3

Click here to load reader

Fraud Risk Management and Computer Security

Embed Size (px)

DESCRIPTION

Fraud costs businesses hundreds of millions of dollars each year. It affects livelihoods and is a common cause of corporate failure. It is the responsibility of the board of directors to prevent fraud by putting in places the appropriate controls and review procedures. This program shows you why Accounting Information System (AIS) Threats are ever increasing. The program focus is to cater the need for Fraud Risk Management. (FRM) Control risks have also increased in the last few years because there are computers and servers everywhere,and information is available to an unprecedented number of workers. Distributed computer networks make data available to many users and these networks are harder to control than centralized mainframe systems. Wide area networks are giving customers and suppliers access to each other’s systems and data, making confidentiality a major concern.

Citation preview

  • 1. FRAUD Risk Management & Computer Security Organized by:Organized by:Hotel Equatorial, Kuala Lumpur 24th and 25th June 2009 CSI accredited 10 CPE points A CSI CPE 1 year CSI Associate membershipCompetitive Advantage Assuredrecognized Incorporating the CSI qualifying compulsory module on Fundamental ofpgprogramComputer FraudFraud.Fraud costs businesses hundreds of millions of dollars each year. ItFRM Audit Strategies for affects livelihoods and is a common cause of corporate failure. It is the Detecting Fraud responsibility of the board of directors to prevent fraud by putting in Using personal profiling to detect places the appropriate controls and review procedures. This program fraud by computer shows you why Accounting Information System (AIS) Threats are ever increasing. The program focus is to cater the need for Fraud Risk Management. (FRM) g ()Computer Evidence p Control risks have also increased in the last few years because there areCollection computers and servers everywhere,and information is available to an The need for documentation , unprecedented number of workers. types of fraud. Distributed computer networks make data available to many users and these networks are harder to control than centralized mainframeSkill sets for detecting AIS systems.Computer Fraud Wide area networks are giving customers and suppliers access to each others systems and data, making confidentiality a major concern. y , g yjFRM and Computer FraudThe many GOOD reasons to attend this workshop Typical computer Forensics Field Historically, many organizations have not adequately protectedKittheir data because Computer control problems are oftenHigh Profile Computer underestimated and downplayed.Fraud Control implications of moving from centralized, host-based How can it happen? computer systems to those of a networked system or Internet-based system are not always f ll understood.b dt tl fully d t dComputer Evidence Companies have not realized that data is a strategic resource and An introduction to thethat data security must be a strategic requirement.fundamentals Productivity and cost pressures may motivate management toforego time-consuming control measures. Tommy is someone that you would like to meet and to know. Straight talking, sincere kind, helpfulknow talking sincere, kindand without pretences, he is truly a man of strong conviction and blessed with many practicaltalents. First and foremost, he is a World Class hands-on accountant He has worked as anAccountant for some of the largest companies in the world. He is a tried and tested accountantwith a very firm grip on financial products. He is also trained in Access Data Digital Forensics tooland a full Member of the Association of Computer Professionals. (U.K.) since 1980s. Because ofhis grip on the subject matter, his services in providing technical training is much sought after bynumerous banks in the region, including Germany, Singapore, Malaysia, China, Indonesia,Philippines and Taiwan. Tommy's other professional achievements would have been the objectsof envy for many of his peers. Some of the better known fact is that he is the only Singaporeanpeersthat sits on the ACFE Board of Regents in Texas, USA. In the year 2006, his strategic managementskills were put to the test and his contribution was duly acknowledged when he was elected theACFE Board of Regents, Vice-Chairman. Based in Austin, Texas, ACFE is the best recognised andlargest Fraud Examination Body in the world. While in Singapore, he also help founded the CSIWorld Headquarters, a Digital Forensics Certification body. To this day, he is the ChairpersonEmeritus for the CSI World Headquarters. His previous work experience includes systems basedTommy Seah, Certified Fraud ExaminerWorld Class Financial Managementauditing in an American International Bank, where he was the Senior Regional Auditor responsibleExpert. for the Bank's audit in the Asia Pacific region. He has also held the top executive position of ChiefDouble Firsts in Financial Managementg of Internal Audit in a prime offshore bank where his audit duties cover the Singapore and Hongand Accountancy (U.K.)Kong operations of the bank. He covers all areas of the bank's audit of operations and IT systems.Chartered Banker, InternationalHe also has hands-on practical consulting work experience in many different global AAA financialAccountant, FCPA (USA), CSOXPinstitutions. He specialises in financial institutions AML system penetration testing.Member of Advisory Board to SOXInstitute (N.Y.) Member, ACP (U.K.) For registration and enquiries, please contact KH Eng : Email: [email protected] Tel: 017-8886862 Fax: 03-79584868 Web: www. fimastr .com. ForCopy right of FIMA Strategic Resources. All Rights Reserve

2. Program Outline Day OneDay Two VIDEO presentation A Cyber Robbery An examination on the current(Firewall Extracts 50 minutes) Internal Control Model. Recap on Day 1 What are the basic internal control concepts, and why areCyber Crime as We Enter the Twenty-First Century Fraud Risk Management is critical toWhat Is Cyber Crime? computer control and security important?How Does Todays Cyber Crime Differ from the Hacker Exploits of Yesterday? The Trinity of Controls The Reality of Information Warfare in the Corporate Why Internal A dit Wh I t l Auditors and Ri k M d Risk Management tEnvironment have in common when dealing with Occupational fraudIndustrial Espionage Hackers for Hire What really is fraud ?Public Law Enforcements Role in Cyber Crime Investigations Why is there a need for a new paradigm in Fraud Risk Management?The Role of Private Cyber Crime Investigators and SecurityConsultants in Investigations What are the major elements in A FRM model ?The 4 Steps in Fraud Risk Assessment to prevent Fraudwith Computers What is the distinction between FRM and Investigation ?Short Demonstration video clip on Digital Forensics. What events affect uncertainty,The need to consider outsourcing an investigation that and how can they be identified?involves computers Behavioral science can assist inWhere t seek help i th event of a suspected computerWhtok h l in the tf td t mitigating the insider threat. fraud. What control activities areHow to proceed with an investigation that involves the use commonly used in companies?of computersHow do organizations Q& A session communicate information and monitor control processes? Day 2 CloseDay 1 CloseYour Opportunity to..Partner with management to create an environment hostile toWHO SHOULD ATTEND? computer fraud. Fraud Investigators/Anti-Fraud Managers Build FRM fraud detection into routine audit activity. Legal & Compliance Managers Learn how to use control techniques to prevent computerfraud. Risk Management & Audit ManagersMaster approaches and techniques to conduct effective Internal Auditorsinvestigations from discovery through dealing with law enforcement. Financial ControllersUnderstand practical approaches to preventing dishonest and Company Secretariesfraudulent activity. CIOs, CEOs, COOs BONUS ! Place the ACSI initials after your name !By attending this program, you are entitled to a ONE E-Banking, MIS ManagersYEAR FREE Associate Membership of the Procurement ManagersCSI World Headquarters. IT AuditorsImportant Notice Due to the interactive nature of the learning session, the sequence and contents of the program maybe vary according to the needs of theparticipants. The speaker reserves the right and the privilege to conduct the program in the manner which he thinks to be in the bestinterest of the majority of the participants. Please ensure that you understand this completely so as to prevent any form of unrealisticexpectation and or disappointment in a public enrolment program that was not tailored to your specific need. Please inform theorganizer in advance if you are not agreeable or do not completely understand the above term and we will deregister yourparticipation accordingly. 3. Registration Form (sales contract) YES! I would like to register for: Fraud Risk Management & Computer SecurityPriceRegular fee: RM 2888 Early bird fee: RM 2688 (Register before 8 May 2009) Group Price: RM 2688 (3rd and subsequent registration receive 10% off the regular fee)Disclaimer: The registration does not include hotel accommodation. Indemnity: Should for any reason outside the control of FIMA Strategic Resources, the venue or speakers change, or the event be cancelled due to an act of terrorism, extreme weather conditions or industrial action, FIMA Strategic Resources shall endeavor to reschedule but the client hereby indemnifies and holds FIMA Strategic Resources harmless from and against any and all costs, damages and expenses, including attorneys fees, which are incurred by the client. The construction, validity and performance of this Agreement shall be g g governed in all respects by the laws of Malaysia to the exclusive j p y yjurisdiction of whose Courts the Parties herebyy agree to submit.Please complete this registration form and fax back to us on +603 - 79584868Delegate Detail DELEGATE 2 DELEGATE 1Name Name______________________________________________________ _____________________________________________________Job Title Job Title______________________________________________________ _____________________________________________________CompanyCompany ___________________________________________________________________________________________________________Address Address ___________________________________________________________________________________________________________Email Email______________________________________________________ ______________________________________________________Phone Phone ______________________________________________ ______________________________________________________ Authorization Payment Options Name Cheque : Made payable to FIMA Strategic Resources _____________________________________________________ Bank Transfer: FIMA Strategic ResourcesRHB Bank Berhad DesignationRHB Centre, Jalan Tun Razak _____________________________________________________50400 Kuala Lumpur 0 00 l SignatureAccount number: 21412900218129 _________________________________________ Date/ /*I have read, understood, agree to the booking terms &Venue Hotel Equatorial, Kuala Lumpur conditions in its entirely * Our Address: 1802, 18th Floor, Campbell Complex, Jalan Dang Wangi 50100 Kuala Lumpur How to register Please send your completed registration form details by Fax: +603 79584868 Booking Conditions IMPORTANT NOTICE : Registration ill Regist ation will be confi med upon receipt of your completedconfirmed pon eceipto This program is designed for the basic computer Registration Formuser and information systems manager in Once registration is confirmed, payment must be made within 1mind, explaining the concepts needed to week after receipt of invoice. read through the hype in the marketplace If you are unable to attend the conference, a substitute delegate is and understand risks and how to deal with welcome at no extra charge. Alternatively, your registration can bethem. credited to a future seminar within the next 6 month.This is not intended to be a ``frequently askedFor cancellations received in writing more than 2 weeks prior toquestions'' reference, nor is it a ``hands-on'' the conference, a full refund less RM 100 admin charge will be made. Regrettably, no refund can be made less than 2 weeks prior workshop describing how to accomplish to the event and the amount will remain payable in full. A completespecific functionality. set of the seminar documentation will be given.It is hoped that the audience will have a wider All speakers and topics are correct at the time of printing, FIMAperspective on security in general, and better Strategic Resources reserves the right to substitute speakers andunderstand how to reduce and manage risk cancel or alter the content and timing of the program for reasonpersonally, at home, and in the workplace. beyond its control. The conditions are subject to change without prior notice. For registration and enquiries, please contact KH Eng. Email: [email protected] Tel: 017-8886862 Fax: 03-79584868 Web: www. fimastr.com.Copy right of FIMA Strategic Resources. All Rights Reserve