CRISC Grandfathering Program Now Open

Size: px
Start display at page:

Download "CRISC Grandfathering Program Now Open"

Transcription

1 Volume 9, 28 April 2010 In This Issue: CRISC Grandfathering Program Now Open Top Eight Tips for Forensics New Blog to Debut on Revamped Web Site Read About the Latest Changes in Oracle E-Business and ERP Finding Career Variety and Stability Through Certification Enhanced Chapter Integration on New Web Site Book Review: Information Technology for Management Improving Performance in the Digital Economy, 7 th Edition CRISC Grandfathering Program Now Open Grandfathering applications for the new Certified in Risk and Information Systems Control (CRISC, pronounced see-risk ) designation are now being accepted. CRISC is a new certification designed for IT and business professionals who identify and manage risks through the development, implementation and maintenance of appropriate information systems controls. Top Eight Tips for Forensics By Leighton Johnson, CISSP, CISA, CISM, CIFI Digital forensics is the detailed process invoked during incident response when the event is found to have some legal, criminal or civil component or potential result for the organization. The acronym PIPSECAP ( pips-e-cap ) will help you to remember how to conduct the forensics investigation: 1. Prepare Specific forensics training, overarching corporate policies and procedures, and practice investigations and examinations will prepare you for an event.

2 New Blog to Debut on Revamped Web Site By Emil D Angelo, CISA, CISM, ISACA International President When ISACA s new web site is introduced in late May, one of the many enhancements will be the debut of a new blog, ISACA Now. Read About the Latest Changes in Oracle E-Business and ERP A Conversation With Najeeba Hossain, Member of Deloitte Touche Tohmatsu s Primary Research Team Not only does Security, Audit and Control Features Oracle E-Business, 3 rd Edition provide readers with an understanding of Oracle E-Business, but it also focuses on the enhancements in the latest software release, which offers significant improvements to audit quality and efficiency. In particular, the guide discusses how the advent of Oracle s GRC solution can assist with continuous compliance over an Oracle E-Business environment. Finding Career Variety and Stability Through Certification Mark Petterson, CISA, CPA, Audit Manager, Arizona Board of Regents, Shares His Experience As a CISA Earning Certified Information Systems Auditor (CISA ) and pursuing a career path with the certification has provided Petterson with variety in his work and the opportunity to affect significant change. Information technology is so ingrained in organizations, and so critical, that CISAs get to look at a lot of different things, said Petterson.

3 Enhanced Chapter Integration on New Web Site Chapters play a pivotal role at ISACA, giving support to members at the local level. Some of the chapter-related offerings planned for the soon-to-launch, renovated ISACA web site include: Book Review: Information Technology for Management Improving Performance in the Digital Economy, 7th Edition Reviewed by Vishnu Kanhere, Ph.D., CISA, CISM, AICWA, CFE, FCA In today s competitive business world, IT is a major driver, medium, tool and enabler for organizations to transform and leverage a competitive advantage on their path to success. Information Technology for Management Improving Performance in the Digital Economy, 7 th Edition, highlights the role IT plays in changing the business environment and how information systems can be leveraged to gain strategic advantage... CRISC Grandfathering Program Now Open Grandfathering applications for the new Certified in Risk and Information Systems Control (CRISC, pronounced see-risk ) designation are now being accepted. CRISC is a new certification designed for IT and business professionals who identify and manage risks through the development, implementation and maintenance of appropriate information systems (IS) controls. CRISC is intended to recognize a wide range of professionals for their knowledge of enterprise risk and their ability to design, implement, monitor and maintain IS controls to mitigate such risks. Professionals with eight or more years of IT and business experience can now earn ISACA s new CRISC designation under its grandfathering program. Certification through the grandfathering program is open from April 2010 through March 2011 to

4 highly experienced individuals. Click here for specific details regarding the grandfathering program, specific requirements and an application. CRISC is intended to complement ISACA s three existing certifications as follows: CRISC is for IT and business professionals who are engaged at an operational level to mitigate risk, while CGEIT is for IT and business-related professionals who have a significant management, advisory or assurance role relating to the governance of IT including risk management. CRISC is for IT and business professionals who design, implement and maintain IS controls, while CISA is designed for IT professionals who perform independent reviews of control design and operational effectiveness. CRISC is for IT professionals whose roles encompass security, operational and compliance considerations, while CISM is for individuals who manage, design, oversee and/or assess an enterprise s information security, including the identification and management of information security risks. Set yourself apart from your peers; apply for the CRISC certification today. Top Eight Tips for Forensics By Leighton Johnson, CISA, CISM, CIFI, CISSP Digital forensics is the process for any forensics scene activity or investigation involving computer-based or network-based digital data in a system and/or network. This activity is usually in response to some incident, event or activity that resulted in an incident response action. Digital forensics is the detailed process invoked during incident response when the event is found to have some legal, criminal or civil component or potential result for the organization. The acronym PIPSECAP ( pips-ecap ) will help you to remember how to conduct the forensics investigation: 1. Prepare Specific forensics training, overarching corporate policies and procedures, and practice investigations and examinations will prepare you for an event. Specialized forensics or incident handling certifications are considered of great value for forensics investigators. 2. Identify When approaching an incident scene, review what is occurring on the computer screen. If data are being deleted, pull the power plug from the wall; otherwise, perform real-time capture of system volatile data first. 3. Preserve Once the system-specific volatile data are retrieved, turn off the

5 machine, remove it from the scene and power it up in an isolated environment. Perform a full-system, bit-stream image capture of the data on the machine, remembering to hash the image with the original data for verification purposes. 4. Select Once you have a verified copy of the available data, start the investigation of data by selecting potential evidence files, data sets and locations where data could be stored. Isolate event-specific data from normal system data for further examination. 5. Examine Look for potential hidden storage locations of data, such as slack space, unallocated space and in front of file allocation table (FAT) space on hard drives. Remember to look in registry entries or root directories for additional potential indicators of data storage activity. 6. Classify Evaluate data in potential locations for relevance to the current investigation. Are the data directly related to the case? Does the data support events of the case? Or, are the data unrelated to the case? 7. Analyze Review data from relevant locations. Ensure data are readable, legible and relevant to the investigation. Evaluate the data for type of evidence: Is the data direct evidence of the alleged issue or are they related to the issue? 8. Present Correlate all data reviewed to investigation papers (e.g., warrants, corporate documents). Prepare a data report for presentation either in a court of law or to corporate officers. Leighton Johnson, CISA, CISM, CIFI, CISSP, is a senior security consultant for the Information Security & Forensics Management Team (ISFMT) of Bath, South Carolina, USA. New Blog to Debut on Revamped Web Site By Emil D Angelo, CISA, CISM, ISACA International President When ISACA s new web site is introduced in late May, one of the many enhancements will be the debut of a new blog, ISACA Now. The blog is designed with member needs in mind, and will feature posts from ISACA s current international president (that s me, for now) as well as from Susan Caldwell, ISACA s chief executive officer. Comments to the posts are welcomed and encouraged.

6 The blog will also host a variety of questions from members and other constituents. ISACA leaders will serve as guest bloggers to provide timely responses. Submissions are being accepted now, in advance of the blog, so start sending questions about ISACA, IT, careers, certifications or business in general to news@isaca.org. Please put Blog Question in the subject line. We also encourage you to keep up with the latest ISACA-related news via ISACA s official Twitter In addition, the new web site will feature: A Knowledge Center A single location where users can view all ISACA resources, including publications, ISACA Journal articles, events, links and news, around a specific topic Networking among users and the ability to post documents within communities. These communities will have topic leaders and moderators, and most will be accessible only to ISACA members. One of the greatest benefits of belonging to a global association such as ISACA is the tremendous opportunity to learn from, and interact with, members from all over the world. We hope these new capabilities will provide another effective outlet for that valuable sharing of knowledge and expertise. Read About the Latest Changes in Oracle E-Business and ERP A Conversation With Najeeba Hossain, Member of Deloitte Touche Tohmatsu s Primary Research Team Q: Why and how was the book developed? Does it replace or complement other publications? A: This third edition of the technical reference guide on Oracle E-Business was developed to provide an update to readers on current industry standards and to identify future trends in risks and control related to Oracle E-Business. The objective of Security, Audit and Control Features Oracle E-Business, 3 rd Edition, is to enable professionals to evaluate risks and controls in existing enterprise resource planning (ERP) implementations, and to facilitate the design and implementation of better practice controls into system upgrades and enhancements. The book references ISACA s COBIT 4.1, which provides guidance across a domain and process risk framework. The book is currently being developed by risk and audit professionals from Deloitte, on

7 behalf of ISACA, with input also being provided by Oracle Corp. and subject matter experts from around the world. The Oracle E-Business book is one in a series of three that provides information relating to the world s three major ERP systems. The other guides in the Security, Audit and Control Features series focus on SAP and PeopleSoft. Q: Please describe the goals and aims of the publication. How do you anticipate the reader benefiting from the content? A: The main aim of the publication is to notify readers of the key changes in the most recent release of Oracle E-Business Suite R12.1; the advent of governance, risk and compliance (GRC) solutions; and the impact that these have had on Oracle E-Business s security, risks and audit techniques. Not only does this guide provide readers with an understanding of Oracle E-Business, but it also focuses on the enhancements in the latest release, which offer significant improvements to audit quality and efficiency. In particular, the guide discusses how the advent of Oracle s GRC solution can assist with continuous compliance over an Oracle E-Business environment. The publication also provides information around the upcoming trends and directions for ERP systems in general and for Oracle E-Business, which is aimed to prepare readers for future changes that may arise. Q: To whom is the book written? What titles, roles will benefit the most from the publication and how? A: The book has been written with IT and business professionals in mind. Assurance professionals, as well as security and risk management professionals will find this publication to be highly informative and helpful. This book also aims to assist system architects, business analysts and business process owners who are implementing Oracle E- Business, and people responsible for running the system in live production, to maintain an appropriate level of control and security according to business needs and industry standards. Parts of the publication are written for those looking to learn more about how Oracle E- Business generally works, while the focus of the book is on the key strategic/risk management issues and audit tools/techniques that should be considered for an Oracle E- Business environment. Q: What would you identify as the single most important takeaway from the book? In other words, how will the reader benefit from the publication? A: This book outlines the importance of identifying the key specific risks inherent in an

8 Oracle E-Business environment, and, in particular, focuses on the expenditure and financial accounting business cycles, as well as Oracle E-Business security administration. The book provides the reader with suggested tools and techniques available to assist with controlling and auditing such risks. Q: What makes this publication unique and valuable to the reader? A: Although there are many books that have been written on Oracle, most of them are focused narrowly on the implementation, the business aspects, or on how a specific Oracle module works. This publication is unique, in that it deals with aspects of risk management, audit, security and control over the most recent release of Oracle E-Business. These are important aspects that have not been dealt with previously in a comprehensive manner within one publication. The book is also unique in that it contains audit programs, audit suggestions and internal control questionnaires for the business cycles addressed within the publication. The publication is scheduled to be available in the ISACA Bookstore in June. Click here to learn more about recently released ISACA research publications. Finding Career Variety and Stability Through Certification Mark Petterson, CISA, CPA, Audit Manager, Arizona Board of Regents, Shares His Experience As a CISA Mark Petterson s first civilian job after his military service was as a bank internal auditor. Eventually, as he considered IS auditing, he became more and more interested in it and thought it would be a good fit with his accounting and computer science degrees. I pursued the Certified Information Systems Auditor (CISA ) certification to demonstrate my proficiency in the field of IS audit and to demonstrate my suitability for jobs requiring a CISA, explained Petterson. Having the CISA has given me confidence that I possess the body of knowledge necessary to do my job proficiently. The CISA certificate doesn't always mean you'll get the job you want, but it opens the door to interviews. Earning CISA and pursuing a career path with the certification has provided Petterson with variety in his work and the opportunity to effect significant change. Information technology is so ingrained in organizations, and so critical, that CISAs get to look at a

9 lot of different things, said Petterson. It is rewarding to go into an area, such as systems development, and identify significant problems that are dragging down the organization and have not been recognized by management, and recommend ways to solve them. And, continually changing technology helps keep the job interesting. As in most industries, the current economic climate has been tough on public university systems, and university employees are being asked to do more with less. Petterson finds there is pressure on both IT and audit staffing and it is a challenge to keep up with new technology especially in the area of information security. It s difficult to find a way to get management to embrace a control framework and a sound IT governance framework, he explained. It s not that they don t appreciate the concepts; it s that they prefer to operate within their own comfort levels. To remain current and knowledgeable on new technology and maintain the requirements of his certifications, Petterson prefers in-person training; however, he feels webinars and other forms of distance learning are frequently worthwhile. The continuing professional education (CPE) hours available from participating in ISACA committees have been helpful, he added. For those considering pursuing an ISACA credential, such as CISA, Petterson recommends beginning the process immediately. Pick the certification that is most appropriate to your job or career goals, register for the exam, and start studying in a structured manner, he suggests. The exams are designed to be challenging, but fair. I wouldn t be concerned with the experience requirement at this point if you are working in the right field, time will pass and then you will be eligible for the certification. For those looking to work in the audit, security and/or governance field after graduation, Petterson suggests, Network through participation in professional meetings and training, and pursue worthwhile professional development to keep up with changing technology and concepts. He continued, Avoid training that meets CPE requirements but is not challenging or useful. Be alert for opportunities brought by the changing technological landscape. Technological innovations, such as end-user computing, relational databases and the Internet, to name a few, have brought opportunities. Petterson added that becoming involved with ISACA can be very beneficial professionally. Earning my CISA certification has enabled me to participate on ISACA committees, he said. My friendship and interaction with CISAs from all over the world and with ISACA International Headquarters staff has been extraordinarily fulfilling and

10 educational. When not busy with his position as an audit manager, Petterson likes to run, hike, play tennis and read, especially the novels of Patrick O'Brian. He would also like to travel. Having spent three years in Germany with the military, I feel at home in Europe and love to go back, he said. If he wasn t working in the audit field, Petterson says he would like to be teaching in a university setting or writing novels. Mark Petterson is a member of the CISA Test Enhancement Subcommittee and the ISACA Credentialing Board. He also has been a member (including holding the chair position) of the CISA Certification Committee. Enhanced Chapter Integration on New Web Site Chapters play a pivotal role at ISACA, giving support to members at the local level. Some of the chapter-related offerings planned for the soon-to-launch, renovated ISACA web site include: Relevant chapter information presented to you on your My ISACA page Chapter events and announcements listed on the ISACA web site and personalized to members A chapter map to quickly and easily locate chapters around the world Unified login use your ISACA login credentials on chapter web sites The renovated ISACA web site is launching next month with important upgrades and useful advancements. Learn more in upcoming issues Click here for additional information available online. Book Review: Information Technology for Management Improving Performance in the Digital Economy, 7 th Edition Reviewed by Vishnu Kanhere, Ph.D., CISA, CISM, AICWA, CFE, FCA In today s competitive business world, IT is a major driver, medium, tool and enabler for organizations to transform and leverage a competitive advantage on their path to success. Information Technology for Management Improving Performance in the Digital Economy, 7 th Edition, highlights the role IT plays in changing the business

11 environment and how information systems can be leveraged to gain strategic advantage by facilitating problem solving, increasing productivity and quality, increasing speed, and improving service and product delivery through better communication, collaboration and business processes. The book, written by Efraim Turban and Linda Volonino, is primarily aimed at managers and will help improve their understanding of IT or information systems (IS) as an enabler and an effective tool for management. It is a good business reference and an excellent resource for the beginner. However, it is an intermediate book, appropriate for understanding and appreciating cutting-edge IT and IS solutions, and will prove useful for the IS professional to understand business management s perspective of IT/IS. With appropriate documentation and features, including a chapter online, learning objectives, cases, work boxes and highlights, the book has added strengths in the form of a presentation that takes a closer look at relevant issues, and is supplemented by chapter highlights, assignments, web-based resources and a glossary. The presentation is in textbook style, but is worth the effort due to the content and information that is made available. And, the number of diagrams, figures, illustrations, tables, pictures and cases make the book interesting and appropriate as a business reference. The book, if appropriately referenced and used, will provide enough resources and material to serve the current and future needs of business managers in the acquisition, implementation and effective deployment, operation and use of information technology and systems for managing their organizations. Click here to order Information Technology for Management Improving Performance in the Digital Economy, 7 th Edition, or bookstore@isaca.org. Vishnu Kanhere, Ph.D., CISA, CISM, AICWA, CFE, FCA, is an expert in software valuation, IS security and IS audit. He is a renowned faculty member at several management institutes, government academies and corporate training programs. He is a member of the ISACA Mumbai (India) Chapter and the ISACA Publications Subcommittee ISACA. All rights reserved.

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential

More information

building for my Future 2013 Certification

building for my Future 2013 Certification I am building for my Future 2013 Certification Let ISACA help you open new doors of opportunity With more complex IT challenges arising, enterprises demand qualified professionals with proven knowledge

More information

ISACA Enterprise. Solutions and Resources

ISACA Enterprise. Solutions and Resources ISACA Enterprise Solutions and Resources About ISACA Global association serving 140,000 members and certification holders Members in 180+ countries; 210+ chapters worldwide Developed and maintains the

More information

Invest in. ISACA-certified professionals, see the. rewards.

Invest in. ISACA-certified professionals, see the. rewards. Invest in ISACA-certified professionals, see the rewards. Invest in ISACA-certified professionals, see the rewards. As a global IT association that has been around for more than 40 years, ISACA provides

More information

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED

More information

BRING EXPERT TRAINING TO YOUR WORKPLACE.

BRING EXPERT TRAINING TO YOUR WORKPLACE. BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique

More information

ISACA International Perspective

ISACA International Perspective ISACA International Perspective 11 th October 2013 Allan Boardman ISACA International Vice President and Board Director Member of ISACA s Strategic Advisory Council Member of the IT Governance Institute

More information

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers 2017 PORT SECURITY SEMINAR & EXPO ISACA/CISM Information Security Management Training for Security Directors/Managers Agenda Introduction ISACA Information security vs. cybersecurity CISM certification

More information

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized. Val-EdTM Valiant Technologies Education & Training Services Workshop for CISM aspirants All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting

More information

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS Good IT governance is a key element of a well-performing enterprise. Enterprises need qualified information

More information

comprehensive guide toı ACCOUNTINGı CERTIFICATIONSı cpa, cfe, cia, cisa & more ı The Bean Counter, LLC All Rights Reservedı

comprehensive guide toı ACCOUNTINGı CERTIFICATIONSı cpa, cfe, cia, cisa & more ı The Bean Counter, LLC All Rights Reservedı ACCOUNTING comprehensive guide to CERTIFICATIONS cpa, cfe, cia, cisa & more The Bean Counter, LLC All Rights Reserved The Bean Counter, LLC All Rights Reserved Certified Public Accountant This is what

More information

Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY

Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY ACHIEVE SUCCESS with ICE ICE has given me a real edge in knowing more about the intricacies of credentialing and connecting with others in the

More information

ROI for Your Enterprise Through ISACA A global IS association helping members achieve organisational success.

ROI for Your Enterprise Through ISACA A global IS association helping members achieve organisational success. ROI for Your Enterprise Through ISACA A global IS association helping members achieve organisational success. ROI for Your Enterprise Through ISACA With the growing complexities of global business and

More information

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)

More information

INCREASE YOUR CHANCES OF PASSING THE CIA EXAM

INCREASE YOUR CHANCES OF PASSING THE CIA EXAM INCREASE YOUR CHANCES OF PASSING THE CIA EXAM Sherri Lee Manager, Global Certifications, The IIA Daniel Lebel, CPA, CMA, CIA, CCSA, CFSA, CGAP, CRMA Chief Audit Executive, University of Quebec in Montreal

More information

A Global Look at IT Audit Best Practices

A Global Look at IT Audit Best Practices A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory

More information

Top Business/Technology Issues Survey 2011

Top Business/Technology Issues Survey 2011 Volume 9, 27 April 2011 In This Issue: Top Business/Technology Issues Survey 2011 Results Released 5 Considerations When Evaluating ISRM Programs and Capabilities Now Available in the Apple App Store:

More information

WELCOME TO ISACA Claudio CILLI, CISA, CISM, CRISC, CGEIT

WELCOME TO ISACA Claudio CILLI, CISA, CISM, CRISC, CGEIT WELCOME TO ISACA 2015 Claudio CILLI, CISA, CISM, CRISC, CGEIT cilli@di.uniroma1.it http://dsi.uniroma1.it/~cilli WHO IS ISACA? ABOUT ISACA The trusted source of guidance, networking and career development

More information

CISA Course. Course Details: iathena.com, a Navitus Education Venture

CISA Course. Course Details: iathena.com, a Navitus Education Venture iathena.com, a Navitus Education Venture CISA Course Course Details: Modules: 5 Contents: Interactive Supplements: Overview, Tips n Tricks, 1 Exam Type: Self-Paced (30, 90 & 180 Days) Copyright: Navitus

More information

COBIT 5 Foundation Workshop

COBIT 5 Foundation Workshop COBIT 5 Foundation Workshop Dear Members, ISACA Pune chapter is pleased to organize Two / Three Days COBIT-5 Foundation course Dates of Training & Workshop: Date: Friday, 19 th Dec 2014 and Saturday, 20

More information

New Global ITGI Report: Value Creation a Top Priority

New Global ITGI Report: Value Creation a Top Priority Volume 2, 19 January 2011 In This Issue: New Global ITGI Report: Value Creation a Top Priority 5 Steps in Evidence Examination The Joy of Item Writing Writing a Good Question Remembering Past President

More information

IS Audit and Assurance Guideline 2002 Organisational Independence

IS Audit and Assurance Guideline 2002 Organisational Independence IS Audit and Assurance Guideline 2002 Organisational Independence The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards

More information

Article II - Standards Section V - Continuing Education Requirements

Article II - Standards Section V - Continuing Education Requirements Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update

More information

Implementation PREVIEW VERSION

Implementation PREVIEW VERSION Implementation These following pages provide a preview of the information contained in COBIT 5 Implementation. The publication provides a good-practice approach for implementation governance of enterprise

More information

ISACA Survey Results. 27 April Ms. Nancy M. Morris, Secretary Securities and Exchange Commission 100 F Street NE Washington, DC

ISACA Survey Results. 27 April Ms. Nancy M. Morris, Secretary Securities and Exchange Commission 100 F Street NE Washington, DC 3701 Algonquin Road, Suite 1010 Telephone: 847.253.1545 Rolling Meadows, Illinois 60008, USA Facsimile: 847.253.1443 Web Sites: www.isaca.org and www.itgi.org 27 April 2006 Ms. Nancy M. Morris, Secretary

More information

RISK MANAGEMENT Education and Certification

RISK MANAGEMENT Education and Certification RISK MANAGEMENT Education and Certification aba.com/risked 1-800-BANKERS A new type of risk management professional is now in demand one that can demonstrate a thorough understanding of the complexities

More information

Background of the North America Top Technology Initiatives Survey

Background of the North America Top Technology Initiatives Survey Kevin M. Martin, CPA.CITP, MCSE, MCP+I The 2013 North America* Top Technology Initiatives Survey *AICPA and CPA Canada The views expressed by the presenters do not necessarily represent the views, positions,

More information

IASA CONTINUING EDUCATION UNITS

IASA CONTINUING EDUCATION UNITS IASA CONTINUING EDUCATION UNITS This manual serves to outline the requirements, reporting structure, and options for earning your continuing education units. CONTENTS Overview... 2 Requirements... 2 Reporting...

More information

DUNS CAGE 5T5C3

DUNS CAGE 5T5C3 Response to Department of Management Services Cyber Security Assessment, Remediation, and Identity Protection, Monitoring and Restoration Services Request For Information 131 Guilford Road, Bloomfield

More information

Effective COBIT Learning Solutions Information package Corporate customers

Effective COBIT Learning Solutions Information package Corporate customers Effective COBIT Learning Solutions Information package Corporate customers Thank you f o r y o u r interest Thank you for showing interest in COBIT learning solutions from ITpreneurs. This document provides

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment

More information

NEW! 2018 CPIM LEARNING SYSTEM

NEW! 2018 CPIM LEARNING SYSTEM NEW! 2018 CPIM LEARNING SYSTEM TOOLS TO HELP YOU PREPARE FOR SUCCESS. One comprehensive system to prepare you for CPIM certification. Streamlined content with targeted learning tools and practice questions.

More information

Report of the Nominating Committee

Report of the Nominating Committee Volume 7, 31 March 2011 In This Issue: Report of the Nominating Committee Slate of 2011-2012 Board of Directors New COBIT Case Study: Grupo Bancolombia New COBIT Process Assessment Model: The Market Need

More information

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information

Security, Audit And Control Features SAP R/3: A Technical And Risk Management Reference Guide, 2nd Edition By Deloitte Touche Tohmatsu Research

Security, Audit And Control Features SAP R/3: A Technical And Risk Management Reference Guide, 2nd Edition By Deloitte Touche Tohmatsu Research Security, Audit And Control Features SAP R/3: A Technical And Risk Management Reference Guide, 2nd Edition By Deloitte Touche Tohmatsu Research Team;ISACA If searching for the ebook by Deloitte Touche

More information

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com Spread your wings Professional qualifications and development at Deloitte What impact will you make? careers.deloitte.com It s your future. How far will you take it? Do you want to make an impact in your

More information

Workshop description

Workshop description Workshop description COBIT5 for Assurance With information and technology at the heart of creating value for enterprises, it is more important than ever for organizations to optimize their IT assurance

More information

Drive Your Career Forward IIA Certifications and Qualifications

Drive Your Career Forward IIA Certifications and Qualifications Drive Your Career Forward IIA Certifications and Qualifications Mapping Your Path for Growth Professional development is a journey. Demonstrating your knowledge, acumen, and leadership ability are key

More information

COURSE BROCHURE CISA TRAINING

COURSE BROCHURE CISA TRAINING COURSE BROCHURE CISA TRAINING What is CISA? The CISA, Certified Information Systems Auditor, is a professional designation which provides great benefits and increased influence for an individual within

More information

26 February Office of the Secretary Public Company Accounting Oversight Board 1666 K Street, NW Washington, DC

26 February Office of the Secretary Public Company Accounting Oversight Board 1666 K Street, NW Washington, DC 3701 Algonquin Road, Suite 1010 Telephone: 847.253.1545 Rolling Meadows, Illinois 60008, USA Facsimile: 847.253.1443 Web Sites: www.isaca.org and www.itgi.org 26 February 2007 Office of the Secretary Public

More information

Strategies for Deriving Maximum Benefit From Audit. Allan Boardman CyberAdvisor.London

Strategies for Deriving Maximum Benefit From Audit. Allan Boardman CyberAdvisor.London Strategies for Deriving Maximum Benefit From Audit Allan Boardman CyberAdvisor.London Agenda Setting the scene Why Audit often struggle working with Security and Risk Spotlight on Audit Spotlight on Security

More information

CITP Mentoring Program Guidelines

CITP Mentoring Program Guidelines CITP Mentoring Program Guidelines 1 AICPA CITP Mentoring Program Guidelines 2017 American Institute of CPAs. All rights reserved. DISCLAIMER: The contents of this publication do not necessarily reflect

More information

CFE Exam Review Course

CFE Exam Review Course CFE Exam Review Course Leading Excellence in Banking BIBF plays a vital role in the training and development of human capital in the Kingdom of Bahrain. Our commitment to excellence has strengthened our

More information

International Auditing and Assurance Standards Board (IAASB) International Federation of Accountants 545 Fifth Avenue, 14 th Floor New York, NY 10017

International Auditing and Assurance Standards Board (IAASB) International Federation of Accountants 545 Fifth Avenue, 14 th Floor New York, NY 10017 3701 Algonquin Road, Suite 1010 Telephone: 847.253.1545 Rolling Meadows, Illinois 60008, USA Facsimile: 847.253.1443 Web Sites: www.isaca.org and www.itgi.org 25 April 2008 International Auditing and Assurance

More information

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA The Experience of Generali Group in Implementing COBIT 5 Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA Generali Group at a glance Let me introduce myself Marco Salvato CISA, CISM, CGEIT,

More information

2018 CALENDAR OF ACTIVITIES

2018 CALENDAR OF ACTIVITIES 2018 CALENDAR OF ACTIVITIES WHO WE ARE AND WHAT WE OFFER Ý Public Trainings Technical Sessions Reviews GMM Other Chapter Activities Conferences Professionals Night ISACA was incorporated by individuals

More information

Les joies et les peines de la transformation numérique

Les joies et les peines de la transformation numérique Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education

More information

Professional Evaluation and Certification Board Frequently Asked Questions

Professional Evaluation and Certification Board Frequently Asked Questions Professional Evaluation and Certification Board Frequently Asked Questions 1. About PECB... 2 2. General... 2 3. PECB Official Training Courses... 4 4. Course Registration... 5 5. Certification... 5 6.

More information

Application for Certification

Application for Certification Application for Certification Requirements to Become a Certified Information Security Manager To become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade on the

More information

Memphis Chapter. President s Message. This annual event is designed to provide students with a

Memphis Chapter. President s Message. This annual event is designed to provide students with a Memphis Chapter F E B R U A R Y 2 0 1 5 Remember: Update your IIA profile for the most up-to-date news. RSVP for the Annual Student Day February 24, 2015 This annual event is designed to provide students

More information

The President s Message 3. ISACA Karachi Chapter Presentation Flyer 5. ISACA Karachi Chapter Presentation Report 6. ISACA Book Store Update 9

The President s Message 3. ISACA Karachi Chapter Presentation Flyer 5. ISACA Karachi Chapter Presentation Report 6. ISACA Book Store Update 9 Table of Content Editor Absar Khan The President s Message 3 ISACA Karachi Chapter Presentation Flyer 5 ISACA Karachi Chapter Presentation Report 6 ISACA Book Store Update 9 ISACA International News /

More information

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,

More information

2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION. learncscp.com

2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION. learncscp.com 2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION APICS CSCP Learning System users consistently surpass the average CSCP exam pass rate. learncscp.com WHY SEEK CERTIFICATION? The APICS Certified

More information

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

Cyber Security Incident Response Fighting Fire with Fire

Cyber Security Incident Response Fighting Fire with Fire Cyber Security Incident Response Fighting Fire with Fire Arun Perinkolam, Senior Manager Deloitte & Touche LLP Professional Techniques T21 CRISC CGEIT CISM CISA AGENDA Companies like yours What is the

More information

Achieving effective risk management and continuous compliance with Deloitte and SAP

Achieving effective risk management and continuous compliance with Deloitte and SAP Achieving effective risk management and continuous compliance with Deloitte and SAP 2 Deloitte and SAP: collaborating to make GRC work for you Meeting Governance, Risk and Compliance (GRC) requirements

More information

CASA External Peer Review Program Guidelines. Table of Contents

CASA External Peer Review Program Guidelines. Table of Contents CASA External Peer Review Program Guidelines Table of Contents Introduction... I-1 Eligibility/Point System... I-1 How to Request a Peer Review... I-1 Peer Reviewer Qualifications... I-2 CASA Peer Review

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Certified Manager Certification

Certified Manager Certification Certified Manager Certification Get Trained Get Certified Get Recognized www.hr-pulse.org In Partnership With HR Pulse has the Learning Solutions to Empower Your People & Grow Your Business About ICPM

More information

ASCPA Road to the CPA Toolkit

ASCPA Road to the CPA Toolkit ASCPA Road to the CPA Toolkit Start Your Journey to Become a CPA The Arizona Society of Certified Public Accountants www.ascpa.com Arizona Society of Certified Public Accountants 4801 E. Washington St.,

More information

Present. 5th May - Chennai. Internal. auditing. today: Beginning Auditor Tools and Techniques. 6 CPE hours.

Present. 5th May - Chennai. Internal. auditing. today: Beginning Auditor Tools and Techniques. 6 CPE hours. Present 5th May - Chennai Internal auditing today: Beginning Auditor Tools and Techniques 6 CPE hours www.achromicpoint.com About the Seminar To become a successful auditor, a strong base of knowledge

More information

Business Architecture Implementation Workshop

Business Architecture Implementation Workshop Delivering a Business Architecture Transformation Project using the Business Architecture Guild BIZBOK Hands-on Workshop In this turbulent and competitive global economy, and the rapid pace of change in

More information

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY : THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY 18 2017: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) MAY 15 AND 16 o INFORMATION

More information

2018 CLTD LEARNING SYSTEM

2018 CLTD LEARNING SYSTEM 2018 CLTD LEARNING SYSTEM FOR CLTD CERTIFICATION EXAM PREPARATION learn.apics.org/cltd THE CLTD CERTIFICATION The APICS Certified in Logistics, Transportation and Distribution (CLTD) designation provides

More information

MASTER OF ACCOUNTING

MASTER OF ACCOUNTING MASTER OF ACCOUNTING BECOME AN ACCOUNTING LEADER 1 MASTER of ACCOUNTING The Master of Accounting (MAcc) degree is designed for individuals wanting to pursue the Chartered Professional Accountant (CPA)

More information

Opportunities to Integrate Technology Into the Classroom. Presented by:

Opportunities to Integrate Technology Into the Classroom. Presented by: Opportunities to Integrate Technology Into the Classroom Presented by: Mark Salamasick, CIA, CISA, CRMA, CSP Executive Director of Audit University of Texas System Discussion Topics Internal Audit Textbook

More information

(ISC) 2 CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES AND GUIDELINES

(ISC) 2 CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES AND GUIDELINES (ISC) 2 CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES AND GUIDELINES (ISC)² Continuing Professional Education credits (CPEs) Policies & Guidelines (rev. 3-09) (ISC) 2. All contents and marks are the

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 14001 Lead Auditor www.pecb.com The objective of the PECB Certified ISO 14001 Lead Auditor examination is to ensure that the candidate

More information

(ISC) 2 CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES AND GUIDELINES

(ISC) 2 CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES AND GUIDELINES (ISC) 2 CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES AND GUIDELINES (ISC)² Continuing Professional Education credits (CPEs) Policies & Guidelines (rev. 4-08) (ISC) 2. All contents and marks are the

More information

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for

More information

ISM 324: Information Systems Security Spring 2014

ISM 324: Information Systems Security Spring 2014 ISM 324: Information Systems Security Spring 2014 Instructor: Co-Instructor: Office: E-Mail: Phone: Office Hours: Jeffrey Wall Hamid Nemati 392 Bryan Building jdwall2@uncg.edu (email is the preferred method

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

Mapping PCI DSS v2.0 With COBIT 4.1 By Pritam Bankar, CISA, CISM, and Sharad Verma

Mapping PCI DSS v2.0 With COBIT 4.1 By Pritam Bankar, CISA, CISM, and Sharad Verma Volume 2, April 2011 Come join the discussion! Pritam Bankar and Sharad Verma will be responding to questions and comments in the discussion area of the COBIT Use It Effectively topic beginning 21 April

More information

The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018

The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018 The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018 Jeff Hemphill Partner and Central Region Leader, Risk Advisory Services Brian Kirkpatrick Managing Director, Risk Advisory

More information

Candidate Brochure. V15.1a. American Society of Professional Estimators 2525 Perimeter Place Dr., Ste. 103 Nashville, TN 37214

Candidate Brochure. V15.1a. American Society of Professional Estimators 2525 Perimeter Place Dr., Ste. 103 Nashville, TN 37214 Candidate Brochure American Society of Professional Estimators 2525 Perimeter Place Dr., Ste. 103 Nashville, TN 37214 615.316.9200 Fax 615.316.9800 ACCE Recognized Program V15.1a Revised V15.1a May 2017

More information

5 Ways to Limit Data Leakage and Exposure

5 Ways to Limit Data Leakage and Exposure Volume 3, 2 February 2011 In This Issue: 5 Ways to Limit Data Leakage and Exposure The Joy of Item Writing The Review Process Uncover Renewed Perspectives to Identity Management at Asia-Pacific CACS 2011

More information

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today Security Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today Staff Augmentation, Executive Staffing, Flex Staffing Achieving our main goal

More information

ContinuingProfessionalEducation(CPE)Guide

ContinuingProfessionalEducation(CPE)Guide ContinuingProfessionalEducation(CPE)Guide CPCM CFCM CCCM Program Year 2017 2018 Table of Contents Page 2 INTRODUCTION....3 THREE CATEGORIES OF CPE.....3 EXPIRATION OF CPE..3 CPE PROGRAMS AND TOPIC/SUBJECT

More information

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec. National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec April 12, 2018 1 Introduction to NICE - The National Initiative for Cybersecurity

More information

IS Audit and Assurance Guideline 2001 Audit Charter

IS Audit and Assurance Guideline 2001 Audit Charter IS Audit and Assurance Guideline 2001 Audit Charter The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards that apply

More information

ISACA Certifications Overview

ISACA Certifications Overview ISACA Certifications Overview CISA, CISM, CRISC, CGEIT Instructor Jay Ranade CISA,, CISSP, CISM, CBCP, ISSAP Risk Management Professionals Intl. jayranade@aol.com jayranade@nyu.edu ranadej@stjohns.edu

More information

The Forensic Certified Public Accountant Programme

The Forensic Certified Public Accountant Programme The Forensic Certified Public Accountant Programme Guyana 2018 2019 FAQ- Booklet Q: What is an FCPA? A: FCPA stands for Forensic Certified Public Accountant. The use of this designation indicates to the

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

ACMPE Workshop! 4/27/15. Objectives! Agenda! Describe the foundation and value of certification and fellowship

ACMPE Workshop! 4/27/15. Objectives! Agenda! Describe the foundation and value of certification and fellowship ACMPE Workshop Lauren Harris, FACMPE Washington State ACMPE Forum Rep Susan Curtis, FACMPE Oregon ACMPE Forum Rep May 6, 2015 Copyright 2015. Medical Group Management Association (MGMA ). All rights reserved.

More information

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. Course Outline CISM - Certified Information Security Manager 20 Nov 2017 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

CYBERSECURITY NEXUSTM (CSX) The Premier Source For Cyber Security Knowledge and Expertise

CYBERSECURITY NEXUSTM (CSX) The Premier Source For Cyber Security Knowledge and Expertise CYBERSECURITY NEXUSTM (CSX) The Premier Source For Cyber Security Knowledge and Expertise In enterprise IT, there is a single point where everything that matters in information, technology and business

More information

GUIDELINES FOR SUBMITTING CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS

GUIDELINES FOR SUBMITTING CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS GUIDELINES FOR SUBMITTING CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS (ISC) 2 CISSP Recertification Guidelines (rev. 8-06) Page 1 of 16 CONTENTS Introduction... 3 CPE Record Keeping... 4 CPE Credit

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

CITP Credential handbook

CITP Credential handbook CITP Credential handbook A guide to the AICPA Certified Information Technology Professional credential i CITP Credential handbook A guide to the AICPA Certified Information Technology Professional credential

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 9001 Lead Auditor www.pecb.com The objective of the PECB Certified ISO 9001 Lead Auditor examination is to ensure that the candidate possesses

More information

Drive Your Career Forward IIA Certifications and Qualifications

Drive Your Career Forward IIA Certifications and Qualifications CCSA CRMA CFSA CGAP Don t miss out on the CIA Application Fee Waiver in August! More information is available on the back cover. Drive Your Career Forward IIA Certifications and Qualifications Mapping

More information

SALESFORCE CERTIFIED TECHNICAL ARCHITECT

SALESFORCE CERTIFIED TECHNICAL ARCHITECT Certification Exam Guide SALESFORCE CERTIFIED TECHNICAL ARCHITECT Spring 18 2018 Salesforce.com, inc. All rights reserved. S ALESFORCE CERTIFIED TECHNICAL ARCHITECT CONTENTS About the Salesforce Certified

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

Educational and Professional qualifications

Educational and Professional qualifications Dr. Vishnu Kanhere, Ph.D., B.Com (Hons), CFE, FCA, CISA, CISM, AICWA, ISO 9001:2000 QMS Auditor IRCA (UK) V.K. Kanhere & Company, Chartered Accountants Mumbai Maharashtra India Educational and Professional

More information

ISO/ IEC (ITSM) Certification Roadmap

ISO/ IEC (ITSM) Certification Roadmap ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank

More information

KIRKPATRICK FOUR LEVELS EVALUATION CERTIFICATION PROGRAM - SILVER LEVEL

KIRKPATRICK FOUR LEVELS EVALUATION CERTIFICATION PROGRAM - SILVER LEVEL KIRKPATRICK FOUR LEVELS EVALUATION CERTIFICATION PROGRAM - SILVER LEVEL Live Online Version PROGRAM DESCRIPTION Kirkpatrick silver level certification provides the structure and support you need to successfully

More information

Mohammad Shahadat Hossain

Mohammad Shahadat Hossain Mohammad Shahadat Hossain Principal Security Architect at Grameenphone Limited Summary Has extensive knowledge and experience on following:- NIST Cyber Security Framework SANS Top 20 Security Control Network

More information

2016 NCCA Standards Revisions Recap and Takeaways: What You Need to Know

2016 NCCA Standards Revisions Recap and Takeaways: What You Need to Know 2016 NCCA Standards Revisions Recap and Takeaways: What You Need to Know Certification programs must stay up to date with the latest revisions to the NCCA Standards for certification. Written by Dr. Jim

More information