Protect Your Business Become a Hard Target. Where Are We Going?

Slides:



Advertisements
Similar presentations
Fraud and Internal Control Presented by Andy Harper Pugh & Company, P.C. April 28, 2011.
Advertisements

FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
Chapter 6 Funding the Program ©2013 Cengage Learning. All Rights Reserved.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up © 2009.
How JCPenney is Managing Corporate Risk
Chris Gravatt Mallory De Kovessey Tina Vargas Tim Hogenhouser The ChoicePoint Attack.
SAFEGUARDING YOUR PURCHASING CARD UNIVERSITY OF ARIZONA POLICE DEPARTMENT “PARTNERS WITH OUR COMMUNITY”
1 Those Darned Cards!. 2 Chapter 6 – Credit Cards Extremely important but deceptively expensive Revolving – borrow, repay then reborrow Minimum repayment.
Presented to: OCHIN 11/17/2012 Presented By: Tiffany Couch Acuity Group PLLC HOW SECURE IS YOUR PRACTICE?
Fraud Prevention and Investigation Branch. Fraud Prevention- Everyone’s Responsibility.
Call The Police! Vickie L. Mickey, CT,CLHRP. White Collar Crime Edwin Sutherland coined this phrase in the late 1930’s. Usually non-violent crimes Commercial.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
2015 ANNUAL TRAINING By: Denise Goff
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
Lesson 7.3 PROTECT YOUR BUSINESS
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
Wireless Access Code: July 21, 2002  General medical ID theft education is lacking – over 1.4 million fraud victims in  Fraud can.
IDENTITY THEFT: WHO’S AT FAULT? ERIC LAMBERT. THESIS I BELIEVE THAT IDENTITY THEFT IS A HUGE PROBLEM THAT IS AFFECTING SOCIETY AND THAT WE NEED TO FIND.
Internal Controls and Fraud Convery Describe an Internal Controls System and its elements Identify specific Internal Control issues in a NPO Consider.
Internal Controls and Financial Reporting for Executive Boards Eva Rooks, MA Health Services Administrator/Trainer Health Systems Quality Assurance Division.
Protecting Your Organization Identity Theft and Data Breach.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
Introduction to Computer Security PA Turnpike Commission.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Identity Theft Project Erin L. Caraway Jacob Locke.
The State of Computer & Data Security in Corporations Independent Survey.
Custom Corporate Consulting and Training Fraud: Detecting and Preventing Presented October 30, 2010 To University of Texas at Arlington Executive MBA Students.
Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Chapter 7 Fraud, Ethics, and Controls.
INTERNAL CONTROL AND CASH Friday, we will meet in room 217 CHAPTER 7.
Identity Theft The Nation’s Fastest Growing Crime.
Chapter 9: Introduction to Internal Control Systems
Police are not prepared for rising incidence of Identity Fraud By Chris DeVito.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
LESSONS ENTREPRENEURSHIP: Ideas in Action© SOUTH-WESTERN PUBLISHING Chapter 7 FINANCE, PROTECT, AND INSURE YOUR BUSINESS Put Together a Financial.
Identity Theft How it happens and how to avoid it.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
SAFEGUARDING YOUR ASSETS AND PREVENTING FRAUD
Protecting Yourself from Fraud including Identity Theft Personal Finance.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Identity Theft One of America's fastest growing crimes.
Identity Theft Project By: Timmy Townsend And Eric Fields.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
Presented By: W. Andrew Powell, CPA Principal Halt, Buzas & Powell, Ltd.
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
TYLER GROUP
Financial Institutions – Cyber Risk
how to prevent them from being successful
Protection of CONSUMER information
cybercrime Presented to you by : NAMES MATRIC NO
Vendor Management & Business Value
When you get caught for Identity Theft
FINANCE, PROTECT, AND INSURE YOUR BUSINESS
Cyber Trends and Market Update
Data Breach Overview Mike Schenk, VP Research and Policy Analysis
Developing a Plan Chapter 2.
Anthem Data Breach Group 2: Jing Jiang, Dongjie Wang, Haitao Huang, Binju Gaire, Parneet Toor.
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Protect Your Business Become a Hard Target

Where Are We Going?

Continuous Monitoring Think Like a Thief Cyber Security Considerations Continuous Monitoring Think Like a Thief Cyber Security Considerations Goals of this Program

Fraud is Mean Question: “Why did you do this?” Answer: “BECAUSE THEY WERE STUPID”. Question: “Why did you do this?” Answer: “BECAUSE THEY WERE STUPID”.

Financial Crime Autopsy Indications were missed Trust is Lost Lack of Recovery Problems Continue Indications were missed Trust is Lost Lack of Recovery Problems Continue

Self Image Strong Work Ethic Building Solid Company Providing Good Jobs Fair, Concerned Strong Work Ethic Building Solid Company Providing Good Jobs Fair, Concerned

Maybe Not Wealthy Uncaring Greedy Owes Employees More Wealthy Uncaring Greedy Owes Employees More

What Can Happen Theft Occurs Loss Unknown Inquiries Confrontations Theft Occurs Loss Unknown Inquiries Confrontations

Training and Prevention Average loss: $150, % Margin=$1.5 million to make up for loss Obtaining Financial Records Difficult Prosecution or Not? Average loss: $150, % Margin=$1.5 million to make up for loss Obtaining Financial Records Difficult Prosecution or Not?

5 Things You Can Do Know Your Vendors Identify Unknown Vendors Background Check Verify Existence Determine if any relationship to employees Know Your Vendors Identify Unknown Vendors Background Check Verify Existence Determine if any relationship to employees

5 Things You Can Do Know Your Employees Identify Employees in Sensitive Positions Review and verify applications/resumes Credit Reports Background Checks Fidelity Bonds Know Your Employees Identify Employees in Sensitive Positions Review and verify applications/resumes Credit Reports Background Checks Fidelity Bonds

5 Things You Can Do Know Your Credit Cards How Many Custody Written Guidelines Review Statements Know Your Credit Cards How Many Custody Written Guidelines Review Statements

5 Things You Can Do Know Your Cyber Environment Common Attack Vectors Keep System Modern Employee Training Know Your Cyber Environment Common Attack Vectors Keep System Modern Employee Training

5 Things You Can Do Have a Plan Suspicion Only Known Theft Known Intrusion Have a Plan Suspicion Only Known Theft Known Intrusion

When to Call a Pro Sensitive Position Lawsuit, Subpoena Unresolved Allegations Theft has Occurred, Loss Unknown, Large Loss Chance of Recovery Law Enforcement Involvement L Sensitive Position Lawsuit, Subpoena Unresolved Allegations Theft has Occurred, Loss Unknown, Large Loss Chance of Recovery Law Enforcement Involvement L

Additional Considerations Know Your Company Know Your Partners Know Your Expenses Know Your Bank Statements Know Your Bonus Programs/Return Policies Know Social Media Know Your Company Know Your Partners Know Your Expenses Know Your Bank Statements Know Your Bonus Programs/Return Policies Know Social Media

Randal A. Wolverton CPA CFF CFE (816) m CPA CFF CFE (816) m