If you're a sitting or prospective board member of a corporation, how can you ensure that you and other directors are in compliance with Sarbanes-Oxley and other regulatory requirements? How can you maximize your contribution to the board and the company, and minimize your risk as a board member?
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss...
The rapid advance of technology has changed and influenced how we think about gathering digital
evidence. Soon after the attacks on the World Trade Center in New York City on September 11,
2001, many young men and women volunteered to serve their country in different ways. For those
who did not choose the military, options included...
Increased globalization of businesses, market pressure to improve operations, and rapidly changing business conditions are creating demand for technology-enabled auditing (TEA) to ensure timely ongoing assurance that controls are working effectively and that risk is properly...
Cut warranty costs by reducing fraud with transparent processes and balanced control
Warranty Fraud Management provides a clear, practical framework for reducing fraudulent warranty claims and other excess costs in warranty and service operations. Packed with actionable guidelines and detailed information, this book...
"Wide perspectives and best practices combined deliver a punch that will knock your 'SOX' off! The author has blended together a critical mix necessary for effectively handling the requirements of SOX." —Rob Nance, Publisher, AccountingWEB, Inc.
"Robust compliance and corporate governance is an absolute necessity...
Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...
The series ‘‘Springer Theses’’ brings together a selection of the very best Ph.D.
theses from around the world and across the physical sciences. Nominated and
endorsed by two recognized specialists, each published volume has been selected
for its scientific excellence and the high impact of its contents for...
Today, identity is more than anything, economic. The technology used to create, utilize and protect identities is increasingly ill-matched to the economics and uses of identities. Identity theft is the misuse of private authenticating information to steal money. Protecting identity requires privacy. Proving identity requires exposing information....
The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version...
Bankers are administrators of other people’s money, and they are responsible both to their depositors and to other stakeholders. Human nature being what it is, however, they sometimes fall prey to overweening ambition, coming to see themselves as the rightful beneficiaries of the moneys entrusted to them. This can...