Gregory. Regulators. Speakers

Size: px
Start display at page:

Download "Gregory. Regulators. Speakers"

Transcription

1 Athens, ISACA Athens Chapter with the support of Hellenic American Unionn is organizingg the 3rd ISACA Athens Chapter Conference on November 2 & 4, The theme of the conference is: Emerging from Crisiss The risks, the opportunities and the real value of IT. Attendees will earn up to a total of 17 CPEs (workshop 8, conference 9 CPEs) and 10 PDUs (workshop 2, conference 8). ISACA Keynote Speakers: Emerging IT Trends and their Implications to the Audit Profession Gregory T. Grocholski, CISA Global Business Finance Director Ventures, Businesss Development and Joint Venture at Dow Chemical ISACA International President ENISA and ISACA Workshop Addresses CybersecurityChallenges for Telecom Operators and Regulators Christoss Dimitriadis,CISA, CISM, CRISC Group Head of Information Security, Compliance and Innovation at INTRALOT Director of ISACA International BoD Awardedd in 2013 with the John W. Lainhart IV Common Body of Knowledge Award by ISACA International International Vice President Chair of COBIT Security Task Force and of External Relations Committee Member of the Relations Board, Academic Relations Committee, ISACA Journal Editorial Committee and Business Model for Information Security Work Group IT Governance and Emerging Trends Georges Ataya, CISA, CGEIT, CRISC, CISM, CISSP Managingg Partner at ICT Control Professor at Solvay BrusselsSchool International Vice President Chair, External Relations Committee President, Benelux Chapter Geo location: Risks, Strategies and Audit Aspects Urs Fischer, CISA, CRISC, CIA, CPA Owner & CEO Fischer IT GRC Consulting & Training, Member of ISACA/ITGI's Nomination Committee Awardedd in 2010 with the John W. Lainhart IV Common Body of Knowledge Award by ISACA International Chair of ISACA's & IT Governance Institute's Risk IT Task Force Chair Audit Committee Member of the COBIT Steering Committee and of the Credentialing Board Chair ISACA's CRISCC Committee INVITED Expert Speakers: Dr.Evangelos Ouzounis,Head of Unit Secure Infrastructure and Services, ENISA Dr.Vasilis Katos, CHFI, Democritus University of Thrace ISACA Academic Advocate INTERNATIONAL Speakers: Charlie McMurdie, Senior Cyber Crime Advisor, PwC, Former Head of Law Enforcement National Cyber capability, Police Central e Crime Unit, Metropolitan Police UK ( ) Nikolaos Virvilis, CISSP, CISA, GPEN, Information Assurance Scientist, NATO Communications & Informationn Agency Speakers

2 Iraklis Kanavaris, CISA, ISO LA, Supervising Senior Advisor, KPMG Advisorss SA Giorgos Gerogiannis, Datacenter & Cloud Solutions Manager, Unisystems Dr.Vasilis Vlachos, Lecturerr at Technological Education Institute of Larissa ISACA Academic Advocate Dr.Emmanouil Serrelis, CISM, PhD (InfoSec), Information Security Expert Conference Chairman: Dr. Dimitris Gritzalis, Professorr of ICT Security, Athens University of Economics and Business Stay in touch at and for updates on the conference program. Official language: English, (Translation from Greek to English available only). Venue: 2 Nov 2013 Workshop Athens, Hellenic American Union Conferencee Center, Hours: 09:00 17:00 4 Nov 2013 Conference Athens Hotel Athenaeum Intercontinental, Hours: 08:45 18:15 Registration Fees ISACA members Non ISACA members More than 2 registrations from same company Collaborative institutions Students (undergrads only) Workshop & Conferencee (2 &4 November) Early Bird Regular Fee Conference 4 November Only Conference fees are subject to 23% VAT. Workshop fee is covered by LAEK / OAED 0,45 (for Greek companies only) Registration to workshop grants free entrance to the Conference on November 4 th You may register at the Hellenic American Union. For further information, pleasee contact: Eleni Tsirigoti, PMP ISACA Athens Chapter Vocational Training Section, Hellenic American Union Tel: , etsirigoti@hau.gr Premier Sponsors Supporters With the participation of Media Sponsors

3 2013 ISACA Athens Chapter Conference 4 November Preliminary Agenda 08:00 08:45 09:00 09:40 Registration Opening Remarks Dr. Dimitrios Gritzalis Conference Chairman, Professor of ICT Security, Athens University of Economics & Business Mr. Ioannis Lefkakis, CISA, CRISC, CFE ISACA Athens Chapter President Dr. Christos Dimitriadis, CISA.CISM, CRISC ISACA International Director, Group Head of Information Security, Compliance & Innovation, Intralot Group 1 ISACA KEYNOTE Presentation Emerging IT Trends and their Implications to the Audit Profession Mr. Gregory Grocholski, CISA Global Business Finance Director for The Dow Chemical Company, ISACA International President , 09:40 10:30 ENISA and ISACA Workshop Addresses Cybersecurity Challenges for Telecom Operators and Regulators Dr. Christos Dimitriadis, CISA.CISM, CRISC ISACA International Director, Group Head of Information Security, Compliance & Innovation, Intralot Group Dr. Evangelos Ouzounis Head of Unit Securee Infrastructure and Services, ENISA 10:30 10:50 International Presentation Mrs. Charlie McMurdie Senior Cyber Crime Advisor at PwC, Former Head of Law Enforcement National Cyber capability, Police Central e Crime Unit, Metropolitan Police UK 10:50 11:15 11:15 11:30 11:30 12:10 Coffee Break About ISACA International Answer & Win! 2 ISACA KEYNOTE Presentation IT Governance and Emerging Trends Mr. Georges Ataya, CISA, CGEIT, CRISC, CISM, CISSP Past ISACA International VP, Managing Partner at ICT Control Professor at Solvay Brusselss School 12:10 12:40 3 INVITED EXPERT Presentation VoIP Forensics Dr. Vasilis Katos Associate Professor at DemocritusUniversity of Thrace ISACA Academic Advocate 12:40 13:00 Presentation Using Data Analytics and ContinuousAuditing for Effective Risk Management Mr. Iraklis Kanavaris, CISA, ISO LA, Supervising Senior Advisor, KPMG Advisors SA 13:00 14:00 14:00 14:40 Lunch Break 4 ISACA KEYNOTE Presentation Geo Location: Risks, Strategies and Audit Aspects Mr. Urs Fischer, CISA, CRISC, CIA, CPA Member of ISACA/ITGI's Nomination Committee, Owner & CEO Fischer IT GRC Consulting & Training 14:40 15:10 Round Table Discussion: Cloud Computing "Sharing the Governance Burden: Getting Compliant in the Cloud" With the participation Unisystems 15:10 15:40 5 INVITED EXPERT Presentation Advanced Persistent Threat vs Defenders: Why we keep losing this game Mr. Nikolaos Virvilis, CISSP, CISA, GPEN Information Assurance Scientist, NATO Communications & Informationn Agency 15:40 16:00 Presentation Protecting from NextGen Hacking Targets: From Information Driven Security to the Assurance of Everyday Life Dr. Emmanouil Serrelis, CISM PhD (InfoSec) Information Security Expert 16:00 16:25 16:25 16:40 16:40 17:00 Coffee Break About ISACA Athens Chapter Answer & Win! Presentation TBA Sponsor Slot TBA 17:00 17:20 Presentation The OWASP Hackademic Challenges Project Dr. Vasileios Vlachos Lecturer at Technological Educational Institute of Thessaly ISACA Academic Advocate 17:20 18:00 ISACA Round Table Discussion: Emerging Trends Have they emerged or the wave has yet to come? Mr. Gregory Grocholski, Dr. Christos Dimitriadis, Mr. Georges Ataya, Mr. Urs Fischer 18:15 End of Conference Check at or for more updates

4 Pre Conference Workshop Athens, 2 November 2013, 09:00 17:00 Hellenic American Union Conference Center Overview This year the pre conference workshop is consisted of two specific sessions, each one lasting approximately 3½ hours. The first session focuses on management of IT related business risk as an essential component of IT governancee and is based on recently launched COBIT5 framework. Facilitator is Mr. Urs Fischer who has served ISACAA from various positions until today, among of which are Chair of ISACA's & IT Governance Institute's Risk IT Task Force and Member of the COBIT Steering Committee and of the Credentialing Board Chair ISACA's CRISC Committee. The second session is a hands on experience on the processes, methodologies and tools used during an incident response and conducting a forensic investigation. Facilitator is Dr. Vasilis Katos,Associate Professor and Director of the Information Security and Incident Response Research Unit at the Department of Electrical and Computer Engineering at the Democritus University of Thrace, who has long served as an ISACA Academic Advocate. 1 st Session WS1 IT Risk Management based on COBIT5 (for Risk) Facilitator: Urs Fischer, CISA, CRISC Owner, Fischer IT GRC Training & Consulting Abstract: Effective management of IT related business risk has become an essential component of IT governance. To recognize the complex and diverse role that risk plays, it is essential to develop a clear understanding of the risk universe, appetite and culture within your enterprise. It is also important to be able to identify and classify different types of risk, and choose an applicable analysis method for your enterprise. Leading the drive to help organizations mitigate risks, ISACA has developed several guidance (especially COBIT 5 for Risk) to help an organization manage their IT related risk. This half day, instructor of IT led workshop will provide the essential building blocks to develop a risk management plan. It describes the principles risk management, the responsibilities and accountability for IT risk, how to build up awareness, and how to communicate risk scenarios, After completing this session, you will be able to: Describe the principles and methodology of IT risk management Discuss aspects of risk culture and how they affect risk management Understand risk appetite, risk tolerance and target risk concepts Describe and understand IT related risk using risk scenarios analysis, know how risk scenarios can be constructed Determine what data to collect and where to collect it to monitor and respond to risk Discuss several methods to describe impact and magnitude of IT events in business related terms Describe risk responses suitable for different risk scenarioss Develop risk response plans

5 2 nd Session WS2 Digital Forensics and Incident Response Facilitator: DrVasilisKatos, CHFI Associate Professor and Director of the Information Security and Incident Response Research Unit at the Department of Electrical and Computer Engineering at the Democritus University of Thrace. Democritus University of Thrace, ISACA Academic Advocate Abstract: When most modern information systems eventually fail, it is not a matter of "pulling the plug" or rebooting the system; recovery may involve litigation which in turn requires the collection, preservation and analysis of digital evidence in order to allow the identification of the cause of the failure. Digital forensics and incident response is about handling information security failures and cybercrime related incidents in general, in a way that the collected evidence are admissible that is, they are accepted as evidence in a court of law. The workshop is about the processes, methodologies and tools used during an incident response and conducting a forensic investigation. After completing this session, you will be able to: Appreciate the challenges first responders and forensic analysts may face during a security incident Understand the different phasess of a forensic investigationn Acknowledge the wealth and variety of the many forms of cybercrime Obtain knowledge on a selection of tools used in incident response and forensic analysis Understand the need of forensic readiness for an organization Informationn This workshop grants 8 CPEs and 2 PDUs. This is a training, highly interactive workshop, therefore participation is limited. Participants will be accepted on a first come first served basis. To secure your place, please register on time. Official language: English

1 ISACA KEYNOTE Presentation Emerging IT - Trends and their Implications to the Audit Profession

1 ISACA KEYNOTE Presentation Emerging IT - Trends and their Implications to the Audit Profession Αναρτήθηκαν στον δικτυακό μας τόπο οι παρουσιάσεις του 3ου Συνεδρίου ISACA Athens Chapter στο οποίο η συμμετοχή σας ξεπέρασε κατά πολύ το προηγούμενο. Στη συνέχεια αυτής της σελίδας μπορείτε να βρείτε

More information

Athens, 2 & 4 November 2013

Athens, 2 & 4 November 2013 Athens, ISACA Athens Chapter with the support of Hellenic American Union is organizing the on November 2 & 4, 2013. The theme of the conference is: Emerging from Crisis The risks, the opportunities and

More information

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized. Val-EdTM Valiant Technologies Education & Training Services Workshop for CISM aspirants All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

Les joies et les peines de la transformation numérique

Les joies et les peines de la transformation numérique Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education

More information

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential

More information

Athens, 6 7 December 2012 Hellenic American Union Conference Center

Athens, 6 7 December 2012 Hellenic American Union Conference Center Athens, 6 7 December 2012 Hellenic American Union Conference Center ISACA Athens Chapter and the Hellenic American Union are organizing the 2012 ISACA Athens Chapter Conference on December 6 7, 2012. The

More information

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY : THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY 18 2017: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) MAY 15 AND 16 o INFORMATION

More information

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO A New Cyber Defense Management Regulation Ophir Zilbiger, CRISC, CISSP SECOZ CEO Personal Background IT and Internet professional (since 1992) PwC (1999-2003) Global SME for Network Director Information

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

Volume 2014, Number 4. Volunteers Needed!

Volume 2014, Number 4. Volunteers Needed! Volume 2014, Number 4 Volunteers Needed! Volunteering for NJ ISACA is a great opportunity to expand your professional contacts and your IT knowledge base. NJ ISACA needs talented professionals like you

More information

ISACA International Perspective

ISACA International Perspective ISACA International Perspective 11 th October 2013 Allan Boardman ISACA International Vice President and Board Director Member of ISACA s Strategic Advisory Council Member of the IT Governance Institute

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

Information Security Officer (ISO) Education

Information Security Officer (ISO) Education Information Security Officer (ISO) Education October 16, 2018 TBA Barrett Training Center Nashville, Tenn. Information Security Officer (ISO) Education October 16, 2018 TBA Barrett Training Center Nashville,

More information

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information

2018 Government Professional Accounting Seminar

2018 Government Professional Accounting Seminar 2018 Government Professional Accounting Seminar Thursday September 6, 2018 7:30 a.m. - Registration and Networking 8:00 a.m. 4:50 p.m. (Early Registration by Tuesday, July 31, 2018; Regular by Friday,

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION Telecommunication Development Bureau T E L E F A X Place des Nations Telephone +41 22 730 51 11 CH-1211 Geneva 20 Telefax Gr3: +41 22 733 72 56 Switzerland Gr4: +41

More information

Workshop description

Workshop description Workshop description COBIT5 for Assurance With information and technology at the heart of creating value for enterprises, it is more important than ever for organizations to optimize their IT assurance

More information

CISM Prep Course 2018

CISM Prep Course 2018 CISM Prep Course 2018 31 May - 2 June 2018 Early registration 27 April 2018 Final registration 23 May 2018 Offered by In association with ISACA Athens Chapter has been awarded four times as Best Large

More information

Application for Certification

Application for Certification Application for Certification Requirements to Become a Certified Information Security Manager To become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade on the

More information

ISACA Enterprise. Solutions and Resources

ISACA Enterprise. Solutions and Resources ISACA Enterprise Solutions and Resources About ISACA Global association serving 140,000 members and certification holders Members in 180+ countries; 210+ chapters worldwide Developed and maintains the

More information

Certified Cyber Security Specialist

Certified Cyber Security Specialist Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal

More information

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers 2017 PORT SECURITY SEMINAR & EXPO ISACA/CISM Information Security Management Training for Security Directors/Managers Agenda Introduction ISACA Information security vs. cybersecurity CISM certification

More information

IT Governance and emerging trends

IT Governance and emerging trends IT Governance and emerging trends Athens, 4 November 2013 Professor Georges Ataya Academic Director, Solvay Brussels School (solvay.edu/it) Past International Vice President, ISACA (isaca.org) Managing

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart Budget 2019 NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate

More information

Vademecum of Speakers

Vademecum of Speakers Vademecum of Speakers Session 1 - The response to the crisis: removing barriers and unleashing growth in services Ariane Kiesow Centre for European Policy Ariane Kiesow is a policy analyst at the Centre

More information

IT Audit Essentials. Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur

IT Audit Essentials. Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur IT Audit Essentials Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur IT Audit Essentials Workshop Overview ISACA Malaysia Chapter is

More information

Report of the Nominating Committee

Report of the Nominating Committee Volume 8, 9 April 2014 Report of the Nominating Committee Slate of 2014-15 Board of Directors New NIST Cybersecurity Framework Features COBIT 5 in Its Core Parameters to Consider When Acquiring Software

More information

Security Program Design:

Security Program Design: Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident

More information

The NextGen cyber crime battlefield. Why organizations will always lose this battle

The NextGen cyber crime battlefield. Why organizations will always lose this battle The NextGen cyber crime battlefield. Why organizations will always lose this battle Enforce cyber threat intelligence into your organization 10 April 2014 KPMG has been awarded with the Europe Awards as

More information

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot STANDING COMMITTEES A 1 Academic and Student Affairs Committee Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot INFORMATION This item is for information only. BACKGROUND To help

More information

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway.

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway. Aalborg Universitet Vision for IT Audit 2020 Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication from Aalborg University Citation

More information

Effective COBIT Learning Solutions Information package Corporate customers

Effective COBIT Learning Solutions Information package Corporate customers Effective COBIT Learning Solutions Information package Corporate customers Thank you f o r y o u r interest Thank you for showing interest in COBIT learning solutions from ITpreneurs. This document provides

More information

Report of the Nominating Committee

Report of the Nominating Committee Volume 7, 31 March 2011 In This Issue: Report of the Nominating Committee Slate of 2011-2012 Board of Directors New COBIT Case Study: Grupo Bancolombia New COBIT Process Assessment Model: The Market Need

More information

Present. 5th May - Chennai. Internal. auditing. today: Beginning Auditor Tools and Techniques. 6 CPE hours.

Present. 5th May - Chennai. Internal. auditing. today: Beginning Auditor Tools and Techniques. 6 CPE hours. Present 5th May - Chennai Internal auditing today: Beginning Auditor Tools and Techniques 6 CPE hours www.achromicpoint.com About the Seminar To become a successful auditor, a strong base of knowledge

More information

CISM Prep Course 2015

CISM Prep Course 2015 CISM Prep Course 2015 20-22 April 2015 Early registration 23 March 2015 Final registration 6 April 2015 Offered by In association with ISACA Athens Chapter has been awarded four times as Best Large Chapter

More information

CFE Exam Review Course

CFE Exam Review Course CFE Exam Review Course Leading Excellence in Banking BIBF plays a vital role in the training and development of human capital in the Kingdom of Bahrain. Our commitment to excellence has strengthened our

More information

NERC Staff Organization Chart Budget 2018

NERC Staff Organization Chart Budget 2018 NERC Staff Organization Chart Budget 2018 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate

More information

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED

More information

A Global Look at IT Audit Best Practices

A Global Look at IT Audit Best Practices A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory

More information

Overview: Sponsored By:

Overview: Sponsored By: Overview: IIA Winnipeg is hosting its third annual full day Fraud Summit on Tuesday, March 15 th. The 2016 Fraud Summit will focus on fraud prevention, deterrence and detection along with topics including

More information

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,

More information

NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart Budget 2019 NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate

More information

Strategies for Deriving Maximum Benefit From Audit. Allan Boardman CyberAdvisor.London

Strategies for Deriving Maximum Benefit From Audit. Allan Boardman CyberAdvisor.London Strategies for Deriving Maximum Benefit From Audit Allan Boardman CyberAdvisor.London Agenda Setting the scene Why Audit often struggle working with Security and Risk Spotlight on Audit Spotlight on Security

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

INFORMATION SECURITY OFFICER (ISO) EDUCATION Securing Your Bank s Future. May 17, 2017 TBA Barrett Training Center Nashville, Tenn.

INFORMATION SECURITY OFFICER (ISO) EDUCATION Securing Your Bank s Future. May 17, 2017 TBA Barrett Training Center Nashville, Tenn. INFORMATION SECURITY OFFICER (ISO) EDUCATION Securing Your Bank s Future May 17, 2017 TBA Barrett Training Center Nashville, Tenn. INFORMATION SECURITY OFFICER (ISO) EDUCATION Securing Your Bank s Future

More information

Welcome October, 2013 INSIDE THIS ISSUE. Jesse A. Hanford Greater Cincinnati ISACA President

Welcome   October, 2013 INSIDE THIS ISSUE. Jesse A. Hanford Greater Cincinnati ISACA President October, 2013 INSIDE THIS ISSUE Welcome Message....1 Monthly Meeting......2 Events 3 Education......5 Meet A Board member...8 Editor s Corner....9 About Our Chapter... 10 Welcome Greater Cincinnati ISACA

More information

Cyber Security Congress 2017

Cyber Security Congress 2017 Cyber Security Congress 2017 A rich agenda covering both technical and management matters with targeted presentations and hands on workshops. Day 1 Conference Morning Session 8.30 9.00 Registration & Coffee

More information

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN CENTRAL REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN TAKE THE STAGE Members: Register by Feb. 29 to save US$100. Take the Stage The IIA and IIA Nashville Chapter are excited to host the 2016 Central

More information

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

E-guide CISSP Prep: 4 Steps to Achieve Your Certification CISSP Prep: 4 Steps to Achieve Your Certification Practice for the exam and keep your skills sharp : Thank you for downloading our CISSP certification guide. Aside from this handy PDF, you can also access

More information

Data-Driven Policing Summit

Data-Driven Policing Summit Reduce Crime and Manage Risk in Policing with Data Analysis Data-Driven Policing Summit Using Data Analytics and Predictive Modeling to Mitigate Risk and Reduce Crime September 18-19, 2017 Washington,

More information

NORTH ATLANTIC TREATY ORGANISATION

NORTH ATLANTIC TREATY ORGANISATION NORTH ATLANTIC TREATY ORGANISATION NATO MARITIME INTERDICTION OPERATIONAL TRAINING CENTRE NMIOTC SOUDA BAY 73200 CHANIA HELLAS NMIOTC 1 st CYBER SECURITY CONFERENCE AGENDA AND TIMELINE TIME TOPIC SPEAKER

More information

TRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I.

TRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I. TRAINING WEEK COURSE OUTLINE May 9-13 2016 RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I. Page2 FACILITATOR S BIOGRAPHY John Tannahill, CA, CISM, CGEIT, CRISC is a management consultant specializing

More information

Northeast Ohio Chapter Annual General Meeting

Northeast Ohio Chapter Annual General Meeting Northeast Ohio Chapter Annual General Meeting May 21, 2015 For professionals and organizations be the leading global provider of knowledge, certifications, community, advocacy and education on information

More information

EARN UP TO 18 CPE CREDITS

EARN UP TO 18 CPE CREDITS Join Us in Nashville, TN, USA 370 Stay at the Heart of the Conference Action! The Omni Nashville 250 5th Avenue South Nashville, TN 37203, USA Hotel Reservations: 615-782-5300 2018 Governance, Risk, and

More information

gridconnext provides an unprecedented

gridconnext provides an unprecedented Where Policy & Business Leaders Meet to Build the Next-Generation Grid 2017 gridconnext provides an unprecedented opportunity for diverse industry stakeholders to discuss evolving policies and share best

More information

CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions. Regional Headquarters, The University of the West Indies, Mona

CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions. Regional Headquarters, The University of the West Indies, Mona 2 nd National Conference on CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions Regional Headquarters, The University of the West Indies, Mona November 20-21, 2014 Conference

More information

CYBERSECURITY: E-COMMERCE, GOVERNANCE AND APPLIED CERTIFICATIONS A ROUNDTABLE DISCUSSION 15 DECEMBER 2015

CYBERSECURITY: E-COMMERCE, GOVERNANCE AND APPLIED CERTIFICATIONS A ROUNDTABLE DISCUSSION 15 DECEMBER 2015 CYBERSECURITY: E-COMMERCE, GOVERNANCE AND APPLIED CERTIFICATIONS A ROUNDTABLE DISCUSSION 15 DECEMBER 2015 WELCOME Have a question for the speaker? Text it in using the Ask A Question button! Audio is streamed

More information

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Table of Contents Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Chapter 1: Significance of Internal Auditing in Enterprises Today: An Update 3 1.1 Internal Auditing History and Background

More information

Cybersecurity Fundamentals

Cybersecurity Fundamentals Cybersecurity Fundamentals Prof. Georges Ataya, Vice President of the Belgian Cybersecurity Coalition Academic Director, IT Management Education (Solvay Brussels School of Economics and Management) Managing

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

Predstavenie štandardu ISO/IEC 27005

Predstavenie štandardu ISO/IEC 27005 PERFORMANCE & TECHNOLOGY - IT ADVISORY Predstavenie štandardu ISO/IEC 27005 ISMS Risk Management 16.02.2011 ADVISORY KPMG details KPMG is a global network of professional services firms providing audit,

More information

MAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world

MAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world 8 MAY 2018 (Tue) Hong Kong CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world CYBERSECURITY AND RISK MANAGEMENT By HKUST Business School Executive Education Office

More information

The President s Message 3. ISACA Bookstore Updates 22

The President s Message 3. ISACA Bookstore Updates 22 Table of Content Editor Absar Khan The President s Message 3 ISACA Karachi Chapter AGM 2016 5 Chapter AGM held on 30-Mar-2016 at Royal Rodale Complex Karachi ISACA Karachi Chapter Won Two International

More information

WELCOME TO ISACA Claudio CILLI, CISA, CISM, CRISC, CGEIT

WELCOME TO ISACA Claudio CILLI, CISA, CISM, CRISC, CGEIT WELCOME TO ISACA 2015 Claudio CILLI, CISA, CISM, CRISC, CGEIT cilli@di.uniroma1.it http://dsi.uniroma1.it/~cilli WHO IS ISACA? ABOUT ISACA The trusted source of guidance, networking and career development

More information

Cloud Computing: A European Perspective. Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA

Cloud Computing: A European Perspective. Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA Cloud Computing: A European Perspective Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA Overview Cloud Universe Definitions Cloud Risks in Europe Governance, Risk and Compliance

More information

Global cybersecurity and international standards

Global cybersecurity and international standards World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level

More information

Leading the Digital Transformation from the Centre of Government

Leading the Digital Transformation from the Centre of Government 37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00

More information

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable

More information

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)

More information

COBIT 5 Foundation Workshop

COBIT 5 Foundation Workshop COBIT 5 Foundation Workshop Dear Members, ISACA Pune chapter is pleased to organize Two / Three Days COBIT-5 Foundation course Dates of Training & Workshop: Date: Friday, 19 th Dec 2014 and Saturday, 20

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

Helping you understand the impact of GDPR.

Helping you understand the impact of GDPR. Helping you understand the impact of GDPR. GENERAL DATA PROTECTION REGULATION (GDPR) RSM s GDPR experts GREGOR STROBL Munich, Germany Partner Risk Advisory Services (RAS) Master of Arts (M.A.) in Corporate

More information

Cloud Security Certification CCSP Certified Cloud Security Professional

Cloud Security Certification CCSP Certified Cloud Security Professional Cloud Security Certification CCSP Certified Cloud Security Professional Course code: 10006308 Prove You re on the Forefront of Cloud Security In the ever-changing world of the cloud, you face unique security

More information

RISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process

RISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process RISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process Date 24-25 September 2018 Time: 09:00 17:00 Location Hotel Grand, Tirana, Albania Course director: Mr. Konstantinos P. Triantafyllidis,

More information

IT in Healthcare Day

IT in Healthcare Day San Francisco ISACA Chapter Proudly Presents IT in Healthcare Day A Day-Long, Multi-Session Event, being held in Walnut Creek! Where: Walnut Creek Marriott - 2355 North Main Street Walnut Creek, CA 94596

More information

Call for Expressions of Interest

Call for Expressions of Interest Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...

More information

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES MANILA CHAPTER 2017 CALENDAR OF ACTIVITIES 2017 MANILA CALENDAR OF ACTIVITIES GMM Professionals Night Public Trainings Reviews Conferences Technical Session & MANILA PROFILE HISTORY AND MISSION Who we

More information

CISA Prep Course 2017

CISA Prep Course 2017 CISA Prep Course 2017 13-15 November 2017 Final registration 6 November 2017 Offered by In association with ISACA Athens Chapter has been awarded four times as Best Large Chapter in Europe/Africa (2009,

More information

IT123: SABSA Foundation Training

IT123: SABSA Foundation Training IT123: SABSA Foundation Training IT123 Rev.002 CMCT COURSE OUTLINE Page 1 of 8 Training Description: SABSA is the world s leading open security architecture framework and methodology. SABSA is a top-tobottom

More information

Cyber Security Incident Response Fighting Fire with Fire

Cyber Security Incident Response Fighting Fire with Fire Cyber Security Incident Response Fighting Fire with Fire Arun Perinkolam, Senior Manager Deloitte & Touche LLP Professional Techniques T21 CRISC CGEIT CISM CISA AGENDA Companies like yours What is the

More information

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity

More information

COMPUTER HACKING Forensic Investigator

COMPUTER HACKING Forensic Investigator COMPUTER HACKING Forensic Investigator H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: CHFIv8 presents a detailed methodological approach

More information

TOMORROW. TOGETHER Governance, Risk, and Control Conference. August 19-21, Phoenix, Arizona. An IIA & ISACA Collaboration

TOMORROW. TOGETHER Governance, Risk, and Control Conference. August 19-21, Phoenix, Arizona. An IIA & ISACA Collaboration TOMORROW. TOGETHER. 2013 Governance, Risk, and Control Conference An IIA & ISACA Collaboration Join two highly respected associations at one world-class event August 19-21, 2013 Phoenix, Arizona Reserve

More information

The First Annual Privacy & Data Protection SOUTH AFRICA 2016

The First Annual Privacy & Data Protection SOUTH AFRICA 2016 The First Annual Privacy & Data Protection SOUTH AFRICA 2016 TransAtlantic Events 2016 Conference Series "POPI, The new horizon for South Africa: linking GDPR, The Cloud, Social Media and Information Security."

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

Mapping PCI DSS v2.0 With COBIT 4.1 By Pritam Bankar, CISA, CISM, and Sharad Verma

Mapping PCI DSS v2.0 With COBIT 4.1 By Pritam Bankar, CISA, CISM, and Sharad Verma Volume 2, April 2011 Come join the discussion! Pritam Bankar and Sharad Verma will be responding to questions and comments in the discussion area of the COBIT Use It Effectively topic beginning 21 April

More information

13:05-13:20 CONFERENCE OPENING Hon. Dr José A. Herrera Parliamentary Secretary for Competitiveness and Economic Growth

13:05-13:20 CONFERENCE OPENING Hon. Dr José A. Herrera Parliamentary Secretary for Competitiveness and Economic Growth Date Friday 8 th May 2015, 12:30-17:30 Followed by a Networking Reception to celebrate the ISACA Malta Chapter s Tenth Anniversary Venue Parking Le Méridien St. Julians Hotel & Spa Main Street, St. Julians,

More information

IT Auditing and IT Fraud Detection

IT Auditing and IT Fraud Detection IT Auditing and IT Fraud Detection Page 1 of 7 Why Attend In today s world, IT fraud prevention and investigation have become an everyday part of corporate life and auditors must gain expertise in this

More information

Building a Cybersecurity R&D Ecosystem in Singapore

Building a Cybersecurity R&D Ecosystem in Singapore Building a Cybersecurity R&D Ecosystem in Singapore Vivy Suhendra Executive Director, Singapore Cybersecurity Consortium About Us Launched 1 Sep 2016, funded by National Research Foundation (NRF) and anchored

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

DUNS CAGE 5T5C3

DUNS CAGE 5T5C3 Response to Department of Management Services Cyber Security Assessment, Remediation, and Identity Protection, Monitoring and Restoration Services Request For Information 131 Guilford Road, Bloomfield

More information

Conference Overview. w w w. s p a t i a l c o. e v e n t s / b c m. Who should attend? Conference Topics. Officially Sponsored by.

Conference Overview. w w w. s p a t i a l c o. e v e n t s / b c m. Who should attend? Conference Topics. Officially Sponsored by. Officially Sponsored by Supported by Sponsored by Knowledge Partner Conference Overview Business Continuity Management and Disaster Recovery BCM & DR are fundamental to the wellbeing of an organization.

More information

FramewOrk to DeSign and implement ifc

FramewOrk to DeSign and implement ifc Marketing Partner Hotel Radisson GRT, 15 Leveraging COSO internal COntrOLS FramewOrk to DeSign and implement ifc 8 CPE Hours Networking Opportunities Qualified CIA Faculty about the Seminar The COSO Internal

More information

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES MANILA CHAPTER 2017 CALENDAR OF ACTIVITIES 2017 MANILA CALENDAR OF ACTIVITIES GMM Professionals Night Public Trainings Reviews Conferences Technical Session & MANILA PROFILE HISTORY AND MISSION Who we

More information

2018 CALENDAR OF ACTIVITIES

2018 CALENDAR OF ACTIVITIES 2018 CALENDAR OF ACTIVITIES WHO WE ARE AND WHAT WE OFFER Ý Public Trainings Technical Sessions Reviews GMM Other Chapter Activities Conferences Professionals Night ISACA was incorporated by individuals

More information

Partnership Information

Partnership Information SECOND INTERNATIONAL CONFERENCE ON ISO 31000 STANDARD USING ISO 31000 RISK MANAGEMENT STANDARD TO ACHIEVE OPTIMAL PERFORMANCE Conference Date: 28-29 May 2013 Master Classes Date: 30-31 May 2013 Location:

More information

Certified in Risk and Information Systems ControlTM Certification Training - Brochure

Certified in Risk and Information Systems ControlTM Certification Training - Brochure Certified in Risk and Information Systems ControlTM Certification Training - Brochure Manage IT risks to control Information Systems effectively Course Name : CRISC Certification Training Version : INVL_CRISC_BR_1.0

More information

CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore

CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore 6 th annual CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore Organised By: Event Schedule Tuesday 20 th March 2018 Full Day Workshop

More information