Fraud costs businesses hundreds of millions of dollars each year. It affects livelihoods and is a common cause of corporate failure. It is the responsibility of the board of directors to prevent fraud by putting in places the appropriate controls and review procedures. This program shows you why Accounting Information System (AIS) Threats are ever increasing. The program focus is to cater the need for Fraud Risk Management. (FRM)
Control risks have also increased in the last few years because there are computers and servers everywhere,and information is available to an unprecedented number of workers.
Distributed computer networks make data available to many users and these networks are harder to control than centralized mainframe systems.
Wide area networks are giving customers and suppliers access to each other’s systems and data, making confidentiality a major concern.
1. FRAUD Risk Management & Computer Security Organized by:
Organized by:
Hotel Equatorial, Kuala Lumpur 24th and 25th June 2009
• CSI accredited 10 CPE points
A CSI CPE
• 1 year CSI Associate membership Competitive Advantage Assured
recognized
• Incorporating the CSI qualifying compulsory module on Fundamental of
pg
program
Computer Fraud
Fraud.
Fraud costs businesses hundreds of millions of dollars each year. It
FRM Audit Strategies for affects livelihoods and is a common cause of corporate failure. It is the
Detecting Fraud responsibility of the board of directors to prevent fraud by putting in
● Using personal profiling to detect places the appropriate controls and review procedures. This program
fraud by computer shows you why Accounting Information System (AIS) Threats are ever
increasing. The program focus is to cater the need for Fraud Risk
Management. (FRM)
g ( )
Computer Evidence
p
Control risks have also increased in the last few years because there are
Collection
computers and servers everywhere,and information is available to an
● The need for documentation ,
unprecedented number of workers.
types of fraud. Distributed computer networks make data available to many users and
these networks are harder to control than centralized mainframe
Skill sets for detecting AIS
systems.
Computer Fraud
Wide area networks are giving customers and suppliers access to each
other’s systems and data, making confidentiality a major concern.
y , g y j
FRM and Computer Fraud
The many GOOD reasons to attend this workshop
● Typical computer Forensics Field
● Historically, many organizations have not adequately protected
Kit
their data because Computer control problems are often
High Profile Computer underestimated and downplayed.
●
Fraud Control implications of moving from centralized, host-based
● How can it happen? computer systems to those of a networked system or Internet-
based system are not always f ll understood.
b d t tl fully d t d
Computer Evidence ● Companies have not realized that data is a strategic resource and
● An introduction to the
that data security must be a strategic requirement.
fundamentals
● Productivity and cost pressures may motivate management to
forego time-consuming control measures.
Tommy is someone that you would like to meet and to know. Straight talking, sincere kind, helpful
know talking sincere, kind
and without pretences, he is truly a man of strong conviction and blessed with many practical
talents. First and foremost, he is a World Class hands-on accountant He has worked as an
Accountant for some of the largest companies in the world. He is a tried and tested accountant
with a very firm grip on financial products. He is also trained in Access Data Digital Forensics tool
and a full Member of the Association of Computer Professionals. (U.K.) since 1980s. Because of
his grip on the subject matter, his services in providing technical training is much sought after by
numerous banks in the region, including Germany, Singapore, Malaysia, China, Indonesia,
Philippines and Taiwan. Tommy's other professional achievements would have been the objects
of envy for many of his peers. Some of the better known fact is that he is the only Singaporean
peers
that sits on the ACFE Board of Regents in Texas, USA. In the year 2006, his strategic management
skills were put to the test and his contribution was duly acknowledged when he was elected the
ACFE Board of Regents, Vice-Chairman. Based in Austin, Texas, ACFE is the best recognised and
largest Fraud Examination Body in the world. While in Singapore, he also help founded the CSI
World Headquarters, a Digital Forensics Certification body. To this day, he is the Chairperson
Emeritus for the CSI World Headquarters. His previous work experience includes systems based
Tommy Seah, Certified Fraud Examiner
World Class Financial Management auditing in an American International Bank, where he was the Senior Regional Auditor responsible
Expert. for the Bank's audit in the Asia Pacific region. He has also held the top executive position of Chief
Double Firsts in Financial Management
g of Internal Audit in a prime offshore bank where his audit duties cover the Singapore and Hong
and Accountancy (U.K.)
Kong operations of the bank. He covers all areas of the bank's audit of operations and IT systems.
Chartered Banker, International
He also has hands-on practical consulting work experience in many different global AAA financial
Accountant, FCPA (USA), CSOXP
institutions. He specialises in financial institutions AML system penetration testing.
Member of Advisory Board to SOX
Institute (N.Y.) Member, ACP (U.K.)
For registration and enquiries, please contact KH Eng : Email: kheng@fimastr.com Tel: 017-8886862 Fax: 03-79584868
Web: www. fimastr .com.
For Copy right of FIMA Strategic Resources. All Rights Reserve
2. Program Outline
Day One Day Two
VIDEO presentation – A Cyber Robbery
An examination on the current
(Firewall Extracts – 50 minutes)
Internal Control Model.
Recap on Day 1
What are the basic internal
control concepts, and why are
Cyber Crime as We Enter the Twenty-First Century
Fraud Risk Management is critical to
What Is Cyber Crime?
computer control and security
important?
How Does Today’s Cyber Crime Differ from the Hacker
Exploits of Yesterday?
The Trinity of Controls
The Reality of Information Warfare in the Corporate
Why Internal A dit
Wh I t l Auditors and Ri k M
d Risk Management
t
Environment
have in common when dealing with
Occupational fraud
Industrial Espionage — Hackers for Hire
What really is fraud ?
Public Law Enforcement’s Role in Cyber Crime
Investigations
Why is there a need for a new paradigm
in Fraud Risk Management?
The Role of Private Cyber Crime Investigators and Security
Consultants in Investigations
What are the major elements in
A FRM model ?
The 4 Steps in Fraud Risk Assessment to prevent Fraud
with Computers
What is the distinction between FRM and
Investigation ?
Short Demonstration video clip on Digital Forensics.
What events affect uncertainty,
The need to consider outsourcing an investigation that
and how can they be identified?
involves computers
Behavioral science can assist in
Where t seek help i th event of a suspected computer
Wh to k h l in the tf td t
mitigating the insider threat.
fraud.
What control activities are
How to proceed with an investigation that involves the use
commonly used in companies? of computers
How do organizations Q& A session
communicate information and
monitor control processes? Day 2 Close
Day 1 Close
Your Opportunity to..…
Partner with management to create an environment hostile to
WHO SHOULD ATTEND?
computer fraud.
● Fraud Investigators/Anti-Fraud Managers Build FRM fraud detection into routine audit activity.
● Legal & Compliance Managers Learn how to use control techniques to prevent computer
fraud.
● Risk Management & Audit Managers
Master approaches and techniques to conduct effective
● Internal Auditors investigations from discovery through dealing with law
enforcement.
● Financial Controllers
Understand practical approaches to preventing dishonest and
● Company Secretaries fraudulent activity.
● CIO’s, CEO’s, COO’s BONUS ! Place the ACSI initials after your name !
By attending this program, you are entitled to a ONE
● E-Banking, MIS Managers YEAR FREE Associate Membership of the
● Procurement Managers CSI World Headquarters.
● IT Auditors
Important Notice
Due to the interactive nature of the learning session, the sequence and contents of the program maybe vary according to the needs of the
participants. The speaker reserves the right and the privilege to conduct the program in the manner which he thinks to be in the best
interest of the majority of the participants. Please ensure that you understand this completely so as to prevent any form of unrealistic
expectation and or disappointment in a public enrolment program that was not tailored to your specific need. Please inform the
organizer in advance if you are not agreeable or do not completely understand the above term and we will deregister your
participation accordingly. ”
3. Registration Form (sales contract)
YES! I would like to register for: Fraud Risk Management & Computer Security
Price
Regular fee: RM 2888
Early bird fee: RM 2688 (Register before 8 May 2009)
Group Price: RM 2688 (3rd and subsequent registration receive 10% off the regular fee)
Disclaimer:
The registration does not include hotel accommodation.
Indemnity: Should for any reason outside the control of FIMA Strategic Resources, the venue or speakers change, or the event be
cancelled due to an act of terrorism, extreme weather conditions or industrial action, FIMA Strategic Resources shall endeavor to
reschedule but the client hereby indemnifies and holds FIMA Strategic Resources harmless from and against any and all costs,
damages and expenses, including attorneys fees, which are incurred by the client. The construction, validity and performance of this
Agreement shall be g
g governed in all respects by the laws of Malaysia to the exclusive j
p y y jurisdiction of whose Courts the Parties hereby
y
agree to submit.
Please complete this registration form and fax back to us on +603 - 79584868
Delegate Detail
DELEGATE 2
DELEGATE 1
Name
Name
______________________________________________________
_____________________________________________________
Job Title
Job Title
______________________________________________________
_____________________________________________________
Company Company
_____________________________________________________ ______________________________________________________
Address
Address
_____________________________________________________ ______________________________________________________
Email
Email
______________________________________________________
______________________________________________________
Phone
Phone
______________________________________________ ______________________________________________________
Authorization
Payment Options
Name
Cheque : Made payable to FIMA Strategic Resources
_____________________________________________________
Bank Transfer: FIMA Strategic Resources
RHB Bank Berhad
Designation
RHB Centre, Jalan Tun Razak
_____________________________________________________
50400 Kuala Lumpur
0 00 l
Signature Account number: 21412900218129
_________________________________________ Date / /
*I have read, understood, agree to the booking terms & Venue Hotel Equatorial, Kuala Lumpur
conditions in its entirely *
Our Address: 1802, 18th Floor, Campbell Complex, Jalan Dang
Wangi 50100 Kuala Lumpur
How to register
Please send your completed registration form details by Fax: +603 79584868
Booking Conditions IMPORTANT NOTICE :
Registration ill
Regist ation will be confi med upon receipt of your completed
confirmed pon eceipt o This program is designed for the basic computer
Registration Form user and information systems manager in
Once registration is confirmed, payment must be made within 1 mind, explaining the concepts needed to
week after receipt of invoice. read through the hype in the marketplace
If you are unable to attend the conference, a substitute delegate is and understand risks and how to deal with
welcome at no extra charge. Alternatively, your registration can be them.
credited to a future seminar within the next 6 month.
This is not intended to be a ``frequently asked
For cancellations received in writing more than 2 weeks prior to
questions'' reference, nor is it a ``hands-on''
the conference, a full refund less RM 100 admin charge will be
made. Regrettably, no refund can be made less than 2 weeks prior workshop describing how to accomplish
to the event and the amount will remain payable in full. A complete specific functionality.
set of the seminar documentation will be given. It is hoped that the audience will have a wider
All speakers and topics are correct at the time of printing, FIMA perspective on security in general, and better
Strategic Resources reserves the right to substitute speakers and understand how to reduce and manage risk
cancel or alter the content and timing of the program for reason
personally, at home, and in the workplace.
beyond its control.
The conditions are subject to change without prior notice.
For registration and enquiries, please contact KH Eng. Email: kheng@fimastr.com Tel: 017-8886862 Fax: 03-79584868
Web: www. fimastr.com. Copy right of FIMA Strategic Resources. All Rights Reserve