Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How...

51
Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves

Transcript of Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How...

Page 1: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Clark Nuber: How Cybersecurity programs are effecting fraud.

Anthony Hargreaves

Page 2: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

How Cybersecurity programs are effecting fraud

Page 3: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Agenda

• Introduction• Todays audience• What’s happening out there?• Data & Cybersecurity impact on fraud• Tips on scams, phishing, spoofing, and scrapping• Tips on how to combat Cyber & Fraud threats• Summary• Q & A

Page 4: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Anthony Hargreaves

• Originally from Australia• 15 Years Experience:

– National Australia Bank – Credit Card Fraud and phishing scams

– Protiviti IT Auditor – Focus on SOX & IT Consulting

– Safeway – Focus on PCI and Database re-engineering

– EY – Focus on IT and Cloud compliance

– Clark Nuber focus on IT Security Programs

Page 5: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Introduction - Relationships

• Family, friends, partners, community• Smart phone• Bank• Employer• Tax preparer• Healthcare provider• As a consumer• Giving back and preparing for retirement

Page 6: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Todays Audiences

• Interactive – Show of Hands

Presenter
Presentation Notes
Take a survey of the room. Identify Android Vs Iphone users…joke about blackberry users (if any!)
Page 7: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Today’s Audience

• No individual, organization, or industry is immune

Page 8: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

What’s Happening Out There?

• Email (contacts, sensitive info)• Banking apps• Expense apps• Payment Apps• Social media (all about you)

Page 9: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

What’s Happening Out There?

Page 10: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Cybersecurity Program

Make-up• An Effective Frame-work• End-to-End Scope• Comprehensive Risk Assessment and Threat Modelling• Proactive Incident Response Plan combined with training• Dedicated Cybersecurity resources

Page 11: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Anti-Fraud Program

Make-up• Risk Assessment• Code of Ethics and Anti-Fraud Policies• Tone from the top• Training• Vehicles for reporting non-compliance• Centralized Data Repository• Standardized case investigation, management and disposition• Data analytics• Evaluation and validation (Monitoring or Internal Controls)• Available Fraud or Loss Prevention resources

Page 12: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

What’s Happening Out There?

• Increase in technology, software and devices

• Availability of the data these devices produce, consume and store.

• Increase in data breaches

• Cybersecurity laws and regulations remain behind or in a state of flux

Page 13: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Technology + Devices = Data

• Increase in devices

Page 14: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

What’s happening out there

• Increase in devices

Page 15: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

What’s happening out there

• Increase in availability of information

Page 16: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

What’s happening out there

Top 5 most cyber-attacked industries in 2016

• Healthcare• Manufacturing• Financial Services• Government • Transportation

Source: 2016 IBM X-Force Cybersecurity Intelligence Index

Presenter
Presentation Notes
Real Estate, Gaming and EBP Medical Devices Manufacturing – Robotics Financial Services – Remote access – dash boards Government – Size of databases – decentralized security posture Transportation – Volume of transactions
Page 17: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

What’s happening out there

• Top 12 Health Care data breaches by people impacted

Page 18: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

What’s happening out there

• Top 12 Health Care data breaches by people impacted

Page 19: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Data and Cybersecurity impact on fraud

Page 20: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Data Classification

• Data Classification model

Page 21: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Data Classification

• In the U.S. you need to be aware of:• The Federal Trade Commission (FTC) Act• The Financial Services Modernization Act (Gramm-Leach-Bliley Act)• Health Insurance Portability and Accountability Act (HIPAA)• The Fair Credit Reporting Act

• EU will enact General Data Protection Regulation (GDPR).• Is a very vast and complicated act – it will impact the U.S.• Goes into force May 25, 2018

• The directive affects all companies that hold or use European personal data, whether that company is located in Europe or not.

Page 22: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

How best to prevent limit fraud

Whistleblower Internal Controls Security Training

Page 23: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

What does Data and Fraud Look Like?

Page 24: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Some Common Attacks

• Online Spoofing• Phishing• Ransomware• Scrapping

• Documentation Fraud• Wire Fraud• Vendor Management• Data theft

Page 25: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Some Common Attacks

Page 26: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Some Common Attacks - Phishing

Page 27: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Some Common Attacks - Ransomware

Page 28: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Some Common Attacks – Phishing

Page 29: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Some Common Attacks - Hoax

Page 30: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Some Common Attacks – Web Scraping

Page 31: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Some Common Attacks – Documentation Fraud

• On the rise again• Scammer fabricates documents – Name your Industry!• Scammer takes out a new overdraft/mortgage/credit card• The criminal takes the

cash – leaves owner debt

Page 32: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Wire Fraud

• Obtain the email address format of the company• Identify persons in positions of authority to wire funds• Send an email with fraudulent wire transfer instructions• The victim follows the

instructions, and the moneyis sent to the scammer

• The scammer acquires the funds.

Page 33: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Importance of Vendor Management

• Know your Third Party Vendors• Understand Service Level Agreements• Review key access roles • Align data policy with yours• Understand documentation

handling procedures• Perform regular document destruction• Know your data breach protocols

Page 34: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Attacked from Within

Page 35: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

What does Data and Fraud Look Like?

• So what does this mean?• Financial Information• Transactional Data• Personally Identifiable information

• Info which can assist with ID fraud/social engineering• The past, present, or future records.

• Intellectual Property• Trade Secrets• Digital media that can be converted to currency

Page 36: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Combating Fraud & Cyber Threats

Page 37: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

The Relationship of Cybersecurity and Fraud

• 5 Tips for Cybersecurity• 5 Tips for Data Security• 4 Best Technical Tips• 3 of Anthony’s recommended baby steps

Page 38: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

5 Tips Cybersecurity

1. Verify the front lines– Maintaining a detailed and integrated network diagram.

2. Identify Cyber threats– Perform an annual risk assessment.

Presenter
Presentation Notes
Verify the front lines Maintaining a detailed and integrated network diagram is crucial. Knowing your boundaries, areas of weakness and communication protocols are important. Identify Cyber threats Perform an annual risk assessment. This annual process is to keep you and your organization abreast of the ever changing risk landscape within which you operate. Network scanning and Security Assessments They walk among us! Know your IT environments limitations and scan and test it frequently. Data Classification Define what’s important and worth spending money to protect: Data classification, in the context of cybersecurity, is the classification of data based on its level of sensitivity and the impact to the entity or individual should that data be compromised, altered or destroyed without authorization and or consent. Know your incident response plan: You should adopt the mindset that you will get compromised and it will be how fast you can respond, apply containment measures and communicate both internally and externally that limits exposure. Define the chain of command. Few organizations really understand their ‘state of readiness’ to respond to a cyber security incident.
Page 39: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

5 Tips Cybersecurity

Page 40: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

5 Tips Cybersecurity

1. Verify the front lines– Maintaining a detailed and integrated network diagram.

2. Identify Cyber threats– Perform an annual risk assessment.

3. Network scanning and Security Assessments– They walk among us! Know your IT environments limitations and scan

and test it frequently. 4. Data Classification

– Define what is your organizations data assets.5. Know your incident response plan:

– Rehearse your incident response plan.

Presenter
Presentation Notes
Verify the front lines Maintaining a detailed and integrated network diagram is crucial. Knowing your boundaries, areas of weakness and communication protocols are important. Identify Cyber threats Perform an annual risk assessment. This annual process is to keep you and your organization abreast of the ever changing risk landscape within which you operate. Network scanning and Security Assessments They walk among us! Know your IT environments limitations and scan and test it frequently. Data Classification Define what’s important and worth spending money to protect: Data classification, in the context of cybersecurity, is the classification of data based on its level of sensitivity and the impact to the entity or individual should that data be compromised, altered or destroyed without authorization and or consent. Know your incident response plan: You should adopt the mindset that you will get compromised and it will be how fast you can respond, apply containment measures and communicate both internally and externally that limits exposure. Define the chain of command. Few organizations really understand their ‘state of readiness’ to respond to a cyber security incident.
Page 41: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

5 Tips on Data Security

Create a Data Management PolicyEncompass Data Classification and Document retention and destruction

1. Take stock – Network Diagram/Data Flow2. Scale down – Keep only the information you need3. Lock it – Apply appropriate safety measures4. Pitch it – Destroy it once you don’t need it5. Plan Ahead – Be prepared for a data breach

Note: Many states have different PII laws

Page 42: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Best 4 Technical Tips

Page 43: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Passwords are like Underwear

• Change them regularly• Keep them long

• Don’t leave on your desk• Don’t loan them to anyone

Page 44: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Know and map your controller

Entity LevelControls

ManualControls

IT Dependent Manual Controls

ApplicationControlsIT General Controls

Strategies and Plans

Polices & Procedures

Risk Assessments

Training & Education

Quality Assurance

Internal Audit

Board Communication

Involves NO reliance on a system or

application and are performed by people:

Fixed asset acquisitions in excess

of $10,000 are approved by the

Capital Asset Committee and the

CFO via physical signature on a capital

expenditure form.

(ITDM) controls have both a manual and a system component

(typically with reports)

The A/P sub-ledge is reconciled to the

general ledger on a quarterly basis; the

reconciliation is reviewed by the CFO

Application controls are completely

automated, and are either programmed or configured within the

application itself:

Embedded Control:System is programmed

(hard coded) to perform the control

Configurable Control:System is configured

via settings within the application to perform

the control

Logical Access

Change Management

Operations

Page 45: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Know and map your controls

Entity LevelControls

ManualControls

IT Dependent Manual Controls

ApplicationControlsIT General Controls

Mission / Purpose

Strategies and Plans

Polices & Procedures

Risk Assessments

Training & Education

Internal Audit

Quality Assurance

Board Communication

Involves NO reliance on a system or

application and are performed by people:

Fixed asset acquisitions in excess

of $10,000 are approved by the

Capital Asset Committee and the

CFO via physical signature on a capital

expenditure form.

(ITDM) controls have both a manual and a system component

(typically with reports)

The A/P sub-ledge is reconciled to the

general ledger on a quarterly basis; the

reconciliation is reviewed by the CFO

Application controls are completely

automated, and are either programmed or configured within the

application itself:

Embedded Control:System is programmed

(hard coded) to perform the control

Configurable Control:System is configured

via settings within the application to perform

the control

Logical Access(Security)

Change Management

Operations

Page 46: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Know and map your controls

Page 47: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Know and map your controls

Page 48: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Anti-Fraud Program

Make-up• Risk Assessment• Code of Ethics and Anti-Fraud Policies• Tone from the top• Training• Vehicles for reporting non-compliance• Centralized Data Repository• Standardized case investigation, management and disposition• Data analytics• Evaluation and validation (Monitoring or Internal Controls)• Available Fraud or Loss Prevention resources

Page 49: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

What can YOU do Right Now?

• Are you confident with the accuracy of your data classification, Anti-Fraud policy – is it effectively enforced?

• Do you currently have a whistle-blower hotline?• Are your IT security policy and procedures current?• Do you receive annual security awareness training?• Are you aware or involved in your annual Risk Assessment or

Cybersecurity program?• Are your IT General Controls formalized?• Has an IT Security or network penetration test been performed in

the last 36 months (Yes/No)

Page 50: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Summary

Page 51: Clark Nuber: How Cybersecurity programs are effecting fraud. 2_How... · Clark Nuber: How Cybersecurity programs are effecting fraud. Anthony Hargreaves. How Cybersecurity programs

Thank you for your attention

Please contact

Anthony Hargreaves425.635.4558

[email protected]“Anthony Hargreaves” in the Subject Line