SlideShare uma empresa Scribd logo
1 de 10
Computers : The fraudsters friend? CFDG IT Conference 2011 William Wilkinson 08 March 2011 Copyright © February 11 BDO LLP. All rights reserved.
Introduction Computers & Risks – “the fraudsters friend” Computers & Awareness – “the best defence” Questions CFDG IT Conference 2011 Page 2
They’re everywhere… In modern society, computers literally are almost everywhere In your office In your home In your car In your pocket… CFDG IT Conference 2011 Page 3
Fraudsters and other “E-criminals” Do you have sleepless nights or office headaches caused by: ,[object Object]
Phishing
Denial of Service
Blackmail
Sensitive & Intellectual Property Theft
Confidential data loss
FraudCFDG IT Conference 2011 Page 4

Mais conteúdo relacionado

Mais procurados

Our team _ ITG Holdings_Charles Lam
Our team _ ITG Holdings_Charles LamOur team _ ITG Holdings_Charles Lam
Our team _ ITG Holdings_Charles LamCharles Lam
 
Internet of Things in 10 slides
Internet of Things in 10 slides Internet of Things in 10 slides
Internet of Things in 10 slides Francisco Maroto
 
IT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data CenterIT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data CenterOleg Konovalov
 
Business uses for blockchain
Business uses for blockchainBusiness uses for blockchain
Business uses for blockchainAtkins
 
Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of riskMichel de Goede
 
Data sovereignty issues: a 15 minute debrief for not-for-profits
Data sovereignty issues: a 15 minute debrief for not-for-profitsData sovereignty issues: a 15 minute debrief for not-for-profits
Data sovereignty issues: a 15 minute debrief for not-for-profitsrgtechnologies
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...44CON
 
IoT Policy and Regulatory Framework
IoT Policy and Regulatory FrameworkIoT Policy and Regulatory Framework
IoT Policy and Regulatory FrameworkGwanhoo Lee
 
Cybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway CybersecurityCybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway CybersecurityVertex Holdings
 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Rick Huijbregts
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
 
Edge intelligence slide share
Edge intelligence slide shareEdge intelligence slide share
Edge intelligence slide shareBit Stew Systems
 
Best Blockchain Development Company - Blockchaindevelopments
Best Blockchain Development Company - BlockchaindevelopmentsBest Blockchain Development Company - Blockchaindevelopments
Best Blockchain Development Company - BlockchaindevelopmentsBlockchain Developments
 
Drones and logistics - What legal issues and how to handle them
Drones and logistics - What legal issues and how to handle themDrones and logistics - What legal issues and how to handle them
Drones and logistics - What legal issues and how to handle themGiulio Coraggio
 
Li.finance pitchdeck - no request
Li.finance   pitchdeck - no requestLi.finance   pitchdeck - no request
Li.finance pitchdeck - no requestPhilipp Zentner
 
5 IoT challenges to be faced in 2018- Infographic
5 IoT challenges to be faced in 2018- Infographic5 IoT challenges to be faced in 2018- Infographic
5 IoT challenges to be faced in 2018- InfographicTestingXperts
 

Mais procurados (20)

Our team _ ITG Holdings_Charles Lam
Our team _ ITG Holdings_Charles LamOur team _ ITG Holdings_Charles Lam
Our team _ ITG Holdings_Charles Lam
 
Internet of Things in 10 slides
Internet of Things in 10 slides Internet of Things in 10 slides
Internet of Things in 10 slides
 
IT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data CenterIT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data Center
 
Business uses for blockchain
Business uses for blockchainBusiness uses for blockchain
Business uses for blockchain
 
Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of risk
 
Data sovereignty issues: a 15 minute debrief for not-for-profits
Data sovereignty issues: a 15 minute debrief for not-for-profitsData sovereignty issues: a 15 minute debrief for not-for-profits
Data sovereignty issues: a 15 minute debrief for not-for-profits
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IoT Innovation Insights from Patents
IoT Innovation Insights from PatentsIoT Innovation Insights from Patents
IoT Innovation Insights from Patents
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 
IoT Policy and Regulatory Framework
IoT Policy and Regulatory FrameworkIoT Policy and Regulatory Framework
IoT Policy and Regulatory Framework
 
Introduction to IoT Architecture
Introduction to IoT ArchitectureIntroduction to IoT Architecture
Introduction to IoT Architecture
 
Cybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway CybersecurityCybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway Cybersecurity
 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
 
Edge intelligence slide share
Edge intelligence slide shareEdge intelligence slide share
Edge intelligence slide share
 
Lomma Kommun
Lomma Kommun Lomma Kommun
Lomma Kommun
 
Best Blockchain Development Company - Blockchaindevelopments
Best Blockchain Development Company - BlockchaindevelopmentsBest Blockchain Development Company - Blockchaindevelopments
Best Blockchain Development Company - Blockchaindevelopments
 
Drones and logistics - What legal issues and how to handle them
Drones and logistics - What legal issues and how to handle themDrones and logistics - What legal issues and how to handle them
Drones and logistics - What legal issues and how to handle them
 
Li.finance pitchdeck - no request
Li.finance   pitchdeck - no requestLi.finance   pitchdeck - no request
Li.finance pitchdeck - no request
 
5 IoT challenges to be faced in 2018- Infographic
5 IoT challenges to be faced in 2018- Infographic5 IoT challenges to be faced in 2018- Infographic
5 IoT challenges to be faced in 2018- Infographic
 

Destaque

4B Steps to CRM success
4B Steps to CRM success4B Steps to CRM success
4B Steps to CRM successCFG
 
The Startup's Quickstart Guide To: Albania
The Startup's Quickstart Guide To: AlbaniaThe Startup's Quickstart Guide To: Albania
The Startup's Quickstart Guide To: AlbaniaCool Blue Company, LLC
 
Keth.barbosa_catálogo_clearchannelclearview2005
Keth.barbosa_catálogo_clearchannelclearview2005Keth.barbosa_catálogo_clearchannelclearview2005
Keth.barbosa_catálogo_clearchannelclearview2005Keth Barbosa
 
Why Branded Mobile Apps fail?
Why Branded Mobile Apps fail?Why Branded Mobile Apps fail?
Why Branded Mobile Apps fail?Rachna Sharma
 
2B Maggie's Cloud Infrastructure
2B Maggie's Cloud Infrastructure2B Maggie's Cloud Infrastructure
2B Maggie's Cloud InfrastructureCFG
 
Cinco consejos sobre los libros de texto
Cinco consejos sobre los libros de textoCinco consejos sobre los libros de texto
Cinco consejos sobre los libros de textoIván Anero Terradillos
 
Understanding Strategy in Times of Austerity, Sally O'Neill, Royal Opera House
Understanding Strategy in Times of Austerity, Sally O'Neill, Royal Opera HouseUnderstanding Strategy in Times of Austerity, Sally O'Neill, Royal Opera House
Understanding Strategy in Times of Austerity, Sally O'Neill, Royal Opera HouseCFG
 
TimbaLabs Introduction
TimbaLabs IntroductionTimbaLabs Introduction
TimbaLabs IntroductionWouter Mertens
 
1B - Measuring your impact - Sue Holloway and Laura Blazey
1B - Measuring your impact - Sue Holloway and Laura Blazey1B - Measuring your impact - Sue Holloway and Laura Blazey
1B - Measuring your impact - Sue Holloway and Laura BlazeyCFG
 
3B - The importance of branding - Paul Breckell & Emma Harrison
3B - The importance of branding - Paul Breckell & Emma Harrison3B - The importance of branding - Paul Breckell & Emma Harrison
3B - The importance of branding - Paul Breckell & Emma HarrisonCFG
 
25 years & the future - Andrew Hind
25 years & the future - Andrew Hind25 years & the future - Andrew Hind
25 years & the future - Andrew HindCFG
 
1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...
1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...
1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...CFG
 
3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER
3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER
3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDERCFG
 
4B - Is the cloud safe - Ed Zedlewski
4B - Is the cloud safe - Ed Zedlewski4B - Is the cloud safe - Ed Zedlewski
4B - Is the cloud safe - Ed ZedlewskiCFG
 
Be Careful what you Wish for, Lucy Caldicott and Rachel Williams, CLIC Sargent
Be Careful what you Wish for, Lucy Caldicott and Rachel Williams, CLIC SargentBe Careful what you Wish for, Lucy Caldicott and Rachel Williams, CLIC Sargent
Be Careful what you Wish for, Lucy Caldicott and Rachel Williams, CLIC SargentCFG
 
The Startup's Quickstart Guide To: Angola
The Startup's Quickstart Guide To: AngolaThe Startup's Quickstart Guide To: Angola
The Startup's Quickstart Guide To: AngolaCool Blue Company, LLC
 

Destaque (20)

4B Steps to CRM success
4B Steps to CRM success4B Steps to CRM success
4B Steps to CRM success
 
The Startup's Quickstart Guide To: Albania
The Startup's Quickstart Guide To: AlbaniaThe Startup's Quickstart Guide To: Albania
The Startup's Quickstart Guide To: Albania
 
Keth.barbosa_catálogo_clearchannelclearview2005
Keth.barbosa_catálogo_clearchannelclearview2005Keth.barbosa_catálogo_clearchannelclearview2005
Keth.barbosa_catálogo_clearchannelclearview2005
 
Why Branded Mobile Apps fail?
Why Branded Mobile Apps fail?Why Branded Mobile Apps fail?
Why Branded Mobile Apps fail?
 
Presentazione
PresentazionePresentazione
Presentazione
 
El siete
El sieteEl siete
El siete
 
2B Maggie's Cloud Infrastructure
2B Maggie's Cloud Infrastructure2B Maggie's Cloud Infrastructure
2B Maggie's Cloud Infrastructure
 
Report ncj195171
Report ncj195171Report ncj195171
Report ncj195171
 
Cinco consejos sobre los libros de texto
Cinco consejos sobre los libros de textoCinco consejos sobre los libros de texto
Cinco consejos sobre los libros de texto
 
Understanding Strategy in Times of Austerity, Sally O'Neill, Royal Opera House
Understanding Strategy in Times of Austerity, Sally O'Neill, Royal Opera HouseUnderstanding Strategy in Times of Austerity, Sally O'Neill, Royal Opera House
Understanding Strategy in Times of Austerity, Sally O'Neill, Royal Opera House
 
TimbaLabs Introduction
TimbaLabs IntroductionTimbaLabs Introduction
TimbaLabs Introduction
 
1B - Measuring your impact - Sue Holloway and Laura Blazey
1B - Measuring your impact - Sue Holloway and Laura Blazey1B - Measuring your impact - Sue Holloway and Laura Blazey
1B - Measuring your impact - Sue Holloway and Laura Blazey
 
3B - The importance of branding - Paul Breckell & Emma Harrison
3B - The importance of branding - Paul Breckell & Emma Harrison3B - The importance of branding - Paul Breckell & Emma Harrison
3B - The importance of branding - Paul Breckell & Emma Harrison
 
25 years & the future - Andrew Hind
25 years & the future - Andrew Hind25 years & the future - Andrew Hind
25 years & the future - Andrew Hind
 
1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...
1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...
1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...
 
3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER
3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER
3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER
 
Educar a los hijos
Educar a los hijosEducar a los hijos
Educar a los hijos
 
4B - Is the cloud safe - Ed Zedlewski
4B - Is the cloud safe - Ed Zedlewski4B - Is the cloud safe - Ed Zedlewski
4B - Is the cloud safe - Ed Zedlewski
 
Be Careful what you Wish for, Lucy Caldicott and Rachel Williams, CLIC Sargent
Be Careful what you Wish for, Lucy Caldicott and Rachel Williams, CLIC SargentBe Careful what you Wish for, Lucy Caldicott and Rachel Williams, CLIC Sargent
Be Careful what you Wish for, Lucy Caldicott and Rachel Williams, CLIC Sargent
 
The Startup's Quickstart Guide To: Angola
The Startup's Quickstart Guide To: AngolaThe Startup's Quickstart Guide To: Angola
The Startup's Quickstart Guide To: Angola
 

Semelhante a 2A Computers: The fraudsters friend?

Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
Cybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile WorldCybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile WorldAhmed Abu Eldahab
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017Craig Devlin
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetHarry Gunns
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
The Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public SectorThe Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public SectorLapSafe Products
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetRichardus Indrajit
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdf1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdfdrputtanr
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of thingsChristian Milde
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problemsscoopnewsgroup
 
SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7Chin Wan Lim
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 

Semelhante a 2A Computers: The fraudsters friend? (20)

Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Cybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile WorldCybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile World
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
Szalai_Gemalto
Szalai_GemaltoSzalai_Gemalto
Szalai_Gemalto
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
The Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public SectorThe Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public Sector
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdf1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdf
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 

Mais de CFG

WORKSHOP 2 – CHANGE MANAGEMENT
WORKSHOP 2 – CHANGE MANAGEMENTWORKSHOP 2 – CHANGE MANAGEMENT
WORKSHOP 2 – CHANGE MANAGEMENTCFG
 
4D – PERFORMANCE AND REWARDS
4D – PERFORMANCE AND REWARDS4D – PERFORMANCE AND REWARDS
4D – PERFORMANCE AND REWARDSCFG
 
3C – PAYMENT BY RESULTS
3C – PAYMENT BY RESULTS3C – PAYMENT BY RESULTS
3C – PAYMENT BY RESULTSCFG
 
3B – GOVERNANCE DISCLOSURES: BEST PRACTICE
3B – GOVERNANCE DISCLOSURES: BEST PRACTICE3B – GOVERNANCE DISCLOSURES: BEST PRACTICE
3B – GOVERNANCE DISCLOSURES: BEST PRACTICECFG
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICECFG
 
WORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCE
WORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCEWORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCE
WORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCECFG
 
2C – SOCIAL INVESTMENT
2C – SOCIAL INVESTMENT2C – SOCIAL INVESTMENT
2C – SOCIAL INVESTMENTCFG
 
2B – ACCOUNTABILITY OF FINANCE PROFESSIONALS
2B –   ACCOUNTABILITY OF FINANCE PROFESSIONALS2B –   ACCOUNTABILITY OF FINANCE PROFESSIONALS
2B – ACCOUNTABILITY OF FINANCE PROFESSIONALSCFG
 
2A – AUTO ENROLMENT: LESSONS LEARNT
2A – AUTO ENROLMENT: LESSONS LEARNT2A – AUTO ENROLMENT: LESSONS LEARNT
2A – AUTO ENROLMENT: LESSONS LEARNTCFG
 
2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT
2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT
2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENTCFG
 
1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS
1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS
1B – DASH BOARDS, BALANCED SCORECARDS AND KPISCFG
 
1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOWCFG
 
1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOWCFG
 
Opening plenary – The future of the sector - Dan Corry
Opening plenary – The future of the sector - Dan CorryOpening plenary – The future of the sector - Dan Corry
Opening plenary – The future of the sector - Dan CorryCFG
 
Session 1B – Fraud - Collin Belcher
Session 1B – Fraud - Collin BelcherSession 1B – Fraud - Collin Belcher
Session 1B – Fraud - Collin BelcherCFG
 
2B - Business IT Investment Risks - Richard Moulds
2B - Business IT Investment Risks - Richard Moulds2B - Business IT Investment Risks - Richard Moulds
2B - Business IT Investment Risks - Richard MouldsCFG
 
4A - Working remotely - Richard Craig
4A - Working remotely - Richard Craig4A - Working remotely - Richard Craig
4A - Working remotely - Richard CraigCFG
 
3B - How to effectively engage users and managers in IT projects - Richard Co...
3B - How to effectively engage users and managers in IT projects - Richard Co...3B - How to effectively engage users and managers in IT projects - Richard Co...
3B - How to effectively engage users and managers in IT projects - Richard Co...CFG
 
1B - Outsourcing - Kevin Calder & Peter Wainman
1B - Outsourcing - Kevin Calder & Peter Wainman1B - Outsourcing - Kevin Calder & Peter Wainman
1B - Outsourcing - Kevin Calder & Peter WainmanCFG
 
1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...
1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...
1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...CFG
 

Mais de CFG (20)

WORKSHOP 2 – CHANGE MANAGEMENT
WORKSHOP 2 – CHANGE MANAGEMENTWORKSHOP 2 – CHANGE MANAGEMENT
WORKSHOP 2 – CHANGE MANAGEMENT
 
4D – PERFORMANCE AND REWARDS
4D – PERFORMANCE AND REWARDS4D – PERFORMANCE AND REWARDS
4D – PERFORMANCE AND REWARDS
 
3C – PAYMENT BY RESULTS
3C – PAYMENT BY RESULTS3C – PAYMENT BY RESULTS
3C – PAYMENT BY RESULTS
 
3B – GOVERNANCE DISCLOSURES: BEST PRACTICE
3B – GOVERNANCE DISCLOSURES: BEST PRACTICE3B – GOVERNANCE DISCLOSURES: BEST PRACTICE
3B – GOVERNANCE DISCLOSURES: BEST PRACTICE
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
 
WORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCE
WORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCEWORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCE
WORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCE
 
2C – SOCIAL INVESTMENT
2C – SOCIAL INVESTMENT2C – SOCIAL INVESTMENT
2C – SOCIAL INVESTMENT
 
2B – ACCOUNTABILITY OF FINANCE PROFESSIONALS
2B –   ACCOUNTABILITY OF FINANCE PROFESSIONALS2B –   ACCOUNTABILITY OF FINANCE PROFESSIONALS
2B – ACCOUNTABILITY OF FINANCE PROFESSIONALS
 
2A – AUTO ENROLMENT: LESSONS LEARNT
2A – AUTO ENROLMENT: LESSONS LEARNT2A – AUTO ENROLMENT: LESSONS LEARNT
2A – AUTO ENROLMENT: LESSONS LEARNT
 
2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT
2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT
2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT
 
1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS
1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS
1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS
 
1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
 
1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
 
Opening plenary – The future of the sector - Dan Corry
Opening plenary – The future of the sector - Dan CorryOpening plenary – The future of the sector - Dan Corry
Opening plenary – The future of the sector - Dan Corry
 
Session 1B – Fraud - Collin Belcher
Session 1B – Fraud - Collin BelcherSession 1B – Fraud - Collin Belcher
Session 1B – Fraud - Collin Belcher
 
2B - Business IT Investment Risks - Richard Moulds
2B - Business IT Investment Risks - Richard Moulds2B - Business IT Investment Risks - Richard Moulds
2B - Business IT Investment Risks - Richard Moulds
 
4A - Working remotely - Richard Craig
4A - Working remotely - Richard Craig4A - Working remotely - Richard Craig
4A - Working remotely - Richard Craig
 
3B - How to effectively engage users and managers in IT projects - Richard Co...
3B - How to effectively engage users and managers in IT projects - Richard Co...3B - How to effectively engage users and managers in IT projects - Richard Co...
3B - How to effectively engage users and managers in IT projects - Richard Co...
 
1B - Outsourcing - Kevin Calder & Peter Wainman
1B - Outsourcing - Kevin Calder & Peter Wainman1B - Outsourcing - Kevin Calder & Peter Wainman
1B - Outsourcing - Kevin Calder & Peter Wainman
 
1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...
1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...
1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...
 

2A Computers: The fraudsters friend?