31
“A Lack of IT Controls = Fraud Opportunities”

A Lack of IT Controls= Fraud Opportunities

Embed Size (px)

Citation preview

Page 1: A Lack of IT Controls= Fraud Opportunities

“A Lack of IT Controls = Fraud Opportunities”

Page 2: A Lack of IT Controls= Fraud Opportunities

Chris Mitchell - MBA, CIA, CISA, CCSA

Experience

Chris has over 18 years of risk management, finance, and IT consulting experience. He has held the titles of Internal Audit Director, Senior Program Manager, and Managing Consultant at various companies in industries including financial services, telecommunications, software development, manufacturing, and government. Chris’ practice focuses on assisting clients with 404 implementations, Type I & II SSAE 16 engagements, leading internal audit teams, and making cost-effective recommendations to enhance internal controls, maximize efficiency, and minimize exposure to loss and regulatory risk.

EducationB.B.A. from University of Texas at San AntonioMBA from Touro University

Bios

2

Page 3: A Lack of IT Controls= Fraud Opportunities

Established in 1983, Whitley Penn has become one of the region's most distinguished accounting firms by providing exceptional service that reaches far beyond traditional accounting

Today, with offices in Dallas, Fort Worth, and Houston, 37 partners, approximately 280 exceptional employees, and a worldwide network affiliation via Nexia International, we are strategically positioned to grow and excel in the future

Services Offered: Assurance and Advisory Business Process Improvement Business Valuation Services Employee Benefit Plans Litigation and Forensic Services Risk Advisory Tax and Consulting Virtual Back Office

About Whitley Penn LLP

5

Page 4: A Lack of IT Controls= Fraud Opportunities

Service Areas:– IT Audits and Consulting – IT and Business Risk Assessments – Internal Audit Services – Service Organization Control (SOC) Reports – 1, 2, & 3– Surprise Examinations for Registered Investment Advisors – Sarbanes-Oxley Compliance and Maintenance – Enterprise Risk Management Implementation and

Maintenance6

Whitley Penn LLP – Risk Advisory Services

Page 5: A Lack of IT Controls= Fraud Opportunities

Common Facts IT Fraud Statistics Common Anti-Fraud Controls Client Scenarios Information Technology Best Practices Cyber Warfare Questions

1

Agenda

Page 6: A Lack of IT Controls= Fraud Opportunities

Common Facts

• Estimated loss of 5% of revenue , of which 1-2% is caused by lack o f IT controls within an organization

• Corruption and Billing schemes pose the greatest risk to an organization. These schemes take place based on the data that is fed into systems and how a lack of access, approval controls, and management oversight would lead to such schemes

• Most common victims:

– Banking & financial services

– Government & public administration

– Manufacturing sectors

• Anti-fraud controls correlate to significant decreases in the cost and duration of occupational fraud schemes

7References:ACFE – 2012 Report to the Nations

Page 7: A Lack of IT Controls= Fraud Opportunities

8

IT Fraud Statistics – Top 3 Business Departments

References:ACFE – 2012 Report to the Nations

Page 8: A Lack of IT Controls= Fraud Opportunities

• Accounting: User access to accounting systems / functions and modules should be segregated based on job responsibilities

• Executive/Upper Management: Management oversight plays a vital role in making sure that appropriate controls are in place within an organization. It is advised that management conduct periodic reviews of these controls to make sure that it is working as stated

IT Fraud Statistics Breakdown

9

Page 9: A Lack of IT Controls= Fraud Opportunities

10

Fraud Statistics – Trusted Business Partners

References:Software Engineering Institute, Carnegie Mellon. "Spotlight On: Insider Threat from Trusted Business Partners, Version 2: Updated and Revised". Computer Emergency Response Team (CERT) website. 2012 http://www.cert.org/archive/pdf/TrustedBusinessPartners1012.pdf

Trusted Business PartnerNon-TBP Insider

Organizational IndividualType of Position Technical 45% 80% 39%Nontechnical 55% 20% 61%Authorized Access Authorized Access 44% 36% 48%Unauthorized Access 26% 36% 23%Location On-Site 81% 60% 73%Remote Access 19% 40% 27%Employment Status Current 90% 69% 76%Former 10% 31% 24%Type of Insider Crime Fraud 64% 23% 54%Theft of Intellectual Property 28% 18% 19%Sabotage 8% 59% 27%

Page 10: A Lack of IT Controls= Fraud Opportunities

11

Common Anti-Fraud Controls

References:ACFE – 2012 Report to the Nations

Page 11: A Lack of IT Controls= Fraud Opportunities

Common Anti-Fraud Controls (continued)

12References:ACFE – 2012 Report to the Nations

Page 12: A Lack of IT Controls= Fraud Opportunities

Common Anti-Fraud Controls (continued)

13References:ACFE – 2012 Report to the Nations

Page 13: A Lack of IT Controls= Fraud Opportunities

Client Scenarios

• Following are several client scenarios that we have either encountered or obtained through credible references

• Picture these happening at your company or client• Think of possible controls to mitigate weaknesses• Brief description of Scenarios:

– #1 pertains to 3rd party vendors & compliance– #2 pertains to logical access control usage– #3 pertains to change management controls– #4 pertains to general IT operations

14

Page 14: A Lack of IT Controls= Fraud Opportunities

15

Scenario #1

Clueless, Inc. requested to have a General Controls Review (GCR) conducted as part of their annual audit. During planning and fieldwork , it was noted that they had outsourced all IT work to a third party consultant, and the following issues were identified:• There was no valid contract between Clueless , Inc. and the third party consultant;• There was no formal IT purchasing approval process; and• Clueless, Inc.’s IT liaison was married to the consultantClueless, Inc. was implementing a third party web application to support their business. The consultant recommended that they install a Citrix solution to secure the web application at a cost of just under $1 million. No other organizations using the third party’s web applications were using Citrix or a comparable solution to secure the web application

Page 15: A Lack of IT Controls= Fraud Opportunities

16

Clueless, Inc. Control Recommendations

Preventative Controls– Contract / SLA management– Conflict of Interest Compliance– Purchase approval process– Qualified staff performing oversight

Detective Controls– Contract/SLA performance reviews

Page 16: A Lack of IT Controls= Fraud Opportunities

Naveen Krishnan – CRISC

ExperienceNaveen has over six years of IT audit experience focused on public and private sectors pertaining to Oil and Gas, Technology, Manufacturing, and Healthcare industry. He has led multiple SOX 404 engagements and has assisted numerous clients with Type I and II SSAE16 examinations. He joined Whitley Penn in June 2011 to help build the risk practice and since then has successfully recruited and developed a core team engaged to deliver quality work and establish relationships with clients.

EducationBachelors in Management Information Systems (MIS)Louisiana State University

Bios

3

Page 17: A Lack of IT Controls= Fraud Opportunities

Free For All, LLC , an online retailer, requested to have a GRC and analysis of third party service providers/consultants to evaluate the feasibility of continuing operations. The company was owned by a wealthy individual who had little involvement in the planning or operations of the company. The following issues were identified:• The company had established a contract with a third party developer requiring $30,000

worth of development work to be done each month, regardless of need. The business owner also owned a company that developed online retail websites for a niche market, but this resource was not leveraged for Free For All, LLC

• The company had established a contract with a third party marketing firm that required $25,000 worth of marketing work be done each month, regardless of need.

• The first act of the CEO was to hire his wife as CFO• The CEO awarded himself a $100,000/year raise and doubled the salary of the Office

Manager• The Company had approximately $100,000 in revenue for the year

Scenario #2

17

Page 18: A Lack of IT Controls= Fraud Opportunities

Preventative Controls– Contract / SLA management– Conflict of Interest Compliance– Qualified staff performing oversight

Detective Controls– Contract/SLA performance reviews

Free For All, LLC Control Recommendations

18

Page 19: A Lack of IT Controls= Fraud Opportunities

19

Scenario #3

An IT Manager at Hornswoggled, LLP carried out a fraud scheme that lasted two years before being detected. The manager was able to gain access to multiple accounts, allowing them to submit and approve purchase orders and payments. The manager was also able to bypass a system control that notified the AP manager and security when a vendor’s address was added or modified

To enable this fraud, the IT manager modified a single line of code in a program that synchronized passwords between the production and test environments, which provided them with all user account passwords in clear text. The IT manager also modified a single line of code in another program that notified the AP manager and security when a vendor address was added or modified, allowing it to be turned off at will

References:Software Engineering Institute, Carnegie Mellon. "Spotlight On: Programming Techniques Used as an Insider Attack Tool". Computer Emergency Response Team (CERT) website. 2008 http://www.cert.org/archive/pdf/insiderthreat_programmers_1208.pdf

Page 20: A Lack of IT Controls= Fraud Opportunities

20

Hornswoggled , LLP Control Recommendations

Preventative Controls– Segregation of Duties– Change management controls must apply to all systems that

underlie significant applications and controls– Code and System Architecture Reviews

Detective Controls– Change detection– Review usage of critical system functions

Page 21: A Lack of IT Controls= Fraud Opportunities

Duped Brokerage, Inc. began receiving reports of fraudulent trades from clients. Upon investigation it was determined that their trading web application had been breached and a hacker had obtained access to all client accounts. The hacker used the victim’s account to make fraudulent trades that benefited his own market positions

Scenario #4

21

References:Association of Certified Fraud Examiners. “Internet Transactions at Risk – New Solutions Are Needed”. Robert D Peterson 2000 http://www.acfe.com/article.aspx?id=4294968466

Page 22: A Lack of IT Controls= Fraud Opportunities

Preventative Controls– Vulnerability management and penetration testing– Secure software development methodology– Service provider change management and logical access

Detective Controls– Change detection

Duped Brokerage, Inc. Control Recommendations

22

Page 23: A Lack of IT Controls= Fraud Opportunities

23

IT Process Summary

• Logical Access– Principle of least privilege and Segregation of Duties– Sufficient logging– Strong authentication– Special considerations for privileged accounts

• Change Management– Segregation of Duties– Change management scope– Change detection / Configuration Management

• IT Operations– Protect backup media from tampering– Restrict and monitor removable storage device and data transfer usage

• Security– Vulnerability management and penetration testing– Secure software development methodology

Page 24: A Lack of IT Controls= Fraud Opportunities

• Consider threats from insiders and business partners in enterprise-wide risk assessments

• Clearly document and consistently enforce policies and controls

• Incorporate insider threat awareness into periodic security training for all employees

• Beginning with the hiring process, monitor and respond to suspicious or disruptive behavior

• Know your assets• Implement strict password and

account management policies and practices

• Enforce separation of duties and least privilege

• Define explicit security agreements for any cloud services, especially access restrictions and monitoring capabilities

Information Technology Best Practices

24

References:Software Engineering Institute, Carnegie Mellon. “Common Sense Guide to Mitigating Insider Threats". Computer Emergency Response Team (CERT) website. 2012 http://www.sei.cmu.edu/reports/12tr012.pdf

Page 25: A Lack of IT Controls= Fraud Opportunities

• Institute stringent access controls and monitoring policies on privileged users

• Institutionalize system change controls

• Use a log correlation engine or security information and event management (SIEM) system to log, monitor, and audit employee actions

• Establish a baseline of normal network behavior

• Monitor and control remote access from all end points, including mobile devices

• Develop a comprehensive employee termination procedure

• Implement secure backup and recovery processes

• Develop a formalized insider threat program

• Close the doors to unauthorized data exfiltration

Information Technology Best Practices (continued)

25

References:Software Engineering Institute, Carnegie Mellon. “Common Sense Guide to Mitigating Insider Threats". Computer Emergency Response Team (CERT) website. 2012 http://www.sei.cmu.edu/reports/12tr012.pdf

Page 26: A Lack of IT Controls= Fraud Opportunities

Jarrett Kolthoff– President/CEO SpearTip, LLC

ExperienceJarrett Kolthoff, President/CEO of SpearTip, LLC, has over 19 years of experience in the Information Security field. As a former Special Agent – U.S. Army Counterintelligence, he has experience in cyber investigations, counterintelligence, and fusion cell analysis that assist SpearTip’s clients to identify, assess, neutralize, and exploit the threats leveled against their corporation. His civil case work has included investigations in anti-trust lawsuits, embezzlement, collusion, theft of intellectual property, and corporate espionage. Mr. Kolthoff has led assignments throughout the United States with both national and international corporations.

EducationRockhurst University, Bachelor (Political Science & Economics)U.S. Army, Counterintelligence AgentTroy State University, Masters (International Relations)

Bios

4

Page 27: A Lack of IT Controls= Fraud Opportunities

• Taking on new missions– Theft of processing power– Theft of customer data and financial information– Theft of Research– Destruction of research data

• Using active memory manipulation to foil static analysis and avoid signature based AV solutions

• In some cases, being used in conjunction with human operatives in the theft of company IP

Cyber Warfare – New Types of Soldiers

26

Page 28: A Lack of IT Controls= Fraud Opportunities

Cyber Warfare (continued)

27

Plan For the “When”, Not the “If”• Cyber Counterespionage

• Fusion Cell Analysis

• CyberStrike:̶X Identify̶X Assess̶X Neutralize̶X Exploit

Page 29: A Lack of IT Controls= Fraud Opportunities

• Passively Monitoring Known ‘Bad Actors’ and Crime Servers for:– Client IP Address– Client Domain Name– Conspiracy to Attack

• Monitoring Multiple Data feeds to include:– Internet Relay Chat (IRC) Communications– Log files– Open Source Intelligence (OSINT)

• The more network security, attack vector, and threat trending knowledge an enterprise can harvest, the more secure the enterprise

Engagement Strategies

28

Page 30: A Lack of IT Controls= Fraud Opportunities

Fusion Cell Analysis

Engagement Strategies (continued)

29

HUMINTHuman Collection Efforts

PredictiveTrends

IRCInternet Relay Chat

Malware Analysis

GovernmentCases

ThreatProfiling

OSINTOpen Source Intelligence

Known Threats

Civilian Cases

PostingExploits

Page 31: A Lack of IT Controls= Fraud Opportunities

Questions