2017 NSAA IT Conference October 4-6, 2017 Tacoma, Washington SPEAKER BIOGRAPHIES
|
|
- Bernard Darren Freeman
- 6 years ago
- Views:
Transcription
1 2017 NSAA IT Conference October 4-6, 2017 Tacoma, Washington SPEAKER BIOGRAPHIES DAVID ASHLEY, CISA, CISM, CBCP, CHP, CRISC, has served as the director of EDP audit for the state of Mississippi with the Office of the State Auditor for the last four years. David has over 40 years of experience at the domestic and international levels in information technology auditing, operations, applications development, and technical support. In addition, he has been involved in numerous business continuity planning and disaster recovery projects. David graduated from Delta State University with a master of education in 1975 and Millsaps College with a master of business administration in David is a certified information systems auditor, certified information security manager, certified business continuity professional, certified HIPAA professional and is certified in risk and information systems controls. Immediately prior to coming to the State Auditor s Office, David served for over eight years as manager of IT risk and assurance at a CPA firm that was ranked in the Top 50 firms in the United States, where he gained considerable experience in the areas of publicly traded and private entities, governmental entities, healthcare, SAS 70/SSAE 16 (SOC report generation and use), and regulatory compliance. While David enjoys the challenge of auditing agencies with very complex computer systems, he realizes the most satisfaction when helping smaller entities secure their information assets and passing along to both staff and clients the knowledge about business systems, as well as life, that he has gained through his varied experiences. BLAKE BIALKOWSKI, CISA, PMP, is an audit manager with the commonwealth of Virginia s Office of the Auditor of Public Accounts (APA). Blake has worked for the commonwealth for over 13 years, with 11 being at the APA. He has experience performing financial, project management, and information security audits. Blake is currently on the information systems security team that performs information security audits at all public colleges, universities, and agencies in the commonwealth. Blake has a bachelor of science degree in business information technology from Virginia Tech. Blake has a six-year-old daughter, and enjoys spending time outside with her and his wife. Blake is a huge fan of the Virginia Tech Hokies and is unfortunately a Redskins fan. JARED BROWN is a special agent assigned to the FBI Seattle Cyber Task Force. He has worked for the FBI since 2005 in the Seattle and San Francisco field offices. MIKI CESTNIK, CISA, has been working with the Montana State Legislative Audit Division for over four years as an IS auditor. This summer she obtained the certified information security auditor credential. Prior to working in Montana, she was involved with process improvement as a business analyst and merchandise planner for the private sector in Nebraska. Outside of work, she competes in and coaches weightlifting and powerlifting and drives two children around to various activities. JOE CLARK has been with the Washington State Auditor s Office since early He has worked on multiple performance audits, including SAO s 2016 and 2017 IT security performance audits of state agencies. In late 2016, he administered a survey of nearly three dozen Washington state agencies, soliciting feedback on SAO s IT security performance audits and areas for improvement. Joe has a master s degree in public policy and a bachelor s degree in economics from Oregon State University. SCOTT DeVINEY, CPA, has worked for the Office of the Washington State Auditor since He leads the office s technical support team to deliver current audit guidance, training, technical assistance and quality assurance. He also serves on the Financial Management Standards Board of the Association of Government Accountants and both the Peer Review and Audit Standards and Reporting committees of the National State Auditors Association.
2 SHELLY FANSON, CPA, CISA, was appointed as an audit manager in December As an audit manager, Ms. Fanson shares responsibility with the Audit Division administrator for the oversight of information technology audits at all departments and for the oversight of financial and performance audits at the Michigan Department of Agriculture and Rural Development, the Department of Environmental Quality, the Department of Natural Resources, and the Department of Transportation. In addition, Ms. Fanson participates in the formulation of audit policy and the establishment of goals and objectives for improving the effectiveness and efficiency of the Bureau of Audit Operations. She also participates in the presentation of final audit reports to legislative committees and represents the auditor general when consulting with, providing assistance to, or advising officials from other states, the federal government, and professional organizations. Ms. Fanson is a member of the American Institute of Certified Public Accountants and the Information Systems Audit and Control Association. Ms. Fanson is a member of the National State Auditors Association's E-Government Committee. She has a bachelor's degree in accounting from Michigan State University. MIKE FARRAR, CISA, CISM, CGFM, has spent his entire career in roles that focus on public accountability and transparency. Mike worked for 25 years in the New York State Comptroller s Office where he conducted performance audits of New York State agencies and public benefit corporations, and where he was also responsible for ensuring technology resources for the audit unit ran efficiently and were adequately supported. Mike left the Comptroller s Office to join the newly-created New York State Authorities Budget Office in The Authorities Budget Office s primary responsibility is to make public authorities more accountable and transparent, and to ensure public authorities act in the public interest consistent with their intended purpose. Mike is a certified information systems auditor, a certified information security manager, and a certified government financial manager. Mike is also an active member of the Association of Government Accountants and the Information Systems Audit and Control Association, where he is a past president and board member of the Hudson Valley chapter. TERESA FURNISH, CISA, is the IT audit manager at the Oregon Secretary of State s Audits Division. She is a certified information systems auditor and holds degrees in liberal studies, english, accounting, and business management with an option in managing information systems. She has been performing, leading or managing information technology audits at the division since Her work includes multiple reviews of security management and general controls at the state data center and security, application, and general controls reviews at numerous other agencies. GORAN GUSTAVSSON, CISM, CISSP, is an audit director with the commonwealth of Virginia s Auditor of Public Accounts. He has been with the APA since He is also the team leader for the information systems security specialty team, which is responsible for audits of IT systems at state agencies and public institutions of higher education. Goran has a bachelor of science degree in computer science from Virginia Commonwealth University and a master of business administration degree with concentration in information security from James Madison University. Goran is an active pilot and flies Cirrus SR-20/22 aircrafts out of Chesterfield Airport. He lives with his wife and two daughters in Chesterfield County, Virginia. KAREN HELDERMAN, CPA, CISA, PMP, is an audit director with the Office of the Auditor of Public Accounts and has more than 31 years of audit experience. She specializes in managing audits that are highly automated and also serves as a systems development audit director. Since 2003, much of her work has involved following Virginia s activities to consolidate the IT infrastructure, develop project management standards, and replace existing central administrative systems. Karen and her team have made recommendations on these activities and other major systems development initiatives in numerous audit reports. Karen graduated with a bachelor s degree in accounting from Christopher Newport University and holds a master s degree in business administration from Virginia Tech. She currently serves as vice chair of the National State Auditor s Association E-Government Committee.
3 MIKE HJERMSTAD joined the State Auditor s Office in 2014 as an assistant state auditor with the State Technology Audit Team, and is now an assistant audit manager with the Local Information Systems Audit Team. Mike s primary responsibility is to plan and manage SAO s ongoing series of local government cyber security audits, which are performed free to local governments of all sizes and purposes within the State of Washington. In addition, Mike also works on audit strategies and resources related to cybersecurity for use by SAO staff and local governments. Prior to joining the State Auditor s Office, Mike spent over 15 years with the information technology division of PriceWaterhouseCoopers. During that time, Mike developed an extensive knowledge of IT and IT security through practical experience and by observing and providing technical assistance to PwCs IT audit practice. TINA KIM is the deputy comptroller for state government accountability. She previously served as the Office of the New York City Comptroller's deputy comptroller for audit, and the New York State Department of Transportation's director of the Audit and Civil Rights Division as well as the leader of the New York State Economic Recovery and Reinvestment Cabinet's Internal Control and Fraud Prevention Working Group. Ms. Kim is current chair of the Institute of Internal Auditor's Information Technology Guidance Committee and former chair of the IIA s Public Sector Committee as well as the American Institute of Certified Public Accountant's Government Performance and Accountability Committee. Ms. Kim is also a member of the audit committee for the Council of Korean Americans. She is the co-author of numerous articles and other publications on auditing and fraud-related topics. Prior to joining the Department of Transportation, she was the deputy inspector general for audit with the Office of the State Inspector General. Ms. Kim has a master s degree in accounting and information technology and a bachelor's degree in economics. KATHY LOVEJOY, CPA, CISA, is a senior audit manager for the Illinois Office of the Auditor General. Her areas of responsibility include managing financial audits, attestation examinations and information technology reviews of Illinois government agencies. In addition, she is responsible for the state of Illinois Service Organization Engagement. Ms. Lovejoy graduated from the University of Illinois and is a member of the American Institute of Certified Public Accountants and the Information Systems Audit and Control Association. SUNIA LAULILE joined the State Auditor s Office in October 2015 as an information security specialist. Sunia serves as an IT security expert supporting performance audits at the state and local level. He also serves in the State Auditor s Office internal security team for IT security policies and program. In total, Sunia has about two years of service with the state of Washington and 12 years of experience within the IT field. Additionally, Sunia is an actively serving member in the Washington Army National Guard with more than nine years of service. His current assignment is in information technology. RUSS McREE is group program manager of the Blue Team for Microsoft s Windows & Devices Group. He writes toolsmith, a monthly column for information security practitioners, and has written for other publications including Information Security, (IN)SECURE, SysAdmin, and Linux Magazine. Russ has spoken at events such as DEFCON, Derby Con, BlueHat, Black Hat, SANSFIRE, RSA, and is a SANS Internet Storm Center handler. He serves as a joint forces operator and planner on behalf of Washington Military Department s cyber and emergency management missions. Russ advocates for a holistic approach to the practice of information assurance as represented by holisticinfosec.org. HILDA MORGAN, CPA, CISA, CGFM, is an audit coordinator with the Auditor General s Office in the state of Florida. Hilda has 27 years of governmental IT audit experience including conducting application and general controls audits at state agencies, educational entities, and state data centers. Prior to working for the Auditor General s Office, Hilda worked in the private sector concentrating in accounting. Hilda is a certified public accountant, certified information systems auditor, and a certified government financial manager. Hilda received a bachelor of science in accounting and a bachelor of science in finance from the Florida State University.
4 DAVID MORRIS is the chief technology officer for cybersecurity for the state of Washington s Office of Cybersecurity. The Washington State Office of Cybersecurity was created in 2015 in response to everincreasing threats to individual privacy, infrastructure stability, and preserving the continuity of commerce in the event of a cyber-attack. The office is a part of Washington Technology Solutions (WaTech), the state agency responsible for central information technology services and policy for all state agencies. David manages the Computer Emergency Readiness Team, Cyber Threat Intelligence Program, and Digital Forensics Services. These teams provide proactive cyber defense, network assessments and incident response for organizations on the state of Washington government network. This group is comprised of professional cyber incident responders, forensics experts, and code analysts. Together they form a focal point for reporting, containment, and recovery of cyber security incidents. David is a certified security professional with over 15 years of experience as an engineer and technical manager supporting a diverse range of complex network environments for government, private, and non-profit industries. David has a focus in security technologies with specialty and credentialing in digital forensics, ethical hacking and incident response. David s recent efforts are in building out a threat intelligence program for sharing information within a state-level Information Sharing and Analysis Center, or ISAC. This program will provide machine-level information to ISAC members for the immediate strengthening of security defenses across the state of Washington. In March of 2017, David was nominated for the 2017 Governor s Award for Leadership in Management. He has been president of the Rainier chapter of ISSA for the past four years, and is an active member of the Seattle InfraGard Chapter and the High Technology Crime Investigative Association. AMANDA SAYLER is currently serving as an information systems auditor for the Legislative Audit Division in Montana where she provides support to financial compliance as well as conducts various types of information systems audits. She has only been employed with Legislative Audit Division for a little over a year. She previously worked in higher education as a full-time systems analyst in Denver, where she also graduated with a master s degree in public administration. MELISSA A. SCHUILING, CPA, CISA, joined the Michigan Office of the Auditor General in October She was appointed audit division administrator in April Ms. Schuiling is primarily responsible for the oversight of IT audits of general and application controls, as well as performance audits of the Department of Agriculture and Rural Development, Department of Environmental Quality, and Department of Natural Resources. Prior to becoming an audit division administrator, Ms. Schuiling served the OAG as a principal IT audit supervisor and an audit manager. Ms. Schuiling graduated from Ferris State University with bachelor of science degrees in accounting and computer information systems. She is a member of the American Institute of Certified Public Accountants. BRENDA SHINER, CISA, is an audit supervisor with the Auditor General s Office in the state of Florida. Brenda has 11 years of governmental IT audit experience including conducting application and general controls audits at state agencies, educational entities, and state data centers. Prior to working for the Auditor General s Office, Brenda worked as a technology consultant for Arthur Andersen and Andersen Consulting specializing in the design and development of large federal systems. Brenda is a certified information systems auditor and received a bachelor s degree in management information systems from Old Dominion University in Virginia. PAUL UNDERWOOD is currently the chief operating officer and former head of the Incident Response Program at Emagined Security. Mr. Underwood was an executive information security consultant and CISO for several companies over the last 27 years. Mr. Underwood s extensive experience in information security at both the technical and management levels has led him to teach security courseware in over 60 countries around the world. Mr. Underwood has extensive experience in running the day-to-day operations of information security practice in several security engineering disciplines including incident response, compliance programs, architecture design, application and platform controls, penetration testing, and network and physical security.
5 Emagined Security was founded to provide executive level security consulting services to Fortune 100 companies enabling a secure working environment with reduced risk. As the COO of Emagined Security, Mr. Underwood provides executive advising services to Fortune 100 CISOs guiding them through challenges in information security and compliance. Emagined Security s commercial clients cover a wide range of global organizations, including the financial, energy, healthcare, high tech, manufacturing, and insurance industries. His executive level experience enables the ability to help corporations make responsible decisions that drive company needs and balance security to ensure a symbiotic relationship between security and profitability.
Cybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More information2018 Government Professional Accounting Seminar
2018 Government Professional Accounting Seminar Thursday September 6, 2018 7:30 a.m. - Registration and Networking 8:00 a.m. 4:50 p.m. (Early Registration by Tuesday, July 31, 2018; Regular by Friday,
More informationNSAA IT CONFERENCE. January 30-February 1, 2019 Savannah, Georgia
NSAA IT CONFERENCE January 30-February 1, 2019 Savannah, Georgia DAN ALTOBELLI, CPA, CISA, CEH, is a principal auditor for the New Jersey Office of the State Auditor. He is responsible for planning, conducting
More informationInvestigating Insider Threats
Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More informationVice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security
Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity
More informationNERC Staff Organization Chart Budget 2018
NERC Staff Organization Chart Budget 2018 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationGovernment-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot
STANDING COMMITTEES A 1 Academic and Student Affairs Committee Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot INFORMATION This item is for information only. BACKGROUND To help
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationNERC Staff Organization Chart
NERC Staff Organization Chart President and CEO Administrative Associate Director to the Office of the CEO Associate Director, Member Relations and MRC Secretary Senior Vice President and Chief Reliability
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationUNITED STATES OFFICE OF PERSONNEL MANAGEMENT
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT TESTIMONY OF BETH F. COBERT ACTING DIRECTOR U.S. OFFICE OF PERSONNEL MANAGEMENT before the COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM UNITED STATES HOUSE
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate
More informationMemphis Chapter. President s Message. This annual event is designed to provide students with a
Memphis Chapter F E B R U A R Y 2 0 1 5 Remember: Update your IIA profile for the most up-to-date news. RSVP for the Annual Student Day February 24, 2015 This annual event is designed to provide students
More informationNERC Staff Organization Chart Budget 2017
NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel
More informationCYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD
CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)
More informationCYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More informationNERC Staff Organization Chart Budget 2017
NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel
More informationUNITED STATES OF AMERICA BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, DC 20554
UNITED STATES OF AMERICA BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, DC 20554 In the Matter Of ) ) Cyber Security Certification Program ) PS Docket No. 10-93 COMMENTS OF THE NATIONAL BOARD
More informationSteps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.
Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important
More informationM.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program
Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable
More informationGovernment Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security
Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:
More informationCareer Paths In Cybersecurity
Career Paths In Cybersecurity Introductions Rob Ashcraft Sr. Technical Advisor 26-yrs in Information Technology 14-yrs in Information Security Held positions as Technician, IT Management, IT Sales Double
More informationPROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM
PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM THE THREAT WE FACE On average, the Department of Administration information officers identify: 200 brute force attempts per day;
More informationTaking the Mystery Out of Counting CPE. Opening Remarks
Taking the Mystery Out of Counting CPE Kristen Kociolek Assistant Director U.S. Government Accountability Office Harriet Richardson City Auditor Palo Alto, CA Opening Remarks MODERATOR R. Kinney Poynter
More informationCyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research
More informationCybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.
Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationSOC for cybersecurity
April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory
More informationThe Widening Talent Gap: The greatest security challenge of our time
INFORMATION SECURITY The Widening Talent Gap: The greatest security challenge of our time Presented by: Experis Information Security Practice Thursday, April 14, 2016 General Information Share the webinar
More informationPlenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.
Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationResolution: Advancing the National Preparedness for Cyber Security
Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government
More information2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers
2017 PORT SECURITY SEMINAR & EXPO ISACA/CISM Information Security Management Training for Security Directors/Managers Agenda Introduction ISACA Information security vs. cybersecurity CISM certification
More informationChief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m.
Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Increased use of technologies such as mobile devices, social media and cloud computing has increased
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationNERC Staff Organization Chart 2015 Budget
NERC Staff Organization Chart President and CEO (Dept. 2100) Executive Assistant (Dept. 2100) Associate Director, Member Relations and MRC Secretary (Dept. 2100) Senior Vice President and Chief Reliability
More informationArticle II - Standards Section V - Continuing Education Requirements
Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationSTRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE
STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationKENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)
KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for
More informationDUNS CAGE 5T5C3
Response to Department of Management Services Cyber Security Assessment, Remediation, and Identity Protection, Monitoring and Restoration Services Request For Information 131 Guilford Road, Bloomfield
More informationMANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative
More informationBen Eu. Summary. Experience. Associate Partner, Infrastructure & Endpoint Security at IBM
Ben Eu Associate Partner, Infrastructure & Endpoint Security at IBM Summary Ben Eu is currently an Associate Partner at IBM Security Services, North America. As an experienced information security executive
More informationSALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually
SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC
More informationCalifornia Cybersecurity Integration Center (Cal-CSIC)
California Cybersecurity Integration Center (Cal-CSIC) Agenda Mission and Scope Whole of State Government Approach Where is the Cal-CSIC? Cal-CSIC Partners Attaining Cyber Maturity in Parallel Machine
More informationMaster the implementation and management of a Cybersecurity Program based on ISO/IEC 27032
ISO/IEC 27032 Lead Manager 23rd - 27th October 2017 Hilton Hotel, Sandton, Johannesburg Master the implementation and management of a Program based on ISO/IEC 27032 Why should you attend? Manager training
More informationLes joies et les peines de la transformation numérique
Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education
More informationState Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017
State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and
More informationSpread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com
Spread your wings Professional qualifications and development at Deloitte What impact will you make? careers.deloitte.com It s your future. How far will you take it? Do you want to make an impact in your
More informationNYS DFS Cybersecurity Requirements. Stephen Head Senior Manager Risk Advisory Services
NYS DFS Cybersecurity Requirements Stephen Head Senior Manager Risk Advisory Services December 5, 2017 About Me Stephen W. Head Mr. Head is a Senior Manager with Experis Finance, and has over thirty-five
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More informationISACA Survey Results. 27 April Ms. Nancy M. Morris, Secretary Securities and Exchange Commission 100 F Street NE Washington, DC
3701 Algonquin Road, Suite 1010 Telephone: 847.253.1545 Rolling Meadows, Illinois 60008, USA Facsimile: 847.253.1443 Web Sites: www.isaca.org and www.itgi.org 27 April 2006 Ms. Nancy M. Morris, Secretary
More informationCENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN
CENTRAL REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN TAKE THE STAGE Members: Register by Feb. 29 to save US$100. Take the Stage The IIA and IIA Nashville Chapter are excited to host the 2016 Central
More informationCYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017
CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 Sponsored by: Kansas Municipal Utilities Kansas Municipal Energy Agency Kansas Power Pool CYBERSECURITY TRAINING EXERCISE DATE November
More informationEffective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m.
Effective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m. Financial institutions are subject to threats on multiple fronts. Two threats of significant
More informationVal-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.
Val-EdTM Valiant Technologies Education & Training Services Workshop for CISM aspirants All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting
More informationThe value of visibility. Cybersecurity risk management examination
The value of visibility Cybersecurity risk management examination Welcome to the "new normal" Cyberattacks are inevitable. In fact, it s no longer a question of if a breach will occur but when. Cybercriminals
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationOverview: Sponsored By:
Overview: IIA Winnipeg is hosting its third annual full day Fraud Summit on Tuesday, March 15 th. The 2016 Fraud Summit will focus on fraud prevention, deterrence and detection along with topics including
More informationAnatomy of a Data Breach: A Practical Guide for Small Law Departments
Anatomy of a Data Breach: A Practical Guide for Small Law Departments Judy Branzelle is the Chief Legal Officer and General Counsel for Goodwill Industries International, Inc. where she has been employed
More informationISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015
ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters
More informationNERC Staff Organization Chart Budget
NERC Staff Organization Chart 2013 2014 President and CEO (Dept. 2100) Executive Assistant (Dept. 2100) Senior Vice President and Chief Operating Officer (Dept. 2100) Senior Vice President General Counsel
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationIT Audit Process Prof. Liang Yao Week Two IT Audit Function
Week Two IT Audit Function Why we need IT audit A Case Study What You Can Learn about Risk Management from Societe Generale? https://www.cio.com/article/2436790/security0/what-you-can-learn-about-risk-management-fromsociete-generale.html
More informationMNsure Privacy Program Strategic Plan FY
MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term
More informationAssessment and Compliance with Sarbanes-Oxley (SOX) Requirements DataGuardZ Whitepaper
Assessment and Compliance with Sarbanes-Oxley (SOX) Requirements DataGuardZ Whitepaper What is the history behind Sarbanes-Oxley Act (SOX)? In 2002, the U.S. Senate added the Sarbanes-Oxley Act (SOX) to
More informationIntroducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security
Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And
More informationHandling Complex and Difficult Privacy and Information Security Issues
Handling Complex and Difficult Privacy and Information Security Issues Rebecca Herold, CIPP, CISSP, CISM, CISA, FLMI Christopher Grillo, CISM, CISA, CPA, ITIL Presentation Overview: Handling complex and
More informationGreg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security
1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE
More informationDoes a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA?
Does a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA? A brief overview of security requirements for Federal government agencies applicable to contracted IT services,
More informationService Organization Control (SOC) Reports: What they are and what to do with them MARCH 21, 2017
Service Organization Control (SOC) Reports: What they are and what to do with them MARCH 21, 2017 Presenter Colin Wallace, CPA/CFF, CFE, CIA, CISA Partner Colin has provided management consulting and internal
More informationA Global Look at IT Audit Best Practices
A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory
More informationHCISPP HealthCare Information Security and Privacy Practitioner
HCISPP HealthCare Information Security and Privacy Practitioner William Buddy Gillespie, HCISPP Global Academic Instructor (ISC)² Former Healthcare CIO Chair Advocacy Committee, CPAHIMSS budgill@aol.com
More informationESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN
More informationInformation Systems and Tech (IST)
Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of
More informationISACA MOSCOW CHAPTER Chapter meeting 22 September 2016
ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,
More informationFederal Acquisition Service Authorized Federal Supply Schedule Price List
Federal Acquisition Service Authorized Federal Supply Schedule Price List On-line access to contract ordering information, terms and conditions, up-to-date pricing, and the option to create an electronic
More informationCOMMENTARY. Federal Banking Agencies Propose Enhanced Cyber Risk Management Standards
November 2016 COMMENTARY Federal Banking Agencies Propose Enhanced Cyber Risk Management Standards The Board of Governors of the Federal Reserve System ( Federal Reserve Board ), the Federal Deposit Insurance
More information300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0
P.O. Box 212 Philip D. Murphy, Governor 300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ 08625-0212 www.tech.nj.gov STATE OF NEW JERSEY TECHNOLOGY CIRCULAR Enterprise Information
More informationThe 4 th Annual Information Assurance Day November 10, 2011 Delaware Room HUB IUP. Time Slot Speaker Topic Title
The 4 th Annual Information Assurance Day November 10, 2011 Delaware Room HUB IUP Time Slot Speaker Topic Title 8:40 9:00 Dr. Deanne Snavely, Dean College of Natural Science and Mathematics 9:00 9:45 9:45
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More informationCybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com
Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding
More informationMonthly Meeting November 16, 2016
Monthly Meeting November 16, 2016 Agenda / Announcements Welcome to Parsons, 7110 Samuel Morse Drive, Suite 200 Columbia, Maryland 21046 Non-U.S. Citizen Requirements Any guests or new members in attendance?
More informationExploring the Maturity of Risk Management Process in Government: An Integrated ERM Model at the U.S. Department of Education
Exploring the Maturity of Risk Management Process in Government: An Integrated ERM Model at the U.S. Department of Education FEDERAL STUDENT AID ENTERPRISE RISK MANAGEMENT GROUP Cynthia Vitters 1. ERM
More informationUNIVERSITY OF VIRGINIA BOARD OF VISITORS MEETING OF THE AUDIT, COMPLIANCE, AND RISK COMMITTEE DECEMBER 9, 2016
UNIVERSITY OF VIRGINIA BOARD OF VISITORS MEETING OF THE AUDIT, COMPLIANCE, AND RISK COMMITTEE DECEMBER 9, 2016 AUDIT, COMPLIANCE, AND RISK COMMITTEE (Open Session) Friday, December 9, 2016 12:45-1:45 p.m.
More informationCYBERSECURITY. The Intersection of Policy and Technology YOU RE HERE TO MAKE A DIFFERENCE ṢM
CYBERSECURITY The Intersection of Policy and Technology WWW.HKS.HARVARD.EDU/EE/CYBER YOU RE HERE TO MAKE A DIFFERENCE ṢM CYBERSECURITY THE INTERSECTION OF POLICY AND TECHNOLOGY In a world with almost limitless
More informationITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018
GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences
More informationEvaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium
Discussion on: Evaluating Cybersecurity Coverage A Maturity Model Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium By: Eric C. Lovell PricewaterhouseCoopers LLP ( PwC ) March 24,
More informationInstitute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI
Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee
More informationAUDIT REPORT. Network Assessment Audit Audit Opinion: Needs Improvement. Date: December 15, Report Number: 2014-IT-03
AUDIT REPORT Network Assessment Audit Audit Opinion: Needs Improvement Date: December 15, 2014 Report Number: 2014-IT-03 Table of Contents: Page Executive Summary Background 1 Audit Objectives and Scope
More informationCOPYRIGHTED MATERIAL. Index
Index 2014 revised COSO framework. See COSO internal control framework Association of Certified Fraud Examiners (ACFE), 666 Administrative files workpaper document organization, 402 AICPA fraud standards
More informationTable of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING
Table of Contents Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Chapter 1: Significance of Internal Auditing in Enterprises Today: An Update 3 1.1 Internal Auditing History and Background
More informationFERC Reliability Technical Conference Panel III: ERO Performance and Initiatives ESCC and the ES-ISAC
: ERO Performance and Initiatives June 4, 2015 Chairman Bay, Commissioners, and fellow panelists, I appreciate the opportunity to address the topics identified for the third panel of today s important
More informationOSC Guidance and Training for Internal Audit and Internal Control Practitioners. Tina Kim John Buyce
OSC Guidance and Training for Internal Audit and Internal Control Practitioners Tina Kim John Buyce Training Requirements for Auditors and Internal Control Professionals Yellow Book: Chapter 3 General
More informationPresident's Letter. March Meeting Details: Date: Wednesday, March 15, 2006
President's Letter I hope everyone had a safe and fun Mardi Gras season. It seems strange to be writing at the beginning of March. We typically have a February meeting scheduled, so we re running a little
More informationAudit and Compliance Committee - Agenda
Audit and Compliance Committee - Agenda Board of Trustees Audit and Compliance Committee April 17, 2018, 1:30 2:30 p.m. President s Board Room Conference Call-In Phone #1-800-442-5794, passcode 463796
More informationKey Findings from the Global State of Information Security Survey 2017 Indonesian Insights
www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.
More information