ISACA NEW DELHI CHAPTER CPE Held and Credits Earned Record
|
|
- Patrick Conrad Henderson
- 6 years ago
- Views:
Transcription
1 CPE EVENT *
2 CPE EVENT *
3 CPE EVENT *
4 CPE EVENT *
5 CPE EVENT *
6 CPE EVENT * CISA / CISM Aspirants
7 * CPE Event CPE Event Date ISACA NEW DELHI CHAPTER CPE CREDITs CPE 1 13 April, TOPIC(s) Topic 1: Carbon Foot Print Concept, relevance and Components Topic 2: Intellectual Property Rights - Copyrights in the context of the Virtual World Issues & Challenges CPE 2 11 May, CPE 3 25 May, Topic 1: Auditing in an ERP (SAP) Environment : The shifting Paradigm Topic 2: Aligning IT Strategy with Business Strategy Topic : COBIT 5 - IT Governance Simplified CPE 4 13 July CPE 5 24 August CPE 6 07 September CPE 7 21 September CPE 8 26 October Topic 1: Managing Large Enterprise Applications-Special Reference to IRCTC Topic 2 : COBIT 5 Documentation Walkthrough Topic 1: Oracle Talk - Advanced Controls to Manage Risk Topic 2 : Oracle Talk - Database Security Topic 1: Disaster Management and IT Topic 1: Security Topic 2 : Software Security Topic 1: IS Audit and its Understanding CPE 9 16 November Topic 1: Bridging the Gap Between Privacy, PCI DSS and Big Data Insight CPE December Topic 1: Information Security Topic 2 : Security in Indian Telecom Industry 6
8 * CPE Event Date of Event / Topic(s) / Speaker 1 13 April, 2013 Topic 1: Carbon Foot Print Concept, relevance and Components Topic 2: 2 11 May, 2013 Sh Navin Chopra CEO Agile Group Dr Madhukar Sinha Topic 1: Auditing in an ERP (SAP) Environment : The shifting Paradigm CA. Murali Narayanamurthy Topic 2: Aligning IT Strategy with Business Strategy 3 25 May, 2013 Mrs Padmaja Krishnan Topic : COBIT 5 - IT Governance Simplified Mr. Ashish Mahajan 4 13 July 2013 Intellectual Property Rights - Copyrights in the context of the Virtual World Issues & Challenges Professor, Centre for WTO Studies, Indian Institute of Foreign Trade, New Delhi. Chartered Accountant, Cost Accountant Co-Founder, Emerging Edges Consultants Private Limited & Consultant Guest Faculty Faculty of Management Studies, University of Delhi India Manager (IT Services & Knowledge Manager), K Solutions Topic 1: Managing Large Enterprise Applications-Special Reference IRCTC Mr. Amit Hardi Vice President, Consulting Services - Broadvision India Topic 2 : COBIT 5 Documentation Walkthrough Mr. Harsh Kumar Railway Officer, Indian Railways & Director ISACA New Delhi Chapter 7
9 5 24 August 2013 ISACA NEW DELHI CHAPTER Topic 1: Oracle Talk - Advanced Controls to Manage Risk Mr. Rajesh Ramdas Topic 2 : Oracle Talk - Database Security Mr. Swaminathan Babu 6 07 September 2013 Topic 1: Disaster Management and IT Major General R. K. Kaushal 7 21 September 2013 Topic 1: Security Mr. Sanjiv Arora Topic 2 : Software Security Mr. Sandeep Sehgal 8 26 October 2013 Topic 1: IS Audit and its Understanding Mr. Neeraj Gupta 9 16 November 2013 Topic 1: Bridging the Gap Between Privacy, PCI DSS and Big Data Insight Mr. Ulf Mattsson December 2013 Topic 1: Information Security Mr S.R. Balasubramanian Director Application Center of Excellence Oracle Director Technology Readiness. Oracle India Senior Specialist in the National Disaster Management Authority (NDMA) Founder, Principal Consultant at Technologics & Controls IBM India Country Manager & Senior Architect- Information Security at IBM India CTO, Protegrity, USA Consultant, IT Strategy and management. Topic 2 : Security in Indian Telecom Industry Mr. Pankaj Agrawal Independent consultant and Angel Investor 8
Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi
Invitation for Continuing Professional Education Session On November 16, 2013 (Saturday) Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi -110001 Time: 03:00
More information2013 ISACA New Delhi Chapter All Rights Reserved
Mr. Rajendra Kathal President Invitation for Continuing Professional Education Session On May 25, 2013 (Saturday) from 04:30 pm to 06:30 pm Venue: Seminar Hall No. 1, USI Building Rao Tula Ram Marg, New
More informationMohammad Shahadat Hossain
Mohammad Shahadat Hossain Principal Security Architect at Grameenphone Limited Summary Has extensive knowledge and experience on following:- NIST Cyber Security Framework SANS Top 20 Security Control Network
More informationCyber, Information Security, and Data Protection
Cyber, Information Security, and Data Protection The past, the present, and th e future 15th, 16th & 17th October 2018 Muscat - Oman Intellectual Events And Conferences Private Limited For more information
More informationISACA International Perspective
ISACA International Perspective 11 th October 2013 Allan Boardman ISACA International Vice President and Board Director Member of ISACA s Strategic Advisory Council Member of the IT Governance Institute
More informationInvitation for Continuing Professional Education Session On March 01, 2014 (Saturday)
24 February, 2014 Dear colleagues, Invitation for Continuing Professional Education Session On March 01, 2014 (Saturday) Venue : Seminar Hall No. 1, IDSA Building Institute for Defence Studies and Analyses
More informationbuilding for my Future 2013 Certification
I am building for my Future 2013 Certification Let ISACA help you open new doors of opportunity With more complex IT challenges arising, enterprises demand qualified professionals with proven knowledge
More informationA Global Look at IT Audit Best Practices
A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory
More informationCommunication Networks & Cyber Security Workshop and Sixteenth GISFI Standardisation Series Meeting (GSSM),
Series of GISFI s Five Years Anniversary First Series Event PROGRAMME Communication Networks & Cyber Security Workshop and Sixteenth GISFI Standardisation Series Meeting (GSSM), March 10-12, 2014 Organizing
More informationInternational Policy Division, Global ICT Strategy Bureau
MIC International Policy Division, Global ICT Strategy Bureau Communications News Newsletter of the Ministry of Internal Affairs and Communications(MIC), Japan Please Feel free to use articles in this
More informationIT Audit Essentials. Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur
IT Audit Essentials Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur IT Audit Essentials Workshop Overview ISACA Malaysia Chapter is
More informationNew Horizons in Audit & Assurance
IIA Hyderabad Chapter brings you a Seminar on New Horizons in Audit & Assurance 6 CPE Hours for IIA Members Date : 04 th January 2018 1 Schedule... SCHEDULE 09:00 AM to 09:30 AM Seminar Registration 09:30
More informationPCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1
PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman
More informationTHE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :
THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY 18 2017: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) MAY 15 AND 16 o INFORMATION
More informationBen Eu. Summary. Experience. Associate Partner, Infrastructure & Endpoint Security at IBM
Ben Eu Associate Partner, Infrastructure & Endpoint Security at IBM Summary Ben Eu is currently an Associate Partner at IBM Security Services, North America. As an experienced information security executive
More informationVal-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.
Val-EdTM Valiant Technologies Education & Training Services Workshop for CISM aspirants All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More information2018 CALENDAR OF ACTIVITIES
2018 CALENDAR OF ACTIVITIES WHO WE ARE AND WHAT WE OFFER Ý Public Trainings Technical Sessions Reviews GMM Other Chapter Activities Conferences Professionals Night ISACA was incorporated by individuals
More informationROI for Your Enterprise Through ISACA A global IS association helping members achieve organisational success.
ROI for Your Enterprise Through ISACA A global IS association helping members achieve organisational success. ROI for Your Enterprise Through ISACA With the growing complexities of global business and
More informationHYDERABAD CHAPTER OF ISACA FIFTEENTH ANNUAL REPORT
Dear Members, It is my privilege and honor to present the 15 th Annual Report of the Hyderabad for the year. 1. FINANCIAL RESULTS Rs.in lakhs Particulars 2013 14 Income 9.84 8.96 Surplus 2.31 2.56 Investments(Bank
More informationThe Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA
The Experience of Generali Group in Implementing COBIT 5 Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA Generali Group at a glance Let me introduce myself Marco Salvato CISA, CISM, CGEIT,
More informationOpportunities to Integrate Technology Into the Classroom. Presented by:
Opportunities to Integrate Technology Into the Classroom Presented by: Mark Salamasick, CIA, CISA, CRMA, CSP Executive Director of Audit University of Texas System Discussion Topics Internal Audit Textbook
More informationLeveraging COBIT to Implement Information Security
DISCUSS THIS ARTICLE Leveraging COBIT to Implement Information By John Frisken, CA COBIT Focus 5 May 2015 In delivering IT security consulting services to large enterprises in Australia, particularly in
More informationCERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS
CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS Good IT governance is a key element of a well-performing enterprise. Enterprises need qualified information
More informationLes joies et les peines de la transformation numérique
Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education
More informationWELCOME TO ISACA Claudio CILLI, CISA, CISM, CRISC, CGEIT
WELCOME TO ISACA 2015 Claudio CILLI, CISA, CISM, CRISC, CGEIT cilli@di.uniroma1.it http://dsi.uniroma1.it/~cilli WHO IS ISACA? ABOUT ISACA The trusted source of guidance, networking and career development
More informationแนวทางการพ ฒนา Information Security Professional ในประเทศไทย
แนวทางการพ ฒนา Information Security Professional ในประเทศไทย โดย Thailand Information Security Association (TISA) Agenda 1) Global Information Security Professional Situation 2) Current Thailand Information
More informationDUNS CAGE 5T5C3
Response to Department of Management Services Cyber Security Assessment, Remediation, and Identity Protection, Monitoring and Restoration Services Request For Information 131 Guilford Road, Bloomfield
More informationISACA MADRID DECEMBER Robert E Stroud CEGIT CRISC International President December 2014
ISACA MADRID DECEMBER 2014 Robert E Stroud CEGIT CRISC International President December 2014 CHANGING DYNAMICS OF BUSINESS Source: http://www.securedgenetworks.com/secure-edge-networks-blog/bid/84023/10-ways-mobile-device-management-can-help-your-school
More informationCYBERSECURITY: E-COMMERCE, GOVERNANCE AND APPLIED CERTIFICATIONS A ROUNDTABLE DISCUSSION 15 DECEMBER 2015
CYBERSECURITY: E-COMMERCE, GOVERNANCE AND APPLIED CERTIFICATIONS A ROUNDTABLE DISCUSSION 15 DECEMBER 2015 WELCOME Have a question for the speaker? Text it in using the Ask A Question button! Audio is streamed
More informationPROFILE FRANCIS KAITANO. Francis Kaitano is a strategic, innovative, delivery focused Cyber Security professional.
PROFILE FRANCIS KAITANO Francis Kaitano is a strategic, innovative, delivery focused Cyber Security professional. Originally from Zimbabwe Francis Kaitano came to New Zealand more than 10 years ago for
More informationBECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW
BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential
More informationmission critical applications mission critical security Oracle Critical Patch Update July 2011 E-Business Suite Impact
mission critical applications mission critical security Oracle Critical Patch Update July 2011 E-Business Suite Impact Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director
More informationVolume 2014, Number 4. Volunteers Needed!
Volume 2014, Number 4 Volunteers Needed! Volunteering for NJ ISACA is a great opportunity to expand your professional contacts and your IT knowledge base. NJ ISACA needs talented professionals like you
More informationCLOUD-CON: Management & Security
October 18, 2012 CLOUD-CON: Management & Security Deploy, Manage & Secure Private & Hybrid Clouds Vance McCarthy Program Director Today s Expert Speakers Jyothi Swaroop Product Director Robert Vila WebSphere
More informationCyber Security in M&A. Joshua Stone, CIA, CFE, CISA
Cyber Security in M&A Joshua Stone, CIA, CFE, CISA Agenda About Whitley Penn, LLP The Threat Landscape Changed Cybersecurity Due Diligence Privacy Practices Cybersecurity Practices Costs of a Data Breach
More informationCENTRE OF EXCELLENCE IN CLOUD COMPUTING
CENTRE OF EXCELLENCE IN CLOUD COMPUTING Cloud computing is a computing infrastructure and software model for enabling ubiquitous access to shared pools of configurable resources in on-demand basis. Cloud
More informationCSI Mumbai Chapter Yearly Training Calendar for April-14. May-14
CSI Mumbai Chapter Yearly Training Calendar for 2014-2015 April-14 1 Knowledge Forum Session ( Free ) Half Day April TBD TBD 2 Software Process Improvement Network (SPIN) Session ( Free ) Half Day April
More informationRisk Based IT Auditing Master Class. Unlocking your World to a Sea of Opportunities
Risk Based IT Auditing Master Class Unlocking your World to a Sea of Opportunities The Digital World Information Technology has developed into a nerve center of every organisation. It has become an intrinsic
More information2018 Post Show Report. SMART ASIA India 2018
2018 Post Show Report 1 SMART ASIA India 2018 About the Organizer: TAITRA Taiwan External Trade Development Council, TAITRA, is Taiwan s foremost non-profit trade promotion organization. Founded in 1970
More informationCYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD
CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)
More informationUsing the NIST Cybersecurity Framework to Guide your Security Program August 31, 2017
Using the NIST Cybersecurity Framework to Guide your Security Program August 31, 2017 Presenters: Allie Russell, Conexxus Kara Gunderson, DSSC Chair, CITGO Petroleum Chris Lietz & Bob Post, Coalfire Housekeeping
More informationISACA Annual General Meeting 2006 President Report Vincent Chan
ISACA Annual General Meeting 2006 President Report Vincent Chan President, ISACA Hong Kong Chapter 1 About ISACA Information Systems Audit and Control Association Information Systems Audit and Control
More informationmission critical applications mission critical security Oracle Critical Patch Update October 2011 Oracle Database Impact
mission critical applications mission critical security Oracle Critical Patch Update October 2011 Oracle Database Impact Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director
More informationCOBIT 5 Foundation Workshop
COBIT 5 Foundation Workshop Dear Members, ISACA Pune chapter is pleased to organize Two / Three Days COBIT-5 Foundation course Dates of Training & Workshop: Date: Friday, 19 th Dec 2014 and Saturday, 20
More information2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers
2017 PORT SECURITY SEMINAR & EXPO ISACA/CISM Information Security Management Training for Security Directors/Managers Agenda Introduction ISACA Information security vs. cybersecurity CISM certification
More informationTop Business/Technology Issues Survey 2011
Volume 9, 27 April 2011 In This Issue: Top Business/Technology Issues Survey 2011 Results Released 5 Considerations When Evaluating ISRM Programs and Capabilities Now Available in the Apple App Store:
More informationOperationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results
Operationalizing Cybersecurity in Healthcare - - 2017 IT Security & Risk Management Study Quantitative and Qualitative Research Program Results David S. Finn, CISA, CISM, CRISC Health IT Officer, Symantec
More informationIT in Healthcare Day
San Francisco ISACA Chapter Proudly Presents IT in Healthcare Day A Day-Long, Multi-Session Event, being held in Walnut Creek! Where: Walnut Creek Marriott - 2355 North Main Street Walnut Creek, CA 94596
More informationIT Governance and emerging trends
IT Governance and emerging trends Athens, 4 November 2013 Professor Georges Ataya Academic Director, Solvay Brussels School (solvay.edu/it) Past International Vice President, ISACA (isaca.org) Managing
More informationHealthcare HIPAA and Cybersecurity Update
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Healthcare HIPAA and Cybersecurity Update Agenda > Introductions > Cybersecurity
More informationIntroduction. January 1, 2015
Introduction January 1, 2015 Radio Frequency IDentification Technologies that enable the capture of data about objects remotely using radio energy Our Mission To promote the public good by promoting high
More informationBusiness Context: Key for Successful Risk Management
Business Context: Key for Successful Risk Management Philip Aldrich, CISSP, CISM, CISA, CRISC, CIPP Program Director, Risk Management EMC Event Alert Finding Incident Law Vulnerability Regulation Audit
More informationmission critical applications mission critical security Oracle Critical Patch Update July 2011 Oracle Database Impact
mission critical applications mission critical security Oracle Critical Patch Update July 2011 Oracle Database Impact Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationCOBIT 5 With COSO 2013
Integrating COBIT 5 With COSO 2013 Stephen Head Senior Manager, IT Risk Advisory Services 1 Our Time This Evening Importance of Governance COBIT 5 Overview COSO Overview Mapping These Frameworks Stakeholder
More informationBALA GANESHAN, PH.D. EXPERIENCE. Vice President and CTO Stellus Technologies, San Jose, CA. Technical Leadership. Ecosystem Engineering and Evangelism
BALA GANESHAN, PH.D. 423 THATCHER LANE FOSTER CITY, CA 94404 BALA.GANESHAN@YAHOO.COM (650) 678-1223 A Chief Technology Officer and architect with 10+ years of executive level experience in information
More informationmission critical applications mission critical security Oracle Critical Patch Update October 2011 E-Business Suite Impact
mission critical applications mission critical security Oracle Critical Patch Update October 2011 E-Business Suite Impact Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director
More informationTransforming the Data Center Lenovo. All rights reserved.
Transforming the Data Center Lenovo Data Center Group A global technology company with 55,000 employees supporting customers in over 160 countries to deliver PC, Mobile, and Data Center solutions Data
More informationUK Permanent Salary Index November 2013 Based on registered vacancies and actual placements
UK Permanent Salary Index ember 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation
More informationMULTI-CLOUD REQUIRES NEW MANAGEMENT STRATEGIES AND A FORWARD-LOOKING APPROACH
MULTI-CLOUD REQUIRES NEW MANAGEMENT STRATEGIES AND A FORWARD-LOOKING APPROACH A new global survey by BMC reveals the confusion created by multi-cloud, increased challenges facing organizations, and that
More informationCompany Overview. global-lynx. Version: September 30, 2015
Company Overview Version: September 30, 2015 www.globallynx.com global-lynx 1. Why Global Lynx? Most likely your enterprise has made significant investments to enhance or transform your IT organization;
More informationNortheast Ohio Chapter Annual General Meeting
Northeast Ohio Chapter Annual General Meeting May 21, 2015 For professionals and organizations be the leading global provider of knowledge, certifications, community, advocacy and education on information
More informationMonthly Meeting September 28, 2016
Monthly Meeting September 28, 2016 Agenda / Announcements Welcome to Parsons, 7110 Samuel Morse Drive, Suite 200 Columbia, Maryland 21046 Non-U.S. Citizen Requirements Any guests or new members in attendance?
More informationTable of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING
Table of Contents Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Chapter 1: Significance of Internal Auditing in Enterprises Today: An Update 3 1.1 Internal Auditing History and Background
More informationAdvancing data governance to create improved data quality frameworks. Presented by: Micheal Axelsen Director Applied Insight Pty Ltd
Advancing data governance to create improved data quality frameworks Presented by: Micheal Axelsen Director Applied Insight Pty Ltd INTRODUCTION About the speaker Services Micheal Axelsen provides business
More informationDigital Transformation with HPE Cloud Management October 26, Copyright 2016 Vivit Worldwide
Digital Transformation with HPE Cloud Management October 26, 2016 Copyright 2016 Vivit Worldwide Brought to you by Copyright 2016 Vivit Worldwide Hosted By Milan Danrel Consultant Machine Data Systems
More informationProtecting Your Data in the Cloud. Ulf Mattsson Chief Technology Officer ulf.mattsson [at] protegrity.com
Protecting Your Data in the Cloud Ulf Mattsson Chief Technology Officer ulf.mattsson [at] protegrity.com Ulf Mattsson 20 years with IBM Development & Global Services Inventor of 22 patents Encryption and
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate
More informationINTERACTIVE PANEL DISCUSSIONS
The Mezzanine Floor, Hall No-6, INTERACTIVE PANEL DISCUSSIONS 24 th February, 2011 (Thursday) Conducted by: - LBNL (Lawrence Berkeley National Laboratory) 11.30 13.00 Hrs. Session 1: Visions for India
More informationMY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.
MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED
More informationLearn How to Increase the Awareness of Risk Management at Your Enterprise
Volume 22, 24 October 2012 Learn How to Increase the Awareness of Risk Management at Your Enterprise 5 Considerations for Choosing an MDM Solution ISACA Member Recognized for His Information Security Initiative
More informationINDIA - UAE COMPREHENSIVE STRATEGIC PARTNERSHIP OVER THE YEARS
SEPTEMBER 2017 INDIA - UAE COMPREHENSIVE STRATEGIC PARTNERSHIP OVER THE YEARS INDIA UAE Over the years UAE is India s 3rd largest trade partner globally UAE is the second largest export destination of
More informationHelping you understand the impact of GDPR.
Helping you understand the impact of GDPR. GENERAL DATA PROTECTION REGULATION (GDPR) RSM s GDPR experts GREGOR STROBL Munich, Germany Partner Risk Advisory Services (RAS) Master of Arts (M.A.) in Corporate
More informationThe Realities of Data Security and Compliance: Compliance Security
The Realities of Data Security and Compliance: Compliance Security Ulf Mattsson, CTO, Protegrity Ulf.mattsson @ protegrity.com Bio - A Passion for Sailing and International Travel 2 Ulf Mattsson 20 years
More informationJerry Luftman. Executive Director & Distinguished Professor SIM VP Chapter Relations & Academic Affairs, Emeritus
Jerry Luftman Executive Director & Distinguished Professor SIM VP Chapter Relations & Academic Affairs, Emeritus 8 HEADLINES 1. State of IT is Resilient 2. Cautious Improvements in IT Spending 3. Judicious
More informationImportant updates to Business Applications competencies
Important updates to Business Applications competencies April 2019 Maximize the cloud opportunity Worldwide, business is moving to the cloud. We re focused on supporting you through this shift to a thriving
More informationWelcome October, 2013 INSIDE THIS ISSUE. Jesse A. Hanford Greater Cincinnati ISACA President
October, 2013 INSIDE THIS ISSUE Welcome Message....1 Monthly Meeting......2 Events 3 Education......5 Meet A Board member...8 Editor s Corner....9 About Our Chapter... 10 Welcome Greater Cincinnati ISACA
More informationGopher Protocol. Technology Overview. Danny Rittman, PhD CTO Oct 2016
Gopher Protocol Technology Overview Danny Rittman, PhD CTO Oct 2016 Who are we? Gopher Protocol, Inc. ( GOPH ) is a development stage company that is creating innovative mobile microchip (ICs) and software
More informationINFORMATION SECURITY GOVERNANCE, RISK & COMPLIANCE CLOUD CONSULTING SERVICES CIO & CISO SERVICES. forebrook
INFORMATION SECURITY GOVERNANCE, RISK & COMPLIANCE CLOUD CONSULTING SERVICES CIO & CISO SERVICES forebrook INFRASTRUCTURE ASSESSMENT SECURITY ASSESSMENT RISK ASSESSMENT VULNERABILITY ASSESSMENT PENETRATION
More informationAT FIRST VIEW C U R R I C U L U M V I T A E. Diplom-Betriebswirt (FH) Peter Konrad. Executive Partner Senior Consultant
Our Contact Details IT-SCAN GMBH c/o: DOCK3 Hafenstrasse 25-27 68159 Mannheim E: info@it-scan.de W: www.it-scan.de Nationalität Berufserfahrung C U R R I C U L U M V I T A E Diplom-Betriebswirt (FH) Peter
More informationDigital government toolkit
Digital Government Strategies: Good Practices Colombia: Government Enterprise Architecture Framework The OECD Council adopted on 15 July 2014 the Recommendation on Digital Government Strategies. The Recommendation
More informationThe Widening Talent Gap: The greatest security challenge of our time
INFORMATION SECURITY The Widening Talent Gap: The greatest security challenge of our time Presented by: Experis Information Security Practice Thursday, April 14, 2016 General Information Share the webinar
More informationExploring Emerging Cyber Attest Requirements
Exploring Emerging Cyber Attest Requirements With a focus on SOC for Cybersecurity ( Cyber Attest ) Introductions and Overview Audrey Katcher Partner, RubinBrown LLP AICPA volunteer: AICPA SOC2 Guide Working
More informationIT Audit Process Prof. Liang Yao Week Two IT Audit Function
Week Two IT Audit Function Why we need IT audit A Case Study What You Can Learn about Risk Management from Societe Generale? https://www.cio.com/article/2436790/security0/what-you-can-learn-about-risk-management-fromsociete-generale.html
More informationPresent. 5th May - Chennai. Internal. auditing. today: Beginning Auditor Tools and Techniques. 6 CPE hours.
Present 5th May - Chennai Internal auditing today: Beginning Auditor Tools and Techniques 6 CPE hours www.achromicpoint.com About the Seminar To become a successful auditor, a strong base of knowledge
More informationConvergence of BCM and Information Security at Direct Energy
Convergence of BCM and Information Security at Direct Energy Karen Kemp Direct Energy Session ID: GRC-403 Session Classification: Advanced About Direct Energy Direct Energy was acquired by Centrica Plc
More informationDr. Imran Khan University of Nebraska-Lincoln Marketing (402)
Dr. Imran Khan University of Nebraska-Lincoln Marketing (402) 472-4536 Email: ikhan3@unl.edu Education DBA, Kennesaw State University, 2014. Major: Marketing Dissertation Title: Vendor Firm Characteristics
More informationCommunity Participation in the JCP Program: a winning combination November 2012
1 Community Participation in the JCP Program: a winning combination heather@jcp.org http://jcp.org November 2012 JCP.next.1 (JSR 348) JCP 2.8, implemented in October 2011 Three themes aimed at: Transparency
More informationCreative Solutions Consulting, Inc. Commercial Price List (CPL) Price List Effective January 1, 2018 *
Creative Solutions Consulting, Inc. Commercial Price List (CPL) Price List Effective January 1, 2018 * Note: These are Commercial rates, and not rates applied to the Federal Government. CSCI s Federal
More informationFeatured event 1: Disaster Risk Resilient Infrastructure for Sustainable Development
Asian Ministerial Conference on Disaster Risk Reduction 2016 New Delhi, India 02-05 November 2016 Concept Note of Featured Event Event title Featured event 1: Disaster Risk Resilient Infrastructure for
More informationService Provider Consulting
From Microsoft Services 1 Industry Overview More and more businesses are looking to outsource IT, decrease management requirements and ultimately save money. With worldwide public cloud spending expected
More informationMAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world
8 MAY 2018 (Tue) Hong Kong CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world CYBERSECURITY AND RISK MANAGEMENT By HKUST Business School Executive Education Office
More informationCertified Information Systems Auditor Training and Certification
Certified Information Systems Auditor Training and Certification Course Description Certified Information Systems Auditor (CISA) Training designation is a globally recognized certification for IS audit
More informationRethinking Information Security Risk Management CRM002
Rethinking Information Security Risk Management CRM002 Speakers: Tanya Scott, Senior Manager, Information Risk Management, Lending Club Learning Objectives At the end of this session, you will: Design
More informationHeading Text. Manage your Organization s Governance, Risks, and Compliance Requirements and Transform your Business Potential with SAP GRC
Heading Text Manage your Organization s Governance, Risks, and Compliance Requirements and Transform your Business Potential with SAP GRC Why Governance, Risk Management, and Compliance? Unidentified risks
More informationBRING EXPERT TRAINING TO YOUR WORKPLACE.
BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More informationFramewOrk t O DeSign and implement ifc
Marketing Partner Mumbai 25 th November Bengaluru 7 th December Chennai 9 th December Leveraging COSO internal COntrOLS FramewOrk t O DeSign and implement ifc 8 CPE Hours Networking Opportunities Qualified
More informationRisk Management and Cloud Security: Setting and Enforcing Policy
October 2012 Volume 5, Issue 3 2012-2013 Officers: President BJ Smith Vice President Dan Sterba Secretary Greg Harper Treasurer Matt Suozzo Director Molly Coplen Director Kevan Brewer In This Issue: October
More information