Risk Detection, Operations Efficiency & Economic Analysis Eva K Lee

Slides:



Advertisements
Similar presentations
1. 2 August Recommendation 9.1 of the Strategic Information Technology Advisory Committee (SITAC) report initiated the effort to create an Administrative.
Advertisements

Agency Risk Management and Internal Control Standards Presentation to the Board of Visitors November 14, 2014.
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
 DB&A, Knowledge Management Within and Across Projects June 15, 2012 INNOVATION for a better world.
Oncor’s EIM Program.
CISB444 - Strategic Information Systems Planning
Measuring the effectiveness of government IT systems Current ANAO initiatives to enhance IT Audit integration and support in delivering Audit outcomes.
Application Streamlining Initiative Kickoff Meeting August 23, 2011.
Information Systems Controls for System Reliability -Information Security-
Information Technology Audit
© Copyright 2012 Pearson Education. All Rights Reserved. Chapter 10 Fraud & Internal Control ACCOUNTING INFORMATION SYSTEMS The Crossroads of Accounting.
06/12/ CYPADAPT “Development of a national strategy for adaptation to climate change adverse impacts in Cyprus “ Professor Maria Loizidou National.
How Will Continuous Auditing and XBRL-GL Work Together to Provide Improved Business Value? Nigel J. R. Matthews, BASc, CA ACL Services Ltd.
Internal Control in a Financial Statement Audit
GBA IT Project Management Final Project - Establishment of a Project Management Management Office 10 July, 2003.
7-Oct-15 System Auditing. AUDITING Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
S7: Audit Planning. Session Objectives To explain the need for planning To explain the need for planning To outline the essential elements of planning.
Audit Planning. Session Objectives To explain the need for planning To outline the essential elements of planning process To finalise the audit approach.
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
HIS Impact Story: Strengthening national HIS through multi-sectoral coordination and collaboration Crispinita A. Valdez Director Information Management.
Energy Efficiency Action Plan Kathleen Hogan Director, Climate Protection Partnerships Division U.S. Environmental Protection Agency NARUC Winter Meetings.
IT GOVERNANCE  Objective : The objective of this area is to ensure that the Certified Information Systems Auditor ( CISA ) candidate understands and can.
IT Controls Global Technology Auditing Guide 1.
5/18/2006 Department of Technology Services Security Architecture.
Introduction to IT investment decision-making Pertemuan 1-2 Matakuliah: A Strategi Investasi IT Tahun: 2009.
Fiscal Year 2007 Urban Area Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
Overview of System or Process Design and Improvement 1.
Salesforce.com Migration Assessment with Microsoft Services Assess whether your current CRM implementation is the right solution for your current and future.
Implementing an IT Project Oversight Discipline in Government Cindy Blehm, PMP ® Maisha Dottery, PMP ® September 23, 2009.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Using Analysis and Tools to Inform Adaptation and Resilience Decisions -- the U.S. national experiences Jia Li Climate Change Division U.S. Environmental.
JMFIP Financial Management Conference
Strategic Information Systems Planning
Based on four case studies and a follow-up survey, we have identified the key success factors for realizing value from DDS (digital data stream) investments.
Disaster and Emergency Planning
Data Architecture World Class Operations - Impact Workshop.
5 OCTOBER 2015 MANILA, PHILIPPINES
PMI Chapter, IT Governance, Portfolio and Project Management in State Government Chris Cruz, Chief Information Officer, California Department of Food and.
Fraud Risk Management at Digital Insurance Market
Visibility & Analytics Networks:
Chapter 9 Control, security and audit
Lifecycle Services for Advanced Wireless LAN (LCSAWLAN) practice-questions.html.
Project Title Kelvin Cheu(PI), Ron Askin (co-I)
OPS/571 Operations Management
University at Albany (State University of New York)
An Application in Analyzing Isolated Malicious Activities
CHAPTER 7: The Manager as a Planner and Strategist
Making Information Security Manageable with GRC
Quality Management Six Sigma
1Georgia Institute of Technology 2Chicago Booth School of Business
University of California—Irvine
UNLV Data Governance Executive Sponsors Meeting
Predictive Analysis of Massive Streaming Graphs
Treasury Performance Measuring and Monitoring in Kyrgyz Republic
EC Strategy, Globalization, and SMEs
Automating Profitable Growth™
Presentation to the INTOSAI Working Group on IT Audit Systems assurance and data analytics for continued audit quality and improved efficiency of audits.
Sarbanes-Oxley Act (404) An IT Viewpoint
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
Cybersecurity ATD technical
Metrics for process and Projects
Define Your IT Strategy
Data Governance & Management Skills and Experience
An IT Viewpoint Darin Kreimeyer, Senior Manager Newel Linford, Manager
KEY INITIATIVE Financial Data and Analytics
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Ben Rohrbaugh Lantern UAS, LLC
Concept Development Template
Presentation transcript:

Risk Detection, Operations Efficiency & Economic Analysis Eva K Lee Georgia Institute of Technology Atlanta, GA Problem Statement and Objective: DHS employ different data sources to perform risk and fraud prediction, with multiple DHS divisions perform risk analysis for routine operations (e.g., CBP, TSA). Effective management of complex data source is essential to risk advances, operational efficiency and resource investment. Objectives: Prioritize data sources and data values for reliable prediction Investigate current gap – both technology and operational – for risk detection Leverage advance analytic tools to reinforce protection, identify minimum set of data needed, also pinpoints, in the policy level, what sources must be collected and use for best operational performance Methodology and Data Requirements Apply machine learning to assess and predict fraud/risk using existing data sources, analyze and measure data quality, and impact on risk/fraud results Evaluate tradeoff between investing in data improvement and improving effectiveness and efficiency Simulate system network to explore fraud players, errors in detection and system short/long-term impact Design game theory model to assess vulnerability of system Data requirement Work with DHS to identify current sources used and accessible guidelines Identify external source date that are useful (to DHS) to acquire Impact Statement and Relevance to DHS Roles and Responsibilities Risk management is a critical component across multiple DHS programs. DHS shall advance in risk assessment ability and adopt technology to improve its ability to detect risk, mitigate risks, improve operations efficiency, and understand the economical impact. Impact to DHS: improved technological and operational capability and efficiency in risk detection and assessment; improved data usage for risk detection; improved knowledge in ROI (return of investment) in different data stream, ability to prioritize and identify key and reliable risk indicators. Potential DHS lead: Jerry Booker (or components in CBP) Director, Risk Management Division Chief Performance and Enterprise Risk Timeline and Deliverables 20 days: Complete workplan, identify DHS components 60 days: Complete component visits, finalize collaborators 120 days: Complete review with customers 6 months: Obtain data source information, DHS usage and procedures 9 months: Establish gap and data quality analysis 12 months: Complete machine learning on quality of prediction 15 months: Complete tradeoff analysis on data sources that improve detection performance, ROI analysis 18 months: Report fraud players, systems impact, mitigation strategies 21 months: Complete vulnerability assessment 24 months: Report findings, prioritize actions for improvement