Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being...

23
Bob Stark, Vice President, Strategy September 16, 2015 Leveraging technology to prevent fraud and cybercrime

Transcript of Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being...

Page 1: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

Bob Stark, Vice President, Strategy

September 16, 2015

Leveraging technology to prevent fraud and cybercrime

Page 2: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Fraud is a driving concern

Page 3: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Fraud is a driving concern

60% of organizations have experienced

attempted or actual payments fraud1

34% of organizations have been subjected to a

cyberattack in the last 18 months2

20% of corporates report fraud committed by

employees3

Corporate fraud has doubled since 20094

Average = 18 months before fraud detected5

Sources: (1, 2, 3) AFP, 2015; (4) PWC, 2014; (5) ACFE, 2014

Page 4: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

4 © 2015 Kyriba Corporation. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Risk Management Planning

1) What is being protected • Financial Data and workflows

2) Categorize threats • Operational (e.g. technology failures) • Accidental (e.g. spreadsheet mistakes) • Fraud (internal and external)

3) Identify solutions • Disaster recovery • Data encryption • Weak passwords • Active monitoring

Fraud Prevention – Key Part of Corporate Risk Planning

Page 5: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Opportunities to leverage technology:

Preventing Spear Phishing

Data Security (eliminate internal hosting)

Bank account control

Payments – Payment approvals

– Digital Signatures

Trading

Monitoring and Detection

Fraud Prevention

Page 6: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Spear Phishing

Very threatening to corporate treasury

Cybercriminals are specifically targeting…you

Attacks are quick and lethal; one mistake or exception from policy is all that it takes

Fraud Prevention

Page 7: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Spear Phishing

Attacks prey on weak passwords – the easiest entry point to hack a software solution and access data

Require combination of password controls: – Password timeouts, resets, history, alphanumeric requirements – Virtual Keypad – Dual-factor authentication (SMS, Token or Yubikey) – IP Filtering – VPN Tunnel

Must eliminate single point of failure

Fraud Prevention

Page 8: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Data Security

IT thinks treasury data is safer hosted externally

Cloud technology offers more safeguards than internal hosting – Encryption of data - in transit and at rest

– Hosting within audited certified data centers that feature 24/7 security, biometric access

– Separation of duties & other policy driven protections to restrict access to hosting infrastructure and client data

– Firewalls to protect externally and between tiers

Fraud Prevention

Page 9: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Report

SOC1 (SSAE16) SOC1 is the report; SSAE16 is the standard SSAE16 is AICPA’s ‘minimum standard’

SOC2 AICPA’s recommended report for cloud service providers due to standardized Trust Service Principles

Penetration Testing Most vendors outsource to specialists (McAfee, Qualys, etc.)

Fraud Prevention

Assessing Data Security - Audit Reporting

Most vendors offer a SOC1 Type II report

IT often requests a SOC2 Type I and/or Type II report

Must evaluate details of audit; there is no pass/fail

Page 10: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Control of Bank Accounts

As organizations expand/decentralize, easy to lose control of accounts, signatories…and management of funds

Need to establish:

1) Central repository – visibility into accounts, tracking of authorized signers, and one source for documentation

2) Structured workflows – mandate approval processes to ensure no ‘under the radar’ bank accounts or signatories

3) Reconciliation procedures – with the bank(s)

Fraud Prevention - BAM

Page 11: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Treasury Your banks

Payment Initiation

Payment Transmission

Fraud Prevention - Payments

Page 12: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Exposure Points: Must be protected

Each exposure point opportunity for cybercrime Exceptions to standardized process opportunity Good news: there are good ways to protect!

Treasury Your banks

Payment Initiation

Payment Transmission

Fraud Prevention - Payments

Page 13: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Separation of duties and application of limits are key; Ensure approvals align with dollar limits

Standardization of approval workflow across all banks and all payment types is important – e.g. mandate review of attached documentation

Treasury

Payment Initiation

Fraud Prevention - Payments

Page 14: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Payment files to bank must be encrypted (bank or banking network determines encryption methodology)

Acknowledgements/confirmations must be reviewed

Where available, apply digital signatures (e.g. SWIFT 3SKey) to authenticate exported payment files

Your banks

Payment Transmission

Fraud Prevention - Payments

Page 15: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Trading – settlement instructions

Standard settlement instructions (SSI) avoid redirection of funds to unauthorized accounts

– Payment template should be automatically attached to trade and require approval to edit/remove

– Even harder to audit disparate trading/payment workflows (e.g. initiate trade / walk paper down the hall / initiate payment)

Fraud Prevention - Trading

Page 16: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Trading – making the right trade

More of an enforcement, than prevention – Trade has already happened by the time it hits treasury system

Use of approvals and limits will help enforce the right behavior – Even if you shouldn’t have done it, you still have to approve it after

Also tracking multiple bids per trade is helpful to ensure right bid was selected – Also necessary for Dodd-Frank (for the exact same reason)

Fraud Prevention - Trading

Page 17: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Identifying Fraudulent Transactions

Review of audit trails will identify specific actions

Fraud Detection

Page 18: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Identifying Fraudulent Transactions

Daily monitoring of balances and transactions will find suspicious/fraudulent transactions:

– Daily bank reporting will proactively find suspicions transactions; especially via use of dashboards and automated reporting

– Daily cash positioning forces review of transaction variances

– Monthly accounting reconciliation offers same ability, but another checkpoint (and perhaps more centralized check)

Fraud Detection

Page 19: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Identifying Fraudulent Transactions

Separating GL Posting from GL Reconciliation

– Processes should be separated

– Same person that created journal entries should not be reconciling those entries

– Implementing both workflows in same system makes it easier to prove to auditors proper controls are in place

Fraud Detection

Page 20: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Central Monitoring

Payments to be transmitted to bank

Internal workflow changes (e.g. limits and approvals)

Bank Accounts & Signatories

Daily monitoring & reconciliation of all transactions

Fraud Detection

Page 21: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

© 2015 Kyriba Corp. All rights reserved. PROPRIETARY & CONFIDENTIAL.

Summary of opportunities to improve

Detection Prevention

Bank Account Reconciliation Sunset procedures

Application Security One-Time Password, IP Filtering

Daily Cash Reconciliation Reviewing daily bank transactions

Data Security Encryption, Penetration Testing, Audit

Certification

GL Reconciliation Monthly true-up of bank to ledger

Bank Account Management Opening/Closing, Signatories

Active Monitoring File, Task, and Transaction Monitoring,

Approval of workflow changes

Payments Approvals, Limits, Automation,

Authentication

Audit Trails Per transaction and system reporting

Financial Transactions Controls, Limits, Settlements

Page 22: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

22 © 2014 Kyriba Corporation. All rights reserved. PROPRIETARY & CONFIDENTIAL.

1) List and quantify risk exposures, to more easily assess impact and set priorities

2) Most underestimate likelihood of attack – so think in possibilities, not probabilities

3) Collaborate – and be an example to others

4) Look for quick wins

Tips to implement effective fraud management

Page 23: Leveraging technology to prevent fraud and cybercrime...Risk Management Planning 1) What is being protected •Financial Data and workflows 2) Categorize threats •Operational (e.g.

Bob Stark, Vice President, Strategy

Sep 16, 2015

Leveraging technology to prevent fraud and cybercrime