it general controls & the prevention of fraud ed tobias, cisa, cia, cfe may 11, 2011

57
IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

Upload: clinton-eaton

Post on 27-Dec-2015

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

IT GENERAL CONTROLS &

THE PREVENTION OF FRAUD

Ed Tobias, CISA, CIA, CFEMay 11, 2011

Page 2: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

AGEN

DA

What are IT General Controls?

5 Areas for Review

Case Study

Page 3: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

What are IT General Controls (ITGC)?

What is a “control”?•Process developed by management •Provides reasonable assurance:•Operations – effective & efficient•Reliable financial reporting•Compliance – laws & regulations

Page 4: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

What are IT General Controls (ITGC)?

•Used to manage risks“control someone’s behavior”

•Examples: •Policies & procedures •Approvals•Reconciliations •SoD (Segregation of Duties)

Page 5: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

What are IT General Controls (ITGC)?

What are IT General Controls (ITGC)?•Process developed by management •Provides reasonable assurance that:•Operations – effective & efficient•Reliable financial reporting•Compliance – laws & regulations

•Used to manage technology risks

Page 6: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

What are IT General Controls (ITGC)?

What’s the difference???

Page 7: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

What are IT General Controls (ITGC)?

•ITGC affect everything based on technology• Passwords• Program Changes / System updates• Roles / SoD• Backups / Recovery• 3rd-party providers

Page 8: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

What are IT General Controls (ITGC)?

•ITGC are part of the entire system of internal control

Page 9: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

What are IT General Controls (ITGC)?

3 main technology areas:1. System (servers)2. Network3. Applications

Page 10: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

What are IT General Controls (ITGC)?

•ITGC provide assurance that information systems are working as intended•Rely on the information •Legal / regulatory compliance•Effective / efficient operations

Page 11: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

What are IT General Controls (ITGC)?

Center for Internet Security•Applying ITGC consistently•Protects against 85%+ of top vulnerabilities reported by:•NIST•FBI•SANS Institute•Computer Security Institute

Page 12: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

What are IT General Controls (ITGC)?

Without effective ITGC, where is the fraud …• Financial statements schemes• Asset misappropriation schemes• Fraudulent disbursements• Theft of assets/inventory

• Bribery / Conflicts of interest

Page 13: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

What are IT General Controls (ITGC)?

Without effective ITGC, where is the fraud …• Theft of Intellectual Property • Financial Institution Fraud• Check & Credit Card Fraud• Insurance Fraud• Health Care Fraud• Securities Fraud

Page 14: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

What are IT General Controls (ITGC)?

Without effective ITGC, where is the fraud …• Consumer Fraud – Identity Theft• Computer / Internet Fraud• Public Sector Fraud

Page 15: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

What are IT General Controls (ITGC)?

Without effective ITGC, where is the fraud …

Almost everywhere since we use technology• Store information• Make decisions

Page 16: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

1. IT Entity-Level2. Change Management3. Information Security4. Backup and Recovery5. 3rd-party IT Providers

Page 17: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

Normally done by IT Auditors• Technology skills/background• Can be performed by• Operational/financial auditors• IT Security / Compliance

Page 18: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

Need to determine the “key information technology risks”• Framework (NIST, COBIT)• IT Management

Page 19: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

What 3-5 things keep them awake at night?

Page 20: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

1. IT Entity-Level• Need to understand IT

involvement

• Assess IT complexity• Low – COTS, 1 server, 1-15 users• High – ERP and/or customized,

4+ servers, 30+ users

Page 21: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

1. IT Entity-Level• Impact to the system?

• Mitigating controls?

Page 22: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

1. IT Entity-Level• Policies & procedures • Acceptable Use• Found in Employee Manual

Page 23: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

What about …• USB Thumb Drives

Your data has legs!

Page 24: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

What about …• Smartphones

Your data has legs!

Page 25: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

What about …• Rogue wireless access points

Your network is

OPEN!

Page 26: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

• Acceptable Use• Information Security

responsibilities

YOU are responsible for your company’s data!

Page 27: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

1. IT Entity-Level• Annual Technology Plan• Annual Budget• Prioritization of IT projects

Page 29: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

2. Change Management• Vendor does changes• Access always on?• Logging access times?• Review key reports

before/after changes?

Page 32: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

3. Information Security• Physical Security• Passwords• User IDs• Roles in the system• Administrators / Super Users• Logging• Encryption

Page 33: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

3. Information Security• Wireless Access

Page 34: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

3. Information Security• Physical Security

Page 35: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

3. Information Security• Password best practices (NIST)• Password length - 8• Complex passwords – 2/4• Upper / lower case• Numeric (0-9)• Special (!,@,#,$)

Page 36: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

3. Information Security• Password best practices (NIST)• Password history – 90 days• Suspended after 3 tries• Change initial password • Password history – 8

Page 37: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

3. Information Security• Password best practices (NIST)• Mitigating controls• No dictionary words• Regular training /

awareness

Page 38: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

3. Information Security• User IDs• No sharing• No generic IDs (i.e. Clerk1)• No default IDs/passwords• CIRT.net – 444 vendors,

1800+ passwords

Page 39: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

3. Information Security• Roles in the system• Simplify security

administration• Regularly reviewed?

Page 40: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

3. Information Security• Administrators / Super Users

“Keys to the Kingdom”

Page 41: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

3. Information Security• Administrators / Super Users• Limited number• Required for job duties• Audit trail / logging• Use only when necessary• Periodic review

Page 42: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

3. Information Security• Logging• Slows down system• Critical changes/info

• Protected from Admins• Regularly reviewed

Page 43: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

3. Information Security• Encryption• Data at rest

WHY? • Hacked• Internal theft• Backups are compromised

Page 44: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

3. Information Security• Encryption• Data in transit

WHY? • Packet sniffing - Wire theft• War driving

Page 45: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

3. Information Security• Wireless Access• Wireless Access Policy• Encryption • MAC Address filtering

Page 46: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

4. Backup and Recovery• Encrypted?• Limited access

Page 47: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

5. 3rd-party IT Providers

“Data in the Cloud”

Page 48: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

5. 3rd-party IT Providers• Outsource anything• Servers (Data Center)• Virtual Servers on demand• Applications• Virus scanning

Page 49: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

5. 3rd-party IT Providers• SAS70 • Replaced by SSAE16 Type 2• Effective June 15, 2011• Financial Reporting

Page 50: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

5 Areas for Review

5. 3rd-party IT Providers• SOC 2• Security• Availability• Processing integrity• Confidentiality• Privacy

• Risk-based control framework

Page 51: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

Case Study

Profiled in Nov/Dec 2010 and Jan/Feb 2011 issues Fraud mag.

• Deputy treasurer/controller issued $236,000 in checks through authorized maker scheme

• Detected through manual reconciliation & computer exception report

Page 52: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

Case Study

• $7,148 check cleared the bank but not an outstanding check

• Uncashed check of $7,148 to a vendor was found in his office

• Clerk noticed missing exception reports

• Looked at IT system changes for days w/missing reports

Page 53: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

Case Study

• Staff cuts left him as the authorized person for changes

• IT discovered 2 inactive, unauthorized program changes• $215,846• $13,930

Page 54: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

Case Study

What went wrong?

Page 55: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

Case Study

• Weak IT Entity-Level controls• Improper SoD• Poor change management

• Weak controls in payment dept

Page 56: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

Questions

Page 57: IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011

Contact Information

[email protected]

http://www.linkedin.com/in/ed3200