Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

How to protect yourself, your computer, and others on the internet
Online Holiday Shopping Brings Great Deals – and Fraud This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.
SECURITY CHECK Protecting Your System and Yourself Source:
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.

Emerging Trends: Cyber Threats Bryan Sheppard Cyber Security Defense Center.
Internet Security Awareness Presenter: Royce Wilkerson.
Security, Privacy, and Ethics Online Computer Crimes.
FIT3105 Security and Identity Management Lecture 1.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Security Advice Georgie Pepper Campsmount Acadamy.
How It Applies In A Virtual World
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
General Awareness Training
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Overview of Cybercrime
Cyber Crimes.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Unethical use of Computers and Networks
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
W h y D o I N e e d C y b e r L i a b i l i t y I n s u r a n c e ?
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Cybercrime What is it, what does it cost, & how is it regulated?
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Managing Your Cyber/E&O Risk with Willis FINEX Robert Barberi, Vice President, Willis Cyber Practice.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
2016 HFTP Club & Hotel Controllers June 20-22, 2016 New Orleans, LA Presented by James J. Hankowski, CPA, Partner Matthew P. O’Dell, CPA, Partner.
Cyber Liability: New Exposures Presented by: Henriott Group © 2007, , Zywave Inc. All rights reserved.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Protecting Your Assets By Preventing Identity Theft
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
Financial Institutions – Cyber Risk
A Project on CYBER SECURITY
Cyber Insurance Overview
Five Unethical Uses of Computers
Society of Risk Management Consultants Annual Conference
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
INFORMATION SYSTEMS SECURITY and CONTROL
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Forensic and Investigative Accounting
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just Scott Perry)

Wake Up & Smell the Coffee True or False Seattle's annual rainfall is less than that of Houston, Chicago and New York City.

Wake Up & Smell the Coffee True!!!

Cost of Cybercrime The Center for Strategic & International Studies estimates that annual losses due to cybercrime on the global economy are: ◦ A conservative estimate would be $375 billion. ◦ Maximum would be $575 billion. ◦ Even the smallest would be more than the national income of most countries.

Cost of Cybercrime Costs include: ◦ Hundred of millions of people having their identity stolen.  40 million in the U.S.  54 million in Turkey  20 million in each Korea & China  16 million in Germany ◦ Damages company performance, competitiveness and innovation.

How Bad Is It? The U.S. Director of National Intelligence has ranked cybercrime as the top national security threat, higher than that of terrorism, espionage, and weapons of mass destruction.

Common Types of Cybercrime Theft ◦ Copy right violations such as downloading music, games, etc. Identity theft Malicious software ◦ Usually internet based software used to disrupt a network, steal sensitive information or cause damage to the present system Hacking ◦ Computer is broken into ◦ Fraudulent financial transactions can occur ◦ Also have sensitive information stolen

How Does Cybercrime Start An infected document attached to an A link within an that connects to an infected website Employees visiting social networking websites and clicking on infected documents, videos, or photos posted there. Transferring documents infected from another computer.

An Ounce of Prevention How to protect financial assets and sensitive information: ◦ Install and maintain real time anti-virus and anti-spyware ◦ Install routers and firewalls ◦ Perform IT security evaluations ◦ Be wary if you unexpectedly receive s  The IRS never s!!!!!!!

An Ounce of Prevention How to protect financial assets and sensitive information (continued): ◦ Do not perform online banking activities in public spaces ◦ Use electronic security tokens  If you ever receive a message, after entering your code, that the online banking is temporarily unavailable, notify your bank at once

An Ounce of Prevention How to protect financial assets and sensitive information (continued): ◦ Initiate wire and ACH files using dual control  One employee initiates transfer and another user approves and releases using a different computer and ID ◦ Dedicated computer(s) for banking  No other than banks  No social media, etc. ◦ Discuss options with banking institution(s)

Wake Up & Smell the Coffee Who is going to be installed as the new HFTP Global President tonight? A) Scott Perry B) Arlene Ramirez C) John Daum D) Frank Wolfe

Wake Up & Smell the Coffee Arlene Ramirez

Cybercrime Insurance What is generally covered: ◦ Third-party loss resulting from a breach  Employee or vendor information compromised resulting in a loss  Lawsuits ◦ Direct first-party costs  Cost of notifications (Required in 46 states)  Public relations  Forensic investigations  Legal consultations  Identity monitoring cost for victims

Cybercrime Insurance What is generally covered (continued): ◦ Business interruption resulting in lost revenue and additional operating expenses ◦ Threats made by an outsider  Extort money, securities, etc.  Monies paid to end threat  Cost of investigation ◦ Liability due to content distributed on website  Copyright, trademark, etc. infringement  Defamation  Invasion of privacy

Cybercrime Insurance Cybercrime insurance usually in itself does not cover any actual lose of funds. Computer Fraud Coverage will ◦ Protects if a thief uses a computer to steal covered property from your property or bank to a person or place on the outside ◦ Covered property includes:  Money  Securities  Credit card receipts  Secret recipes

Cybercrime Insurance Computer Fraud Coverage does not always clearly define what a “computer” is If you have a Cybercrime policy check to make sure Computer Fraud Coverage is included ◦ Usually a separate endorsement ◦ Usually maximum of $250,000  Statistics show that 90% of fraudulent transfers are for less than $250,000.