Richard Rose, CPA Chris Pembrook, MBA, CPA, CGAP, CFA 1.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

What you will get? Or what you like to know?
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
HIPAA Security.
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
29 Oded Moshe, VP Products & IT Official Release May 24, 2011 SysAid 8.0.
Passwords suck Nico Smit November “The million passwords dilemma:”  Just like having a million keys suck, so also having a million usernames and.
U N C L A S S I F I E D LA-UR LANL Exchange / Blackberry Deployment June 2, 2009 Anil Karmel Solutions Architect Network and Infrastructure Engineering.
1 Sarbanes-Oxley Section 404 June 29,  SOX 404 Background 3  SOX 404 Goals 4  SOX 404 Requirements 5  SOX 404 Assertions 6  SOX 404 Compliance.
1 Pertemuan 6 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
Getting Started in Blackboard. You will need… A web browser, preferably Internet Explorer, version 4.0 or higher An account and the knowledge of.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Sessions about to start – Get your rig on!. Ash de Zylva.
 Our solution  Our methodology  Zeta advantage  Case study – ›Oil & Gas digitization project.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
SHARESYNCPage 1 of 2 ShareSync is a business-grade file sync and share service Sync files across devices Share files and folders easily and securely Business-grade.
Your storage on the ground; Your files in the cloud.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Auditors: Why do they ask all those questions? LGC Resource April 2015 Penny Austin, Assistant Director – IS Local Government Audit.
MessageSync™ Exclusively By: TELETOUCH PAGING, LP A Critical Alerts System Company.
Fraud & Internal Control Frank M. Klaus, CPA. Fraud Definition  Fraud is the misappropriation of assets for the benefit of an individual.  “Willful.
IT:Network:Applications.  How messaging servers work  Initial tips for success Exchange management  Server roles  Exchange Server Management  Message.
ESCCO Data Security Training David Dixon September 2014.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
1 of6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Wireless Security: Protect yourself when you’re mobile.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
Auditing Information Systems (AIS)
Technology Overview Kim Davis Coordinator of Technology Support Services.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
SPH Information Security Update September 10, 2010.
IT Services Getting Started on your iPad Created by Michael Mackenzie.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
MICHAEL J MONROE. What is ? Collection of online services and software offered by Apple. Compatible with Mac OSX, Windows, iPhone, and iPod Touch. Released:
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
09:45-10:30 – Windows Mobile Update 10:30-11:30 – System Center Mobile Device Manager :30-11:45 - Break 11:45-12:30 -Deploying SCMDM and Customer.
Riva – Sync GoldMine to Exchange and Office 365 Server-side sync | No plug-ins required Neil Graham Riva Specialist Riva CRM Integration ext.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Encryption as a Preventive Countermeasure Sean Maher, Information Security Coordinator.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
A leap ahead... Darren Kearney Don Miller Ilya Pinchuk.
College of Pharmacy Leave System. How to login to the leave system Visit the website mpl/empli2.php
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Microsoft Virtual Academy Talbott Crowell | Chief Architect, ThirdM.com Rob Latino | Program Manager in Office 365 Support, Microsoft.
Mobile Device Security Management Leyna Belinsky.
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
INTERCEPTION APPLICATION
Information Security Seminar
Welcome To Outlook Support Number
About CodeTwo We are a trusted software vendor and Microsoft partner delivering Office 365 and Exchange solutions to over businesses all over the.
Staying Austin College
About CodeTwo We are a trusted software vendor and Microsoft partner delivering Office 365 and Exchange solutions to over businesses all over the.
اطار الرقابة الداخلية و فقا للجنة دعم المنظمات COSO
Cyber intelligence made easy.
Red Flags Rule An Introduction County College of Morris
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
Kent County Council Schools Bankline Presentation
Setting up and using secure and document transfer
12 STEPS TO A GDPR AWARE NETWORK
24/7/365 Remote Computer Support
6. Application Software Security
Presentation transcript:

Richard Rose, CPA Chris Pembrook, MBA, CPA, CGAP, CFA 1

 Were they Internal Auditors or External Auditors?  Was it just fraud related?  Was it just for a simple report? 2

WHY & How 3

4

 What is COSO? ◦ COSO (Committee of Sponsoring Organizations) of the Treadway Commission  American Accounting Association (AAA)  American Institute of Certified Public Accountants(AICPA)  Financial Executives International (FEI)  Institute of Management Accountants (IMA)  The Institute of Internal Auditors (IIA) 5

6

7

8

 Polices in place to safe guard information  Documentation and review of customization to software  Security features in place to prevent segregation of duties issues  Detail reports with time stamps to review data in date order  Random information that they will tie to other information to see what the results are 9

 Disaster recovery plan ◦ Has it been tested ◦ Who does what step incase communication is down  Password & policy  Termination policy  Mobile device policy ◦ What does it cover? PDAs ◦ Thumb drives ◦ Tablets ◦ Cell phones  Do you use Microsoft ActiveSync(EAS)? 10

 What changes have been made to the base software?  Who reviewed the changes before they were implemented?  Is there someone on your staff cross trained to understand the changes made?  Does anyone watch or review what consultants or software support changes?  Basically who is getting the rounding digit from Office Space? 11

 Who is to blame for improper access to software?  Do you have a transfer policy?  Do you have an annual review of software and folder access that a department supervisor checks?  Who knew THAT did that? 12

 Who runs custom reports for your system?  Approval report  Detail report that shows all access to an account and the detail of that account.  Access reports  Login reports 13

 Sick leave reports  How many cell phones are connected to exchange?  Who has not logged on in 6 weeks report?  Reports that will ask for a very specific item ◦ Can you run it? ◦ If not do you have something close ◦ May never know why they need it? 14

 EAS protocol concepts ◦ The protocol specification explains how devices and Exchange servers are supposed to talk to one another: which commands each can emit, which kinds of responses are legal for each command, and so on. ◦ Exchange implements EAS on the server side. Besides the code that actually sends and receives data using EAS, there's code that allows administrators to view and set EAS policies through the Exchange Management Console (EMC) and Exchange Management Shell (EMS), code for logging, and code for controlling which devices can connect and what they can do after connecting. 15

 Simple things ◦ , Calendar, Contact syncs ◦ Remote wipe ◦ Folder syncs  Useful things ◦ Require password ◦ Password Complexity ◦ Encryption ◦ Allow attachment downloads 16

Full Disclosure I am not saying you should use these. Just that they are there.  Disable Camera  Allow browser  Disable Bluetooth or Wi-Fi (windows and blackberry only)  Disable POP3/IMAP4 (windows and blackberry only)  Include past items(Days) 17

18