysis is a count of items per day. Going back to the Wake County example, auditors could have found something suspicious with the Barnes company pretty easily: there were 24 separate days with at least 50 invoices, certainly a suspicious scenario. Other time series examples include the sums of measures by day or month, such as revenue, cost, number of orders, and amounts of refunds.

26 Time Series Analysis Balances Date Checks Holidays For semi-additive measures such as account balances, look at the state of the measure at fixed points in time, such as looking at account balances every day at 9 PM UTC. Look for "odd" date combinations: order date later than ship date? Adjustments after a journal closes? Look at behavior based on date: focus on day of week, day of month, weekdays vs weekends, mid-week versus early week vs late week. Sum and count measures grouped on these date slices. Holidays can lead to different behavior like more sales of higher amounts. They can also lead to less activity, like how when invoices are due on a holiday, they may be submitted the next working day. Be aware of floating holidays like Easter, as well as observed holidays like Christmas Day observed. It's easiest to store holidays in a date table to avoid trying to calculate these rules on the fly.

27 DEMO TIME

28 Outlier Detection Numeral Analysis Even without a detailed understanding of data elements, we can gain some insight simply from looking at the digits which make up these data points.

29 Round Numbers One high-level analysis of values is to get a count of "round numbers." We group into types based on the number of 0s at the end (ignoring cents): $5000 (type 3), $10,200 (type 2), $180 (type 1), $17,999 (type 0). Demo upcoming.

30 Benford s Law Benford's Law is an interesting phenomenon, where the first digit (or two digits, or three digits) of a set of numbers tends to follow a specific pattern. Demo upcoming.

31 Last Digit Analysis As we saw in the last demo, Benford's Law doesn't apply to the last digit in a sequence; instead, we assume those are uniform unless there is a reason to believe otherwise. People are terrible at generating random numbers; the human mind tends to think 3, 7, and 8 feel more random than 0 or 5, so we can see certain digit patterns pop up when people fudge the data.

32 Wrapping Up This has been a quick survey of forensic accounting and outlier detection techniques. You can apply these techniques to a number of data sets, not only to find potential instances of fraud, but also to search for potential data integrity issues and even to gain more insight into your data. To learn more, go here: And for help, contact me.

33 QUESTIONS?

34 Coming up next! Securing SQL Server Processes with Certificates Robert Davis

35 THANK YOU FOR ATTENDING

36

Securing SQL Server Processes with Certificates. Robert, Davis, Database Engineer, BlueMountain Capital Management Moderated By: Ivan Sanders

Securing SQL Server Processes with Certificates. Robert, Davis, Database Engineer, BlueMountain Capital Management Moderated By: Ivan Sanders Securing SQL Server Processes with Certificates Robert, Davis, Database Engineer, BlueMountain Capital Management Moderated By: Ivan Sanders Technical Assistance If you require assistance during the session,

More information

Extending Applications Securely Using Service Broker. Ed Leighton-Dick, Founder, Kingfisher Technologies Moderated By: Lance Harra

Extending Applications Securely Using Service Broker. Ed Leighton-Dick, Founder, Kingfisher Technologies Moderated By: Lance Harra Extending Applications Securely Using Service Broker Ed Leighton-Dick, Founder, Kingfisher Technologies Moderated By: Lance Harra Technical Assistance If you require assistance during the session, type

More information

Sensitive Data Warriors: Always On Encryption and Data Masking. Virginia, Mushkatbat, Founder, Hush-Hush Moderated By: Shane O'Neill

Sensitive Data Warriors: Always On Encryption and Data Masking. Virginia, Mushkatbat, Founder, Hush-Hush Moderated By: Shane O'Neill Sensitive Data Warriors: Always On Encryption and Data Masking Virginia, Mushkatbat, Founder, Hush-Hush Moderated By: Shane O'Neill Technical Assistance If you require assistance during the session, type

More information

Ooops, data breach? Not with Always Encrypted. Daniel de Sousa, BI Specialist, Dominos Pizza Enterprise Moderated By: Shane O'Neill

Ooops, data breach? Not with Always Encrypted. Daniel de Sousa, BI Specialist, Dominos Pizza Enterprise Moderated By: Shane O'Neill Ooops, data breach? Not with Always Encrypted Daniel de Sousa, BI Specialist, Dominos Pizza Enterprise Moderated By: Shane O'Neill Technical Assistance If you require assistance during the session, type

More information

New Paradigm for Performance Tuning in SQL Server Presented by Robert Davis

New Paradigm for Performance Tuning in SQL Server Presented by Robert Davis in SQL Server 2016 Presented by Robert Davis Thank You microsoft.com hortonworks.com aws.amazon.com red-gate.com Empower users with new insights through familiar tools while balancing the need for IT to

More information

Format of Session 1. Forensic Accounting then and now 2. Overview of Data Analytics 3. Fraud Analytics Basics 4. Advanced Fraud Analytics 5. Data Visualization 6. Wrap-up Question are welcome and encouraged!

More information

SQL Server and Application Security For Developers. Mladen, Prajdic, Developer, Mladen Prajdic s.p. Moderated By: Lee Coates

SQL Server and Application Security For Developers. Mladen, Prajdic, Developer, Mladen Prajdic s.p. Moderated By: Lee Coates SQL Server and Application Security For Developers Mladen, Prajdic, Developer, Mladen Prajdic s.p. Moderated By: Lee Coates Technical Assistance If you require assistance during the session, type your

More information

Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts.

Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts. Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts. BY SCOTT A. BARNES, CPA, CFF, CGMA The adversarial nature of the American legal system creates a natural conflict between

More information

VERSION EIGHT PRODUCT PROFILE. Be a better auditor. You have the knowledge. We have the tools.

VERSION EIGHT PRODUCT PROFILE. Be a better auditor. You have the knowledge. We have the tools. VERSION EIGHT PRODUCT PROFILE Be a better auditor. You have the knowledge. We have the tools. Improve your audit results and extend your capabilities with IDEA's powerful functionality. With IDEA, you

More information

Using JSON with SQL Server Presented by Steve Hughes Moderated by Sarah Huang

Using JSON with SQL Server Presented by Steve Hughes Moderated by Sarah Huang Using JSON with SQL Server 2016 Presented by Steve Hughes Moderated by Sarah Huang Thank You microsoft.com hortonworks.com aws.amazon.com red-gate.com Empower users with new insights through familiar tools

More information

Columnstore Technology Improvements in SQL Server Presented by Niko Neugebauer Moderated by Nagaraj Venkatesan

Columnstore Technology Improvements in SQL Server Presented by Niko Neugebauer Moderated by Nagaraj Venkatesan Columnstore Technology Improvements in SQL Server 2016 Presented by Niko Neugebauer Moderated by Nagaraj Venkatesan Thank You microsoft.com hortonworks.com aws.amazon.com red-gate.com Empower users with

More information

Swimming in the Data Lake. Presented by Warner Chaves Moderated by Sander Stad

Swimming in the Data Lake. Presented by Warner Chaves Moderated by Sander Stad Swimming in the Data Lake Presented by Warner Chaves Moderated by Sander Stad Thank You microsoft.com hortonworks.com aws.amazon.com red-gate.com Empower users with new insights through familiar tools

More information

CS 4400 Introduction to Database Systems 2002 Spring Term Project (Section A)

CS 4400 Introduction to Database Systems 2002 Spring Term Project (Section A) CS 4400 Introduction to Database Systems 2002 Spring Term Project (Section A) Last updated 1/15/2002, 9:30pm In this term project, you are asked to design a small database system, create and populate this

More information

The Ambiguous Case of Off-Row Storage in In- Memory OLTP. Dmitri Korotkevitch, aboutsqlserver.com Moderated By: Sander Stad

The Ambiguous Case of Off-Row Storage in In- Memory OLTP. Dmitri Korotkevitch, aboutsqlserver.com Moderated By: Sander Stad The Ambiguous Case of Off-Row Storage in In- Memory OLTP Dmitri Korotkevitch, aboutsqlserver.com Moderated By: Sander Stad Technical Assistance If you require assistance during the session, type your inquiry

More information

Welcome to the In The Know monthly webinar - our main focus is What s new in QuickBooks Online this month.

Welcome to the In The Know monthly webinar - our main focus is What s new in QuickBooks Online this month. 1 Hello and Welcome, I am Wesley and I ll be your host today. Welcome to the In The Know monthly webinar - our main focus is What s new in QuickBooks Online this month. I and have been taking your support

More information

This module presents the star schema, an alternative to 3NF schemas intended for analytical databases.

This module presents the star schema, an alternative to 3NF schemas intended for analytical databases. Topic 3.3: Star Schema Design This module presents the star schema, an alternative to 3NF schemas intended for analytical databases. Star Schema Overview The star schema is a simple database architecture

More information

CODE MAROON TEST SEPT. 30, 2011 SURVEY RESULTS

CODE MAROON TEST SEPT. 30, 2011 SURVEY RESULTS CODE MAROON TEST SEPT. 30, 2011 SURVEY RESULTS SMS (text) Message 1. Respondents were asked if they received the Code Maroon test by SMS (text) message. The responses indicate that 93% of the respondents

More information

DETECTING ANOMALIES IN YOUR DATA USING ROUNDED NUMBERS Curtis A. Smith, Defense Contract Audit Agency, La Mirada, CA

DETECTING ANOMALIES IN YOUR DATA USING ROUNDED NUMBERS Curtis A. Smith, Defense Contract Audit Agency, La Mirada, CA DETECTING ANOMALIES IN YOUR DATA USING ROUNDED NUMBERS Curtis A. Smith, Defense Contract Audit Agency, La Mirada, CA ABSTRACT Analyzing large amounts of data looking for anomalies can be a disheartening

More information

Monitoring Page Splits in SQL Server

Monitoring Page Splits in SQL Server Monitoring Page Splits in SQL Server Guy Glantser, CEO, Madeira Data Solutions Moderated By: Jay O'Donnell Presenting Sponsors Technical Assistance If you require assistance during the session, type your

More information

Balancing the pressures of a healthcare SQL Server DBA

Balancing the pressures of a healthcare SQL Server DBA Balancing the pressures of a healthcare SQL Server DBA More than security, compliance and auditing? Working with SQL Server in the healthcare industry presents many unique challenges. The majority of these

More information

D&B Release for Oracle CRM On Demand: Addendum to User Guide

D&B Release for Oracle CRM On Demand: Addendum to User Guide D&B360 2.2 Release for Oracle CRM On Demand: Addendum to User Guide Tier 3 New Feature: Competitors: Overview Competitive information offers value in two forms. It allows a sales person to be knowledgeable

More information

The ClassPass Front Desk Guide. ClassPass Front Desk Guide 1

The ClassPass Front Desk Guide. ClassPass Front Desk Guide 1 The ClassPass Front Desk Guide ClassPass Front Desk Guide 1 Welcome to ClassPass! We re excited to partner with you. In the following guide, we ll share everything you need to know about ClassPass users

More information

Locking, Blocking, Versions: Concurrency for Maximum Performance. Kalen Delaney, Moderated By: Daniel Janik

Locking, Blocking, Versions: Concurrency for Maximum Performance. Kalen Delaney,   Moderated By: Daniel Janik Locking, Blocking, Versions: Concurrency for Maximum Performance Kalen Delaney, www.sqlserverinternals.com Moderated By: Daniel Janik Thank You microsoft.com idera.com attunity.com Empower users with new

More information

Best Practices for. Membership Renewals

Best Practices for. Membership Renewals Best Practices for Membership Renewals For many associations, it s easy to get caught up in the marketing efforts associated with attracting new members. But as important as membership growth is, renewal

More information

Senior Design - Spring 2017 EE/CpE 424. Class 2 3/7/17

Senior Design - Spring 2017 EE/CpE 424. Class 2 3/7/17 - Spring 2017 EE/CpE 424 Class 2 3/7/17 Outline Spring 2017 tasks Reimbursement Upcoming priorities Tasks Spring 17 build, debug, test Publish interim project report Develop final report Submit final report

More information

Now without being over-modest we can say that it's our work to reach the summit of your desires.

Now without being over-modest we can say that it's our work to reach the summit of your desires. About Us SGD Networks is a outsource web development and web promotion company. In the present market with more and more growing demand for web development services, SGD Networks has been created by the

More information

How Real Time Are Your Analytics?

How Real Time Are Your Analytics? How Real Time Are Your Analytics? Min Xiao Solutions Architect, VoltDB Table of Contents Your Big Data Analytics.... 1 Turning Analytics into Real Time Decisions....2 Bridging the Gap...3 How VoltDB Helps....4

More information

Asset Liability Management

Asset Liability Management Asset Liability Management INDEX OVERVIEW 3 REPORTS 11 USER 102 PROGRAM OPERATION 282 APPENDIX 368 2005 Information Technology, Inc. All rights reserved. Premier is a registered trademark of Information

More information

R Language for the SQL Server DBA

R Language for the SQL Server DBA R Language for the SQL Server DBA Beginning with R Ing. Eduardo Castro, PhD, Principal Data Analyst Architect, LP Consulting Moderated By: Jose Rolando Guay Paz Thank You microsoft.com idera.com attunity.com

More information

Cyber Insurance: What is your bank doing to manage risk? presented by

Cyber Insurance: What is your bank doing to manage risk? presented by Cyber Insurance: What is your bank doing to manage risk? David Kitchen presented by Lisa Micciche Today s Agenda Claims Statistics Common Types of Cyber Attacks Typical Costs Incurred to Respond to an

More information

DoConference Web Conferencing: DoMore DoConference

DoConference Web Conferencing: DoMore DoConference DoConference Web Conferencing: DoMore DoConference Use DoConference Conferencing for: Training and E-Learning Deliver interactive online classes, E-Learning sessions and educate easily and affordably.

More information

Your Telecom Lead Generation Campaign Checklist

Your Telecom Lead Generation Campaign Checklist Your Telecom Lead Generation Campaign Checklist No one likes investing time and money into a lead generation campaign that doesn't drive results for your business. Use this checklist to create campaigns

More information

What s New Guide Merchants

What s New Guide Merchants Page 2 of 23 Table of Contents PURPOSE... 3 NEW MERCHANT INTERFACE... 3 Home Page... 3 New Navigation... 4 Tools...7 Reports... 8 Search... 9 Account... 10 Settings... 11 Merchant Profile... 12 Billing

More information

Welcome to the Next Level Purchasing Association. Next Level Purchasing is absolutely delighted to have you as a member.

Welcome to the Next Level Purchasing Association. Next Level Purchasing is absolutely delighted to have you as a member. 0 Table of Contents Introduction... 1 Logging In... 2 Courses... 3 Accessing & Enrolling in Courses... 3 Attending Courses... 4 SPSM Family of Certifications: Exams... 4 SPSM Family of Certifications:

More information

CLIENT ONBOARDING PLAN & SCRIPT

CLIENT ONBOARDING PLAN & SCRIPT CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in

More information

UR Financials. User Group Meeting. April 2016

UR Financials. User Group Meeting. April 2016 UR Financials User Group Meeting April 2016 Chatting for WebEx Participants For those joining the WebEx: 1) Please access the chat feature at the top of your screen 2) Please chat directly with Cindy (She

More information

CLIENT ONBOARDING PLAN & SCRIPT

CLIENT ONBOARDING PLAN & SCRIPT CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in

More information

HOLIDAY HOT SHEET N O V E M B E R 6,

HOLIDAY HOT SHEET N O V E M B E R 6, HOLIDAY HOT SHEET NOVEMBER 6, 2013 2013 Holiday hot sheet: weekly insights for the holiday marketer As marketers seek to connect with their customers during the largest consumer spending season of the

More information

Udio Systems. Front Desk

Udio Systems. Front Desk Udio Systems Front Desk Table of Contents 1. Tour of Udio... 5 2. Login... 6 2.1 First Time User... 6 2.2 Login to Udio... 6 2.3 Changing your Password... 6 3. The Dashboard... 7 3.1 People Search... 7

More information

Sales Intelligence The Secret Weapon for 2014

Sales Intelligence The Secret Weapon for 2014 Sales Intelligence The Secret Weapon for 2014 Jeff Ramminger Senior Vice President, Field Marketing & Client Consulting Justin Hoskins Vice President, Product Architecture & Innovation #TTGTSummit www.techtarget.com/formarketers

More information

Breakdown of Some Common Website Components and Their Costs.

Breakdown of Some Common Website Components and Their Costs. Breakdown of Some Common Website Components and Their Costs. Breakdown of Some Common Website Components and Their Costs. The cost of a website can vary dramatically based on the specific components included.

More information

Cloud Monitoring as a Service. Built On Machine Learning

Cloud Monitoring as a Service. Built On Machine Learning Cloud Monitoring as a Service Built On Machine Learning Table of Contents 1 2 3 4 5 6 7 8 9 10 Why Machine Learning Who Cares Four Dimensions to Cloud Monitoring Data Aggregation Anomaly Detection Algorithms

More information

Participants. Results & Recommendations. Summary of Findings from User Study Round 3. Overall. Dashboard

Participants. Results & Recommendations. Summary of Findings from User Study Round 3. Overall. Dashboard Summary of Findings from User Study Round 3 Participants 6 people total 4 Product users Jay Nicole Chris Nic 2 Non Product users Karine (QB ProAdvisor) Ellen (pilot test) Results & Recommendations Overall

More information

VIDEO 1: WHY IS THE USER EXPERIENCE CRITICAL TO CONTEXTUAL MARKETING?

VIDEO 1: WHY IS THE USER EXPERIENCE CRITICAL TO CONTEXTUAL MARKETING? VIDEO 1: WHY IS THE USER EXPERIENCE CRITICAL TO CONTEXTUAL MARKETING? Hello again! I m Angela with HubSpot Academy. In this class, you re going to learn about the user experience. Why is the user experience

More information

2015 VORMETRIC INSIDER THREAT REPORT

2015 VORMETRIC INSIDER THREAT REPORT Research Conducted by Research Analyzed by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security GLOBAL EDITION #2015InsiderThreat EXECUTIVE PERSPECTIVE 1 INSIDER THREATS:

More information

Signature Travel Expert Certification Course

Signature Travel Expert Certification Course Signature Travel Expert Certification Course Module 14: Client Reach Introduction Revised May 18, 2017 First Introduced in 2014, Client Reach has quickly become one of our most popular client communication

More information

Data Warehouses Chapter 12. Class 10: Data Warehouses 1

Data Warehouses Chapter 12. Class 10: Data Warehouses 1 Data Warehouses Chapter 12 Class 10: Data Warehouses 1 OLTP vs OLAP Operational Database: a database designed to support the day today transactions of an organization Data Warehouse: historical data is

More information

Cybersecurity for the SMB. CrowdStrike s Murphy on Steps to Improve Defenses on a Smaller Scale

Cybersecurity for the SMB. CrowdStrike s Murphy on Steps to Improve Defenses on a Smaller Scale Cybersecurity for the SMB CrowdStrike s Murphy on Steps to Improve Defenses on a Smaller Scale The high-profile breaches of Fortune 100 companies are the ones that get the headlines, but small and midsized

More information

Taking a First Look at Excel s Reporting Tools

Taking a First Look at Excel s Reporting Tools CHAPTER 1 Taking a First Look at Excel s Reporting Tools This chapter provides you with an overview of Excel s reporting features. It shows you the principal types of Excel reports and how you can use

More information

Web $trategy. Fundamentals. A Book About Practical Web Strategy for the Non-Geek Anders Tufvesson

Web $trategy. Fundamentals. A Book About Practical Web Strategy for the Non-Geek Anders Tufvesson Web $trategy Fundamentals A Book About Practical Web Strategy for the Non-Geek Anders Tufvesson Reproduction ban This work is protected by copyright law. Reproduction is prohibited other than as specified

More information

Duplicate Invoice Payments

Duplicate Invoice Payments Duplicate Invoice Payments David Macleod Internal Auditor Falkirk Council 4 December 2014 IDEA Scottish User Group 1 Outline of Presentation Background Risk Data Use of IDEA Findings 4 December 2014 IDEA

More information

ARE YOU INTERESTED IN VENDING AT CIVIC CENTER EATS?

ARE YOU INTERESTED IN VENDING AT CIVIC CENTER EATS? ARE YOU INTERESTED IN VENDING AT CIVIC CENTER EATS? Vending space at Civic Center EATS is allocated prior to the season. These spaces are allocated through an application and curation process. The application

More information

A Global Look at IT Audit Best Practices

A Global Look at IT Audit Best Practices A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory

More information

"SQL Monitor now makes the team look more professional."

SQL Monitor now makes the team look more professional. PRUDENTIAL CASE STUDY "SQL Monitor now makes the team look more professional." How Redgate s SQL Monitor makes monitoring a host of production servers easier, faster, and more professional 91% of Fortune

More information

Digital Marketing Manager, Marketing Manager, Agency Owner. Bachelors in Marketing, Advertising, Communications, or equivalent experience

Digital Marketing Manager, Marketing Manager, Agency Owner. Bachelors in Marketing, Advertising, Communications, or equivalent experience Persona name Amanda Industry, geographic or other segments B2B Roles Digital Marketing Manager, Marketing Manager, Agency Owner Reports to VP Marketing or Agency Owner Education Bachelors in Marketing,

More information

SAS Visual Analytics 8.1: Getting Started with Analytical Models

SAS Visual Analytics 8.1: Getting Started with Analytical Models SAS Visual Analytics 8.1: Getting Started with Analytical Models Using This Book Audience This book covers the basics of building, comparing, and exploring analytical models in SAS Visual Analytics. The

More information

APICS NoCo Education Course Registration Form

APICS NoCo Education Course Registration Form APICS NoCo Education Course Registration Form Please complete and submit your registration form here, sending it to apicsnoco@gmail.com. We ll arrange for payment processing separately. Certification classes

More information

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report. 2019 SIEM REPORT INTRODUCTION Security Information and Event Management (SIEM) is a powerful technology that allows security operations teams to collect, correlate and analyze log data from a variety of

More information

Overview. Introduction to Data Warehousing and Business Intelligence. BI Is Important. What is Business Intelligence (BI)?

Overview. Introduction to Data Warehousing and Business Intelligence. BI Is Important. What is Business Intelligence (BI)? Introduction to Data Warehousing and Business Intelligence Overview Why Business Intelligence? Data analysis problems Data Warehouse (DW) introduction A tour of the coming DW lectures DW Applications Loosely

More information

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: October Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of managed environments,

More information

Strategic Plan for years Updated - 8/9/14 Review & re-approved

Strategic Plan for years Updated - 8/9/14 Review & re-approved The Mid-Florida Chapter of APICS will continue to utilize a Continuous Improvement concept, along with the C-BAR as tools to better manage the chapter. Vision: Mission: Mid-Florida Chapter of APICS will

More information

SQL Server Internals: The Practical Angle Sneak Peek. Dmitri Korotkevitch Moderated by Roberto Fonseca

SQL Server Internals: The Practical Angle Sneak Peek. Dmitri Korotkevitch Moderated by Roberto Fonseca SQL Server Internals: The Practical Angle Sneak Peek Dmitri Korotkevitch Moderated by Roberto Fonseca Technical Assistance Maximize your screen with the zoom button on the top of the presentation window

More information

Keep It Easy Software Cloud User Manual

Keep It Easy Software Cloud User Manual Keep It Easy Software Cloud User Manual 2015 Keep It Easy Software 1 CONTENTS How to Login... 5 Functions... 5 System Preferences... 6 General... 7 Receipt Categories... 9 Expense Categories... 10 Service

More information

E2 Shop System Beta Release Notes

E2 Shop System Beta Release Notes The purpose of this document is to provide licensed users of the E2 Shop System with the most up to date information regarding changes made in this release. If you have any questions about this update,

More information

Process Automation & Communications. Jeff Spring, ASI

Process Automation & Communications. Jeff Spring, ASI Process Automation & Communications Jeff Spring, ASI AGENDA Understanding Process Automation and Communications Who is this guy? Why is he up there talking like he knows something? Why does he talk funny?

More information

Create and Submit an Expense Report

Create and Submit an Expense Report Expenses: Create and Submit an Expense Report For employees creating and submitting an expense report Purpose: How to Access: Create and submit an expense report. Log into the Bear Trax application. Select

More information

Reporting Intranet. Complete Online Guide. Table of Contents

Reporting Intranet. Complete Online Guide. Table of Contents Reporting Intranet Complete Online Guide Reporting Intranet - Main Topic Links Go to main link and make sure to scroll through all slides for that topic. Roles of Advisors & Officers Login Screen Terms

More information

turning data into dollars

turning data into dollars turning data into dollars Tom s Ten Data Tips November 2008 Neural Networks Neural Networks (NNs) are sometimes considered the epitome of data mining algorithms. Loosely modeled after the human brain (hence

More information

This tutorial has been prepared for computer science graduates to help them understand the basic-to-advanced concepts related to data mining.

This tutorial has been prepared for computer science graduates to help them understand the basic-to-advanced concepts related to data mining. About the Tutorial Data Mining is defined as the procedure of extracting information from huge sets of data. In other words, we can say that data mining is mining knowledge from data. The tutorial starts

More information

Q1 Meetings are currently held at the Seattle JTF, would you like to see the location of the meeting changed or rotated to improve attendance?

Q1 Meetings are currently held at the Seattle JTF, would you like to see the location of the meeting changed or rotated to improve attendance? Q1 Meetings are currently held at the Seattle JTF, would you like to see the location of the meeting changed or rotated to improve attendance? If yes, please subm it suggestion. If yes, please submit a

More information

Tutorial. these report series:

Tutorial. these report series: Tutorial This tutorial torialisis designed to familiarize you with the basic navigation and features of the BizMiner website. It s easier than you might think to select, load and access any of our 5 million

More information

SMS VAS USAGE IN INDIA

SMS VAS USAGE IN INDIA With the advent of Smartphones, everyone today is talking about Internet on mobiles, 3G speeds etc. However, SMS, a traditional short message service on mobile, even today is pretty much the most frequently

More information

Mobile: The New Oxygen for Events

Mobile: The New Oxygen for Events Mobile: The New Oxygen for Events Presented by Kevin Long Director of Marketing CrowdCompass Wednesday, March 6, 2013 Melissa Nielsen Manager of Print, Online and New Media Communications Society of Critical

More information

Upgrade Your ONYX Customers...

Upgrade Your ONYX Customers... Upgrade Your ONYX Customers... October 1, 2002 To o Discounted i-series Systems! Special 0%* lease program for ONYX to i-series upgrade! Now is the perfect time to upgrade your existing base of ONYX customers

More information

Introduction to emanagement MGMT 230 WEEK 4: JANUARY 29. Implementing basic e-commerce: technologies and options

Introduction to emanagement MGMT 230 WEEK 4: JANUARY 29. Implementing basic e-commerce: technologies and options Introduction to emanagement MGMT 230 WEEK 4: JANUARY 29 Implementing basic e-commerce: technologies and options Today s Class Recap our first three weeks Focus on ecommerce platforms. The online storefront

More information

Frequently Asked Questions PartyLite Preferred Program

Frequently Asked Questions PartyLite Preferred Program PartyLite Preferred Program 1. What is PartyLite Preferred? PartyLite Preferred is an online loyalty program designed to help Consultants strengthen their businesses by developing long term relationships

More information

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Chris Calvert, CISSP, CISM Director of Solutions Innovation Copyright 2013 Hewlett-Packard Development

More information

Microsoft Dynamics 365 for Sales. Workshop Hands-on Lab Book

Microsoft Dynamics 365 for Sales. Workshop Hands-on Lab Book Microsoft Dynamics 365 for Sales Workshop Hands-on Lab Book Table of Contents Lab Overview... 3 Exercise 1: Login to Dynamics 365 Environment... 4 Exercise 2: Follow-up with Tradeshow Customers... 7 Exercise

More information

PSS718 - Data Mining

PSS718 - Data Mining Lecture 5 - Hacettepe University October 23, 2016 Data Issues Improving the performance of a model To improve the performance of a model, we mostly improve the data Source additional data Clean up the

More information

Reporting Intranet. Complete Online Guide. Table of Contents

Reporting Intranet. Complete Online Guide. Table of Contents Reporting Intranet Complete Online Guide Reporting Intranet - Main Topic Links Go to main link and make sure to scroll through all slides for that topic. Roles of Advisors & Officers New Login System Navigating

More information

Adding content to your Blackboard 9.1 class

Adding content to your Blackboard 9.1 class Adding content to your Blackboard 9.1 class There are quite a few options listed when you click the Build Content button in your class, but you ll probably only use a couple of them most of the time. Note

More information

Webinars INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America

Webinars INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America Webinars INSPIRING A SAFE AND SECURE CYBER WORLD 2018 Media Kit - North America 1 THE (ISC) 2 SECURE WEBINARS (ISC) 2 Secure Webinars are a proven method of reaching high-level IT security executives in

More information

TO: Doctoral Students Expected to Register in EDD 1006 for Spring FROM: R. H. Red Owl, Ph.D., Professor

TO: Doctoral Students Expected to Register in EDD 1006 for Spring FROM: R. H. Red Owl, Ph.D., Professor TO: Doctoral Students Expected to Register in EDD 1006 for Spring 2015 FROM: R. H. Red Owl, Ph.D., Professor (redowl@liu.edu) SUBJECT: EDD 1006 Free Statistics Webinar and Webinar Preparation Session DATE:

More information

SSIF Key Management Interoperability Protocol (KMIP) Conformance Test Program FAQ S TORAGE S ECURITY I NDUSTRY F ORUM VERSION 13 JUNE 14, 2016

SSIF Key Management Interoperability Protocol (KMIP) Conformance Test Program FAQ S TORAGE S ECURITY I NDUSTRY F ORUM VERSION 13 JUNE 14, 2016 Section 1: Background 1) What is KMIP? KMIP is the Key Management Interoperability Protocol, a standard defined by OASIS (https://www.oasisopen.org/). KMIP is a protocol used for the communication between

More information

4 online certificate programs are now available:

4 online certificate programs are now available: Over 155 online courses are now available to city employees Whether you are interested in certificate programs, CMFO CPE requirements or professional development hours we offer a variety of online courses.

More information

CA Mahesh Bhatki Mumbai, 28/December/2013. Agenda

CA Mahesh Bhatki Mumbai, 28/December/2013. Agenda Data Analytics and Use of CAATTs Seminar On Investigation and Forensic Accounting & Audit CA Mahesh Bhatki Mumbai, 28/December/2013 Agenda Overview of CAATTs (Tools and Techniques) Some Useful Techniques

More information

Letter from the President

Letter from the President Letter from the President Dear Valued Advantage Customer, Every day we have many exciting activities going on at ECi Advantage that contribute to the betterment of our products and services and benefit

More information

Search Engine Marketing Guide 5 Ways to Optimize Your Business Online

Search Engine Marketing Guide 5 Ways to Optimize Your Business Online Search Engine Marketing Guide 5 Ways to Optimize Your Business Online Table of Contents Introduction....................................................... 3 Quiz: How Does Your Website Rank?.............................4

More information

CoreFirst Bank & Trust

CoreFirst Bank & Trust CoreFirst Bank & Trust New Commercial Internet Banking Frequently Asked Questions ACCOUNT OVERVIEW 1. Q: Why are some of my account numbers highlighted and marked with an asterisk A: Highlighted account

More information

WEBINARS INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America

WEBINARS INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America INSPIRING A SAFE AND SECURE CYBER WORLD 2019 Media Kit - North America THE (ISC) 2 (ISC) 2 Webinars are a proven method of reaching high-level IT security executives in an intimate setting. Members advance

More information

PUTTING THE CUSTOMER FIRST: USER CENTERED DESIGN

PUTTING THE CUSTOMER FIRST: USER CENTERED DESIGN PUTTING THE CUSTOMER FIRST: USER CENTERED DESIGN icidigital.com 1 Case Study DEFINE icidigital was chosen as a trusted creative partner to design a forward-thinking suite of sites for AICPA, one of the

More information

ISO/ IEC (ITSM) Certification Roadmap

ISO/ IEC (ITSM) Certification Roadmap ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank

More information

Privacy Notice. Introduction. What is personal data? Date Updated: 2/11/2019

Privacy Notice. Introduction. What is personal data? Date Updated: 2/11/2019 Privacy Notice Date Updated: 2/11/2019 Introduction NERCOMP is committed to informing its membership and the general public about services, and professional learning opportunities to advance higher education

More information

ACL Interpretive Visual Remediation

ACL Interpretive Visual Remediation January 2016 ACL Interpretive Visual Remediation Innovation in Internal Control Management SOLUTIONPERSPECTIVE Governance, Risk Management & Compliance Insight 2015 GRC 20/20 Research, LLC. All Rights

More information

Certification 101. Presented by the Office of Small Business Assistance Tonya Davis Johnson, Director

Certification 101. Presented by the Office of Small Business Assistance Tonya Davis Johnson, Director Certification 101 Presented by the Office of Small Business Assistance Tonya Davis Johnson, Director Why Certify? Palm Beach County has a 15% SBE participation goal. Becoming a certified S/M/WBE puts your

More information

Using Security to Lock in Commercial Banking Customers

Using Security to Lock in Commercial Banking Customers EXECUTIVE SUMMARY Webinar Using Security to Lock in Commercial Banking Customers Commercial banking is a market opportunity that financial institutions (FIs) should not ignore. Tens of billions of dollars

More information

Google Analytics. powerful simplicity, practical insight

Google Analytics. powerful simplicity, practical insight Google Analytics powerful simplicity, practical insight 1 Overview Google Analytics Improve your site and increase marketing ROI Free, hosted web analytics service View over 80+ reports online, for download,

More information

The official TYPO3 partner program

The official TYPO3 partner program The official TYPO3 partner program Table of contents Partner Program... 4 Separate Yourself From The Competition... 4 Be Successful - Together... 4 Unique Benefits... 6 Partner Ranking In A Nutshell...

More information

What s New Guide Merchants

What s New Guide Merchants Page 2 of 30 Table of Contents PURPOSE...4 MULTIPLE USER ACCOUNTS FEATURE...4 User Roles... 5 User Administration... 6 User Profile... 7 Changes to the Merchant Interface... 8 FAQs... 9 What is the pricing

More information

CitiDirect Global Card Management System (GCMS) Training Guide for BCs and Account Managers TABLE OF CONTENTS

CitiDirect Global Card Management System (GCMS) Training Guide for BCs and Account Managers TABLE OF CONTENTS CitiDirect Global Card Management System (GCMS) Training Guide for BCs and Account Managers TABLE OF CONTENTS LOGGING ON... 2 Global Card Management System (GCMS) URL New User ID, Password, Password Reset

More information