This document is a resume for Timothy S. Dunham summarizing his experience and qualifications for a manager position. It details his education background including a Bachelor's degree in Computer Science and an MBA. It also outlines his work history at Verizon Wireless in various analyst, manager, and supervisor roles over 10 years spanning departments like Corporate Security, Finance, Audit, and Treasury Operations. His responsibilities and accomplishments in each role demonstrate experience in areas like analytics, investigations, risk management, and systems administration.
Third Party Risk Assessment Due Diligence - Managed Service as Best PracticeDVV Solutions Third Party Risk ManagementLooking at the Third Party Risk Assessment Lifecycle and where opportunities lay for improved efficiencies and scalability from the adoption of Managed Service offerings. What benefits can a Managed Service offering deliver to your Third Party risk Management program and process execution? Presented by Sean O'Brien, Director, DVV Solutions.
Data analytics 2 analytics in the audit slides Jim Kaplan CIA CFEThis document provides an overview of data analytics and computer-assisted audit techniques (CAATs) for internal auditors. It discusses conducting the audit process, including planning, determining objectives, obtaining and verifying information from IT systems and databases. It also covers using CAATs for data analysis, test techniques, and audit procedures. The document describes challenges for auditors in obtaining data access, defining metrics, and minimizing system impact. Finally, it discusses various CAAT types and their usage, including sampling, parallel simulation, and snapshot techniques.
The Next Generation of Submission Intake and ClearanceGuidewire Software (formerly FirstBest Systems, Inc.)Manual submission intake is outdated and inefficient. Technology -driven workflow is the modern approach. Here's how to use it.
Acfe bangalore pdm 2 fraud risk - parag deodharParag DeodharThe document discusses fraud risks in the general insurance industry in India. It provides an overview of the industry, noting its concentration among the top players and competitive pressures. It then outlines various internal fraud risks like embezzlement and inappropriate financial reporting. External fraud risks discussed include fraudulent claims, investment scams, and data breaches. Several case studies of insurance fraud schemes in India are also presented, such as "crash for cash" auto insurance scams.
Artificial Intelligence PrimerImam HoqueLooks at the different AI approaches and provides some practical categorisation and case studies. Then talks about the data fabric you need to put in place to improve model accuracy and deployment. Covers: supervised, unsupervised, machine learning, deep learning, RPA, etc. Finishes with how to create successful AI projects.
Third Party Risk ManagementEC-Council Here is a brief description of third-party risk management (TPRM), how to onboard third-party vendors, and what the role of a CISO is in this process. To know more about TPRM and information security management, click here: https://www.eccouncil.org/information-security-management/
managed-services-buying-guideMarie PetersThis document provides guidance on selecting a managed security services partner to assist with application security testing and risk management. It outlines several important questions to ask potential partners, such as how they test for vulnerabilities, what their pricing structure is, how predictable the budget will be, how they help determine priorities, who will be on the account team, and what types of assessment tools they use. The goal is to find a partner with deep expertise in application security who can provide proactive testing and remediation guidance to help lower security risks before attacks occur.
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk ManagementDevOps.comThe document discusses the threats of cyberterrorism and the importance of third-party risk management. It provides examples of recent cyberattacks attributed to state actors. It then outlines best practices for managing third-party vendor access, including identifying vendors, controlling their access, and auditing their connections. The presentation concludes by introducing SecureLink's Vendor Privileged Access Management (VPAM) solution for securing remote access of third-party vendors.
Standards in Third Party Risk - DVV Solutions ISACA North May 19 DVV Solutions Third Party Risk ManagementThis document discusses third party risk management (TPRM) in the UK. It notes several data breaches involving third parties that exposed personal and payment card data. It advocates for establishing formal TPRM frameworks aligned with enterprise risk management. It promotes standardizing TPRM processes using tools from the Shared Assessments program to increase efficiency and allow assessments to be shared. It also notes increasing regulatory pressure around operational resilience and the need for senior management oversight of outsourced activities.
It62015 slidesJim Kaplan CIA CFEThe IT Auditing Series is a series of 10 2-hour webinars.
The study program consists of 5 modules Basic and 5 modules Advanced spanning a broad range of topics and issues in the IT Auditing field. The emphasis in all webinars is therefore on practical aspects, of Internal Auditing.
The course content is based upon ISACA Framework which has been accepted world-wide as the basis of skills and competencies required for all IT Auditors.
This session covers risk analysis for auditors
KRI Consulting Solutions LLCkrh96011KRI Consulting Solutions LLC provides vendor and contract management services to help organizations minimize unidentified risk exposure from third party vendors. Their services include vendor selection and evaluation, contract negotiation, post-award administration, and risk analysis of existing contracts. KRI partners with clients to understand the scope of vendor services and ascertain the level of risk associated with each vendor. They then implement an oversight plan involving risk assessments and controls to provide risk awareness and reduce operational expenses for clients.
Top 8 Ways to Improve Underwriting WorkflowGuidewire Software (formerly FirstBest Systems, Inc.)8 expert tips for creating maximum efficiency in your underwriting workflow. Keep your underwriters focused on what they do best - evaluating risk and writing business.
Internal AuditNigel RobinsonThe document discusses the threat of internal threats to organizations from employees. It notes that while organizations spend significant resources protecting against external threats, many do not adequately protect against internal threats. Examples are given of data breaches and theft caused by employees. The document then describes Capgemini's Internal Audit Solution, which collects and analyzes data from various systems to identify anomalous employee behavior and proactively detect potential internal threats. It provides an overview of how the solution works and the continuous process of monitoring technical policies and analyzing behavioral patterns.
How to Evaluate a Managed Services FirmoneneckitservicesNo “one size fits all” managed services solution will ever be ideal for every business. When evaluating prospective providers, consider important services such as monitoring, reporting, backup, remote management and security. Also consider key provider qualifications including location, third-party certifications, customer references, in-house staffing resources and contract items. After outsourcing, you should see immediate results in cost controls and service delivery.
Information Security Risk ManagementNikhil SoniPresentation on Information Security Risk Management for Secure Software System Mtech Information Security.
Ten Ways to Improve Specialty Lines UnderwritingGuidewire Software (formerly FirstBest Systems, Inc.)Specialty insurance is, well special, because each risk can be unique and complex. So is it really possible to improve specialty lines underwriting? The answer is a resounding yes!
In this eBook, we’ll share best practices and lessons learned in improving specialty lines underwriting.
You’ll learn how you can use underwriting risk management systems to:
Improve underwriting profitability
Seize new market opportunities
Provide world-class broker service
View and download the complimentary survey results.
The challenges for the internal auditorRodoljub KajganićThe document outlines the challenges and responsibilities of an internal auditor. It discusses how to be a successful internal auditor through lifelong learning and balancing controls with business needs. It then covers specific topics like compliance, information system audits, and fraud investigations. For compliance, it emphasizes the importance of policies, procedures, and monitoring. For information system audits, it discusses audit types, controls, and procedures. It provides a case study example of auditing an IT project by checking plans, requirements documentation, and change procedures.
Setting Up and Managing an Anonymous Fraud HotlineFraudBustersWebinar series from FraudResourceNet LLC on Preventing and Detecting Fraud in a High Crime Climate. Recordings of these Webinars are available for purchase from our Website fraudresourcenet.com
This Webinar focused on the subject in the title
FraudResourceNet (FRN) is the only searchable portal of practical, expert fraud prevention, detection and audit information on the Web.
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
Commercial Insurance Underwriting Business Process As Is Current State Diagra...Theresa LeopoldThe commercial underwriting process at an insurance company is highly manual and inefficient. Underwriters spend much of their time on non-core tasks due to outdated systems, incomplete data intake, and disorganized workflows. Key challenges include distracting manual processes, lack of data-driven risk management capabilities, and producer engagement issues due to unstructured communication methods. The underwriting cycle lacks consistency and relies heavily on paper files, multiple data re-entry steps, and subjective underwriter decisions. There is an opportunity to modernize systems and processes to allow underwriters to focus more on strategic tasks and decision-making.
Third Party Risk Management IntroductionNaveen GroverOn October 30, 2013 the Office of the Comptroller of the Currency (OCC) issued updated guidance on third-party risks and vendor management. The OCC's bulletin points out that its updated guidance replaces OCC Bulletin 2001-47, "Third-Party Relationships: Risk Management Principles," and OCC Advisory Letter 2000-9, "Third-Party Risk."
Third-Party Risk Management: Implementing a StrategyNICSATwo Part Series: Part I of II
Third-Party Risk Management: Implementing a Strategy
Sleep Better at Night: Learn techniques to manage risks associated with third-party relationships.
Data Analytics 3 Analytics Techniques Jim Kaplan CIA CFESince the spread of IT systems has made it a pre-requisite that auditors as well as management have the ability to examine high volumes of data and transaction in order to determine patterns and trends. In addition, the increasing need to continuously monitor and audit IT systems has created an imperative for the effective use of appropriate data mining tools.
While a variety of powerful tools are readily available today, the skills required to utilize such tools are not. Not only must the correct testing techniques be selected but the effective interpretation of outcomes presented by the software is essential in the drawing of appropriate conclusions based on the data analysis. This 6 webinar series, based on Richard Cascarino’s book “Data Analytics for Internal Auditors” covers these skills and techniques.
Webinar 3 Analytics Techniques
Conducting the Audit
Obtaining Information from IT Systems for Analysis
Use of Computer Assisted Audit Techniques
Analysis of Big Data
Results Analysis and Validation
Fraud Detection using Data Analysis
Root Cause Analysis
20150311 auditnet ap_procure_excel_rlv2Jim Kaplan CIA CFEDuplicate payments, duplicate vendors, and segregation of duties in accounts payable are still the top tests being run by auditors using analytics. They are simple, effective, and save money which always helps the business case for analytics. Further, vendor and related payments fraud is the #1 fraud (in volume) affecting all organizations – big and small, public and private, regardless of the industry and sector. Excel templates will be provided with admission to assist to complete all testing and visualizations using graphs. Further data request letters and analytic audit programs will be provided to “jump start” your audit efforts in the accounts payable and vendor management areas.
Specific learning objectives include:
o Run over 20….key, proactive error and fraud tests in the areas of the accounts payable, vendor masterfiles, and purchase order files, all in Excel.
o Map the report results to an audit program to produce an analytically-enabled audit program.
o Discover the top frauds and corruption schemes along with top cost efficiencies to enact within accounts payable reviews.
o Distinguish between the top major accounting systems used when extracting accounts payable and vendor masterfile data and obtain a standard data request to aid the extractions
o Complete a multiple perspective visualization review of your accounts payable data including time based, amount based, company/profit center based, enterer, etc.
These are the slides. If you would like the associated data files they are available for download after payment. Videos of these sessions are available for free.
Details contact Rich Lanza (rich@richlanza.com)
4 common headaches with sales compensation managementIBM AnalyticsGain insights and solutions to four highly common headaches that companies face in their sales performance management processes. Learn more: http://ibm.com/spm
Data Analytics for Auditors Analysis and MonitoringJim Kaplan CIA CFE1) The document discusses continuous monitoring and auditing techniques using data analytics. It provides definitions and examples of continuous monitoring, auditing, and assurance.
2) Continuous monitoring involves ongoing management oversight of controls while continuous auditing involves independent testing by internal auditors. The relationship between the two is also discussed.
3) Implementing continuous monitoring and auditing can provide benefits like early detection of issues and fraud reduction but also faces challenges like obtaining the right data and tools.
A compliance officer's guide to third party risk managementSALIH AHMED ISLAMThis document provides guidance for compliance officers on managing third-party risk. It discusses increasing regulations and enforcement, common third-party risks businesses face, challenges that keep compliance officers awake at night, and provides a five-step process for risk rating and conducting due diligence on third parties. It also discusses challenges with traditional disconnected approaches to third-party management and introduces a partnership between Control Risks and GAN Integrity that provides an automated platform and suite of tools to help compliance teams more efficiently manage third-party risk.
Data analytics for auditors Using the AnalysisJim Kaplan CIA CFEThe document provides information about Richard Cascarino and Jim Kaplan, who will be presenting on the topic of data analytics and internal auditing. It gives background on both presenters and their qualifications. It also provides an overview of the company AuditNet, which focuses on resources for auditors. The agenda for the upcoming presentation is outlined, including sections on analysis reporting, data visualization, and presentation.
William Boyette Recruiter ResumeWill BoyetteWilliam Boyette is seeking a position to lead operations and recruiting teams. He has over 2 years of experience recruiting for Acosta Sales & Marketing, where he broke company records by making 70 hires in a month and maintains a weekly average of 17.5 hires. Currently, he is the Operations Manager and Social Media Manager for Digital University, a music promotion company where he has helped grow revenues by 25% over 4 years. He also has coaching experience as the Assistant Quarterback Coach for Elizabeth City State University.
ResumeTiara Alvarado-LeonTiara Alvarado-Leon has over 5 years of experience in education and customer service. She currently works as an English teacher in Shanghai, China, and has previously served as a sales associate, research assistant, and tutor. Alvarado-Leon holds a BA in Psychology and a BS in Criminal Justice from San Diego State University, and is TEFL certified.
Standards in Third Party Risk - DVV Solutions ISACA North May 19 DVV Solutions Third Party Risk ManagementThis document discusses third party risk management (TPRM) in the UK. It notes several data breaches involving third parties that exposed personal and payment card data. It advocates for establishing formal TPRM frameworks aligned with enterprise risk management. It promotes standardizing TPRM processes using tools from the Shared Assessments program to increase efficiency and allow assessments to be shared. It also notes increasing regulatory pressure around operational resilience and the need for senior management oversight of outsourced activities.
It62015 slidesJim Kaplan CIA CFEThe IT Auditing Series is a series of 10 2-hour webinars.
The study program consists of 5 modules Basic and 5 modules Advanced spanning a broad range of topics and issues in the IT Auditing field. The emphasis in all webinars is therefore on practical aspects, of Internal Auditing.
The course content is based upon ISACA Framework which has been accepted world-wide as the basis of skills and competencies required for all IT Auditors.
This session covers risk analysis for auditors
KRI Consulting Solutions LLCkrh96011KRI Consulting Solutions LLC provides vendor and contract management services to help organizations minimize unidentified risk exposure from third party vendors. Their services include vendor selection and evaluation, contract negotiation, post-award administration, and risk analysis of existing contracts. KRI partners with clients to understand the scope of vendor services and ascertain the level of risk associated with each vendor. They then implement an oversight plan involving risk assessments and controls to provide risk awareness and reduce operational expenses for clients.
Top 8 Ways to Improve Underwriting WorkflowGuidewire Software (formerly FirstBest Systems, Inc.)8 expert tips for creating maximum efficiency in your underwriting workflow. Keep your underwriters focused on what they do best - evaluating risk and writing business.
Internal AuditNigel RobinsonThe document discusses the threat of internal threats to organizations from employees. It notes that while organizations spend significant resources protecting against external threats, many do not adequately protect against internal threats. Examples are given of data breaches and theft caused by employees. The document then describes Capgemini's Internal Audit Solution, which collects and analyzes data from various systems to identify anomalous employee behavior and proactively detect potential internal threats. It provides an overview of how the solution works and the continuous process of monitoring technical policies and analyzing behavioral patterns.
How to Evaluate a Managed Services FirmoneneckitservicesNo “one size fits all” managed services solution will ever be ideal for every business. When evaluating prospective providers, consider important services such as monitoring, reporting, backup, remote management and security. Also consider key provider qualifications including location, third-party certifications, customer references, in-house staffing resources and contract items. After outsourcing, you should see immediate results in cost controls and service delivery.
Information Security Risk ManagementNikhil SoniPresentation on Information Security Risk Management for Secure Software System Mtech Information Security.
Ten Ways to Improve Specialty Lines UnderwritingGuidewire Software (formerly FirstBest Systems, Inc.)Specialty insurance is, well special, because each risk can be unique and complex. So is it really possible to improve specialty lines underwriting? The answer is a resounding yes!
In this eBook, we’ll share best practices and lessons learned in improving specialty lines underwriting.
You’ll learn how you can use underwriting risk management systems to:
Improve underwriting profitability
Seize new market opportunities
Provide world-class broker service
View and download the complimentary survey results.
The challenges for the internal auditorRodoljub KajganićThe document outlines the challenges and responsibilities of an internal auditor. It discusses how to be a successful internal auditor through lifelong learning and balancing controls with business needs. It then covers specific topics like compliance, information system audits, and fraud investigations. For compliance, it emphasizes the importance of policies, procedures, and monitoring. For information system audits, it discusses audit types, controls, and procedures. It provides a case study example of auditing an IT project by checking plans, requirements documentation, and change procedures.
Setting Up and Managing an Anonymous Fraud HotlineFraudBustersWebinar series from FraudResourceNet LLC on Preventing and Detecting Fraud in a High Crime Climate. Recordings of these Webinars are available for purchase from our Website fraudresourcenet.com
This Webinar focused on the subject in the title
FraudResourceNet (FRN) is the only searchable portal of practical, expert fraud prevention, detection and audit information on the Web.
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
Commercial Insurance Underwriting Business Process As Is Current State Diagra...Theresa LeopoldThe commercial underwriting process at an insurance company is highly manual and inefficient. Underwriters spend much of their time on non-core tasks due to outdated systems, incomplete data intake, and disorganized workflows. Key challenges include distracting manual processes, lack of data-driven risk management capabilities, and producer engagement issues due to unstructured communication methods. The underwriting cycle lacks consistency and relies heavily on paper files, multiple data re-entry steps, and subjective underwriter decisions. There is an opportunity to modernize systems and processes to allow underwriters to focus more on strategic tasks and decision-making.
Third Party Risk Management IntroductionNaveen GroverOn October 30, 2013 the Office of the Comptroller of the Currency (OCC) issued updated guidance on third-party risks and vendor management. The OCC's bulletin points out that its updated guidance replaces OCC Bulletin 2001-47, "Third-Party Relationships: Risk Management Principles," and OCC Advisory Letter 2000-9, "Third-Party Risk."
Third-Party Risk Management: Implementing a StrategyNICSATwo Part Series: Part I of II
Third-Party Risk Management: Implementing a Strategy
Sleep Better at Night: Learn techniques to manage risks associated with third-party relationships.
Data Analytics 3 Analytics Techniques Jim Kaplan CIA CFESince the spread of IT systems has made it a pre-requisite that auditors as well as management have the ability to examine high volumes of data and transaction in order to determine patterns and trends. In addition, the increasing need to continuously monitor and audit IT systems has created an imperative for the effective use of appropriate data mining tools.
While a variety of powerful tools are readily available today, the skills required to utilize such tools are not. Not only must the correct testing techniques be selected but the effective interpretation of outcomes presented by the software is essential in the drawing of appropriate conclusions based on the data analysis. This 6 webinar series, based on Richard Cascarino’s book “Data Analytics for Internal Auditors” covers these skills and techniques.
Webinar 3 Analytics Techniques
Conducting the Audit
Obtaining Information from IT Systems for Analysis
Use of Computer Assisted Audit Techniques
Analysis of Big Data
Results Analysis and Validation
Fraud Detection using Data Analysis
Root Cause Analysis
20150311 auditnet ap_procure_excel_rlv2Jim Kaplan CIA CFEDuplicate payments, duplicate vendors, and segregation of duties in accounts payable are still the top tests being run by auditors using analytics. They are simple, effective, and save money which always helps the business case for analytics. Further, vendor and related payments fraud is the #1 fraud (in volume) affecting all organizations – big and small, public and private, regardless of the industry and sector. Excel templates will be provided with admission to assist to complete all testing and visualizations using graphs. Further data request letters and analytic audit programs will be provided to “jump start” your audit efforts in the accounts payable and vendor management areas.
Specific learning objectives include:
o Run over 20….key, proactive error and fraud tests in the areas of the accounts payable, vendor masterfiles, and purchase order files, all in Excel.
o Map the report results to an audit program to produce an analytically-enabled audit program.
o Discover the top frauds and corruption schemes along with top cost efficiencies to enact within accounts payable reviews.
o Distinguish between the top major accounting systems used when extracting accounts payable and vendor masterfile data and obtain a standard data request to aid the extractions
o Complete a multiple perspective visualization review of your accounts payable data including time based, amount based, company/profit center based, enterer, etc.
These are the slides. If you would like the associated data files they are available for download after payment. Videos of these sessions are available for free.
Details contact Rich Lanza (rich@richlanza.com)
4 common headaches with sales compensation managementIBM AnalyticsGain insights and solutions to four highly common headaches that companies face in their sales performance management processes. Learn more: http://ibm.com/spm
Data Analytics for Auditors Analysis and MonitoringJim Kaplan CIA CFE1) The document discusses continuous monitoring and auditing techniques using data analytics. It provides definitions and examples of continuous monitoring, auditing, and assurance.
2) Continuous monitoring involves ongoing management oversight of controls while continuous auditing involves independent testing by internal auditors. The relationship between the two is also discussed.
3) Implementing continuous monitoring and auditing can provide benefits like early detection of issues and fraud reduction but also faces challenges like obtaining the right data and tools.
A compliance officer's guide to third party risk managementSALIH AHMED ISLAMThis document provides guidance for compliance officers on managing third-party risk. It discusses increasing regulations and enforcement, common third-party risks businesses face, challenges that keep compliance officers awake at night, and provides a five-step process for risk rating and conducting due diligence on third parties. It also discusses challenges with traditional disconnected approaches to third-party management and introduces a partnership between Control Risks and GAN Integrity that provides an automated platform and suite of tools to help compliance teams more efficiently manage third-party risk.
Data analytics for auditors Using the AnalysisJim Kaplan CIA CFEThe document provides information about Richard Cascarino and Jim Kaplan, who will be presenting on the topic of data analytics and internal auditing. It gives background on both presenters and their qualifications. It also provides an overview of the company AuditNet, which focuses on resources for auditors. The agenda for the upcoming presentation is outlined, including sections on analysis reporting, data visualization, and presentation.
William Boyette Recruiter ResumeWill BoyetteWilliam Boyette is seeking a position to lead operations and recruiting teams. He has over 2 years of experience recruiting for Acosta Sales & Marketing, where he broke company records by making 70 hires in a month and maintains a weekly average of 17.5 hires. Currently, he is the Operations Manager and Social Media Manager for Digital University, a music promotion company where he has helped grow revenues by 25% over 4 years. He also has coaching experience as the Assistant Quarterback Coach for Elizabeth City State University.
ResumeTiara Alvarado-LeonTiara Alvarado-Leon has over 5 years of experience in education and customer service. She currently works as an English teacher in Shanghai, China, and has previously served as a sales associate, research assistant, and tutor. Alvarado-Leon holds a BA in Psychology and a BS in Criminal Justice from San Diego State University, and is TEFL certified.
Aanenson, Wayne Expanded Resume 11.1.16 LWayne AanensonWayne Aanenson is a solutions architect and presales systems engineer with over 20 years of experience developing and selling high-performance IT, telecommunications, and call center solutions. He has a track record of securing large contracts worth millions of dollars from clients across various industries. Aanenson leverages his technical expertise and relationship building skills to architect cost-effective solutions that meet client needs and capture new business opportunities. He is proficient in various technologies and holds multiple professional certifications.
WRK Jr ResumeWill KearneyWilliam R. Kearney Jr. has over 15 years of experience in customer service and sales roles in the telecommunications industry. He currently works as a Cellular Phone Manager at Lennox International, where he supports over 3,000 mobile device users and participates in wireless contract negotiations. Previously, he was a Customer Service Specialist and Customer Service Manager at Sprint PCS, where he managed a team of 10 employees and was the top district salesman for long distance services. Kearney also has experience directing news programs and operating equipment as a director and engineer at several television stations in Texas. He holds a Bachelor's degree in History and Telecommunications from Baylor University.
Excel Model for Valuation of Natural Gas FirmFlevy.com Best PracticesThis ݺߣshare presentation is a partial preview of the full business document. To view and download the full document, please go here:
http://flevy.com/browse/business-document/excel-model-for-valuation-of-natural-gas-firm-1138
DESCRIPTION
This is an valuation model of Petronet LNG. This model covers the different valuation types to arrive at the fair value of a stock.
Business Intelligence For AmlKartik MehtaThe document discusses the role of business intelligence in implementing anti-money laundering compliance software according to regulations introduced by the 2001 USA PATRIOT Act. It outlines requirements for financial institutions to establish anti-money laundering programs, conduct customer due diligence and file suspicious activity reports. The objectives are to help banks integrate data across divisions to identify suspicious transactions and comply with directives to prevent money laundering and terrorist financing.
Business Intelligence For Anti-Money LaunderingKartik MehtaThe document discusses anti-money laundering compliance software implementation following the 2001 enactment of the USA PATRIOT Act. Key points include:
- The Patriot Act delegated responsibility to FinCEN to set requirements for financial institutions to establish anti-money laundering compliance programs.
- Section 352(a) of the Patriot Act amended the Bank Secrecy Act to require financial institutions to establish anti-money laundering programs, including internal policies, a compliance officer, ongoing training, and independent audits.
- The objectives are to help businesses implement Patriot Act directives regarding information sharing about clients with suspicious activity and investigating client accounts and transactions for money laundering or terrorist funding possibilities.
Aviana presentationSujit GhoshAviana Global Technologies is a privately held analytics consultancy founded in 1994 specializing in fraud and risk mitigation. They have developed a platform called Nemesis that uses machine learning and predictive modeling on transactional data to detect anomalies, suspicious patterns and fraud schemes. Nemesis can score individual transactions and groups of transactions, detect irregularities, visualize patterns and insights, link related entities, and support case investigation and resolution to continuously improve detection over time. Aviana has implemented Nemesis for clients across various industries including healthcare, manufacturing, retail, financial services and government.
Tasha Penwell Resume.docxTasha PenwellTasha Penwell has over 10 years of experience in database administration and records management roles. She holds a Master's degree in Information Systems Management and has skills in MS Office, SQL, and various content management systems. Currently she works as a Records Management Associate at Ohio University, ensuring accurate student and personnel data entry and document management. Previously she held several roles such as Database Manager, Parts Manager, and Service Manager at River Front Honda, where she improved data accuracy, oversaw staff, and implemented process improvements.
Shree cv revised wo picSridevi Rayamuthu- Sridevi Rayamuthu is seeking a position that allows her to learn, contribute, and help others grow professionally.
- She has over 12 years of experience in compliance, account opening procedures, and operational risk management for companies like TCS, IGSL, ABN Aces, and Wipro BPO.
- Her experience includes knowledge of regulatory compliance, KYC procedures, customer due diligence, and quality assurance. She has also led teams and transitioned processes internationally.
Ravi Khanchandani ResumeRavi KhanchandaniRavi Khanchandani has over 9 years of experience in operations and asset servicing roles at Nomura Services and Lehman Brothers, including managing teams and analyzing risks and processes. He has a background in corporate actions processing and collateral management, and is seeking a challenging role in investment banking or retail banking involving process improvements and risk analysis. His experience includes automating processes, implementing new systems, and managing teams to improve efficiency.
Post 11. Long term GoalThe Group’s goal is to offer attranhcrowleyThe document discusses long term goals, balanced scorecards, and lead and lag measures for an automotive company. The company's long term goal is to offer attractive, safe, and environmentally sound vehicles that can compete globally and set standards in their class. The balanced scorecard includes financial measures like profit margins and returns, customer measures like market penetration and customer loyalty, and internal business process measures like improvements to property and equipment. Balanced scorecards help managers develop efficient policies to achieve organizational goals. Lead measures guide current decisions that yield future results, while lag measures are outcomes of past management decisions.
Rhonda J Edwards Martin August 2016Rhonda EdwardsRhonda Edwards-Martin has over 16 years of leadership experience in claims quality assurance, special investigations, and claims management at Nationwide. She has a track record of building relationships, improving processes, and managing projects. Some of her accomplishments include developing audit processes to track regulatory compliance and fraud investigations, integrating acquisition claims systems, and implementing accelerated claims excellence programs. She is skilled in leadership, teamwork, planning, problem solving, and leveraging technology to drive efficiency.
Cyber risk management-white-paper-v8 (2) 2015Accounting_WhitepapersThis document discusses a holistic approach to cyber risk management. It recommends conducting regular vulnerability assessments to understand risks and identify security gaps. Once vulnerabilities are found, assets should be protected according to the organization's risk tolerance by implementing security measures like access control and user training. Continuous monitoring is also important since threats change over time. The holistic approach involves people, processes, and technology, not just technology alone.
Gmid associates services portfolio bankPankaj JhaGmid Associates provides analytics services including predictive modeling, descriptive analytics, data mining, and dashboard solutions. They have experience across industries including banking, insurance, and retail. Case studies highlighted include developing churn prediction models for a telecom company, sales forecasting for an apparel retailer, and implementing collection scorecards for a bank. Gmid aims to help clients make better data-driven decisions through analytics.
David.Burna.resume.2023.08.03.docDavidBurnaThis document provides a summary of David G. Burna's professional experience and qualifications. He has over 10 years of experience in data analytics, risk management, and compliance roles within financial services organizations. Currently he is the Director of Risk Analytics at Fiserv, where he oversees machine learning risk models and client relationships to improve fraud prevention performance. Prior experience includes data quality and analytics leadership roles at Wells Fargo, Bank of the West, and BMO Harris, where he developed risk models, led analytics teams, and implemented strategic initiatives.
David.Burna.resume.2023.06.27.docDavidBurnaThis document is a resume for David G. Burna. It summarizes his experience in data analytics, risk management, and compliance roles in the financial services industry. Over 15 years, he has implemented database, risk modeling, fraud prevention, and strategic initiatives at companies including Fiserv, Wells Fargo, Bank of the West, BMO Harris, and HSBC. He is seeking a role using big data to improve organizational effectiveness and performance.
Md arnold, paulpaularnold81631Paul Arnold has over 30 years of experience in information technology leadership roles, including as a Chief Information Officer. He has expertise in data security, risk management, strategic planning, budgeting, and operations management. Arnold has a proven track record of successfully delivering projects on time and within budget. He is skilled in network infrastructure, data centers, security, and communications systems.
Dawn bellDawn BellThis document provides a summary of Dawn Bell's qualifications and experience as a Business Analyst. It includes her contact information, over 10 years of experience in business analysis roles at large insurance companies, a list of relevant skills, and employment history detailing her responsibilities and accomplishments on various projects involving requirements gathering, documentation, testing, and system implementations.
Resume Rhonda J Edwards Martin Nationwide SpecificRhonda EdwardsRhonda Edwards-Martin has over 16 years of leadership experience in claims quality assurance, special investigations, and claims management at Nationwide. She has a track record of building relationships, leading teams, and improving processes. Her roles included managing audits, projects, regulatory compliance, and system integrations. She is skilled in project management, analytics, training, and utilizing technology to increase efficiency.
2016 Risk Management WorkshopStacy WillisThe document discusses designing effective cybersecurity risk management and education programs. It provides an overview of the objectives of the workshop, which are to assess risks and gaps, understand what needs to be done to address them, and create an enterprise-level risk management program. It also discusses scenarios involving a data breach, system outage, and malware outbreak to demonstrate potential costs. The document emphasizes measuring cybersecurity maturity levels and prioritizing the highest risks and most important strategic drivers for an organization.
abhishek singh cvAbhishek SinghAbhishek Singh has over 7 years of experience in investment banking, project management, KYC, AML, and team management. He has designed triggers to mitigate fraud and has successfully migrated various processes. Currently working as a client onboarding professional at Deutsche Bank, he performs KYC and AML checks on clients. Previously he has worked as a fraud analyst at Bank of America and performed various tasks including account opening, transaction monitoring, and reporting suspicious activities. He has a graduate degree from Delhi University and is skilled in various banking applications.
Vasant_Naik_v4Vasant NaikVasant Naik has over 15 years of experience managing production operations and application support across various financial institutions. He has a strong background in data analysis, trading systems, and managing global teams. Some of his accomplishments include reducing incident tickets by 53%, automating processes to save infrastructure costs, and leading migrations to new platforms. He is proficient in technologies like Oracle, SQL Server, Hadoop, and Java/J2EE and aims to contribute leadership and expertise in production management.
rmarshall_pmRoosevelt MarshallRoosevelt Marshall has extensive experience in project management, business analysis, financial analysis, and procurement/contracting. He currently works as a Senior Financial Analyst for the Department of Justice, where he examines criminal debt statistics and business processes to identify areas for improvement. Previously, he was a Business Analyst Specialist at the American Red Cross managing their IT/telecom contracts, purchases, budgets, and implementing a mobile device management system. He has expertise in areas such as project tracking, requirements definition, process improvement, and quality assurance.
1. Timothy S. Dunham
673 Dover Court Unit A1
Hillsborough, NJ 08844
Phone: 908-625-3053
Email: Timothy.Dunham@VerizonWireless.com
Objective: To obtain a full time position as a Manager.
Skill Areas
General
Personnel Supervision
Customer Service
Inventory Control
Hardware Maintenance
Peripheral Maintenance
Basic Accounting
Applications
Vision BillingSystem
PeopleSoft G/L
NetAce
ACSS
MS Office
Data Warehouse
Teradata
ReconNet
TOPS
IDEA
Toad
Enforce
MTAS
MARS
Education
Bachelor of Science in Computer Science, Rowan University, 2004
Software Engineering Specialization
Information Technology Specialization
Mathematics Minor
Executive MBA, Fairleigh Dickinson University, 2011
CPA Education Certificate, Raritan Valley Community College, 2011
Experience
Verizon Wireless, Basking Ridge, NJ
Dates: August 2014 – Present
Department: Legal
Division: Corporate Security
Position: Manager
Responsibilities included: Oversee the Analytics teamwithin corporate security.Team covers the
followingitems. Provideinvestigativeanalytical supportto the corporatesecurity team on an as needed
basis.Develop analyticsinto an organized format to be used for interviews and for criminal prosecutions
of theft and fraud. Obtain and analyzesupportingrecords includingcustomer,company and public
records accurately,logically and in a manner supportiveof the investigation.Conduct onlineresearch and
analysisin supportof investigativeand non-investigativerelated matters. Analyze ICE reports to identify
trends. Anticipate new areas of exposure and suggest ways to investigate.Ensure all investigativesupport
is accurate,timely, and requiringlittleediting/rework. Focus on clientsatisfaction and support;seeking
assistanceregardingunfamiliar matters.Monitor Corporate Security’s hotline and e-mailbox informing
management of matters that require investigator assignmentin a timely basis.Focus on clientsatisfaction
and support; seeking assistanceregardingunfamiliar matters.
2. Results: Handled analytics requests in timely manner. Identified fraudulent activity involving retail
management, leading to their dismissal. Oversaw the development of reporting to close gaps related to
employees assistingin fraudulentactivity.Many cases and dismissalshavebeen completed due to this new
reporting. Developed reporting to help identify fraudulent P-Card transactions. Several large cases have
come out of this reporting and has brought attention to this area of the business. Developed chargeback
database for the Corporate Security Analytics Team. Developed Shrink reporting for the loss prevention
team. This new reporting has allowed the loss prevention team to properly identify the problematic items
at problematic stores, resulting in improved shrink loss. Overall team productivity increased over 28%
within 18 months of managinggroup.Acting as the administrator for theRapid Eye video software for store
security systems. Continued to develop into an emerging leader while expanding groups capabilities and
contributions.
Verizon Wireless, Basking Ridge, NJ
Dates: July 2013 – August 2014
Department: Finance
Division: Customer Care Compliance
Position: Manager
Responsibilities included: Partner with FAAST to complete risk model reporting and all standard reports
for External Customer Care. Continuously monitor weighting/scoringof risk models and evaluate
reporting is hittingcorrecttargets. Use resultingreports to perform risk-based reviews of employees and
centers with the highest identified risk level.Partner with operations teams to leverage work and
eliminateduplication of effort. Conduct reviews of specific processes in Careand recommend system
enhancements or process improvements as appropriateto address control weaknesses and mitigate risk
in the channel.Participateon cross-area coreteams to develop or standardizepolicy,or concerns
regardingspecific issues,proposed programs or changes to the business thataffect externa l Care channel.
Communicate timely and accurateinformation regardingfindings and improvement recommendations to
senior management, and follow-up to track improvement actions.Driveimprovement in discounting,
OCCs, Manager Exception upgrades and overall upgrades,and other key areas for Carethat develop over
the year.
Results: Added value from day one with SQL knowledge to expedite data requests for team. Conducted
audits of M2 upgrades in Care, Albuquerque center and all of the AFNI sites. Produced and sent out the
weekly Save promo reporting to leadership.Involved with Risk Model evaluation and corrections with the
FAAST team, including SRG updates as needed. Worked as a resource to FAAST contact when help was
needed with data warehouse. Developed reporting for Fraud related name change/authorized user report,
alternate CLNR transaction, Winback reporting, CED reporting, EEU reporting, various Edge reporting to
help all Complianceteams,IDO reporting,reportingfor Spiffs in careon various items,for examplejetpacks.
In addition developed Save Offer reporting for the Care channel and shared logic with other channel teams
to help develop leadership reporting. Handled the reporting for the weekly NEA action register as well as
analysis. Conducted multiple reviews of SRG’s to make sure relevant. Team worked diligently to help drive
the Channel towards achieving targets in OCC’s, Manual Discounting, and Manager Exception upgrades.
Verizon Wireless, Basking Ridge, NJ
Dates: July 2011 – July 2013
Department: Legal
Division: Corporate Security
Position: Senior Analyst
Responsibilities included: Provideinvestigativeanalytical supportto the corporate security team on an as
needed basis.Develop analyticsinto an organized format to be used for interviews and for criminal
prosecutions of theft and fraud. Obtain and analyzesupportingrecords includingcustomer,company and
public records accurately,logically and in a manner supportiveof the investigation.Conduct online
research and analysis in supportof investigativeand non-investigativerelated matters. Analyze ICE
reports to identify trends. Anticipatenew areas of exposure and suggest ways to investigate. Ensure all
investigativesupportis accurate,timely, and requiringlittleediting/rework. Focus on clientsatisfaction
3. and support; seeking assistanceregardingunfamiliar matters.Monitor Corporate Security’s hotlineand e-
mailbox informingmanagement of matters that require investigator assignmentin a timely basis.Focus
on clientsatisfaction and support;seekingassistanceregardingunfamiliar matters.
Results: Handled analytics requests in timely manner. Identified fraudulent activity involving retail
management, leadingto their dismissal.Developed reporting to closegaps related to employees accessing
accounts and sellingconfidential information.Several cases and dismissals havebeen completed due to this
new reporting. Developed reporting to help identify fraudulent P-Card transactions. Several large cases
have come out of this reporting and has brought attention to this area of the business.Developed P-Card
database for the Corporate Security Analytics Team. Developed Access database to properly track
attempted and successful burglaries,includingreportingfor upper management. Created and maintain First
Person fraud report to help investigators identify hot zones and provide details on the fraudsters. Helped
as a backup for the Rapid Eye video software for store security systems. Identified and reported issue
regarding IMEI's and their gap in the Lost/Stolen and Non-Pay disconnect aspects of MTAS. Stepped into
position rightaway and contributed immediately due to Verizon strike.Developed into leader on team and
stepped in wherever assistance was needed from incident reports to major analytical projects. Received
recognizing you and cheers for peers awards in 2012.
Verizon Wireless, Basking Ridge, NJ
Dates: March 2010 – July 2011
Department: Audit
Division: Forensic Auditing Services Team
Position: Senior Analyst
Responsibilities included: Proactively identifying fraudulent activity utilizing data obtained from Data
Warehouse;completing analysisof data usingIDEAand MS Excel.Design,develop and implement strategies
that lead to the implementation of effective continuous monitoringprograms for fraudulentactivity.Work
directly with and provide data analysis to the audit teams, corporate security, area compliance and legal.
Provide data analysis used for audit assists and other requests.
Results: Lead and completed first audit assist within first month of service in department. Utilized
experience and leveraged knowledge from previous positionsto providemoreinsightand assistanceduring
auditassists.Completed eight auditassists in first ten months of service. Assisted in the development of a
report for retail store investment cost analysis.Departmental liaison for numerous corporate security and
legal requests. Identification of $61,240 in fraudulent activity. Identified 4 fraudsters through continuous
monitoring testing. Identified $57,306 of fraud dollars related to fraudsters.
Verizon Wireless, Bedminster, NJ
Dates: October 2009 – March 2010
Department: Treasury Operations
Division: ReconNet
Position: Supervisor
Responsibilities included: Load daily files for reconciliation completed within ReconNet. Oversee
reconciliation of gift card and NSF check reconciliation. Administrative responsibilities including
modifications to application in regards to reconciliation types, developing new reconciliation types, and
maintaining users within ReconNet. Develop future changes and create progression of ReconNet
application.
Results: Oversawfour directreports whileparticipatingin COREposition.Stepped in and ensured that there
were no issues with maintainingthe day to day activities.Oversaw the migration to new ReconNet version
7.5. Tested and implemented from the Treasury side for the split TPO29 project which greatly improved
load time for largest portion of ReconNet. Oversaw implementation and testing of replacement for
reconciliation type 905 to 915 to improve the processing time for operators of that reconciliation type.
Reduced number of unnecessary jobs in each reconciliation type in ReconNet. Implemented new
transaction codes for teams upon request. Provided all materialsfor Sarbanes quarterly review.Continued
to help Lockbox group with TOPS requests for 2 hrs per day.
4. Verizon Wireless, Bedminster, NJ
Dates: June 2008 – October 2009
Department: Treasury Operations
Division: Lock Box
Position: Treasury Analyst
Responsibilities included: Reconciling lockbox locations using ReconNet. Resolving bank account and
lockbox location issues. Performing quality assurance reviews for TOPS requests. Working TOPS requests,
includingadjustingaccount payments,issuingrefunds,researchingaccountpayments,and entering journal
entries for adjustments.
Results: Within two weeks was ableto transition mostof the duties of the new position.Continued to learn
other aspects of position over following two weeks. Continued to lead team on TOPS requests while
acquiring new responsibilities. Continued to be a leader on the team.
Verizon Wireless, Bedminster, NJ
Dates: May 2007 – June 2008
Department: Treasury Operations
Division: Lock Box
Position: Treasury Assistant
Responsibilities included: Working TOPS requests, includingadjustingaccountpayments, issuingrefunds,
researching account payments, and entering journal entries for adjustments. Researching checks for
application to accounts.
Results: Within one month of employment moved onto TOPS, usually a function reserved for more
experienced employees. Obtained and helped install and maintain four bulk printers. Chosen to assist
another group within the department with their TOPS requests. These responsibil ities aretypically reserved
for employees with a higher title. Established as a leader on the team.
Verizon Wireless, Warren, NJ
Dates: May 2003 – May 2007
Department: Customer Care East
Division: System Test Team
Position: Technical Analyst
Responsibilities included: Software testing of Customer Service program ACSS (automated customer
service system). Understand and work with Vision and I2K Billing Systems as well as NetACE. Created,
designed, and implemented test cases. Lead for System Test team for multiple Enterprise releases. Lead
responsibilities included managing testers, creating reports for upper management, representing testing
team in enterprise meetings, and ensuring that all testing completed within the specified timeframe.
Administrator for Mercury Quality Center for Customer Care department. Co-lead for Automation project
using Mercury WinRunner.
Results: All releases of software deployed with no major errors.Major contributor in findingcritical errors.
Ensured my area was up to date and performing according to system requirements. Lead tester for most
critical components of the system and high profiled projects. Evolved into a leader within individual team
and department. Brought about and administered process improvements tha t have had an impact
throughout the entire department. Voted MVP of May 2005 Enterprise Release.
Reference
Available upon request