By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.

Slides:



Advertisements
Similar presentations
Chapter 1 Business Driven Technology
Advertisements

FINANCIAL AUDIT METHODOLOGY PETER CARLILL UK NATIONAL AUDIT OFFICE.
Chapter 14 Fraud Risk Assessment.
“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
Auditing Computer-Based Information Systems
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
Contents What is Forensic Accounting Nature of work of Forensic Accountants Need of Forensic accounting Activities of Forensic accountants Forensic Accountant…An.
1 6 - Outsourcing Outsourcing. © Robert G Parker – UW-CISA 2010 Dealing with issues when a portion or all of the provision of technology services is performed.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
A Portfolio Approach to Enterprise Risk Management Bruce B. Thomas November 11, 2002.
S11: Risk Based Audit Approach. Session Objectives  To define audit risks and establish the relationship between materiality and audit risk  To discuss.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
(Geneva, Switzerland, September 2014)
Bureau of Workers’ Comp PA Training for Health & Safety (PATHS)
Lecture 8 Understanding entity and its environment
U.S. Bank Payment Analytics Overview. Payment Fraud Trends 2 Reference: Association of Financial Professionals (AFP), 2011 Payments Fraud and Control.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
PAINTING THE FULL PICTURE
1 Business Continuity and Compliance Working Together Kristy Justice, AVP WaMu Card Services 08/19/2008.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Internal Auditing and Outsourcing
Sapient Insurance Partners. Overview & Services We have almost four decades of combined experience in the property & casualty insurance and reinsurance.
PRM 702 Project Risk Management Lecture #28
Chapter 1: Business Intelligence and its Impacts
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
D-1 McGraw-Hill/Irwin ©2005 by the McGraw-Hill Companies, Inc. All rights reserved. Module D Internal, Governmental, and Fraud Audits “I predict that audit.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Protect critical information with a smart information-based-risk management strategy. Prepared by: Firas Mohamed Taher.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 3-1 Chapter Three Risk Assessment and Materiality Chapter Three.
CDS Operational Risk Management - October 28, 2005 Existing Methodologies for Operational Risk Mitigation - CDS’s ERM Program ACSDA Seminar - October 26.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
S7: Audit Planning. Session Objectives To explain the need for planning To explain the need for planning To outline the essential elements of planning.
Audit Planning. Session Objectives To explain the need for planning To outline the essential elements of planning process To finalise the audit approach.
The views expressed in this presentation do not necessarily reflect those of the Federal Reserve Bank of New York or the Federal Reserve System Association.
BUSINESS WITH CONFIDENCEicaew.com © ICAEW 2015 IT and Accountants: A Partnership Made in Heaven? Kirstin Gillon, ICAEW IT Faculty Introduction by Christiana.
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
1 Internal Audit. 2 Definition Is an independent activity established by management to examine and evaluate the organization’s risk management processes.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
FACILITATOR Prof. Dr. Mohammad Majid Mahmood Art of Leadership & Motivation HRM – 760 Lecture - 25.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
RISK MANAGEMENT : JOURNEY OR DESTINATION ?. What is Risk? “ Any uncertain event that could significantly enhance or impede a Company’s ability to achieve.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Kathy Corbiere Service Delivery and Performance Commission
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Forensic Accounting and Fraud Prevention By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
© 2006 Pearson Education Canada Inc Canadian Advertising in Action Chapter 14 Public Relations and Event Marketing and Sponsorships.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
F8: Audit and Assurance. 2 Designed to give you knowledge and application of: Section A: Audit Framework and Regulation Section B: Internal audit Section.
Horizon 2020 Secure Societies European Info Day and Brokerage Event
Developing the Overall Audit Plan and Audit Program
RCCU Zephyr South West Regional Cyber Crime Unit.
Trends in my profession, Information Technology
Securing Information Systems
Sustainability Corporations, Capital Markets and Global Economy.
Adding Value Across the Board
Forensic and Investigative Accounting
Strategic threat assessment
Managing IT Risk in a digital Transformation AGE
Cyber Security in a Risk Management Framework
Data mining Data mining is the process of analyzing data from different perspectives and summarizing it into useful information.
Presentation transcript:

By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA

Technology in Business Technology has been essential element of almost all the businesses in the present day scenario. Use of Advanced technology has redefined the modern day business operations.

Technology in Business Computers may be used for the performing following activities : Business Communication Customer Relationship Management Marketing and Advertising Data Mining Human Resource Management etc.

Cyber Threats Malware Attacks such as Viruses, Worms and Trojans Phishing Denial of Service(DOS) Attack Password Theft Spoofing Social Engineering Botnets Tampering etc.

Impacts of Cyber Attacks Loss of Data Fraud or Revenue Loss Disruption of Operation Theft of Intellectual Property Damage of Reputation

Cyber Attacks in the Recent Years According to a recent survey report, 72% of the Indian Companies faced Cyber Attacks in Sony Pictures (Nov 2014) – Loss of several internal data centers Staples (Oct 2014) – Access to Information of about 1.16 Million Credit Cards

Factors influencing Cyber Attacks Failure in inclusion of Security and Controls in the Company design principles. Failure in understanding the root cause of the attacks / issues while resolving them. Lack of Technical Expertise on the Cyber Security within the Organization Ineffective Threat analytics

How to Mitigate Cyber Risks ?  Know potential attackers ?  Understand their objectives  Know what tactics they might use ?  Establish or/and Enhance risk – prioritized controls.  Detect violations & anomalies through better situational awareness across the environment.  Establish the ability to quickly return to normal operations & repair damage to the business.

Who is responsible for Cyber Security Management Has the ownership, responsibility and accountability for assessing, controlling and mitigating risks. Audit Committee Also has an equal or higher role in establishing and ensuring Cyber Security. Internal Audit Responsible for regularly reviewing controls pertaining to Cyber Security External Auditor / Specialist Can be valuable source of information on cyber security and may well assist in assessing Cybersecurity. Cyber Security

Scope of Professionals in Cyber Security Due to Lack of expertise within management on Cyber Security, role of professionals with expertise on Cyber Security has become significant in Mitigating Cyber Risk. Due to Continuous increase of Level of Cyber Risk among the business organizations, Cyber Risk Services has been creating global opportunity for the professionals.

Role of Professionals in Cyber Security Framing Cyber Strategies Assisting in Application of security testing Assisting in Application of risk monitoring Supporting in Cyber Analytics Assisting in Breach Crisis Management

Big Data Analytics The Process of examining the large data sets containing a variety of data types.i.e.Big Data. It uncovers hidden patterns, unknown correlations, market trends, customer preferences and other useful business information.

Why is it required ? In 2012, the amount of information stored worldwide exceeded 2.8 zeta bytes. By 2020, the total amount of data stored is expected to be 50X larger. By 2016, the cumulative size of all the world’s data centers is expected to exceed 16,000 acres. An estimated 33% could be useful if appropriately tagged and analyzed but actually analyzed = 0.5%.

Process Information Data Raw unorganized facts, is in and of itself worthless. Potentially valuable concepts based on data. Knowledge – What we understand based upon information Decision Making – Effective use of Knowledge

How does it work ? Big data analytics requires exceptional technologies to efficiently process large quantities of data within tolerable elapsed times. Converts unstructured data into Structured data.

Tools Used Suitable tools used in big data analytics include : -A / B Testing -Crowdsourcing -Simulations -Data fusion and integration -Genetic algorithms -Time series Analysis

Audit with analytics Examine larger sets of data beyond current sampling techniques. Ability to focus on areas beyond Financial compliance – based work. Improves audit quality, answering regulators’ call for a continued focus on the quality of audit work and audit evidence, and higher levels of professional skepticism. Helps companies to move beyond hindsight to insight and foresight.

Conclusion Increased use of computers and technology in the businesses has widened scope of Cyber Risk Services. Big data analytics has created new trend across businesses in perception of data by both management and auditors. However, Big data requires advanced technologies which makes it more challenging.

K.Raghu & Co. Chartered Accountants. “K R Pinnacle”,No.281,II Floor, 7th Main, B.T.M Layout, 2nd Stage, Bangalore Ph: / Mob: – Website: