2017 NSAA IT Conference October 4-6, 2017 Tacoma, Washington SPEAKER BIOGRAPHIES

Size: px
Start display at page:

Download "2017 NSAA IT Conference October 4-6, 2017 Tacoma, Washington SPEAKER BIOGRAPHIES"

Transcription

1 2017 NSAA IT Conference October 4-6, 2017 Tacoma, Washington SPEAKER BIOGRAPHIES DAVID ASHLEY, CISA, CISM, CBCP, CHP, CRISC, has served as the director of EDP audit for the state of Mississippi with the Office of the State Auditor for the last four years. David has over 40 years of experience at the domestic and international levels in information technology auditing, operations, applications development, and technical support. In addition, he has been involved in numerous business continuity planning and disaster recovery projects. David graduated from Delta State University with a master of education in 1975 and Millsaps College with a master of business administration in David is a certified information systems auditor, certified information security manager, certified business continuity professional, certified HIPAA professional and is certified in risk and information systems controls. Immediately prior to coming to the State Auditor s Office, David served for over eight years as manager of IT risk and assurance at a CPA firm that was ranked in the Top 50 firms in the United States, where he gained considerable experience in the areas of publicly traded and private entities, governmental entities, healthcare, SAS 70/SSAE 16 (SOC report generation and use), and regulatory compliance. While David enjoys the challenge of auditing agencies with very complex computer systems, he realizes the most satisfaction when helping smaller entities secure their information assets and passing along to both staff and clients the knowledge about business systems, as well as life, that he has gained through his varied experiences. BLAKE BIALKOWSKI, CISA, PMP, is an audit manager with the commonwealth of Virginia s Office of the Auditor of Public Accounts (APA). Blake has worked for the commonwealth for over 13 years, with 11 being at the APA. He has experience performing financial, project management, and information security audits. Blake is currently on the information systems security team that performs information security audits at all public colleges, universities, and agencies in the commonwealth. Blake has a bachelor of science degree in business information technology from Virginia Tech. Blake has a six-year-old daughter, and enjoys spending time outside with her and his wife. Blake is a huge fan of the Virginia Tech Hokies and is unfortunately a Redskins fan. JARED BROWN is a special agent assigned to the FBI Seattle Cyber Task Force. He has worked for the FBI since 2005 in the Seattle and San Francisco field offices. MIKI CESTNIK, CISA, has been working with the Montana State Legislative Audit Division for over four years as an IS auditor. This summer she obtained the certified information security auditor credential. Prior to working in Montana, she was involved with process improvement as a business analyst and merchandise planner for the private sector in Nebraska. Outside of work, she competes in and coaches weightlifting and powerlifting and drives two children around to various activities. JOE CLARK has been with the Washington State Auditor s Office since early He has worked on multiple performance audits, including SAO s 2016 and 2017 IT security performance audits of state agencies. In late 2016, he administered a survey of nearly three dozen Washington state agencies, soliciting feedback on SAO s IT security performance audits and areas for improvement. Joe has a master s degree in public policy and a bachelor s degree in economics from Oregon State University. SCOTT DeVINEY, CPA, has worked for the Office of the Washington State Auditor since He leads the office s technical support team to deliver current audit guidance, training, technical assistance and quality assurance. He also serves on the Financial Management Standards Board of the Association of Government Accountants and both the Peer Review and Audit Standards and Reporting committees of the National State Auditors Association.

2 SHELLY FANSON, CPA, CISA, was appointed as an audit manager in December As an audit manager, Ms. Fanson shares responsibility with the Audit Division administrator for the oversight of information technology audits at all departments and for the oversight of financial and performance audits at the Michigan Department of Agriculture and Rural Development, the Department of Environmental Quality, the Department of Natural Resources, and the Department of Transportation. In addition, Ms. Fanson participates in the formulation of audit policy and the establishment of goals and objectives for improving the effectiveness and efficiency of the Bureau of Audit Operations. She also participates in the presentation of final audit reports to legislative committees and represents the auditor general when consulting with, providing assistance to, or advising officials from other states, the federal government, and professional organizations. Ms. Fanson is a member of the American Institute of Certified Public Accountants and the Information Systems Audit and Control Association. Ms. Fanson is a member of the National State Auditors Association's E-Government Committee. She has a bachelor's degree in accounting from Michigan State University. MIKE FARRAR, CISA, CISM, CGFM, has spent his entire career in roles that focus on public accountability and transparency. Mike worked for 25 years in the New York State Comptroller s Office where he conducted performance audits of New York State agencies and public benefit corporations, and where he was also responsible for ensuring technology resources for the audit unit ran efficiently and were adequately supported. Mike left the Comptroller s Office to join the newly-created New York State Authorities Budget Office in The Authorities Budget Office s primary responsibility is to make public authorities more accountable and transparent, and to ensure public authorities act in the public interest consistent with their intended purpose. Mike is a certified information systems auditor, a certified information security manager, and a certified government financial manager. Mike is also an active member of the Association of Government Accountants and the Information Systems Audit and Control Association, where he is a past president and board member of the Hudson Valley chapter. TERESA FURNISH, CISA, is the IT audit manager at the Oregon Secretary of State s Audits Division. She is a certified information systems auditor and holds degrees in liberal studies, english, accounting, and business management with an option in managing information systems. She has been performing, leading or managing information technology audits at the division since Her work includes multiple reviews of security management and general controls at the state data center and security, application, and general controls reviews at numerous other agencies. GORAN GUSTAVSSON, CISM, CISSP, is an audit director with the commonwealth of Virginia s Auditor of Public Accounts. He has been with the APA since He is also the team leader for the information systems security specialty team, which is responsible for audits of IT systems at state agencies and public institutions of higher education. Goran has a bachelor of science degree in computer science from Virginia Commonwealth University and a master of business administration degree with concentration in information security from James Madison University. Goran is an active pilot and flies Cirrus SR-20/22 aircrafts out of Chesterfield Airport. He lives with his wife and two daughters in Chesterfield County, Virginia. KAREN HELDERMAN, CPA, CISA, PMP, is an audit director with the Office of the Auditor of Public Accounts and has more than 31 years of audit experience. She specializes in managing audits that are highly automated and also serves as a systems development audit director. Since 2003, much of her work has involved following Virginia s activities to consolidate the IT infrastructure, develop project management standards, and replace existing central administrative systems. Karen and her team have made recommendations on these activities and other major systems development initiatives in numerous audit reports. Karen graduated with a bachelor s degree in accounting from Christopher Newport University and holds a master s degree in business administration from Virginia Tech. She currently serves as vice chair of the National State Auditor s Association E-Government Committee.

3 MIKE HJERMSTAD joined the State Auditor s Office in 2014 as an assistant state auditor with the State Technology Audit Team, and is now an assistant audit manager with the Local Information Systems Audit Team. Mike s primary responsibility is to plan and manage SAO s ongoing series of local government cyber security audits, which are performed free to local governments of all sizes and purposes within the State of Washington. In addition, Mike also works on audit strategies and resources related to cybersecurity for use by SAO staff and local governments. Prior to joining the State Auditor s Office, Mike spent over 15 years with the information technology division of PriceWaterhouseCoopers. During that time, Mike developed an extensive knowledge of IT and IT security through practical experience and by observing and providing technical assistance to PwCs IT audit practice. TINA KIM is the deputy comptroller for state government accountability. She previously served as the Office of the New York City Comptroller's deputy comptroller for audit, and the New York State Department of Transportation's director of the Audit and Civil Rights Division as well as the leader of the New York State Economic Recovery and Reinvestment Cabinet's Internal Control and Fraud Prevention Working Group. Ms. Kim is current chair of the Institute of Internal Auditor's Information Technology Guidance Committee and former chair of the IIA s Public Sector Committee as well as the American Institute of Certified Public Accountant's Government Performance and Accountability Committee. Ms. Kim is also a member of the audit committee for the Council of Korean Americans. She is the co-author of numerous articles and other publications on auditing and fraud-related topics. Prior to joining the Department of Transportation, she was the deputy inspector general for audit with the Office of the State Inspector General. Ms. Kim has a master s degree in accounting and information technology and a bachelor's degree in economics. KATHY LOVEJOY, CPA, CISA, is a senior audit manager for the Illinois Office of the Auditor General. Her areas of responsibility include managing financial audits, attestation examinations and information technology reviews of Illinois government agencies. In addition, she is responsible for the state of Illinois Service Organization Engagement. Ms. Lovejoy graduated from the University of Illinois and is a member of the American Institute of Certified Public Accountants and the Information Systems Audit and Control Association. SUNIA LAULILE joined the State Auditor s Office in October 2015 as an information security specialist. Sunia serves as an IT security expert supporting performance audits at the state and local level. He also serves in the State Auditor s Office internal security team for IT security policies and program. In total, Sunia has about two years of service with the state of Washington and 12 years of experience within the IT field. Additionally, Sunia is an actively serving member in the Washington Army National Guard with more than nine years of service. His current assignment is in information technology. RUSS McREE is group program manager of the Blue Team for Microsoft s Windows & Devices Group. He writes toolsmith, a monthly column for information security practitioners, and has written for other publications including Information Security, (IN)SECURE, SysAdmin, and Linux Magazine. Russ has spoken at events such as DEFCON, Derby Con, BlueHat, Black Hat, SANSFIRE, RSA, and is a SANS Internet Storm Center handler. He serves as a joint forces operator and planner on behalf of Washington Military Department s cyber and emergency management missions. Russ advocates for a holistic approach to the practice of information assurance as represented by holisticinfosec.org. HILDA MORGAN, CPA, CISA, CGFM, is an audit coordinator with the Auditor General s Office in the state of Florida. Hilda has 27 years of governmental IT audit experience including conducting application and general controls audits at state agencies, educational entities, and state data centers. Prior to working for the Auditor General s Office, Hilda worked in the private sector concentrating in accounting. Hilda is a certified public accountant, certified information systems auditor, and a certified government financial manager. Hilda received a bachelor of science in accounting and a bachelor of science in finance from the Florida State University.

4 DAVID MORRIS is the chief technology officer for cybersecurity for the state of Washington s Office of Cybersecurity. The Washington State Office of Cybersecurity was created in 2015 in response to everincreasing threats to individual privacy, infrastructure stability, and preserving the continuity of commerce in the event of a cyber-attack. The office is a part of Washington Technology Solutions (WaTech), the state agency responsible for central information technology services and policy for all state agencies. David manages the Computer Emergency Readiness Team, Cyber Threat Intelligence Program, and Digital Forensics Services. These teams provide proactive cyber defense, network assessments and incident response for organizations on the state of Washington government network. This group is comprised of professional cyber incident responders, forensics experts, and code analysts. Together they form a focal point for reporting, containment, and recovery of cyber security incidents. David is a certified security professional with over 15 years of experience as an engineer and technical manager supporting a diverse range of complex network environments for government, private, and non-profit industries. David has a focus in security technologies with specialty and credentialing in digital forensics, ethical hacking and incident response. David s recent efforts are in building out a threat intelligence program for sharing information within a state-level Information Sharing and Analysis Center, or ISAC. This program will provide machine-level information to ISAC members for the immediate strengthening of security defenses across the state of Washington. In March of 2017, David was nominated for the 2017 Governor s Award for Leadership in Management. He has been president of the Rainier chapter of ISSA for the past four years, and is an active member of the Seattle InfraGard Chapter and the High Technology Crime Investigative Association. AMANDA SAYLER is currently serving as an information systems auditor for the Legislative Audit Division in Montana where she provides support to financial compliance as well as conducts various types of information systems audits. She has only been employed with Legislative Audit Division for a little over a year. She previously worked in higher education as a full-time systems analyst in Denver, where she also graduated with a master s degree in public administration. MELISSA A. SCHUILING, CPA, CISA, joined the Michigan Office of the Auditor General in October She was appointed audit division administrator in April Ms. Schuiling is primarily responsible for the oversight of IT audits of general and application controls, as well as performance audits of the Department of Agriculture and Rural Development, Department of Environmental Quality, and Department of Natural Resources. Prior to becoming an audit division administrator, Ms. Schuiling served the OAG as a principal IT audit supervisor and an audit manager. Ms. Schuiling graduated from Ferris State University with bachelor of science degrees in accounting and computer information systems. She is a member of the American Institute of Certified Public Accountants. BRENDA SHINER, CISA, is an audit supervisor with the Auditor General s Office in the state of Florida. Brenda has 11 years of governmental IT audit experience including conducting application and general controls audits at state agencies, educational entities, and state data centers. Prior to working for the Auditor General s Office, Brenda worked as a technology consultant for Arthur Andersen and Andersen Consulting specializing in the design and development of large federal systems. Brenda is a certified information systems auditor and received a bachelor s degree in management information systems from Old Dominion University in Virginia. PAUL UNDERWOOD is currently the chief operating officer and former head of the Incident Response Program at Emagined Security. Mr. Underwood was an executive information security consultant and CISO for several companies over the last 27 years. Mr. Underwood s extensive experience in information security at both the technical and management levels has led him to teach security courseware in over 60 countries around the world. Mr. Underwood has extensive experience in running the day-to-day operations of information security practice in several security engineering disciplines including incident response, compliance programs, architecture design, application and platform controls, penetration testing, and network and physical security.

5 Emagined Security was founded to provide executive level security consulting services to Fortune 100 companies enabling a secure working environment with reduced risk. As the COO of Emagined Security, Mr. Underwood provides executive advising services to Fortune 100 CISOs guiding them through challenges in information security and compliance. Emagined Security s commercial clients cover a wide range of global organizations, including the financial, energy, healthcare, high tech, manufacturing, and insurance industries. His executive level experience enables the ability to help corporations make responsible decisions that drive company needs and balance security to ensure a symbiotic relationship between security and profitability.

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

2018 Government Professional Accounting Seminar

2018 Government Professional Accounting Seminar 2018 Government Professional Accounting Seminar Thursday September 6, 2018 7:30 a.m. - Registration and Networking 8:00 a.m. 4:50 p.m. (Early Registration by Tuesday, July 31, 2018; Regular by Friday,

More information

NSAA IT CONFERENCE. January 30-February 1, 2019 Savannah, Georgia

NSAA IT CONFERENCE. January 30-February 1, 2019 Savannah, Georgia NSAA IT CONFERENCE January 30-February 1, 2019 Savannah, Georgia DAN ALTOBELLI, CPA, CISA, CEH, is a principal auditor for the New Jersey Office of the State Auditor. He is responsible for planning, conducting

More information

Investigating Insider Threats

Investigating Insider Threats Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity

More information

NERC Staff Organization Chart Budget 2018

NERC Staff Organization Chart Budget 2018 NERC Staff Organization Chart Budget 2018 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate

More information

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot STANDING COMMITTEES A 1 Academic and Student Affairs Committee Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot INFORMATION This item is for information only. BACKGROUND To help

More information

NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart Budget 2019 NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate

More information

NERC Staff Organization Chart

NERC Staff Organization Chart NERC Staff Organization Chart President and CEO Administrative Associate Director to the Office of the CEO Associate Director, Member Relations and MRC Secretary Senior Vice President and Chief Reliability

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

UNITED STATES OFFICE OF PERSONNEL MANAGEMENT

UNITED STATES OFFICE OF PERSONNEL MANAGEMENT UNITED STATES OFFICE OF PERSONNEL MANAGEMENT TESTIMONY OF BETH F. COBERT ACTING DIRECTOR U.S. OFFICE OF PERSONNEL MANAGEMENT before the COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM UNITED STATES HOUSE

More information

NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart Budget 2019 NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate

More information

Memphis Chapter. President s Message. This annual event is designed to provide students with a

Memphis Chapter. President s Message. This annual event is designed to provide students with a Memphis Chapter F E B R U A R Y 2 0 1 5 Remember: Update your IIA profile for the most up-to-date news. RSVP for the Annual Student Day February 24, 2015 This annual event is designed to provide students

More information

NERC Staff Organization Chart Budget 2017

NERC Staff Organization Chart Budget 2017 NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel

More information

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

NERC Staff Organization Chart Budget 2017

NERC Staff Organization Chart Budget 2017 NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel

More information

UNITED STATES OF AMERICA BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, DC 20554

UNITED STATES OF AMERICA BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, DC 20554 UNITED STATES OF AMERICA BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, DC 20554 In the Matter Of ) ) Cyber Security Certification Program ) PS Docket No. 10-93 COMMENTS OF THE NATIONAL BOARD

More information

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important

More information

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable

More information

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:

More information

Career Paths In Cybersecurity

Career Paths In Cybersecurity Career Paths In Cybersecurity Introductions Rob Ashcraft Sr. Technical Advisor 26-yrs in Information Technology 14-yrs in Information Security Held positions as Technician, IT Management, IT Sales Double

More information

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM THE THREAT WE FACE On average, the Department of Administration information officers identify: 200 brute force attempts per day;

More information

Taking the Mystery Out of Counting CPE. Opening Remarks

Taking the Mystery Out of Counting CPE. Opening Remarks Taking the Mystery Out of Counting CPE Kristen Kociolek Assistant Director U.S. Government Accountability Office Harriet Richardson City Auditor Palo Alto, CA Opening Remarks MODERATOR R. Kinney Poynter

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

SOC for cybersecurity

SOC for cybersecurity April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory

More information

The Widening Talent Gap: The greatest security challenge of our time

The Widening Talent Gap: The greatest security challenge of our time INFORMATION SECURITY The Widening Talent Gap: The greatest security challenge of our time Presented by: Experis Information Security Practice Thursday, April 14, 2016 General Information Share the webinar

More information

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

Resolution: Advancing the National Preparedness for Cyber Security

Resolution: Advancing the National Preparedness for Cyber Security Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government

More information

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers 2017 PORT SECURITY SEMINAR & EXPO ISACA/CISM Information Security Management Training for Security Directors/Managers Agenda Introduction ISACA Information security vs. cybersecurity CISM certification

More information

Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m.

Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Increased use of technologies such as mobile devices, social media and cloud computing has increased

More information

Cyber Risks in the Boardroom Conference

Cyber Risks in the Boardroom Conference Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks

More information

NERC Staff Organization Chart 2015 Budget

NERC Staff Organization Chart 2015 Budget NERC Staff Organization Chart President and CEO (Dept. 2100) Executive Assistant (Dept. 2100) Associate Director, Member Relations and MRC Secretary (Dept. 2100) Senior Vice President and Chief Reliability

More information

Article II - Standards Section V - Continuing Education Requirements

Article II - Standards Section V - Continuing Education Requirements Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for

More information

DUNS CAGE 5T5C3

DUNS CAGE 5T5C3 Response to Department of Management Services Cyber Security Assessment, Remediation, and Identity Protection, Monitoring and Restoration Services Request For Information 131 Guilford Road, Bloomfield

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative

More information

Ben Eu. Summary. Experience. Associate Partner, Infrastructure & Endpoint Security at IBM

Ben Eu. Summary. Experience. Associate Partner, Infrastructure & Endpoint Security at IBM Ben Eu Associate Partner, Infrastructure & Endpoint Security at IBM Summary Ben Eu is currently an Associate Partner at IBM Security Services, North America. As an experienced information security executive

More information

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC

More information

California Cybersecurity Integration Center (Cal-CSIC)

California Cybersecurity Integration Center (Cal-CSIC) California Cybersecurity Integration Center (Cal-CSIC) Agenda Mission and Scope Whole of State Government Approach Where is the Cal-CSIC? Cal-CSIC Partners Attaining Cyber Maturity in Parallel Machine

More information

Master the implementation and management of a Cybersecurity Program based on ISO/IEC 27032

Master the implementation and management of a Cybersecurity Program based on ISO/IEC 27032 ISO/IEC 27032 Lead Manager 23rd - 27th October 2017 Hilton Hotel, Sandton, Johannesburg Master the implementation and management of a Program based on ISO/IEC 27032 Why should you attend? Manager training

More information

Les joies et les peines de la transformation numérique

Les joies et les peines de la transformation numérique Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education

More information

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017 State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and

More information

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com Spread your wings Professional qualifications and development at Deloitte What impact will you make? careers.deloitte.com It s your future. How far will you take it? Do you want to make an impact in your

More information

NYS DFS Cybersecurity Requirements. Stephen Head Senior Manager Risk Advisory Services

NYS DFS Cybersecurity Requirements. Stephen Head Senior Manager Risk Advisory Services NYS DFS Cybersecurity Requirements Stephen Head Senior Manager Risk Advisory Services December 5, 2017 About Me Stephen W. Head Mr. Head is a Senior Manager with Experis Finance, and has over thirty-five

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

ISACA Survey Results. 27 April Ms. Nancy M. Morris, Secretary Securities and Exchange Commission 100 F Street NE Washington, DC

ISACA Survey Results. 27 April Ms. Nancy M. Morris, Secretary Securities and Exchange Commission 100 F Street NE Washington, DC 3701 Algonquin Road, Suite 1010 Telephone: 847.253.1545 Rolling Meadows, Illinois 60008, USA Facsimile: 847.253.1443 Web Sites: www.isaca.org and www.itgi.org 27 April 2006 Ms. Nancy M. Morris, Secretary

More information

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN CENTRAL REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN TAKE THE STAGE Members: Register by Feb. 29 to save US$100. Take the Stage The IIA and IIA Nashville Chapter are excited to host the 2016 Central

More information

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 Sponsored by: Kansas Municipal Utilities Kansas Municipal Energy Agency Kansas Power Pool CYBERSECURITY TRAINING EXERCISE DATE November

More information

Effective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m.

Effective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m. Effective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m. Financial institutions are subject to threats on multiple fronts. Two threats of significant

More information

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized. Val-EdTM Valiant Technologies Education & Training Services Workshop for CISM aspirants All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting

More information

The value of visibility. Cybersecurity risk management examination

The value of visibility. Cybersecurity risk management examination The value of visibility Cybersecurity risk management examination Welcome to the "new normal" Cyberattacks are inevitable. In fact, it s no longer a question of if a breach will occur but when. Cybercriminals

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

Overview: Sponsored By:

Overview: Sponsored By: Overview: IIA Winnipeg is hosting its third annual full day Fraud Summit on Tuesday, March 15 th. The 2016 Fraud Summit will focus on fraud prevention, deterrence and detection along with topics including

More information

Anatomy of a Data Breach: A Practical Guide for Small Law Departments

Anatomy of a Data Breach: A Practical Guide for Small Law Departments Anatomy of a Data Breach: A Practical Guide for Small Law Departments Judy Branzelle is the Chief Legal Officer and General Counsel for Goodwill Industries International, Inc. where she has been employed

More information

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015 ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters

More information

NERC Staff Organization Chart Budget

NERC Staff Organization Chart Budget NERC Staff Organization Chart 2013 2014 President and CEO (Dept. 2100) Executive Assistant (Dept. 2100) Senior Vice President and Chief Operating Officer (Dept. 2100) Senior Vice President General Counsel

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

IT Audit Process Prof. Liang Yao Week Two IT Audit Function

IT Audit Process Prof. Liang Yao Week Two IT Audit Function Week Two IT Audit Function Why we need IT audit A Case Study What You Can Learn about Risk Management from Societe Generale? https://www.cio.com/article/2436790/security0/what-you-can-learn-about-risk-management-fromsociete-generale.html

More information

MNsure Privacy Program Strategic Plan FY

MNsure Privacy Program Strategic Plan FY MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term

More information

Assessment and Compliance with Sarbanes-Oxley (SOX) Requirements DataGuardZ Whitepaper

Assessment and Compliance with Sarbanes-Oxley (SOX) Requirements DataGuardZ Whitepaper Assessment and Compliance with Sarbanes-Oxley (SOX) Requirements DataGuardZ Whitepaper What is the history behind Sarbanes-Oxley Act (SOX)? In 2002, the U.S. Senate added the Sarbanes-Oxley Act (SOX) to

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

Handling Complex and Difficult Privacy and Information Security Issues

Handling Complex and Difficult Privacy and Information Security Issues Handling Complex and Difficult Privacy and Information Security Issues Rebecca Herold, CIPP, CISSP, CISM, CISA, FLMI Christopher Grillo, CISM, CISA, CPA, ITIL Presentation Overview: Handling complex and

More information

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE

More information

Does a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA?

Does a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA? Does a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA? A brief overview of security requirements for Federal government agencies applicable to contracted IT services,

More information

Service Organization Control (SOC) Reports: What they are and what to do with them MARCH 21, 2017

Service Organization Control (SOC) Reports: What they are and what to do with them MARCH 21, 2017 Service Organization Control (SOC) Reports: What they are and what to do with them MARCH 21, 2017 Presenter Colin Wallace, CPA/CFF, CFE, CIA, CISA Partner Colin has provided management consulting and internal

More information

A Global Look at IT Audit Best Practices

A Global Look at IT Audit Best Practices A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory

More information

HCISPP HealthCare Information Security and Privacy Practitioner

HCISPP HealthCare Information Security and Privacy Practitioner HCISPP HealthCare Information Security and Privacy Practitioner William Buddy Gillespie, HCISPP Global Academic Instructor (ISC)² Former Healthcare CIO Chair Advocacy Committee, CPAHIMSS budgill@aol.com

More information

ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE

ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of

More information

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,

More information

Federal Acquisition Service Authorized Federal Supply Schedule Price List

Federal Acquisition Service Authorized Federal Supply Schedule Price List Federal Acquisition Service Authorized Federal Supply Schedule Price List On-line access to contract ordering information, terms and conditions, up-to-date pricing, and the option to create an electronic

More information

COMMENTARY. Federal Banking Agencies Propose Enhanced Cyber Risk Management Standards

COMMENTARY. Federal Banking Agencies Propose Enhanced Cyber Risk Management Standards November 2016 COMMENTARY Federal Banking Agencies Propose Enhanced Cyber Risk Management Standards The Board of Governors of the Federal Reserve System ( Federal Reserve Board ), the Federal Deposit Insurance

More information

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0 P.O. Box 212 Philip D. Murphy, Governor 300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ 08625-0212 www.tech.nj.gov STATE OF NEW JERSEY TECHNOLOGY CIRCULAR Enterprise Information

More information

The 4 th Annual Information Assurance Day November 10, 2011 Delaware Room HUB IUP. Time Slot Speaker Topic Title

The 4 th Annual Information Assurance Day November 10, 2011 Delaware Room HUB IUP. Time Slot Speaker Topic Title The 4 th Annual Information Assurance Day November 10, 2011 Delaware Room HUB IUP Time Slot Speaker Topic Title 8:40 9:00 Dr. Deanne Snavely, Dean College of Natural Science and Mathematics 9:00 9:45 9:45

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

Monthly Meeting November 16, 2016

Monthly Meeting November 16, 2016 Monthly Meeting November 16, 2016 Agenda / Announcements Welcome to Parsons, 7110 Samuel Morse Drive, Suite 200 Columbia, Maryland 21046 Non-U.S. Citizen Requirements Any guests or new members in attendance?

More information

Exploring the Maturity of Risk Management Process in Government: An Integrated ERM Model at the U.S. Department of Education

Exploring the Maturity of Risk Management Process in Government: An Integrated ERM Model at the U.S. Department of Education Exploring the Maturity of Risk Management Process in Government: An Integrated ERM Model at the U.S. Department of Education FEDERAL STUDENT AID ENTERPRISE RISK MANAGEMENT GROUP Cynthia Vitters 1. ERM

More information

UNIVERSITY OF VIRGINIA BOARD OF VISITORS MEETING OF THE AUDIT, COMPLIANCE, AND RISK COMMITTEE DECEMBER 9, 2016

UNIVERSITY OF VIRGINIA BOARD OF VISITORS MEETING OF THE AUDIT, COMPLIANCE, AND RISK COMMITTEE DECEMBER 9, 2016 UNIVERSITY OF VIRGINIA BOARD OF VISITORS MEETING OF THE AUDIT, COMPLIANCE, AND RISK COMMITTEE DECEMBER 9, 2016 AUDIT, COMPLIANCE, AND RISK COMMITTEE (Open Session) Friday, December 9, 2016 12:45-1:45 p.m.

More information

CYBERSECURITY. The Intersection of Policy and Technology YOU RE HERE TO MAKE A DIFFERENCE ṢM

CYBERSECURITY. The Intersection of Policy and Technology   YOU RE HERE TO MAKE A DIFFERENCE ṢM CYBERSECURITY The Intersection of Policy and Technology WWW.HKS.HARVARD.EDU/EE/CYBER YOU RE HERE TO MAKE A DIFFERENCE ṢM CYBERSECURITY THE INTERSECTION OF POLICY AND TECHNOLOGY In a world with almost limitless

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

Evaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium

Evaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium Discussion on: Evaluating Cybersecurity Coverage A Maturity Model Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium By: Eric C. Lovell PricewaterhouseCoopers LLP ( PwC ) March 24,

More information

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee

More information

AUDIT REPORT. Network Assessment Audit Audit Opinion: Needs Improvement. Date: December 15, Report Number: 2014-IT-03

AUDIT REPORT. Network Assessment Audit Audit Opinion: Needs Improvement. Date: December 15, Report Number: 2014-IT-03 AUDIT REPORT Network Assessment Audit Audit Opinion: Needs Improvement Date: December 15, 2014 Report Number: 2014-IT-03 Table of Contents: Page Executive Summary Background 1 Audit Objectives and Scope

More information

COPYRIGHTED MATERIAL. Index

COPYRIGHTED MATERIAL.   Index Index 2014 revised COSO framework. See COSO internal control framework Association of Certified Fraud Examiners (ACFE), 666 Administrative files workpaper document organization, 402 AICPA fraud standards

More information

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Table of Contents Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Chapter 1: Significance of Internal Auditing in Enterprises Today: An Update 3 1.1 Internal Auditing History and Background

More information

FERC Reliability Technical Conference Panel III: ERO Performance and Initiatives ESCC and the ES-ISAC

FERC Reliability Technical Conference Panel III: ERO Performance and Initiatives ESCC and the ES-ISAC : ERO Performance and Initiatives June 4, 2015 Chairman Bay, Commissioners, and fellow panelists, I appreciate the opportunity to address the topics identified for the third panel of today s important

More information

OSC Guidance and Training for Internal Audit and Internal Control Practitioners. Tina Kim John Buyce

OSC Guidance and Training for Internal Audit and Internal Control Practitioners. Tina Kim John Buyce OSC Guidance and Training for Internal Audit and Internal Control Practitioners Tina Kim John Buyce Training Requirements for Auditors and Internal Control Professionals Yellow Book: Chapter 3 General

More information

President's Letter. March Meeting Details: Date: Wednesday, March 15, 2006

President's Letter. March Meeting Details: Date: Wednesday, March 15, 2006 President's Letter I hope everyone had a safe and fun Mardi Gras season. It seems strange to be writing at the beginning of March. We typically have a February meeting scheduled, so we re running a little

More information

Audit and Compliance Committee - Agenda

Audit and Compliance Committee - Agenda Audit and Compliance Committee - Agenda Board of Trustees Audit and Compliance Committee April 17, 2018, 1:30 2:30 p.m. President s Board Room Conference Call-In Phone #1-800-442-5794, passcode 463796

More information

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.

More information