Agenda

Day One : Wednesday, October 14, 2020

08:30 EDT

10 min

Welcome and Opening Remarks from the Chair

08:40 EDT

60 min
Jason Murray

Cyber Security Frameworks: Keystones and Building Up

Jason Murray, Director, Cyber Security Services, MNP LLP

  • What are the keystones of effective cyber security measures?
  • What should you focus on if you have limited resources?
  • Establishing an effective framework to detect threats before they cause damage
  • What are some cyber security threats you should be prepared for?
  • How do you build up from an already established framework?

10:40 EDT

20 min

Break

11:00 EDT

60 min
John Craig

The Role of Artificial Intelligence for Internal Controls

John Craig, Director, Government & Integration Partnerships, MindBridge AI

  • How can AI strengthen internal controls?
  • How can AI be used to combat the rise of phishing scams?
  • How AI is/will be used in practice
  • The use of AI in managing internal controls tasks such as the separation of roles and internal verification
  • AI’s role in managing large, unstructured data for internal controls

12:00 EDT

60 min

Break

14:00 EDT

60 min
Mark Scharf

Behavioral Analytics for Internal Controls

Mark Scharf, Behavioural Risk Management Advisor, Pinnacle Insights Inc.

  • Can behavioral analytics be applied as a form of internal controls?
  • Seeing the patterns in behavior that could signal weaknesses in information privacy
  • What kinds of behavior signal increased likeliness of fraud?
  • What are the signs of a compromised employee?
  • Looking at the human aspect of internal breaches

15:00 EDT

20 min

Break

16:20 EDT

End of Day One

Day Two : Thursday, October 15, 2020

08:30 EDT

10 min

Welcome and Opening Remarks from the Chair

09:40 EDT

60 min

Fraud Management Risk Guide

  • Key elements in the Response Protocols
  • Prevention and Detection tools
  • Pitfalls of poor Fraud policies or investigation processes
  • The need for root cause analysis to deal with volumes of investigations
  • Root Cause Analysis tied to Fraud Risk Assessments
  • End-to-end continuous review and improvement methodology to address the risk of fraud

10:40 EDT

20 min

Break

11:00 EDT

60 min
Richard LeBlanc
Keynote Address

Internal Controls and the Board of Directors

Richard LeBlanc, Professor of Governance, Law, and Ethics, York University

  • What role does the board of directors play in strengthening internal controls?
  • Why compliance begins with the board of directors
  • The importance of maintaining communication between management and the board
  • Effective collaboration down the chain of command
  • What kind of insight can the board of directors provide?

12:00 EDT

60 min

Break

13:00 EDT

90 min
Kristann Rose

Internal Controls Over Financial Management: Effective Systems and Best Practices

Cara Cosgrove, Director Financial Services, Department of National Defence

Kristann Rose, Owner/Director, KER Consulting Inc.

  • Updates on ICFM implementation after the Treasury Board changes
  • What really separates ICFM and ICFR?
  • What are best practices when it comes to implementing ICFM?
  • Practical lessons and experiences with ICFR and ICFM
  • How to monitor existing systems and signs of success

14:30 EDT

50 min
Darrell Mathews

Internal Audit Analytics: How Data Analytics Can Work For You

Darrell Mathews, Controller, City of Lethbridge

  • How does data analytics work to improve existing internal controls?
  • How do you begin to make the transition to incorporate internal audit analytics?
  • What are some potentially new functions you can do with this data?
  • Effective ways to discover previously difficult to find risks

15:20 EDT

20 min

Break

15:40 EDT

50 min

Managing E-Funds: Vetting Your Online Process to Comply with Regulations

  • Implementing proper internal controls for processing e-transfers and e-funds
  • How processing payments online differs for internal controls from traditional  banking
  • How can e-transfers and e-funds be riskier than traditional transactions?
  • The unique controls that exist for vetting online transactions

16:30 EDT

End of Day Two