EMERGING TRENDS IN WHITE COLLAR CRIMES

Similar documents
Personal Cybersecurity

Cyber Security. It s not just about technology. May 2017

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Safeguarding company from cyber-crimes and other technology scams ASSOCHAM

Cybersecurity The Evolving Landscape

Cyber Security Incident Response Fighting Fire with Fire

Cyber Insurance: What is your bank doing to manage risk? presented by

June 2 nd, 2016 Security Awareness

Syed Ismail Shah, PhD Chairman, PTA,

Cybersecurity and Nonprofit

Real estate predictions 2017 What changes lie ahead?

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

2017 RIMS CYBER SURVEY

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

DIGITAL FORENSICS. We Place Digital Evidence at Your Fingertips. Cyanre is South Africa's leading provider of computer and digital forensic services

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

Cyber-Threats and Countermeasures in Financial Sector

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Cybersecurity for Service Providers

Governance Ideas Exchange

Cyber Security: Threat and Prevention

IFEA Risk Management and Cybercrime

Angela McKay Director, Government Security Policy and Strategy Microsoft

The Cyber War on Small Business

Cyber Threat Landscape April 2013

DIGITAL ACCOUNTANCY FORUM CYBER SESSION. Sheila Pancholi Partner, Technology Risk Assurance

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

A Framework for Managing Crime and Fraud

European Union Agency for Network and Information Security

Cybersecurity Session IIA Conference 2018

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

Security & Phishing

CYBER SECURITY AND THE PENSIONS INDUSTRY Karen Tasker 1 February 2018

Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016

Cyber Security in Smart Commercial Buildings 2017 to 2021

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Emerging Technologies The risks they pose to your organisations

CipherCloud CASB+ Connector for ServiceNow

Cybersecurity. Overview. Define Cyber Security Importance of Cyber Security 2017 Cyber Trends Top 10 Cyber Security Controls

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

A new approach to Cyber Security

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

Regulation and Innovation: The Experience of Regulating Kenya s M-Pesa

COUNTRY PROFILE. Italy

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Express Monitoring 2019

The CERT Top 10 List for Winning the Battle Against Insider Threats

COUNTRY PROFILE. Qatar

Standing Together for Financial Industry Resilience Quantum Dawn 3 After-Action Report. November 19, 2015

Security in India: Enabling a New Connected Era

Legal Aspects of Cybersecurity

Cyber Security Strategy

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Securing Digital Transformation

COUNTRY PROFILE. Russia

COUNTRY PROFILE. Bulgaria

Altitude Software. Data Protection Heading 2018

Clarity on Cyber Security. Media conference 29 May 2018

Cybersecurity in Higher Ed

Security Standardization and Regulation An Industry Perspective

COUNTRY PROFILE. Ukraine

2016 KPMG AS, a Norwegian limited liability company and a member firm of the KPMG network of independent member firms affiliated with KPMG

COUNTRY PROFILE. Estonia

Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise

Panda Security 2010 Page 1

DeMystifying Data Breaches and Information Security Compliance

COUNTRY PROFILE. Ireland

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Top Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

CYBER SOLUTIONS & THREAT INTELLIGENCE

COUNTRY PROFILE. Croatia

Cyber Security Updates and Trends Affecting the Real Estate Industry

Understanding Persistent Connectivity: How IoT and Data Will Impact the Connected Data Center

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

E-guide Getting your CISSP Certification

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

The Cyber Savvy CEO Getting to grips with today s growing cyber-threats

The NIS Directive and Cybersecurity in

IoT Security and Risk Management

Cyber Security. Activities of an national insurance association based on the example of VVO

DIGITAL TRUST Making digital work by making digital secure

IP Risk Assessment & Loss Prevention By Priya Kanduri Happiest Minds, Security Services Practice

PROTECTING BRANDS IN CYBERSPACE

Internet of Things Toolkit for Small and Medium Businesses

Understanding the Changing Cybersecurity Problem

COUNTRY PROFILE. Iceland

Cybersecurity and the Board of Directors

Forging a Stronger Approach for the Cybersecurity Challenge. Session 34, February 12, 2019 Tom Stafford, VP & CIO, Halifax Health

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

COUNTRY PROFILE AUSTRALIA

Cyber Security: It s all about TRUST

Are we breached? Deloitte's Cyber Threat Hunting

COUNTRY PROFILE. Philippines

HEALTH CARE AND CYBER SECURITY:

Transcription:

EMERGING TRENDS IN WHITE COLLAR CRIMES Presented by: Collins Ojiambo Were CISA, CISM, Mciarb, AVSEC PMC Country Lead, Kroll Associates Thursday 24 th October 2018 Credibility. Professionalism. AccountAbility 1

Outline 1. Audit Trends at glance 2. Fraud- Key concerns 3. Cyber crime- Drivers, Trends 4. Social engineering 5. Data protection 6. Legal and regulatory landscape 7. New frontiers- debt 2

Audit Trends at glance 7 Key issues for Audit Committees - Talent and Human Capital - Technology and Cyber Security - Disruption to Business Models - Evolving Regulatory Landscape - Political and Economic uncertainty - Changing reporting expectations - Environment and Climate Change KPMG research 3

Audit Trends at glance Percentage of ACs who will increase time spent on these issues in the next three years - Technology: 81% - Talent/Human capital: 53% - Business model disruption: 49% - Regulatory standards 48% - Environment 47% - Changing reporting 36% 4

Fraud Trends at glance Key Issues - Junior employees - Ex Employees - Supply Chain ecosystem - Rise of reputational risk - Opaqe ownership of subsidiary/ agents - Cyber Crime - Security KROLL research 5

Cyber Crime - 95 % of information is in digital form - Computers and the Internet continue to pervade and invade our lives. (IOT) - Digital economy - Potential for harm caused by computer crime increases manifold. - Limited information about what computer crime is, and how it should be investigated. Result. 6

Cybercrime Use of computers in Crime : Computer-Assisted Computer as a Tool Computer as a Symbol 7

Emerging Trends: Cyber Crime The Kenyan examples Telco s - SIM Swap, Airtime, Tax Authority IFMIS- NYS Case Airtime Fraud Banks - IT company ransom- Bitcoins Financial Regulator 8

Changing Cyber Threats Insiders Often undetected for up to 32 months Culprits are employees- typically managers with 5 years + experience Usually low-tech, relying on access privileges Hacktivists Attacks based on political reasons and justifications Targets include Government, Visa, MasterCard, Amazon and other big corporations Organized Crimes Cybercrime is maturing as a business, with marketing, support, advertising, R&D, and economies of scale National - States Gauss Malware targets financial services in the Middle East; 9 steals credentials

Crypto -Currencies Concentration of Mining (Pools) Scalability Challenges (Bitcoin one block per 10min) Private Key Management(Users/Exchanges/etc) Online Exchanges attacks Fake offers (Block chain on anything & everything) Fake Initial Coin Offers (ICOs)/Speculators Regulatory Frameworks (Lack of?) 10

Social Engineering - Hacking the Human - Leading Cyber crime method - Less costly and most efficient - Smishing Kamiti School of business - BYOD - Social media intelligence - Importance of awareness 11

Data protection - Privacy - Data protection bill - Personally identifiable information (PII) - Digital Assets - Data is the new currency - Price of Social media/user data more expensive than financial information - Identity theft 12

Data Breaches Entity Year Records Industry Method Centers for Medicare & Medicaid services 2018 75,000 Healthcare hacked Facebook 2018 50,000,000 Social network Poor security Ticket fly( Subsidiary of Eventbrite) 2018 26,151,608 Ticket distribution hacked My heritage 2018 92,283,889 Genealogy unknown Google plus 2018 500,000 Social network Poor security BMO and Simplii 2018 90,000 Banking Poor security 13

Legal and Regulatory landscape - Increased requirement from regulators on Cyber security eg. CBK guidelines - Cybercrime laws - CDSC Act - Evidence Act - Anti Bribery Laws - Data Protection eg. GDPR 14

New technologies Risks & Opportunities - Block chain - Internet of things - Artificial Intelligence - Social Media Platforms - Big Data/Analytics - Cloud Solutions 15

Others Risks & Opportunities - Private equity funds - Infrastructure projects/consortiums what is happening during inception? - Debt - Identity theft - Data theft - Hospitality based investments as opposed to real estate - Tenders - Employment 16

INTERACTIVE SESSION Collins Ojiambo Were 0726487695 ojiambo@gmail.com collins.ojiambo@kroll.com 17

THANK YOU GOD BLESS 18