Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog October 31, 2016 Is your refrigerator running? Yes it is, and it’s flooding the Internet! The distributed denial of service (DDOS) attack on October 21 offered a new twist on an old trick that should cause us to pause and pay attention. DDOS attacks are nothing new. They became popular in the late 90s, when all of us security experts were busy trying to figure out how to combat them. At the time, the attackers were taking advantage of outdated and unpatched operating systems of home… Blog November 1, 2016 PCI DSS 3.2 Kicks In Today: Do You Know What the Changes Are? Version 3.2 of the Payment Card Industry Data Security Standard (PCI DSS 3.2), the information security standard that guides how entities process, hold and transmit cardholder data, comes into effect today, Nov. 1, 2016. In a post last month we discussed the details and implications of the new standard. Here, we want to point out one change of the new standard that has gone largely… Blog November 2, 2016 Compliance Insights Top News: Court Rules on RESPA Enforcement and CFPB Constitutionality In our most recent edition of Compliance Insights, we highlight the compelling news regarding the U.S. Court of Appeals for the District of Columbia Circuit’s ruling in favor of a large, non-bank mortgage servicer seeking relief from an order by the Consumer Financial Protection Bureau (CFPB) to pay more than $100 million in penalties related to the assessment of mortgage reinsurance… Blog November 7, 2016 Are Wireless Technologies the Answer for Cyber-Secure Offshore Asset Utilization and Operator Profitability? A review by Siemens finds that wireless communications are well suited for the often remote locations of oil and gas industry production facilities, both on- and offshore. Previously, satellites provided producers with communications sufficient for transmitting telemetry data, but that method often fell short in system automation controls, which are increasingly required today. Siemens’ analysis… Blog November 11, 2016 Digital Transformation, Data Governance, and Internal Audit Digital advances, such as big data analytics, mobility and smart connected devices are radically changing not just business processes, but entire operations. Companies across industries are racing to migrate analog approaches to customer interactions, products, services and operating models to an automated, always-on, real-time and information-rich marketplace. For internal audit, this means that… Blog November 15, 2016 Navigating Risk and Complexity by Integrating Contract and Supplier Management Most organizations spend between 30 and 70 percent of their revenues procuring third-party goods and services. This level of expenditure can present significant opportunities to drive operational performance, value and innovation if managed effectively – or it can pose a significant risk if left unmanaged. To realize the former, contracts that govern these transactions and the… Blog November 17, 2016 New Evaluation Tool Enables Boards to Assess and Improve Their Risk Oversight Prudent risk-taking is essential to the success of organizations seeking market opportunities and executing aggressive growth strategies. Boards of directors have a growing role in overseeing risk in the companies they govern. In fact, risk oversight is an integral part of a board’s responsibility to ensure the company’s risk profile is aligned with its strategy. Yet according to a NACD… Blog November 18, 2016 COSO Guide Seeks to Elevate and Evolve Fraud Risk Management Practices For many organizations, fraud risk management consists of checking boxes and thinking positive thoughts: “We hire good people.” “We have a code of conduct.” “We comply with Sarbanes-Oxley (SOX).” “Our hotline does not ring (for serious things).” “Fraud simply doesn’t happen here.” Of course, as forensic professionals, we know that this is not enough. So does the Committee of Sponsoring… Blog November 21, 2016 How Expensive Are Cybersecurity Attacks and Data Breaches? A Journal of Cybersecurity article earlier this year concluded that public concerns regarding the increasing rates of breaches and legal actions may be excessive compared to the relatively modest financial impact to firms that suffer these events. Based on a sample of more than 12,000 cyber events that include data breaches, security incidents, privacy violations and phishing crimes, the… Blog November 30, 2016 Compliance Insights Latest: The Future of Financial Regulation Still Unclear; Meanwhile, New Rules March On The recent election results weigh heavily on the minds of financial services professionals. All manner of questions have been raised regarding potential related regulatory impacts. Currently, there is ambiguity and speculation as to what changes are in store, when they will come, and the extent to which they will occur. What is certain is that change is inevitable, at least based upon what can be… Load More