Athens, 6 7 December 2012 Hellenic American Union Conference Center

Size: px
Start display at page:

Download "Athens, 6 7 December 2012 Hellenic American Union Conference Center"

Transcription

1 Athens, 6 7 December 2012 Hellenic American Union Conference Center ISACA Athens Chapter and the Hellenic American Union are organizing the 2012 ISACA Athens Chapter Conference on December 6 7, The theme of the conference is: Information Assurance at a Crossroad: Choosing a New Strategic path through Security, Governance and IT Audit Best Practices. The conference will provide a platform for discussion on key issues faced today, such as: Emerging security risks in new technologies (cloud, mobile computing, BYOD) Best practices for an effective governance of enterprise IT Compliance & privacy risks and implementation practices IT audit and information assurance leading practices COBIT 5 and implementation principles This year we are also featuring an 8 hour workshop prior to the conference on Security, Governance and Risk Management, presented by two International Vice Presidents of ISACA, Dr. Christos Dimitriadis, CISA, CISM, CRISC, Head of Information Security for Intralot Group, and Mr. Ramsés Gallego, CISM, CGEIT, CISSP, SCPM, CCSK, ITIL, COBIT Foundations and Six Sigma Black Belt certified professional, Security Strategist & Evangelist for Dell. Attendees will earn up to a total of 17 CPEs (workshop 8, conference 9 CPEs) and 10 PDUs (workshop 2, conference 8). KEYNOTES ISACA Dr. Christos Dimitriadis, CISA, CISM, CRISC, Head of Information Security for Intralot Group Ramsés Gallego, CISM, CGEIT, CISSP, SCPM, CCSK, ITIL, COBIT(f), Six Sigma Black Belt Certified, Security Strategist & Evangelist for Dell Marc Vael, CISA, CISM, CRISC, CGEIT, CISSP, ITIL service manager, Prince2, Chief Audit Executive at Smals vzw INVITED Andrea Servida, Head of Task Force Legislation Team (eidas), European Commission Dr. Paul Spirakis, Professor, President of the Computer Technology Institute and Press Diophantus Dr. Evangelos Ouzounis, Head of Resilience and CIIP Unit, European Network and Information Security Agency Dr. Lucie Langer, Safety & Security Department, (AIT) Austrian Institute of Technology SPEAKING SLOTS Tassos Alefantos, International Representative of itsmf Hellas, Manager IT&T Operations and Data Centre Services at Athens International Airport Dr. Konstantinos Papapanagiotou, Open Web Application Security Project (OWASP) Greece Chapter Leader, Information Security & Risk Management Services Manager at Syntax IT Christos Vidakis, CISA, CISSP, CISM, ISO LA, Senior Manager, Management and Risk Consulting, KPMG Advisors AE Stan Voulanas, CISA, CIA, CMIA, CA, Partner, IT Risk Assurance, PwC, Greece Conference Chairman: Professor Despina Polemi, University of Piraeus, ISACA Academic Advocate Stay in touch at and for updates on the conference program.

2 INFORMATION Official language: English, however presentations may also be provided in Greek (translation services to English will only be provided). Venue: Hellenic American Union Conference Center (Massalias 22 Athens) Hours: 09:00 to 18:15 Registration fee: Workshop Conference & Conference Non ISACA members ISACA members For more than 2 registrations of the same company Students (undergrads only) Collaborative associations Only Conference fees are subject to 23% VAT Workshop fee is covered by LAEK / OAED 0,45 Registration to workshop grants free entrance to the Conference on December 7th You may register at the Hellenic American Union. For further information, please contact: Eleni Tsirigoti, PMP Vocational Training Section, Hellenic American Union Tel: , etsirigoti@hau.gr ISACA Athens Chapter education@isaca.gr Premier Sponsors Supporters

3 2012 ISACA Athens Chapter Conference 7 December 2012 Preliminary Agenda 8.15 Registration 9.00 Opening Remarks Mr. Ioannis Lefkakis ISACA Athens Chapter President Prof. Despina Polemi Conference Chairman, University of Piraeus, ISACA Academic Advocate ISACA KEYNOTE Presentation Welcome from ISACA International latest update: State of the art in governance of enterprise IT and information security Dr. Christos Dimitriadis ISACA International VP, Head of Information Security for Intralot Group KEYNOTE Presentation Developing a risk management culture: a Regulatory perspective Mr. Andrea Servida Head of Task Force Legislation Team (eidas), European Commission Speaking Slot Key trends and messages from the PwC Global State of Information Security Survey 2013: Roundtable discussion of key issues impacting Greece and the rest of the world" Facilitator: Mr. Stan Voulanas Partner, IT Risk Assurance, PwC, Greece Speaking slot Mobile security: It's all about the applications Coffee Break Dr. Konstantinos Papapanagiotou OWASP Greece Chapter Leader, Information Security & Risk Management Services Manager at Syntax IT ISACA KEYNOTE Presentation Trust in and value from Cloud computing today Mr. Marc Vael ISACA International VP, Chief Audit Executive at Smals vzw Speaking Slot IT Forensics gives a new dimension to Information Security: The role of IT Auditor Mr. Christos Vidakis Senior Manager, Management and Risk Consulting, KPMG Advisors AE Speaking Slot A Letter to Santa Audit Mr. Tassos Alefantos International Representative of itsmf Hellas, Manager IT&T Operations and Data Centre Services at Athens International Airport KEYNOTE Presentation Cyber Security Challenges of Cloud Computing the EU approach Lunch Break Dr. Evangelos Ouzounis Head of Resilience and CIIP Unit, ENISA slides in 20 seconds Session Say it in 6 40 Dr. Konstantinos Papapanagiotou (OWASP, Syntax IT): Hack Yourself out of the Debt Mr. George Raikos (ISACA Athens Chapter Secretary): Crisis! what Crisis? Mr. Anestis Demopoulos (ISACA Athens Chapter Vice President): Get recognized as an expert the ISACA certifications Mr. Ioannis Lefkakis (ISACA Athens Chapter President): More CPEs than ever before an ISACA benefit Mr. Marc Vael (ISACA International VP): Privacy ISACA KEYNOTE Presentation Beyond Identity Management: Welcome to the world of access governance Mr. Ramsés Gallego ISACA International VP, Security Strategist and Evangelist for Dell KEYNOTE Presentation Trust in the web Coffee Break Dr. Paul Spirakis Professor, President of the Computer Technology Institute and Press Diophantus KEYNOTE Presentation Security and Risk Management for Smart Grids Dr. Lucie Langer Safety & Security Department of the AIT Austrian Institute of Technology Round Table Discussion: Your Session, ask whatever you want and challenge the experts End of Conference Dr. Christos Dimitriadis, Mr. Ramsés Gallego, Mr. Marc Vael Check at or for more updates

4 Find out more about our speakers and the program ISACA KEYNOTE PRESENTATIONS Welcome from ISACA International latest update: State of the art in governance of enterprise IT and information security with Dr. Christos Dimitriadis, CISA, CISM, CRISC, Head of Information Security for Intralot Group Abstract: ICT has become the backbone of the world economy, while at the same time it targets at improving quality of life through the adoption of new technologies in our daily life. Enterprises and professionals are continuously looking for ways to balance risk and value, to become more competitive and cost effective, to innovate. This presentation from ISACA International will display the recent trends in the areas of governance of enterprise IT, information security and risk, while ISACA s latest and upcoming frameworks will be demonstrated as the means to address the needs of the modern enterprise. BIO: Christos K. Dimitriadis, CISA, CISM, CRISC, is an International Vice President of ISACA. He also is the Head of Information Security for Intralot Group, a multinational supplier of integrated gaming and transaction processing systems based in Greece, managing information security in more than 50 countries in all continents. Mr. Dimitriadis has served ISACA as chairman of the External Relations Committee and member of the Relations Board, Academic Relations Committee, ISACA Journal Editorial Committee and Business Model for Information Security Workgroup. Mr. Dimitriadis has been working in the area of information security for 11 years and has authored 70 publications in the field. He has been providing information security services to the ITU, European Commission Directorate General, European Ministries and international organizations, as well as business consulting services to entrepreneurial companies. Mr. Dimitriadis received a diploma of electrical and computer engineering from the University of Patras, Greece, and a Ph.D in information security from the University of Piraeus, Greece. Beyond Identity Management: Welcome to the world of access governance with Ramsés Gallego, CISM, CGEIT, CISSP, SCPM, CCSK, ITIL, COBIT(f), Six Sigma Black Belt Certified Abstract: In a world that is changing at the speed of light, protecting information is the number one priority for CISOs. And while there are many processes and technologies for doing that, the discipline of Identity Management is turning into an overarching topic, a different approach that requires a different thinking: one that considers who is really touching corporate information, the need of controlling accounts with elevated rights and the deployment of a corporate program on accessing sensitive information. Through a series of examples and covering all of the angles of the Identity & Access Management discipline, this session will highlight the birth of a new dimension. Welcome to the world of Access Governance. BIO: With a background education in Business Administration (MBA) and Law, Ramsés is a +15 year security professional with deep expertise in the Risk Management and Governance areas. Ramsés is now Security Strategist and Evangelist for Dell where he defines the vision of the security discipline and oversees the deployment of services. Before, he was at CA Technologies for 8 years, was Regional Manager for SurfControl in Spain and Portugal, and just recently Chief Strategy Officer of the Security and Risk Management practice at Entelgy. Ramsés has been serving for three years in ISACA s CISM and CGEIT Certification Committees and also in the Guidance & Practices Committee for three years from where deliverables have been created for the community. He is honored to have been the Chair for ISACA s ISRM Conference and is now Research Director & Strategic Planning at the Barcelona Chapter and part of the Program Committee for the events SecureCloud 2010 and Ramsés played an instrumental role in the Planning Committee that prepared first ever ISACA's World Congress in Washington, June He has also been part of the ISACA's CISM PATF Task Force. He also develops results oriented, business focused, people driven projects due to his Six Sigma Black Belt accreditation. He has been appointed International Vice President for ISACA and has a seat in its Board of Directors. Trust in and value from Cloud computing today with Marc Vael, CISA, CISM, CRISC, CGEIT, CISSP, ITIL service manager, Prince2, ISACA International VP, Chief Audit Executive at Smals vzw, Abstract: Many business and IT leaders are wondering today what cloud computing really means, what it can do for their business and how it impacts their IT environment. Marc will present a vision on the current cloud computing trends, the

5 concerns, the value and the need for calculating the cloud computing ROI based on recent research performed by ISACA and based on his personal experience working with organizations on cloud computing implementations and audits. BIO: Marc Vael ( 1967) has three Master's degrees (Applied Economics, Information Management and IT Management). During his professional career, Marc obtained certifications in IT audit (CISA), information security (CISM and CISSP), IT risk management (CRISC), IT governance (CGEIT and ITIL service manager) and project management (Prince2) and still maintains these through continuous professional education. Marc achieved his official certification for Director at GUBERNA in He has 20 years active experience in evaluating, designing, implementing and monitoring solutions on risk and information security management, business continuity management, privacy and IT Audit. Currently Marc is Chief Audit Executive at Smals vzw, a Belgian not for profit IT company with more than employees working primarily for Belgian Federal Social Security Institutions. In this role, Marc is responsible for all internal auditing activities reporting directly to the Audit committee of Smals vzw. Besides his full time job, Marc is member and active volunteer at ISACA since Since June 2012 he is elected as international vice president of ISACA International and chair of ISACA s Knowledge Board and the Cloud Computing Task Force and member of ISACA s Strategic Advisory Council. In April 2012 Marc got also elected president of the ISACA Belgium Chapter. Marc is lecturing as guest professor at Antwerp Management School since 1997 and Solvay Brussels School since He is a deputy member of the Flemish Privacy Commission since January 2010, board member of SAI since January 2012 and a member of the Permanent Stakeholder Group of ENISA since August He is a passionate speaker and published author involved with research and innovation in his core expertise domains. He has received the formal nomination of fellow in October 2012 from the University of Leuven for his contribution to IT. INVITED KEYNOTE PRESENTATIONS Developing a risk management culture: a Regulatory perspective with Andrea Servida, Head of Task Force Legislation Team (eidas), European Commission Abstract: TBA BIO: He is Head of the Task Force "Legislation Team (eidas) in Directorate General 'Communication networks, content and technology' (DG CONNECT) of the European Commission. From 2006 to 2012, he was Deputy Head of the Unit "Internet; Network and Information Security" in DG INFSO where he co managed the Unit and was in charge of defining and implementing the strategies and policies on network and information security, critical information infrastructure protection, electronic signature and identification. From 1993 to 2005, he worked in the European Commission ICT research programmes (ESPRIT, IT, IST and ICT) dealing with safety critical systems, software engineering, database technology, privacy enhancing technologies, biometrics, dependability and cyber security. Before joining the European Commission in 1993, he worked in industry for nearly eight years as a project manager of international R&D projects on decision support systems for environmental, civil and industrial emergency and risk management. He graduated with Laude in Nuclear Engineering at Politecnico di Milano and carried out PhD studies on fuzzy sets and artificial intelligence at Queen Mary and Westfield College, University of London. Trust in the web with Dr. Paul Spirakis, Professor, President of the Computer Technology Institute and Press Diophantus Abstract: This talk will focus on issues of Trust in the Web, including a discussion about Open Data and Information Assurance. We shall discuss Trust definitions, models, and tools, and the important initiative of the EU on Open Data. The talk will also overview some challenging research topics related to Information Assurance, as well as recent evolutions in the European Research Agenda on the issue. Some relations to modern Cryptography will also be highlighted. BIO: Paul Spirakis, obtained his PhD from Harvard University, in He is currently the President of the Computer Technology Institute & Press DIOPHANTUS and a Full Professor in the Patras University, Greece. Was acknowledged between the top 50 scientists worldwide in Computer Science with respect to The best Nurturers in Computer Science Research, published by B. Kumar and Y.N. Srikant, ACM Data Mining, His research interests Algorithms and Complexity and interaction of Complexity and Game Theory. Paul Spirakis has extensively published in most of the important Computer Science journals and most of the significant refereed conferences. He was elected unanimously as one of the two Vice Presidents of the Council of the EATCS. He is a member of Academia Europaea, a member of the ACM Europe Council and has been appointed as a Member of the Executive Body of the Polytechnic University of Cyprus.

6 Cyber Security Challenges of Cloud Computing the EU approach with Dr. Evangelos Ouzounis, Head of Resilience and CIIP Unit, European Network and Information Security Agency (ENISA) Abstract: ENISA has played an important role in giving stakeholders an overview of the information security risks when going cloud. In this presentation Dr. Ouzounis presents ENISAs work in the area, explains how this is related to the overall EU policy context and identifies areas for future work. BIO: Dr. Evangelos Ouzounis is the head of ENISA s Resilience and Critical Information Infrastructure Protection (CIIP) Unit. His unit implements EU Commission s CIIP action plan, organises the CIIP exercises (e.g. Cyber Europe 2012/10, Cyber Atlantic 2011), facilitates Member States efforts towards a harmonised implementation of incident reporting scheme (article 13 a of new Telecom Package), and develops good practices for national cyber security strategies and national contingency plans. ENISA s Resilience and CIIP Unit runs also numerous other studies on cyber security aspects of critical sectors and services like Industrial Control Systems SCADA, Smart Grids, Cloud Computing, Botnets and Interconnected Networks. The Unit also issues strategic recommendations and develops good practices for relevant stakeholders. Prior to his position at ENISA, Dr. Ouzounis worked several years at the European Commission, DG Information Society and Media (DG INFSO). He contributed significantly to EU Commission s R&D strategy and policies on securing Europe s infrastructures and services. Dr. Ouzounis was co founder of Electronic Commerce Centre of Competence (ECCO) at Fraunhofer Institute for Open Communication Systems (FhG FOKUS, Berlin, Germany). He led and managed more than 20 pan European and International R&D projects. Dr. Ouzounis holds a Ph.D from the Technical University of Berlin and a master in computer engineering and informatics from the Technical University of Patras, Greece. He was a lecturer at Technical University of Berlin, wrote 2 books and more than 20 peer reviewed academic papers and chaired several international conferences. Security and Risk Management for Smart Grids With Dr. Lucie Langer, Safety & Security Department, (AIT) Austrian Institute of Technology Abstract: Future energy grids will make extensive use of the integration of ICT technologies. Thus, cyber security risks become a threat even for energy suppliers. Together with various partners both from research and industry, the AIT Safety & Security Department is currently developing technologies and tools to strengthen the resilience of smart grids against cyber attacks. This includes specific risk management approaches for utility providers, processes and guidelines for implementing security in smart grid environments and also security assessment and monitoring solutions. The presented risk management approaches can also be applied for other security relevant research projects such as FastPass A harmonized, modular reference system for all European automatic border crossing points. BIO: Dr. Lucie Langer joined the Safety & Security Department of the AIT Austrian Institute of Technology in She is currently working on projects related to the security of critical infrastructures and smart grids. Before joining the AIT Lucie has been working as a Technology Consultant in the private sector for two years, focusing on access rights and infrastructure management in large scale IT projects. From 2006 to 2010 she was a member of the Cryptography & Computer Algebra Group at Technische Universität (TU) Darmstadt, where she also received her PhD in 2010 and graduated in Mathematics in As a Research Assistant at TU Darmstadt she participated in several security related research projects on e voting, e government and long term archiving. SPEAKING SLOTS A Letter to Santa Audit with Tassos Alefantos, International Representative of itsmf Hellas, Manager of IT&T Operations and Data Centre Services at Athens International Airport Abstract: An attempt to provide the auditee s perspective on audit outcomes. What an IT Manager would expect from an IT Audit, are there any business benefits, how could we maximize the business value for IT from an audit report, could a proactive audit process be more meaningful? The proposed answers will bridge COBIT and ITIL elements towards a value driven IT Service Management implementation. BIO: Tassos Alefantos, founder, International Representative of the Greek chapter of IT Service Management Forum (ITSMF Hellas). He has over 20 years of international experience in the areas of Information Technology, Telecommunications and Airport Operations. Tassos Alefantos has extensive knowledge and experience in Corporate and IT Governance, IT Service Management and works intensively on the issue of IT Business Value. He is currently the Manager of IT&T Operations and

7 Data Centre Services at Athens International Airport. He is a Certified Information Systems Auditor (CISA), Certified in the Risk and Information Systems Control (CRISC) and Certified ISO20000 Auditor.He holds a BEng in Aeronautical Engineering, a PDip in Computer Science and a Masters in Business Administration. Mobile Security: It's all about the applications with Dr. Konstantinos Papapanagiotou, OWASP Greece Chapter Leader, Information Security & Risk Management Services Manager at Syntax IT Abstract: Mobile devices, smart phones, tablets, etc. are nowadays an integral part not only of our personal but also business life. Everyday hundreds of mobile applications are created and deployed into millions of devices. Enterprises are rapidly looking for ways to embrace the new mobility paradigm, but at the same time face new challenges and risks. Bring Your Own Device is definitely a trend of our days which also carries along various risks related to employees connecting and using their personal mobile devices in the corporate network. However, another risk resides beyond the device: the applications that are installed on it. Bring Your Own Application can actually represent a more significant risk than BYOD. In this presentation we discuss mobile application security risks and challenges that mobile developers face. We will also outline key issues that auditors should be looking for when testing mobile applications, and finally suggest controls that can be used to improve security. BIO: Dr Konstantinos Papapanagiotou has more than 10 years of experience in the field of Information Security both as a corporate consultant and as a researcher. Currently he is managing the team of security consultants at Syntax IT Inc, providing information security services and solutions to large organizations in Greece, Cyprus, Balkans and the Middle East. He has strong expertise in the area of application security, having been involved with OWASP for several years now, leading the OWASP Greek Chapter and lately the Hackademic Challenges Project. He also organized the OWASP Global AppSec Research 2012 conference. Konstantinos holds a BSc from the Department of Informatics and Telecommunications, University of Athens, an MSc with distinction in Information Security from Royal Holloway, University of London and a PhD in Information and Network Security from the Department of Informatics and Telecommunications, University of Athens. He is the author of more than 10 scientific publications. IT Forensics gives a new dimension to Information Security: The role of IT Auditor with Christos Vidakis, CISA, CISSP, CISM, ISO LA, Senior Manager, Management and Risk Consulting, KPMG Advisors Abstract: Nowadays, information security professionals have acknowledged the need of redefining the approach to protecting information assets. This is supported by the fact that the exponential increasing investments in information security have limited narrowed (compared to expectations) the number and impact of information security breaches. Christos will present a revolutionary information security approach and the new challenging role of IT auditors. BIO: Christos Vidakis has more than ten years of information systems security, auditing and technology experience, with special emphasis on continuous security testing engagements. He currently serves as a senior manager in KPMG s Risk and Management Consulting practice. Christos has directed and managed the technology integration aspects of financial statement audits, has designed and implemented information security management systems and has performed and managed a number of security assessments and system implementations such as ISAE 3402, PCI/DSS, SOX 404 and ISO Christos has led numerous technical risk assessment engagements involving forensics of security incidents, penetration tests, network and system security architecture assessments and has guide several clients in evaluation, designing, implementing and managing security architecture solutions. He has also performed assessment of banking information systems security according to the Bank of Greece Governor s Act Key trends and messages from the PwC Global State of Information Security Survey 2013 with Stan Voulanas, CISA, CIA, CMIIA, CA, Partner, Risk Assurance, PwC, Greece Abstract: For many businesses, security has become a game that is almost impossible to win. The rules have changed, opponents are armed with expert technology skills, and the risks are greater than ever. In the 15th year, the Global State of Information Security Survey had over 9,300 respondents from CEOs, CFOs, CIOs, CISOs, CSOs, VPs, and directors of IT and security from 128 countries who have been engaged in the high stakes game of information security. New rules and new opponents are in play. And to win, businesses must prepare to play a new game that requires advanced skills and strategy. A special report has been prepared for Greece with the participation of 77 executives from across a wide

8 range of sectors. Τhe main findings of the report will be presented and discussed with a panel of four invited speakers." BIO: Asterios Voulanas is PwC partner with 20 years of experience in the fields of technology governance, risk and compliance that helps clients gain value from their investments in IT and security. He is responsible for the Risk Assurance practice assists organizations in achieving controls excellence through a complete suite of industry focused IT, process and data risk and control solution sets. Asterios has authored a number of articles on information security on behalf of the firm for local Greek IT publications and newspapers. Asterios has led and managed a large number of PwC Greece s IT governance, risk, audit and security projects for a large portfolio of multinational and Greek clients. He has strong expertise in assessing and developing security and governance frameworks that address emerging and changing business and technology risks including those driven by industry or regulatory frameworks such as CoBiT, ISO27001, PCI DSS, Privacy, Telecommunication and Banking specific regulations. His experience spans various industries and client segments including financial services, telecommunications, manufacturing, retail, shipping and logistics. Conference Chairman Prof. Despina Polemi, Assistant Professor, University of Piraeus, ISACA Academic Advocate BIO: Professor Nineta Polemi has obtained the Degree in Applied Mathematics from Portland State University (USA) in 1984, Ph.D. in Applied Mathematics (Coding Theory) from The City University of New York (Graduate Center) in She held teaching positions ( ) in Queens College and Baruch College of City University of New York. From 1991 to 1996 was assistant professor in The State University of New York at Farmingdale. During was senior security researcher in the National Technical University of Athens (NTUA) ICCS ( During acted as President of the BoD and Technical Manager in the security consultancy company Expertnet ( She is currently an Assistant Professor in the University of Piraeus (Dept. of Informatics) teaching cryptography, security and e business. Her current research interests are in the fields of security and collaborative e services. She has over one hundred publications in the above areas and has organised numerous security scientific events. She has received many research grants from various organizations such as the Danish Research Foundation, MSI Army Research Office/Cornell University, IEEE, State University of New York (SUNY), and The Graduate School of City University of New York (CUNY). She has been project manager (PM) / technical manager (TM) in security projects of various programmes such as National Security Agency (NSA), Dr. Nuala McGann Drescher Foundation, Greek Ministry of Defence, INFOSEC (Biometrics Study, EUROMED ETS, BESTS), TELEMATICS for Administrations (COSACC) and the European Commission (E.C.) IST Programme (HARP, BEE, SEED, WebSig, TSEC, CORAS, RESHEN, SEED, La Mer, SECRETS, INTELCITIES, SELIS, SWEB, NetShare, Eurogene, ImmigrationPolicy2.0). She participated in E.C. security projects of programs (COST, ACTS, ICT and NATOs). She acts as an expert and evaluator in the E.C. and the European Network and Information Security Agency (ENISA). Check at or for more updates

9 Workshop Security, Governance & Risk Management. Explained 6 December 2012, 09:00 17:00 Athens, Hellenic American Union Conference Center Overview This workshop is designed to foster collaboration in the areas of Assurance, Security, Governance and Risk Management over Information Systems. The workshop commences with a 4 hour session on Cobit5 related to privacy by Dr. Christos Dimitriadis, and continues with a 4 hour session on everything participants need to know about Security and Governance. The second session of the workshop has an open agenda, as it is built on the concept of sharing experiences, on everybody's talking about what's happening in the real world. Attendees would need an open minded mood, get ready to present issues, problems, examples from their real environment, and ask everything in these areas. Since it is created to share visions and experiences from the real world, one of its goals is to engage into a relevant, useful dialogue with the audience, covering among other Cloud Computing, Risk Management, Metrics & Indicators, Identity Management, Access Governance, Big Data, Mobile Devices, BYOD, Log Management During this 4 hour session, Mr. Ramsés Gallego will introduce the topics and then will try to get everybody talking and sharing while giving ISACA's, and his own, perspective. Some slides will be used to help through visuals but it will not be a presentation oriented workshop. This will be a highly interactive session therefore participation will be limited to a people max. Please register on time to secure your place. Workshop leaders: 1 st Session: Christos K. Dimitriadis, CISA, CISM, CRISC, is an International Vice President of ISACA. He also is the Head of Information Security for Intralot Group, a multinational supplier of integrated gaming and transaction processing systems based in Greece, managing information security in more than 50 countries in all continents. Mr. Dimitriadis has served ISACA as chairman of the External Relations Committee and member of the Relations Board, Academic Relations Committee, ISACA Journal Editorial Committee and Business Model for Information Security Workgroup. Mr. Dimitriadis has been working in the area of information security for 11 years and has authored 70 publications in the field. He has been providing information security services to the ITU, European Commission Directorate General, European Ministries and international organizations, as well as business consulting services to entrepreneurial companies. Mr. Dimitriadis received a diploma of electrical and computer engineering from the University of Patras, Greece, and a Ph.D in information security from the University of Piraeus, Greece. 2 nd Session: Ramsés Gallego, CISM, CGEIT, CISSP, SCPM, CCSK, ITIL, COBIT(f), Six Sigma Black Belt Certified. With a background education in Business Administration (MBA) and Law, Ramsés is a +15 year security professional with deep expertise in the Risk Management and Governance areas. Ramsés is now Security Strategist and Evangelist for Dell where he defines the vision of the security discipline and oversees the deployment of services. Before, he was at CA Technologies for 8 years, was Regional Manager for SurfControl in Spain and Portugal, and just recently Chief Strategy Officer of the Security and Risk Management practice at Entelgy. Ramsés has been serving for three years in ISACA s CISM and CGEIT Certification Committees and also in the Guidance & Practices Committee for three years from where deliverables have been created for the community. He is honored to have been the Chair for ISACA s ISRM Conference and is now Research Director & Strategic Planning at the Barcelona Chapter and part of the Program Committee for the events SecureCloud 2010 and Ramsés played an instrumental role in the Planning Committee that prepared first ever ISACA's World Congress in Washington, June He has also been part of the ISACA's CISM PATF Task Force. He also develops results oriented, business focused, people driven projects due to his Six Sigma Black Belt accreditation. He has been appointed International Vice President for ISACA and has a seat in its Board of Directors This workshop grants 8 CPEs and 2 PDUs. Stay in touch at and for updates.

Athens, 6 7 December 2012 Hellenic American Union Conference Center

Athens, 6 7 December 2012 Hellenic American Union Conference Center Athens, 6 7 December 2012 Hellenic American Union Conference Center ISACA Athens Chapter and the Hellenic American Union are organizing the 2012 ISACA Athens Chapter Conference on December 6 7, 2012. The

More information

Gregory. Regulators. Speakers

Gregory. Regulators. Speakers Athens, ISACA Athens Chapter with the support of Hellenic American Unionn is organizingg the 3rd ISACA Athens Chapter Conference on November 2 & 4, 2013. The theme of the conference is: Emerging from Crisiss

More information

Athens, 2 & 4 November 2013

Athens, 2 & 4 November 2013 Athens, ISACA Athens Chapter with the support of Hellenic American Union is organizing the on November 2 & 4, 2013. The theme of the conference is: Emerging from Crisis The risks, the opportunities and

More information

1 ISACA KEYNOTE Presentation Emerging IT - Trends and their Implications to the Audit Profession

1 ISACA KEYNOTE Presentation Emerging IT - Trends and their Implications to the Audit Profession Αναρτήθηκαν στον δικτυακό μας τόπο οι παρουσιάσεις του 3ου Συνεδρίου ISACA Athens Chapter στο οποίο η συμμετοχή σας ξεπέρασε κατά πολύ το προηγούμενο. Στη συνέχεια αυτής της σελίδας μπορείτε να βρείτε

More information

Les joies et les peines de la transformation numérique

Les joies et les peines de la transformation numérique Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education

More information

ISACA International Perspective

ISACA International Perspective ISACA International Perspective 11 th October 2013 Allan Boardman ISACA International Vice President and Board Director Member of ISACA s Strategic Advisory Council Member of the IT Governance Institute

More information

Vademecum of Speakers

Vademecum of Speakers Vademecum of Speakers Session 1 - The response to the crisis: removing barriers and unleashing growth in services Ariane Kiesow Centre for European Policy Ariane Kiesow is a policy analyst at the Centre

More information

Call for Expressions of Interest

Call for Expressions of Interest Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...

More information

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA The Experience of Generali Group in Implementing COBIT 5 Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA Generali Group at a glance Let me introduce myself Marco Salvato CISA, CISM, CGEIT,

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

Helping you understand the impact of GDPR.

Helping you understand the impact of GDPR. Helping you understand the impact of GDPR. GENERAL DATA PROTECTION REGULATION (GDPR) RSM s GDPR experts GREGOR STROBL Munich, Germany Partner Risk Advisory Services (RAS) Master of Arts (M.A.) in Corporate

More information

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38

More information

Discussion on MS contribution to the WP2018

Discussion on MS contribution to the WP2018 Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several

More information

Between 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department.

Between 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department. Application for the post of the Executive Director of the European Network and Information Security Agency (ENISA) Udo Helmbrecht Presentation to the ENISA Management Board in Brussels on April 3 rd 2009

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information

building for my Future 2013 Certification

building for my Future 2013 Certification I am building for my Future 2013 Certification Let ISACA help you open new doors of opportunity With more complex IT challenges arising, enterprises demand qualified professionals with proven knowledge

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

Workshop description

Workshop description Workshop description COBIT5 for Assurance With information and technology at the heart of creating value for enterprises, it is more important than ever for organizations to optimize their IT assurance

More information

The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018

The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018 The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018 Jeff Hemphill Partner and Central Region Leader, Risk Advisory Services Brian Kirkpatrick Managing Director, Risk Advisory

More information

Securing Europe's Information Society

Securing Europe's Information Society Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU

More information

ENISA Cooperation in the EU / NIS Directive

ENISA Cooperation in the EU / NIS Directive ENISA Cooperation in the EU / NIS Directive Paulo Empadinhas Head of Administration & Stakeholders Relations IT STAR Milan, Italy 28 th October 2016 European Union Agency for Network and Information Security

More information

ENISA s Position on the NIS Directive

ENISA s Position on the NIS Directive ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

Securing Europe s IoT Devices and Services

Securing Europe s IoT Devices and Services Securing Europe s IoT Devices and Services Dr. Evangelos OUZOUNIS Head of Unit - Secure Infrastructure and Services Validation Workshop Berlin 16 October 2015 European Union Agency for Network and Information

More information

IT in Healthcare Day

IT in Healthcare Day San Francisco ISACA Chapter Proudly Presents IT in Healthcare Day A Day-Long, Multi-Session Event, being held in Walnut Creek! Where: Walnut Creek Marriott - 2355 North Main Street Walnut Creek, CA 94596

More information

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

Proposition to participate in the International non-for-profit Industry Association: Energy Efficient Buildings

Proposition to participate in the International non-for-profit Industry Association: Energy Efficient Buildings Proposition to participate in the International non-for-profit Industry Association: Energy Efficient Buildings Working towards the launch of an EU Joint Technology Initiative on Energy Efficient Buildings

More information

PROFILE FRANCIS KAITANO. Francis Kaitano is a strategic, innovative, delivery focused Cyber Security professional.

PROFILE FRANCIS KAITANO. Francis Kaitano is a strategic, innovative, delivery focused Cyber Security professional. PROFILE FRANCIS KAITANO Francis Kaitano is a strategic, innovative, delivery focused Cyber Security professional. Originally from Zimbabwe Francis Kaitano came to New Zealand more than 10 years ago for

More information

Cybersecurity & Digital Privacy in the Energy sector

Cybersecurity & Digital Privacy in the Energy sector ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European

More information

MAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world

MAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world 8 MAY 2018 (Tue) Hong Kong CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world CYBERSECURITY AND RISK MANAGEMENT By HKUST Business School Executive Education Office

More information

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.

More information

Leading the Digital Transformation from the Centre of Government

Leading the Digital Transformation from the Centre of Government 37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00

More information

2018 Government Professional Accounting Seminar

2018 Government Professional Accounting Seminar 2018 Government Professional Accounting Seminar Thursday September 6, 2018 7:30 a.m. - Registration and Networking 8:00 a.m. 4:50 p.m. (Early Registration by Tuesday, July 31, 2018; Regular by Friday,

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

Driving Global Resilience

Driving Global Resilience Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute

More information

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment

More information

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

COBIT 5 Foundation. Certification-led Audit, Security, Governance & Risk

COBIT 5 Foundation. Certification-led Audit, Security, Governance & Risk COBIT 5 Foundation Vertical Type Sub-Category Technology Certification-led Audit, Security, Governance & Risk Welcome Note Hello there You've considered embarking on an exciting journey to strengthen your

More information

Telecommunication Development Bureau (BDT)

Telecommunication Development Bureau (BDT) Telecommunication Development Bureau (BDT) Ref.: BDT/IEE/RME/DM/006 Geneva, 18 December 2017 To: -ITU-D Sector Members -Administrations of ITU Member States -National Regulatory Authorities -Regional and

More information

Cyber, Information Security, and Data Protection

Cyber, Information Security, and Data Protection Cyber, Information Security, and Data Protection The past, the present, and th e future 15th, 16th & 17th October 2018 Muscat - Oman Intellectual Events And Conferences Private Limited For more information

More information

EU policy on Network and Information Security & Critical Information Infrastructures Protection

EU policy on Network and Information Security & Critical Information Infrastructures Protection EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and

More information

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB 2 OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB In today s digital world, safeguarding data, intellectual property, financial

More information

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3 The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3 Andrea.Servida@ec.europa.eu What is at stake with CIIs The World Economic Forum

More information

Security Program Design:

Security Program Design: Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident

More information

RISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process

RISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process RISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process Date 24-25 September 2018 Time: 09:00 17:00 Location Hotel Grand, Tirana, Albania Course director: Mr. Konstantinos P. Triantafyllidis,

More information

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,

More information

Spring Education Conference. Securing the Organization (Ensuring Trustworthy Systems)

Spring Education Conference. Securing the Organization (Ensuring Trustworthy Systems) Spring Education Conference Securing the Organization (Ensuring Trustworthy Systems) Ken Vander Wal, CISA, CPA Past President, ISACA vandeke@gmail.com 1 2012-2013 Board of Directors International President

More information

21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong

21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong Date: Time: 21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong The Chinese Manufacturers Industry About Vocational

More information

Research Infrastructures and Horizon 2020

Research Infrastructures and Horizon 2020 Research Infrastructures and Horizon 2020 Christos VASILAKOS DG Research & 1 st CoPoRI Workshop on EoE 11-12 June 2012 Hamburg, DE The EU Framework Programme for Research and 2014-2020 Research and Europe

More information

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act'' CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

More information

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED

More information

INDEX ABOUT US 3 ARAB CERTIFIED QUALITY MANAGER PROGRAM. Body of Knowledge 6 UNESCO ICT INDICATORS 8 MESSAGE FROM THE CHAIRM AN

INDEX ABOUT US 3 ARAB CERTIFIED QUALITY MANAGER PROGRAM. Body of Knowledge 6 UNESCO ICT INDICATORS 8 MESSAGE FROM THE CHAIRM AN INDEX MESSAGE FROM THE CHAIRM AN 2 ABOUT US 3 ARAB CERTIFIED QUALITY MANAGER PROGRAM 5 Body of Knowledge 6 UNESCO ICT INDICATORS 8 1 MASSAGE FROM THE CHAIRMAN Welcome to the Arab Knowledge and Management

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

ROI for Your Enterprise Through ISACA A global IS association helping members achieve organisational success.

ROI for Your Enterprise Through ISACA A global IS association helping members achieve organisational success. ROI for Your Enterprise Through ISACA A global IS association helping members achieve organisational success. ROI for Your Enterprise Through ISACA With the growing complexities of global business and

More information

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 21 October /13 LIMITE CO EUR-PREP 37. NOTE General Secretariat of the Council

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 21 October /13 LIMITE CO EUR-PREP 37. NOTE General Secretariat of the Council COUNCIL OF THE EUROPEAN UNION Brussels, 21 October 2013 12397/13 LIMITE CO EUR-PREP 37 NOTE from: To: General Secretariat of the Council Council Subject: European Council (24-25 October 2013) - Draft conclusions

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

COBIT 5 Foundation Workshop

COBIT 5 Foundation Workshop COBIT 5 Foundation Workshop Dear Members, ISACA Pune chapter is pleased to organize Two / Three Days COBIT-5 Foundation course Dates of Training & Workshop: Date: Friday, 19 th Dec 2014 and Saturday, 20

More information

Effective COBIT Learning Solutions Information package Corporate customers

Effective COBIT Learning Solutions Information package Corporate customers Effective COBIT Learning Solutions Information package Corporate customers Thank you f o r y o u r interest Thank you for showing interest in COBIT learning solutions from ITpreneurs. This document provides

More information

Partnership Information

Partnership Information SECOND INTERNATIONAL CONFERENCE ON ISO 31000 STANDARD USING ISO 31000 RISK MANAGEMENT STANDARD TO ACHIEVE OPTIMAL PERFORMANCE Conference Date: 28-29 May 2013 Master Classes Date: 30-31 May 2013 Location:

More information

Information sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3

Information sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3 Information sharing in the EU policy on NIS & CIIP Andrea Servida European Commission DG INFSO-A3 Andrea.Servida@ec.europa.eu COM(2006) 251 - Towards a secure Information Society DIALOGUE structured and

More information

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized. Val-EdTM Valiant Technologies Education & Training Services Workshop for CISM aspirants All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting

More information

MASTER OF SCIENCE IN COMPUTER SCIENCE

MASTER OF SCIENCE IN COMPUTER SCIENCE THE UNIVERSITY OF ZAMBIA SCHOOL OF NATURAL SCIENCES DEPARTMENT OF COMPUTER STUDIES MASTER OF SCIENCE IN COMPUTER SCIENCE November 2014 1) BACKGROUND From the inception of Computer Science programmes at

More information

BRING EXPERT TRAINING TO YOUR WORKPLACE.

BRING EXPERT TRAINING TO YOUR WORKPLACE. BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique

More information

IT123: SABSA Foundation Training

IT123: SABSA Foundation Training IT123: SABSA Foundation Training IT123 Rev.002 CMCT COURSE OUTLINE Page 1 of 8 Training Description: SABSA is the world s leading open security architecture framework and methodology. SABSA is a top-tobottom

More information

College Of. Technological Innovation

College Of. Technological Innovation College Of Technological Innovation Contact Us 00971-2-5993111 (Abu Dhabi) 00971-4-4021111 (Dubai) 00971-4-4021408 (College of Technological Innovation) @Zayed_U zayeduniversity ZayedU www.zu.ac.ae Introduction

More information

COURSE BROCHURE. COBIT5 FOUNDATION Training & Certification

COURSE BROCHURE. COBIT5 FOUNDATION Training & Certification COURSE BROCHURE COBIT5 FOUNDATION Training & Certification What is COBIT5? COBIT 5 (Control Objectives for Information and Related Technology) is an international open standard that defines requirements

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO A New Cyber Defense Management Regulation Ophir Zilbiger, CRISC, CISSP SECOZ CEO Personal Background IT and Internet professional (since 1992) PwC (1999-2003) Global SME for Network Director Information

More information

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway.

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway. Aalborg Universitet Vision for IT Audit 2020 Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication from Aalborg University Citation

More information

Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi

Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi Invitation for Continuing Professional Education Session On November 16, 2013 (Saturday) Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi -110001 Time: 03:00

More information

IT Governance Framework at KIT

IT Governance Framework at KIT [unofficial English version; authoritative is the German version] IT Governance Framework at KIT 1. Recent situation and principle objectives Digitalization increasingly influences our everyday life at

More information

13967/16 MK/mj 1 DG D 2B

13967/16 MK/mj 1 DG D 2B Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:

More information

Implementation Strategy for Cybersecurity Workshop ITU 2016

Implementation Strategy for Cybersecurity Workshop ITU 2016 Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION Telecommunication Development Bureau T E L E F A X Place des Nations Telephone +41 22 730 51 11 CH-1211 Geneva 20 Telefax Gr3: +41 22 733 72 56 Switzerland Gr4: +41

More information

Fill in the attached registration Form and send to fax number or at

Fill in the attached registration Form and send to fax number or  at Information Security Workshop 7-10 April 2013, Gulf Hotel Key Learning Objectives: 1. Understand Information Security needs 2. Learn About Risk management Essentials 3. Understand Standards and Best Practices

More information

Valérie Andrianavaly European Commission DG INFSO-A3

Valérie Andrianavaly European Commission DG INFSO-A3 Security and resilience in the Information Society: towards a CIIP policy in the EU Valérie Andrianavaly European Commission DG INFSO-A3 valerie.andrianavaly@ec.europa.eu Network and information security:

More information

Revisit the Foundations of ITSM SMSG

Revisit the Foundations of ITSM SMSG Revisit the Foundations of ITSM SMSG 10 th October 2013 Ian Connelly Over 15 years experience working in IT, principally in Service Operations for Telcos, ISPs & the Insurance sector Service Management

More information

Shaping the Cyber Security R&D Agenda in Europe, Horizon 2020

Shaping the Cyber Security R&D Agenda in Europe, Horizon 2020 Shaping the Cyber Security R&D Agenda in Europe, Horizon 2020 Aristotelis Tzafalias Trust and Security unit DG Communica4ons Networks, Content and Technology European Commission Shaping the Cyber Security

More information

Memphis Chapter. President s Message. This annual event is designed to provide students with a

Memphis Chapter. President s Message. This annual event is designed to provide students with a Memphis Chapter F E B R U A R Y 2 0 1 5 Remember: Update your IIA profile for the most up-to-date news. RSVP for the Annual Student Day February 24, 2015 This annual event is designed to provide students

More information

Postgraduate Degree in ICT Audit & Security. Is your IT really under control?

Postgraduate Degree in ICT Audit & Security. Is your IT really under control? Postgraduate Degree in ICT Audit & Security Is your IT really under control? Advanced skills development for: Information Security Professionals ICT Management Consultants Information Technology Auditors

More information

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements UK Permanent Salary Index ember 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation

More information

CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions. Regional Headquarters, The University of the West Indies, Mona

CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions. Regional Headquarters, The University of the West Indies, Mona 2 nd National Conference on CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions Regional Headquarters, The University of the West Indies, Mona November 20-21, 2014 Conference

More information

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 Sponsored by: Kansas Municipal Utilities Kansas Municipal Energy Agency Kansas Power Pool CYBERSECURITY TRAINING EXERCISE DATE November

More information

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 18-19 APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 At the Trieste Western Balkans Summit, we stressed the importance of the

More information

5 th IRF Latin America Regional Congress

5 th IRF Latin America Regional Congress Host 5 th IRF Latin America Regional Congress Bogotá, Colombia December 13-15, 2017 Program About the IRF OUR MISSION: Building Partnerships We assist countries in progressing towards better, safer and

More information

Cyber Security Congress 2017

Cyber Security Congress 2017 Cyber Security Congress 2017 A rich agenda covering both technical and management matters with targeted presentations and hands on workshops. Day 1 Conference Morning Session 8.30 9.00 Registration & Coffee

More information

Enhancing the security of CIIPs in Europe - ENISA s Approach Dimitra Liveri Network and Information Security Expert

Enhancing the security of CIIPs in Europe - ENISA s Approach Dimitra Liveri Network and Information Security Expert Enhancing the security of CIIPs in Europe - ENISA s Approach Dimitra Liveri Network and Information Security Expert European Union Agency For Network And Information Security Securing Europe s Information

More information

Master the implementation and management of a Cybersecurity Program based on ISO/IEC 27032

Master the implementation and management of a Cybersecurity Program based on ISO/IEC 27032 ISO/IEC 27032 Lead Manager 23rd - 27th October 2017 Hilton Hotel, Sandton, Johannesburg Master the implementation and management of a Program based on ISO/IEC 27032 Why should you attend? Manager training

More information

GDPR Update and ENISA guidelines

GDPR Update and ENISA guidelines GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure

More information

Developing an Internal Compliance Program for Export Controls & Sanctions

Developing an Internal Compliance Program for Export Controls & Sanctions Full Circle Compliance Presents Developing an Internal Compliance Program for Export Controls & Sanctions, 09.00 16.30 Introduction Full Circle Compliance now welcomes registrations for its academy training

More information

Training Catalog. Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz. Revision public. Authorized Training Partner

Training Catalog. Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz. Revision public. Authorized Training Partner Management and Information Technology Solutions Decker Consulting GmbH Training Catalog Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz Revision 9.1 05.12.2018 public Authorized Training Partner

More information

COBIT 5 Assessor Certification Course

COBIT 5 Assessor Certification Course COBIT 5 Assessor Certification Course About COBIT 5.0 Information is created, used, retained, disclosed and destroyed. Technology plays a key role in these actions and technology is becoming pervasive

More information

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important

More information