Jesse Allison, President
In this issue:
IMA Benefit: Ethics Hotline
Join Us at the 2016 IMA Conference in Las Vegas
Connect with Us!
Do you have info to share with our chapter? Email it to email@example.com.
If you wish a colleague to receive these announcements, send an email to firstname.lastname@example.org and we will add them to our announcement list.
> 5:00 - 8:00
Reservation Deadline: Thursday, May 12th
Technical Session (5:00 - 6:00 pm)
After-Dinner Technical Session (7:00
- 8:00 pm)
IMA offers an Ethics Helpline service to members of IMA and other professionals. Contact the Helpline for free, confidential guidance on ethical issues.
After a preliminary discussion of the problem to determine the kind of ethics matter being reported, an ethics counselor will respond to the caller. Confidentiality is maintained at all times. The counselor will not provide a specific resolution but will explain how the dilemma relates to the provisions of IMA's Statement of Ethical Professional Practice.
To access the Helpline, please call: (800) 245-1383.
Join Us at the 2016 IMA Conference in Las Vegas from June 18-22
If any of the items below are on your "Things To Do For Me" list, now is the perfect time to register for IMA’s Annual Conference & Expo:
Take some “me” time and check these off your list at IMA’s Annual Conference & Expo.
As we gear up for IMA®’s Annual Conference & Expo (ACE), to be held on June 18-22, 2016, in Las Vegas, Nev., we’re featuring a series of Q&As with our keynote speakers. Following is an excerpted Q&A with Neal O’Farrell, executive director of The Identity Theft Council, who will deliver a talk titled “The Role You Can Play in Preventing Catastrophic Data Breaches” on Monday, June 20.
Q: In your documentary, In the Company of Thieves, it’s mentioned that simple mistakes by employees have undone the best of security intentions. What are some types of these mistakes and why do you think they happen?
A: Employees have always been targeted but as security technologies have improved and are able to detect or plug exploits faster, hackers are turning to more reliable methods. That means any kind of an attack based on tricking a user or employee into making a mistake that won’t be detected until it’s too late. Phishing, social engineering, ransomware, e-mail scams – hackers have an arsenal of attacks built around these techniques because they really do work.
Q: According to the documentary, about 700 million people are exposed to data breaches each year. How has technology played a part and what trends have you seen?
A: Data breaches are by far the biggest worry for so many organizations. Not just because they can be expensive, but they can drag on for months, even years, and they can tarnish reputations forever.
And they’re not going away any time soon. There’s just so much data, on so many devices, and often with inadequate protection, that hackers are just finding it way too easy. Because businesses are drowning in data, so are hackers.
Q: Can you share one of the most interesting tactics or the most intricate theft you’ve seen?
A: The most intricate theft or attack I’ve ever come across involved an entire family targeted by a hacker who seemed to have done as much research on the target as the NSA might on a potential spy.
After being a repeated victim of identity theft, the victim Googled her name, only to find that someone had assembled a detailed dossier on almost every member of her family and posted it online – pages and pages of highly detailed information that obviously had to be gleaned and hacked from multiple sources.
Every member of the family whose personal information was included in the postings eventually became a victim of identity theft. One family member was a victim more than 100 times and was arrested twice for crimes the thief committed. But that’s not the worst of it. After some investigating, we concluded that the culprit was probably a 12-year-old.
Q: With management accountants having instant access to sensitive financial information, how do you recommend communicating and enforcing a security message throughout the workplace to help minimize the risk of a data breach?
A: There are many harsh realities of cybersecurity and cybercrime that we all need to accept and embrace. One is that hackers go wherever the most valuable information is. Personal and corporate financial information is high on the list of targets because it can be of immense value.
And the second is that you can’t hide in the herd. There’s no “we’re too small to be noticed” any more. Hackers use very sophisticated automated tools to launch their attacks. Once they breach a defense – as simple as a busy employee clicking on the wrong thing – hackers can remain inside a network for months, undetected and stealing all kinds of sensitive information that can be used in all kinds of unpleasant ways.
Want to learn more? Join us in Las Vegas and see Neal O’Farrell in person! For full details about IMA’s Annual Conference & Expo, visit www.imaconference.org.
You will earn CMA and CPE credits when you attend any live webinar. Replay webinars are available in the archive but do not earn credits. Advance registration is recommended—IMA webinars are popular and fill up quickly.
Evolving Finance to Thrive in the Digital Economy
Uncovering the True Costs of Fleet Ownership
Coping with Change
2015-2016 tech sessions will occur as follows, alternating between n Skyland Pines and McCall’s, with hour long sessions beginning at 5:00 and 7:00 and dinner in between.
Cost for dinner is $30 regardless of the location. Please look for invite emails with registration information prior to each meeting.
• Social/Networking at 4:45 pm
• Pre-Dinner Technical Session at 5:00
• Dinner at 6:00 pm
• Post-Dinner Technical Session at 7:00 pm
More info: http://canton.imanet.org
The mission of the Institute of Management Accountants (IMA) is to provide a forum for research, practice development, education, knowledge sharing, and the advocacy of the highest ethical and best business practices in management accounting and finance. Please join us as we promote this mission in the greater Canton, Ohio, area.