Fraud Risk Management and Computer Security

50 %
50 %
Information about Fraud Risk Management and Computer Security
Education

Published on March 21, 2009

Author: CSISlideShare

Source: slideshare.net

Description

Fraud costs businesses hundreds of millions of dollars each year. It affects livelihoods and is a common cause of corporate failure. It is the responsibility of the board of directors to prevent fraud by putting in places the appropriate controls and review procedures. This program shows you why Accounting Information System (AIS) Threats are ever increasing. The program focus is to cater the need for Fraud Risk Management. (FRM)
Control risks have also increased in the last few years because there are computers and servers everywhere,and information is available to an unprecedented number of workers.
Distributed computer networks make data available to many users and these networks are harder to control than centralized mainframe systems.
Wide area networks are giving customers and suppliers access to each other’s systems and data, making confidentiality a major concern.

FRAUD Risk Management & Computer Security Organized by: Organized by: Hotel Equatorial, Kuala Lumpur 24th and 25th June 2009 • CSI accredited 10 CPE points A CSI CPE • 1 year CSI Associate membership Competitive Advantage Assured recognized • Incorporating the CSI qualifying compulsory module on Fundamental of pg program Computer Fraud Fraud. Fraud costs businesses hundreds of millions of dollars each year. It FRM Audit Strategies for affects livelihoods and is a common cause of corporate failure. It is the Detecting Fraud responsibility of the board of directors to prevent fraud by putting in ● Using personal profiling to detect places the appropriate controls and review procedures. This program fraud by computer shows you why Accounting Information System (AIS) Threats are ever increasing. The program focus is to cater the need for Fraud Risk Management. (FRM) g ( ) Computer Evidence p Control risks have also increased in the last few years because there are Collection computers and servers everywhere,and information is available to an ● The need for documentation , unprecedented number of workers. types of fraud. Distributed computer networks make data available to many users and these networks are harder to control than centralized mainframe Skill sets for detecting AIS systems. Computer Fraud Wide area networks are giving customers and suppliers access to each other’s systems and data, making confidentiality a major concern. y , g y j FRM and Computer Fraud The many GOOD reasons to attend this workshop ● Typical computer Forensics Field ● Historically, many organizations have not adequately protected Kit their data because Computer control problems are often High Profile Computer underestimated and downplayed. ● Fraud Control implications of moving from centralized, host-based ● How can it happen? computer systems to those of a networked system or Internet- based system are not always f ll understood. b d t tl fully d t d Computer Evidence ● Companies have not realized that data is a strategic resource and ● An introduction to the that data security must be a strategic requirement. fundamentals ● Productivity and cost pressures may motivate management to forego time-consuming control measures. Tommy is someone that you would like to meet and to know. Straight talking, sincere kind, helpful know talking sincere, kind and without pretences, he is truly a man of strong conviction and blessed with many practical talents. First and foremost, he is a World Class hands-on accountant He has worked as an Accountant for some of the largest companies in the world. He is a tried and tested accountant with a very firm grip on financial products. He is also trained in Access Data Digital Forensics tool and a full Member of the Association of Computer Professionals. (U.K.) since 1980s. Because of his grip on the subject matter, his services in providing technical training is much sought after by numerous banks in the region, including Germany, Singapore, Malaysia, China, Indonesia, Philippines and Taiwan. Tommy's other professional achievements would have been the objects of envy for many of his peers. Some of the better known fact is that he is the only Singaporean peers that sits on the ACFE Board of Regents in Texas, USA. In the year 2006, his strategic management skills were put to the test and his contribution was duly acknowledged when he was elected the ACFE Board of Regents, Vice-Chairman. Based in Austin, Texas, ACFE is the best recognised and largest Fraud Examination Body in the world. While in Singapore, he also help founded the CSI World Headquarters, a Digital Forensics Certification body. To this day, he is the Chairperson Emeritus for the CSI World Headquarters. His previous work experience includes systems based Tommy Seah, Certified Fraud Examiner World Class Financial Management auditing in an American International Bank, where he was the Senior Regional Auditor responsible Expert. for the Bank's audit in the Asia Pacific region. He has also held the top executive position of Chief Double Firsts in Financial Management g of Internal Audit in a prime offshore bank where his audit duties cover the Singapore and Hong and Accountancy (U.K.) Kong operations of the bank. He covers all areas of the bank's audit of operations and IT systems. Chartered Banker, International He also has hands-on practical consulting work experience in many different global AAA financial Accountant, FCPA (USA), CSOXP institutions. He specialises in financial institutions AML system penetration testing. Member of Advisory Board to SOX Institute (N.Y.) Member, ACP (U.K.) For registration and enquiries, please contact KH Eng : Email: kheng@fimastr.com Tel: 017-8886862 Fax: 03-79584868 Web: www. fimastr .com. For Copy right of FIMA Strategic Resources. All Rights Reserve

Program Outline Day One Day Two VIDEO presentation – A Cyber Robbery An examination on the current (Firewall Extracts – 50 minutes) Internal Control Model. Recap on Day 1 What are the basic internal control concepts, and why are Cyber Crime as We Enter the Twenty-First Century Fraud Risk Management is critical to What Is Cyber Crime? computer control and security important? How Does Today’s Cyber Crime Differ from the Hacker Exploits of Yesterday? The Trinity of Controls The Reality of Information Warfare in the Corporate Why Internal A dit Wh I t l Auditors and Ri k M d Risk Management t Environment have in common when dealing with Occupational fraud Industrial Espionage — Hackers for Hire What really is fraud ? Public Law Enforcement’s Role in Cyber Crime Investigations Why is there a need for a new paradigm in Fraud Risk Management? The Role of Private Cyber Crime Investigators and Security Consultants in Investigations What are the major elements in A FRM model ? The 4 Steps in Fraud Risk Assessment to prevent Fraud with Computers What is the distinction between FRM and Investigation ? Short Demonstration video clip on Digital Forensics. What events affect uncertainty, The need to consider outsourcing an investigation that and how can they be identified? involves computers Behavioral science can assist in Where t seek help i th event of a suspected computer Wh to k h l in the tf td t mitigating the insider threat. fraud. What control activities are How to proceed with an investigation that involves the use commonly used in companies? of computers How do organizations Q& A session communicate information and monitor control processes? Day 2 Close Day 1 Close Your Opportunity to..… Partner with management to create an environment hostile to WHO SHOULD ATTEND? computer fraud. ● Fraud Investigators/Anti-Fraud Managers Build FRM fraud detection into routine audit activity. ● Legal & Compliance Managers Learn how to use control techniques to prevent computer fraud. ● Risk Management & Audit Managers Master approaches and techniques to conduct effective ● Internal Auditors investigations from discovery through dealing with law enforcement. ● Financial Controllers Understand practical approaches to preventing dishonest and ● Company Secretaries fraudulent activity. ● CIO’s, CEO’s, COO’s BONUS ! Place the ACSI initials after your name ! By attending this program, you are entitled to a ONE ● E-Banking, MIS Managers YEAR FREE Associate Membership of the ● Procurement Managers CSI World Headquarters. ● IT Auditors Important Notice Due to the interactive nature of the learning session, the sequence and contents of the program maybe vary according to the needs of the participants. The speaker reserves the right and the privilege to conduct the program in the manner which he thinks to be in the best interest of the majority of the participants. Please ensure that you understand this completely so as to prevent any form of unrealistic expectation and or disappointment in a public enrolment program that was not tailored to your specific need. Please inform the organizer in advance if you are not agreeable or do not completely understand the above term and we will deregister your participation accordingly. ”

Registration Form (sales contract) YES! I would like to register for: Fraud Risk Management & Computer Security Price Regular fee: RM 2888 Early bird fee: RM 2688 (Register before 8 May 2009) Group Price: RM 2688 (3rd and subsequent registration receive 10% off the regular fee) Disclaimer: The registration does not include hotel accommodation. Indemnity: Should for any reason outside the control of FIMA Strategic Resources, the venue or speakers change, or the event be cancelled due to an act of terrorism, extreme weather conditions or industrial action, FIMA Strategic Resources shall endeavor to reschedule but the client hereby indemnifies and holds FIMA Strategic Resources harmless from and against any and all costs, damages and expenses, including attorneys fees, which are incurred by the client. The construction, validity and performance of this Agreement shall be g g governed in all respects by the laws of Malaysia to the exclusive j p y y jurisdiction of whose Courts the Parties hereby y agree to submit. Please complete this registration form and fax back to us on +603 - 79584868 Delegate Detail DELEGATE 2 DELEGATE 1 Name Name ______________________________________________________ _____________________________________________________ Job Title Job Title ______________________________________________________ _____________________________________________________ Company Company _____________________________________________________ ______________________________________________________ Address Address _____________________________________________________ ______________________________________________________ Email Email ______________________________________________________ ______________________________________________________ Phone Phone ______________________________________________ ______________________________________________________ Authorization Payment Options Name Cheque : Made payable to FIMA Strategic Resources _____________________________________________________ Bank Transfer: FIMA Strategic Resources RHB Bank Berhad Designation RHB Centre, Jalan Tun Razak _____________________________________________________ 50400 Kuala Lumpur 0 00 l Signature Account number: 21412900218129 _________________________________________ Date / / *I have read, understood, agree to the booking terms & Venue Hotel Equatorial, Kuala Lumpur conditions in its entirely * Our Address: 1802, 18th Floor, Campbell Complex, Jalan Dang Wangi 50100 Kuala Lumpur How to register Please send your completed registration form details by Fax: +603 79584868 Booking Conditions IMPORTANT NOTICE : Registration ill Regist ation will be confi med upon receipt of your completed confirmed pon eceipt o This program is designed for the basic computer Registration Form user and information systems manager in Once registration is confirmed, payment must be made within 1 mind, explaining the concepts needed to week after receipt of invoice. read through the hype in the marketplace If you are unable to attend the conference, a substitute delegate is and understand risks and how to deal with welcome at no extra charge. Alternatively, your registration can be them. credited to a future seminar within the next 6 month. This is not intended to be a ``frequently asked For cancellations received in writing more than 2 weeks prior to questions'' reference, nor is it a ``hands-on'' the conference, a full refund less RM 100 admin charge will be made. Regrettably, no refund can be made less than 2 weeks prior workshop describing how to accomplish to the event and the amount will remain payable in full. A complete specific functionality. set of the seminar documentation will be given. It is hoped that the audience will have a wider All speakers and topics are correct at the time of printing, FIMA perspective on security in general, and better Strategic Resources reserves the right to substitute speakers and understand how to reduce and manage risk cancel or alter the content and timing of the program for reason personally, at home, and in the workplace. beyond its control. The conditions are subject to change without prior notice. For registration and enquiries, please contact KH Eng. Email: kheng@fimastr.com Tel: 017-8886862 Fax: 03-79584868 Web: www. fimastr.com. Copy right of FIMA Strategic Resources. All Rights Reserve

Add a comment

Related presentations

Related pages

Fraud risk management - CIMA

This guide is based on the fi rst edition of Fraud Risk Management: A Guide to Good Practice. ... work of CIMA’s Fraud and Risk Management Working
Read more

Computer Fraud & Security - Journal - Elsevier

Computer Fraud & Security has grown with the ... and control computer and information security within ... Risk management • Network security
Read more

PAYMENT FRAUD AND RISK MANAGEMENT - asset.mtb.com

Please consult with your security ... could hijack your computer RISE IN PAYMENT FRAUD — ARE ... your Payment Fraud and Risk Management ...
Read more

CGMA Report: Fraud Risk Management

THE MARKETING FINANCE INTERFACE ... 6 FRAUD RISK MANAGEMENT ... Computer based controls 12% fraud. Fraud detection ...
Read more

Assessing Fraud Risk - Journal of Accountancy

Computer fraud; Data/Information security; ... Risk management; ... Magazine; Video; Topics. Feature; AUDITING /FRAUD; Assessing Fraud Risk
Read more

Fraud Risk Management and Computer Security - Education

1. FRAUD Risk Management & Computer Security Organized by:Organized by:Hotel Equatorial, Kuala Lumpur 24th and 25th June 2009• CSI accredited 10 CPE ...
Read more

Fraud and Risk Management | Bottomline Technologies

Bottomline.com places cookies on your computer for ad management and ... Bottomline's fraud and risk management solutions are a set ... fraud and security ...
Read more

Fraud Risk Management - The IIA

mitigating the fraud risk (Note: fraud controls can be tricky!) ... management’s fraud risk assessment was presented / reviewed / discussed / approved.
Read more

Fraud Prevention and Risk Management - Online Payment ...

... fraud prevention and payment security. MasterCard Payment Gateway Services's fraud and risk management solutions ... fraud & risk from every ...
Read more

Financial | ND Office of Management and Budget

It is used by State Government and Higher Education entities primarily for financial ... management software. It is ... Risk Fraud Risk Assessment Form ...
Read more