SlideShare a Scribd company logo
1 of 3
Download to read offline
FRAUD Risk Management & Computer Security                                                                         Organized by:
                                                                                                                   Organized by:

  Hotel Equatorial, Kuala Lumpur 24th and 25th June 2009
                                 • CSI accredited 10 CPE points
  A CSI CPE
                                 • 1 year CSI Associate membership                                                Competitive Advantage Assured
 recognized
                                 • Incorporating the CSI qualifying compulsory module on Fundamental of
   pg
   program
                                 Computer Fraud
                                           Fraud.

                                                    Fraud costs businesses hundreds of millions of dollars each year. It
       FRM Audit Strategies for                     affects livelihoods and is a common cause of corporate failure. It is the
              Detecting Fraud                       responsibility of the board of directors to prevent fraud by putting in
   ● Using personal profiling to detect             places the appropriate controls and review procedures. This program
                  fraud by computer                 shows you why Accounting Information System (AIS) Threats are ever
                                                    increasing. The program focus is to cater the need for Fraud Risk
                                                    Management. (FRM)
                                                          g         (    )
               Computer Evidence
                  p
                                                    Control risks have also increased in the last few years because there are
                       Collection
                                                    computers and servers everywhere,and information is available to an
      ● The need for documentation ,
                                                    unprecedented number of workers.
                              types of fraud.       Distributed computer networks make data available to many users and
                                                    these networks are harder to control than centralized mainframe
     Skill sets for detecting AIS
                                                    systems.
                 Computer Fraud
                                                    Wide area networks are giving customers and suppliers access to each
                                                    other’s systems and data, making confidentiality a major concern.
                                                              y               ,     g               y      j
     FRM and Computer Fraud
                                                     The many GOOD reasons to attend this workshop
  ● Typical computer Forensics Field
                                                     ● Historically, many organizations have not adequately protected
                                 Kit
                                                           their data because Computer control                     problems are often
           High Profile Computer                           underestimated and downplayed.
                                                     ●
                           Fraud                           Control implications of moving from centralized, host-based
                  ● How can it happen?                     computer systems to those of a networked system or Internet-
                                                           based system are not always f ll understood.
                                                           b   d    t         tl       fully d t d
               Computer Evidence                     ●     Companies have not realized that data is a strategic resource and
                 ● An introduction to the
                                                           that data security must be a strategic requirement.
                           fundamentals
                                                     ●     Productivity and cost pressures may motivate management to
                                                           forego time-consuming control measures.



                                             Tommy is someone that you would like to meet and to know. Straight talking, sincere kind, helpful
                                                                                                       know           talking sincere, kind
                                             and without pretences, he is truly a man of strong conviction and blessed with many practical
                                             talents. First and foremost, he is a World Class hands-on accountant He has worked as an
                                             Accountant for some of the largest companies in the world. He is a tried and tested accountant
                                             with a very firm grip on financial products. He is also trained in Access Data Digital Forensics tool
                                             and a full Member of the Association of Computer Professionals. (U.K.) since 1980s. Because of
                                             his grip on the subject matter, his services in providing technical training is much sought after by
                                             numerous banks in the region, including Germany, Singapore, Malaysia, China, Indonesia,
                                             Philippines and Taiwan. Tommy's other professional achievements would have been the objects
                                             of envy for many of his peers. Some of the better known fact is that he is the only Singaporean
                                                                       peers
                                             that sits on the ACFE Board of Regents in Texas, USA. In the year 2006, his strategic management
                                             skills were put to the test and his contribution was duly acknowledged when he was elected the
                                             ACFE Board of Regents, Vice-Chairman. Based in Austin, Texas, ACFE is the best recognised and
                                             largest Fraud Examination Body in the world. While in Singapore, he also help founded the CSI
                                             World Headquarters, a Digital Forensics Certification body. To this day, he is the Chairperson
                                             Emeritus for the CSI World Headquarters. His previous work experience includes systems based
     Tommy Seah, Certified Fraud Examiner
     World Class Financial Management        auditing in an American International Bank, where he was the Senior Regional Auditor responsible
     Expert.                                 for the Bank's audit in the Asia Pacific region. He has also held the top executive position of Chief
     Double Firsts in Financial Management
                                     g       of Internal Audit in a prime offshore bank where his audit duties cover the Singapore and Hong
     and Accountancy (U.K.)
                                             Kong operations of the bank. He covers all areas of the bank's audit of operations and IT systems.
     Chartered Banker, International
                                             He also has hands-on practical consulting work experience in many different global AAA financial
     Accountant, FCPA (USA), CSOXP
                                             institutions. He specialises in financial institutions AML system penetration testing.
     Member of Advisory Board to SOX
     Institute (N.Y.) Member, ACP (U.K.)
For registration and enquiries, please contact KH Eng : Email: kheng@fimastr.com Tel: 017-8886862 Fax: 03-79584868
Web: www. fimastr .com.
    For                                                            Copy right of FIMA Strategic Resources. All Rights Reserve
Program Outline
        Day One                                                            Day Two

                                                                           VIDEO presentation – A Cyber Robbery
        An examination on the current
                                                                           (Firewall Extracts – 50 minutes)
        Internal Control Model.

                                                                           Recap on Day 1
        What are the basic internal
        control concepts, and why are
                                                                           Cyber Crime as We Enter the Twenty-First Century
        Fraud Risk Management is critical to
                                                                           What Is Cyber Crime?
        computer control and security
        important?
                                                                           How Does Today’s Cyber Crime Differ from the Hacker
                                                                                Exploits of Yesterday?
        The Trinity of Controls

                                                                           The Reality of Information Warfare in the Corporate
        Why Internal A dit
        Wh I t     l Auditors and Ri k M
                                d Risk Management
                                                t
                                                                           Environment
              have in common when dealing with
              Occupational fraud
                                                                           Industrial Espionage — Hackers for Hire
        What really is fraud ?
                                                                           Public Law Enforcement’s Role in Cyber Crime
                                                                                  Investigations
        Why is there a need for a new paradigm
        in Fraud Risk Management?
                                                                           The Role of Private Cyber Crime Investigators and Security
                                                                                 Consultants in Investigations
        What are the major elements in
        A FRM model ?
                                                                           The 4 Steps in Fraud Risk Assessment to prevent Fraud
                                                                           with Computers
        What is the distinction between FRM and
              Investigation ?
                                                                           Short Demonstration video clip on Digital Forensics.
        What events affect uncertainty,
                                                                           The need to consider outsourcing an investigation that
        and how can they be identified?
                                                                                 involves computers
        Behavioral science can assist in
                                                                           Where t seek help i th event of a suspected computer
                                                                           Wh    to    k h l in the   tf           td       t
        mitigating the insider threat.
                                                                                fraud.
        What control activities are
                                                                           How to proceed with an investigation that involves the use
        commonly used in companies?                                              of computers

        How do organizations                                               Q& A session
        communicate information and
        monitor control processes?                                         Day 2 Close

        Day 1 Close


                                                                           Your Opportunity to..…
                                                                           Partner with management to create an environment hostile to
   WHO SHOULD ATTEND?
                                                                                  computer fraud.
   ● Fraud Investigators/Anti-Fraud Managers                               Build FRM fraud detection into routine audit activity.
   ● Legal & Compliance Managers                                           Learn how to use control techniques to prevent computer
                                                                           fraud.
   ● Risk Management & Audit Managers
                                                                           Master approaches and techniques to conduct effective
   ● Internal Auditors                                                            investigations from discovery through dealing with law
                                                                                  enforcement.
   ● Financial Controllers
                                                                           Understand practical approaches to preventing dishonest and
   ● Company Secretaries                                                          fraudulent activity.
   ● CIO’s, CEO’s, COO’s                                                   BONUS ! Place the ACSI initials after your name !
                                                                           By attending this program, you are entitled to a ONE
   ● E-Banking, MIS Managers                                                      YEAR FREE Associate Membership of the
   ● Procurement Managers                                                          CSI World Headquarters.
   ● IT Auditors

Important Notice
Due to the interactive nature of the learning session, the sequence and contents of the program maybe vary according to the needs of the
       participants. The speaker reserves the right and the privilege to conduct the program in the manner which he thinks to be in the best
       interest of the majority of the participants. Please ensure that you understand this completely so as to prevent any form of unrealistic
       expectation and or disappointment in a public enrolment program that was not tailored to your specific need. Please inform the
       organizer in advance if you are not agreeable or do not completely understand the above term and we will deregister your
       participation accordingly. ”
Registration Form (sales contract)

     YES! I would like to register for: Fraud Risk Management & Computer Security

      Price

  Regular fee: RM 2888
  Early bird fee: RM 2688 (Register before 8 May 2009)
  Group Price: RM 2688 (3rd and subsequent registration receive 10% off the regular fee)

  Disclaimer:
  The registration does not include hotel accommodation.
  Indemnity:   Should for any reason outside the control of FIMA Strategic Resources, the venue or speakers change, or the event be
        cancelled due to an act of terrorism, extreme weather conditions or industrial action, FIMA Strategic Resources shall endeavor to
        reschedule but the client hereby indemnifies and holds FIMA Strategic Resources harmless from and against any and all costs,
        damages and expenses, including attorneys fees, which are incurred by the client. The construction, validity and performance of this
        Agreement shall be g
          g                 governed in all respects by the laws of Malaysia to the exclusive j
                                                p     y                 y                      jurisdiction of whose Courts the Parties hereby
                                                                                                                                             y
        agree to submit.

  Please complete this registration form and fax back to us on +603 - 79584868

  Delegate Detail

                                                                                 DELEGATE 2
  DELEGATE 1
                                                                                 Name
  Name
                                                                                 ______________________________________________________
  _____________________________________________________
                                                                                 Job Title
  Job Title
                                                                                 ______________________________________________________
  _____________________________________________________

  Company                                                                        Company
  _____________________________________________________                          ______________________________________________________
                                                                                 Address
  Address
  _____________________________________________________                          ______________________________________________________
                                                                                 Email
  Email
                                                                                 ______________________________________________________
  ______________________________________________________
                                                                                 Phone
  Phone
  ______________________________________________                                 ______________________________________________________
  Authorization
                                                                                  Payment Options
  Name
                                                                                  Cheque : Made payable to FIMA Strategic Resources
  _____________________________________________________
                                                                                  Bank Transfer: FIMA Strategic Resources
                                                                                                   RHB Bank Berhad
  Designation
                                                                                                   RHB Centre, Jalan Tun Razak
  _____________________________________________________
                                                                                                   50400 Kuala Lumpur
                                                                                                    0 00     l
  Signature                                                                                        Account number: 21412900218129
  _________________________________________ Date            /     /

  *I have read, understood, agree to the booking terms &                          Venue Hotel Equatorial, Kuala Lumpur
  conditions in its entirely *
                                                                                  Our Address: 1802, 18th Floor, Campbell Complex, Jalan Dang
                                                                                        Wangi 50100 Kuala Lumpur
  How to register
  Please send your completed registration form details by Fax: +603 79584868
  Booking Conditions                                                                         IMPORTANT NOTICE :
          Registration ill
          Regist ation will be confi med upon receipt of your completed
                               confirmed pon eceipt        o                                 This program is designed for the basic computer
          Registration Form                                                                          user and information systems manager in
          Once registration is confirmed, payment must be made within 1                              mind, explaining the concepts needed to
          week after receipt of invoice.                                                             read through the hype in the marketplace
          If you are unable to attend the conference, a substitute delegate is                       and understand risks and how to deal with
          welcome at no extra charge. Alternatively, your registration can be                        them.
          credited to a future seminar within the next 6 month.
                                                                                             This is not intended to be a ``frequently asked
           For cancellations received in writing more than 2 weeks prior to
                                                                                                     questions'' reference, nor is it a ``hands-on''
          the conference, a full refund less RM 100 admin charge will be
          made. Regrettably, no refund can be made less than 2 weeks prior                           workshop describing how to accomplish
          to the event and the amount will remain payable in full. A complete                        specific functionality.
          set of the seminar documentation will be given.                                    It is hoped that the audience will have a wider
          All speakers and topics are correct at the time of printing, FIMA                          perspective on security in general, and better
          Strategic Resources reserves the right to substitute speakers and                          understand how to reduce and manage risk
          cancel or alter the content and timing of the program for reason
                                                                                                     personally, at home, and in the workplace.
          beyond its control.
          The conditions are subject to change without prior notice.


For registration and enquiries, please contact KH Eng. Email: kheng@fimastr.com Tel: 017-8886862 Fax: 03-79584868
Web: www. fimastr.com.                        Copy right of FIMA Strategic Resources. All Rights Reserve

More Related Content

More from Tommy Seah

Criminal Psychology & Fraud Investigation
Criminal Psychology & Fraud InvestigationCriminal Psychology & Fraud Investigation
Criminal Psychology & Fraud InvestigationTommy Seah
 
Psychology of fraud 50 pages for comment by tommy seah number one fraud buster
Psychology of fraud 50 pages for comment by tommy seah number one fraud busterPsychology of fraud 50 pages for comment by tommy seah number one fraud buster
Psychology of fraud 50 pages for comment by tommy seah number one fraud busterTommy Seah
 
Effective Cash Management
Effective Cash ManagementEffective Cash Management
Effective Cash ManagementTommy Seah
 
Enterprise Fraud Risk Management
Enterprise Fraud Risk ManagementEnterprise Fraud Risk Management
Enterprise Fraud Risk ManagementTommy Seah
 
Improving and Implementing Internal Controls
Improving and Implementing Internal ControlsImproving and Implementing Internal Controls
Improving and Implementing Internal ControlsTommy Seah
 
Fraud Risk Management - Road Show in KL, Malaysia
Fraud Risk Management - Road Show in KL, MalaysiaFraud Risk Management - Road Show in KL, Malaysia
Fraud Risk Management - Road Show in KL, MalaysiaTommy Seah
 
CreAtiNG A whiStle-BlowiNG
CreAtiNG A whiStle-BlowiNGCreAtiNG A whiStle-BlowiNG
CreAtiNG A whiStle-BlowiNGTommy Seah
 
Understanding Procurement Fraud by Tommy Seah
Understanding Procurement Fraud by Tommy SeahUnderstanding Procurement Fraud by Tommy Seah
Understanding Procurement Fraud by Tommy SeahTommy Seah
 
Ethics and Integrity by Tommy Seah- A Value Added Audit on Environment
Ethics and Integrity by Tommy Seah- A Value Added Audit on EnvironmentEthics and Integrity by Tommy Seah- A Value Added Audit on Environment
Ethics and Integrity by Tommy Seah- A Value Added Audit on EnvironmentTommy Seah
 
Fraud Risk management
Fraud Risk managementFraud Risk management
Fraud Risk managementTommy Seah
 
Traditionally, the practice of risk management comprises acceptance, transfer...
Traditionally, the practice of risk management comprises acceptance, transfer...Traditionally, the practice of risk management comprises acceptance, transfer...
Traditionally, the practice of risk management comprises acceptance, transfer...Tommy Seah
 
FOREIGN EXCHANGE MANAGEMENT AUDIT - FOREX AUDIT by TOMMY SEAH
FOREIGN EXCHANGE MANAGEMENT AUDIT - FOREX AUDIT by TOMMY SEAHFOREIGN EXCHANGE MANAGEMENT AUDIT - FOREX AUDIT by TOMMY SEAH
FOREIGN EXCHANGE MANAGEMENT AUDIT - FOREX AUDIT by TOMMY SEAHTommy Seah
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAHTommy Seah
 
CSI 2009 Conference Brochure after early bird discount
CSI 2009 Conference Brochure after early bird discountCSI 2009 Conference Brochure after early bird discount
CSI 2009 Conference Brochure after early bird discountTommy Seah
 
Risk Based Audit Training by TOMMY SEAH
Risk Based Audit Training by TOMMY SEAHRisk Based Audit Training by TOMMY SEAH
Risk Based Audit Training by TOMMY SEAHTommy Seah
 
CSI Conference 2009
CSI Conference 2009CSI Conference 2009
CSI Conference 2009Tommy Seah
 
FRAUD RISK MANAGEMENT
FRAUD RISK MANAGEMENTFRAUD RISK MANAGEMENT
FRAUD RISK MANAGEMENTTommy Seah
 
TOMMY SEAH COMBATING CORPORATE FRAUD IN MALAYSIA
TOMMY SEAH COMBATING CORPORATE FRAUD IN MALAYSIATOMMY SEAH COMBATING CORPORATE FRAUD IN MALAYSIA
TOMMY SEAH COMBATING CORPORATE FRAUD IN MALAYSIATommy Seah
 
TOMMY SEAH combating Corporate Fraud
TOMMY SEAH combating Corporate FraudTOMMY SEAH combating Corporate Fraud
TOMMY SEAH combating Corporate FraudTommy Seah
 
Tommy Seah speaks on CORRUPTION and FRAUD PREVENTION in Malaysia
Tommy Seah speaks on CORRUPTION and FRAUD PREVENTION in MalaysiaTommy Seah speaks on CORRUPTION and FRAUD PREVENTION in Malaysia
Tommy Seah speaks on CORRUPTION and FRAUD PREVENTION in MalaysiaTommy Seah
 

More from Tommy Seah (20)

Criminal Psychology & Fraud Investigation
Criminal Psychology & Fraud InvestigationCriminal Psychology & Fraud Investigation
Criminal Psychology & Fraud Investigation
 
Psychology of fraud 50 pages for comment by tommy seah number one fraud buster
Psychology of fraud 50 pages for comment by tommy seah number one fraud busterPsychology of fraud 50 pages for comment by tommy seah number one fraud buster
Psychology of fraud 50 pages for comment by tommy seah number one fraud buster
 
Effective Cash Management
Effective Cash ManagementEffective Cash Management
Effective Cash Management
 
Enterprise Fraud Risk Management
Enterprise Fraud Risk ManagementEnterprise Fraud Risk Management
Enterprise Fraud Risk Management
 
Improving and Implementing Internal Controls
Improving and Implementing Internal ControlsImproving and Implementing Internal Controls
Improving and Implementing Internal Controls
 
Fraud Risk Management - Road Show in KL, Malaysia
Fraud Risk Management - Road Show in KL, MalaysiaFraud Risk Management - Road Show in KL, Malaysia
Fraud Risk Management - Road Show in KL, Malaysia
 
CreAtiNG A whiStle-BlowiNG
CreAtiNG A whiStle-BlowiNGCreAtiNG A whiStle-BlowiNG
CreAtiNG A whiStle-BlowiNG
 
Understanding Procurement Fraud by Tommy Seah
Understanding Procurement Fraud by Tommy SeahUnderstanding Procurement Fraud by Tommy Seah
Understanding Procurement Fraud by Tommy Seah
 
Ethics and Integrity by Tommy Seah- A Value Added Audit on Environment
Ethics and Integrity by Tommy Seah- A Value Added Audit on EnvironmentEthics and Integrity by Tommy Seah- A Value Added Audit on Environment
Ethics and Integrity by Tommy Seah- A Value Added Audit on Environment
 
Fraud Risk management
Fraud Risk managementFraud Risk management
Fraud Risk management
 
Traditionally, the practice of risk management comprises acceptance, transfer...
Traditionally, the practice of risk management comprises acceptance, transfer...Traditionally, the practice of risk management comprises acceptance, transfer...
Traditionally, the practice of risk management comprises acceptance, transfer...
 
FOREIGN EXCHANGE MANAGEMENT AUDIT - FOREX AUDIT by TOMMY SEAH
FOREIGN EXCHANGE MANAGEMENT AUDIT - FOREX AUDIT by TOMMY SEAHFOREIGN EXCHANGE MANAGEMENT AUDIT - FOREX AUDIT by TOMMY SEAH
FOREIGN EXCHANGE MANAGEMENT AUDIT - FOREX AUDIT by TOMMY SEAH
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAH
 
CSI 2009 Conference Brochure after early bird discount
CSI 2009 Conference Brochure after early bird discountCSI 2009 Conference Brochure after early bird discount
CSI 2009 Conference Brochure after early bird discount
 
Risk Based Audit Training by TOMMY SEAH
Risk Based Audit Training by TOMMY SEAHRisk Based Audit Training by TOMMY SEAH
Risk Based Audit Training by TOMMY SEAH
 
CSI Conference 2009
CSI Conference 2009CSI Conference 2009
CSI Conference 2009
 
FRAUD RISK MANAGEMENT
FRAUD RISK MANAGEMENTFRAUD RISK MANAGEMENT
FRAUD RISK MANAGEMENT
 
TOMMY SEAH COMBATING CORPORATE FRAUD IN MALAYSIA
TOMMY SEAH COMBATING CORPORATE FRAUD IN MALAYSIATOMMY SEAH COMBATING CORPORATE FRAUD IN MALAYSIA
TOMMY SEAH COMBATING CORPORATE FRAUD IN MALAYSIA
 
TOMMY SEAH combating Corporate Fraud
TOMMY SEAH combating Corporate FraudTOMMY SEAH combating Corporate Fraud
TOMMY SEAH combating Corporate Fraud
 
Tommy Seah speaks on CORRUPTION and FRAUD PREVENTION in Malaysia
Tommy Seah speaks on CORRUPTION and FRAUD PREVENTION in MalaysiaTommy Seah speaks on CORRUPTION and FRAUD PREVENTION in Malaysia
Tommy Seah speaks on CORRUPTION and FRAUD PREVENTION in Malaysia
 

Recently uploaded

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 

Recently uploaded (20)

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 

Fraud Risk Management and Computer Security

  • 1. FRAUD Risk Management & Computer Security Organized by: Organized by: Hotel Equatorial, Kuala Lumpur 24th and 25th June 2009 • CSI accredited 10 CPE points A CSI CPE • 1 year CSI Associate membership Competitive Advantage Assured recognized • Incorporating the CSI qualifying compulsory module on Fundamental of pg program Computer Fraud Fraud. Fraud costs businesses hundreds of millions of dollars each year. It FRM Audit Strategies for affects livelihoods and is a common cause of corporate failure. It is the Detecting Fraud responsibility of the board of directors to prevent fraud by putting in ● Using personal profiling to detect places the appropriate controls and review procedures. This program fraud by computer shows you why Accounting Information System (AIS) Threats are ever increasing. The program focus is to cater the need for Fraud Risk Management. (FRM) g ( ) Computer Evidence p Control risks have also increased in the last few years because there are Collection computers and servers everywhere,and information is available to an ● The need for documentation , unprecedented number of workers. types of fraud. Distributed computer networks make data available to many users and these networks are harder to control than centralized mainframe Skill sets for detecting AIS systems. Computer Fraud Wide area networks are giving customers and suppliers access to each other’s systems and data, making confidentiality a major concern. y , g y j FRM and Computer Fraud The many GOOD reasons to attend this workshop ● Typical computer Forensics Field ● Historically, many organizations have not adequately protected Kit their data because Computer control problems are often High Profile Computer underestimated and downplayed. ● Fraud Control implications of moving from centralized, host-based ● How can it happen? computer systems to those of a networked system or Internet- based system are not always f ll understood. b d t tl fully d t d Computer Evidence ● Companies have not realized that data is a strategic resource and ● An introduction to the that data security must be a strategic requirement. fundamentals ● Productivity and cost pressures may motivate management to forego time-consuming control measures. Tommy is someone that you would like to meet and to know. Straight talking, sincere kind, helpful know talking sincere, kind and without pretences, he is truly a man of strong conviction and blessed with many practical talents. First and foremost, he is a World Class hands-on accountant He has worked as an Accountant for some of the largest companies in the world. He is a tried and tested accountant with a very firm grip on financial products. He is also trained in Access Data Digital Forensics tool and a full Member of the Association of Computer Professionals. (U.K.) since 1980s. Because of his grip on the subject matter, his services in providing technical training is much sought after by numerous banks in the region, including Germany, Singapore, Malaysia, China, Indonesia, Philippines and Taiwan. Tommy's other professional achievements would have been the objects of envy for many of his peers. Some of the better known fact is that he is the only Singaporean peers that sits on the ACFE Board of Regents in Texas, USA. In the year 2006, his strategic management skills were put to the test and his contribution was duly acknowledged when he was elected the ACFE Board of Regents, Vice-Chairman. Based in Austin, Texas, ACFE is the best recognised and largest Fraud Examination Body in the world. While in Singapore, he also help founded the CSI World Headquarters, a Digital Forensics Certification body. To this day, he is the Chairperson Emeritus for the CSI World Headquarters. His previous work experience includes systems based Tommy Seah, Certified Fraud Examiner World Class Financial Management auditing in an American International Bank, where he was the Senior Regional Auditor responsible Expert. for the Bank's audit in the Asia Pacific region. He has also held the top executive position of Chief Double Firsts in Financial Management g of Internal Audit in a prime offshore bank where his audit duties cover the Singapore and Hong and Accountancy (U.K.) Kong operations of the bank. He covers all areas of the bank's audit of operations and IT systems. Chartered Banker, International He also has hands-on practical consulting work experience in many different global AAA financial Accountant, FCPA (USA), CSOXP institutions. He specialises in financial institutions AML system penetration testing. Member of Advisory Board to SOX Institute (N.Y.) Member, ACP (U.K.) For registration and enquiries, please contact KH Eng : Email: kheng@fimastr.com Tel: 017-8886862 Fax: 03-79584868 Web: www. fimastr .com. For Copy right of FIMA Strategic Resources. All Rights Reserve
  • 2. Program Outline Day One Day Two VIDEO presentation – A Cyber Robbery An examination on the current (Firewall Extracts – 50 minutes) Internal Control Model. Recap on Day 1 What are the basic internal control concepts, and why are Cyber Crime as We Enter the Twenty-First Century Fraud Risk Management is critical to What Is Cyber Crime? computer control and security important? How Does Today’s Cyber Crime Differ from the Hacker Exploits of Yesterday? The Trinity of Controls The Reality of Information Warfare in the Corporate Why Internal A dit Wh I t l Auditors and Ri k M d Risk Management t Environment have in common when dealing with Occupational fraud Industrial Espionage — Hackers for Hire What really is fraud ? Public Law Enforcement’s Role in Cyber Crime Investigations Why is there a need for a new paradigm in Fraud Risk Management? The Role of Private Cyber Crime Investigators and Security Consultants in Investigations What are the major elements in A FRM model ? The 4 Steps in Fraud Risk Assessment to prevent Fraud with Computers What is the distinction between FRM and Investigation ? Short Demonstration video clip on Digital Forensics. What events affect uncertainty, The need to consider outsourcing an investigation that and how can they be identified? involves computers Behavioral science can assist in Where t seek help i th event of a suspected computer Wh to k h l in the tf td t mitigating the insider threat. fraud. What control activities are How to proceed with an investigation that involves the use commonly used in companies? of computers How do organizations Q& A session communicate information and monitor control processes? Day 2 Close Day 1 Close Your Opportunity to..… Partner with management to create an environment hostile to WHO SHOULD ATTEND? computer fraud. ● Fraud Investigators/Anti-Fraud Managers Build FRM fraud detection into routine audit activity. ● Legal & Compliance Managers Learn how to use control techniques to prevent computer fraud. ● Risk Management & Audit Managers Master approaches and techniques to conduct effective ● Internal Auditors investigations from discovery through dealing with law enforcement. ● Financial Controllers Understand practical approaches to preventing dishonest and ● Company Secretaries fraudulent activity. ● CIO’s, CEO’s, COO’s BONUS ! Place the ACSI initials after your name ! By attending this program, you are entitled to a ONE ● E-Banking, MIS Managers YEAR FREE Associate Membership of the ● Procurement Managers CSI World Headquarters. ● IT Auditors Important Notice Due to the interactive nature of the learning session, the sequence and contents of the program maybe vary according to the needs of the participants. The speaker reserves the right and the privilege to conduct the program in the manner which he thinks to be in the best interest of the majority of the participants. Please ensure that you understand this completely so as to prevent any form of unrealistic expectation and or disappointment in a public enrolment program that was not tailored to your specific need. Please inform the organizer in advance if you are not agreeable or do not completely understand the above term and we will deregister your participation accordingly. ”
  • 3. Registration Form (sales contract) YES! I would like to register for: Fraud Risk Management & Computer Security Price Regular fee: RM 2888 Early bird fee: RM 2688 (Register before 8 May 2009) Group Price: RM 2688 (3rd and subsequent registration receive 10% off the regular fee) Disclaimer: The registration does not include hotel accommodation. Indemnity: Should for any reason outside the control of FIMA Strategic Resources, the venue or speakers change, or the event be cancelled due to an act of terrorism, extreme weather conditions or industrial action, FIMA Strategic Resources shall endeavor to reschedule but the client hereby indemnifies and holds FIMA Strategic Resources harmless from and against any and all costs, damages and expenses, including attorneys fees, which are incurred by the client. The construction, validity and performance of this Agreement shall be g g governed in all respects by the laws of Malaysia to the exclusive j p y y jurisdiction of whose Courts the Parties hereby y agree to submit. Please complete this registration form and fax back to us on +603 - 79584868 Delegate Detail DELEGATE 2 DELEGATE 1 Name Name ______________________________________________________ _____________________________________________________ Job Title Job Title ______________________________________________________ _____________________________________________________ Company Company _____________________________________________________ ______________________________________________________ Address Address _____________________________________________________ ______________________________________________________ Email Email ______________________________________________________ ______________________________________________________ Phone Phone ______________________________________________ ______________________________________________________ Authorization Payment Options Name Cheque : Made payable to FIMA Strategic Resources _____________________________________________________ Bank Transfer: FIMA Strategic Resources RHB Bank Berhad Designation RHB Centre, Jalan Tun Razak _____________________________________________________ 50400 Kuala Lumpur 0 00 l Signature Account number: 21412900218129 _________________________________________ Date / / *I have read, understood, agree to the booking terms & Venue Hotel Equatorial, Kuala Lumpur conditions in its entirely * Our Address: 1802, 18th Floor, Campbell Complex, Jalan Dang Wangi 50100 Kuala Lumpur How to register Please send your completed registration form details by Fax: +603 79584868 Booking Conditions IMPORTANT NOTICE : Registration ill Regist ation will be confi med upon receipt of your completed confirmed pon eceipt o This program is designed for the basic computer Registration Form user and information systems manager in Once registration is confirmed, payment must be made within 1 mind, explaining the concepts needed to week after receipt of invoice. read through the hype in the marketplace If you are unable to attend the conference, a substitute delegate is and understand risks and how to deal with welcome at no extra charge. Alternatively, your registration can be them. credited to a future seminar within the next 6 month. This is not intended to be a ``frequently asked For cancellations received in writing more than 2 weeks prior to questions'' reference, nor is it a ``hands-on'' the conference, a full refund less RM 100 admin charge will be made. Regrettably, no refund can be made less than 2 weeks prior workshop describing how to accomplish to the event and the amount will remain payable in full. A complete specific functionality. set of the seminar documentation will be given. It is hoped that the audience will have a wider All speakers and topics are correct at the time of printing, FIMA perspective on security in general, and better Strategic Resources reserves the right to substitute speakers and understand how to reduce and manage risk cancel or alter the content and timing of the program for reason personally, at home, and in the workplace. beyond its control. The conditions are subject to change without prior notice. For registration and enquiries, please contact KH Eng. Email: kheng@fimastr.com Tel: 017-8886862 Fax: 03-79584868 Web: www. fimastr.com. Copy right of FIMA Strategic Resources. All Rights Reserve