SPRING CONFERENCE 2012 SPRING MEMBERSHIP MEETING
|
|
- Warren Stephens
- 5 years ago
- Views:
Transcription
1 ISACA NEW YORK METROPOLITAN CHAPTER SPRING CONFERENCE 2012 SPRING MEMBERSHIP MEETING Citi 388 Greenwich Street Greenwich Rooms New York City, NY April 30, 2012
2 A Message From the President: Dear ISACA NY Metro Member: On behalf of our Board of Directors, I'd like to welcome you to our 2012 Spring Conference. This is one of several major educational events we had planned for this year. We've selected our presenters based on feedback from you and what we believe are 'hot topics' in the industry. The chapter year is almost completed and I m very pleased with everything we ve accomplished. Our webinar series has received great feedback and we continue to offer many world-class educational opportunities at an unmatched price and value. Our next membership event will be our Annual Gala, held on June 18 at the Union League Club in Midtown. This is where we announce our Board of Directors and bestow the prestigious Wasserman Award to this year's winner, for doing the most for the profession. It's a top-notch event with an open bar and hors d'oeuvres, a sit-down dinner and plenty of networking opportunities. Details will be posted on our website and space is limited so please register soon. Thank you for all your support today, and throughout the year. We couldn t be the organization we are today without a strong and dynamic membership. I hope you enjoy today's event and we re already planning plenty more for the Fall, including a joint IIA and ISACA Conference. All the best, James C. Ambrosini CISA, CISSP, CFE, CRISC ISACA New York Metropolitan Chapter President Thank You to our Sponsors and Speakers 2
3 Spring Conference 2012 April 30, 2012 AGENDA Morning Session 08:30 AM 09:00 AM Registration and Networking, Continental Breakfast 09:00 AM 09:15 AM Welcome and Opening Remarks 09:15 AM 10:05 AM Keynote Address - Governance and Security Bart Stanco, Vice President & Executive Partner, Gartner Executive Programs 10:15 AM 11:05 AM Overview of National Cybersecurity & Communications Integration Center and Federal Cyber Response Capabilities Rick Lichtenfels, Deputy Director, Assist and Assess Branch, NCCIC, US Department of Homeland Security 11:15 AM 12:05 PM COBIT 5 Brian Barnier, Principal Analyst and Advisor, ValueBridge Advisors LLC 12:05 PM 12:30 PM Closing Remarks and Raffle Afternoon Session 01:30 AM 02:00 PM Registration and Networking 02:00 PM 02:15 PM Welcome and Opening Remarks 02:15 PM 03:05 PM Choosing the Most Appropriate Data Security Solution for an Organization Ulf Mattsson, Chief Technology Officer, Protegrity 03:15 PM 04:05 PM Operational Standards of Anti-Money Laundering / Combating Terrorist Financing (AML/CTF) Program John F. Walsh, President and Chief Executive Officer, SightSpan 04:15 PM 05:05 PM Enough on Mobile Problems, What About Solutions? Yan Kravchenko, Practice Lead, NetSpi 05:15 PM 05:30 PM Closing Remarks and Raffle 3
4 About the Speaker: Morning Session One 9:15 AM 10:05 AM Keynote Address Governance and Security Gartner defines a strategic technology as one with the potential for significant impact on the enterprise in the next three years. A strategic technology may be an emerging technology. It may also be an existing technology that has matured and/or become suitable for a wider range of uses. Factors that denote significant impact include a high potential for disruption to IT or the business, the need for a major dollar investment, or the risk of being late to adopt. These technologies impact the organization's long-term plans, programs and initiatives. Bart Stanco, Vice President and Executive Partner, Gartner Executive Programs Bart Stanco has more than 25 years of hands-on leadership experience working with key executives, providing business and technology strategy advice. His experience spans successful start-ups, IPOs, and mature companies - and he has worked from Wall Street to the White House. In his previous position at Gartner, Bart was the CIO. He led the team that developed a state-of-the-art operations practice while creating an exciting work environment that yielded high morale and award-winning business results. About the Speaker: Morning Session Two 10:15 AM to 11:05 AM Overview of National Cybersecurity & Communications Integration Center and Federal Cyber Response Capabilities The rapidly converging information technology (IT) and communications infrastructure, known as cyberspace, touches every corner of the globe and every facet of human life. The United States in particular continues to embrace cyberspace, utilizing it for diverse activities from increasing energy efficiency to conducting financial transactions. Recognizing this national reliance on cyberspace and the interdependent nature of the Nation s current cyber infrastructure, the President commissioned the Cyberspace Policy Review. This report, released on May 29, 2009, builds on the Comprehensive National Cybersecurity Initiative (CNCI) and calls for the development of a cybersecurity incident response plan. This National Cyber Incident Response Plan (NCIRP) was developed according to the principles outlined in the National Response Framework (NRF) and describes how the Nation responds to Significant Cyber Incidents. Per the terms of the NCIRP, the National Cybersecurity and Communications Integration Center (NCCIC) is the focal point for the Nation s federal response to a significant cyber incident. The NCIRP represents a significant innovation in how DHS executes its cybersecurity and communications mission and in how the country responds to significant cyber incidents. This session will provide an overview of the NCCIC, the means in which DHS engages government, industry, intelligence and law enforcement communities, and a summary of Federal resources available to state and local entities before, during and after a cyber incident. Rick Lichtenfels, Deputy Director, Assist and Assess Branch, NCCIC, US Department of Homeland Security Rick Lichtenfels is the Deputy Director for the National Cybersecurity and Communications Integration Center's (NCCIC) Assist and Assess Branch. Previously, he was the Deputy Director of the Department of Homeland Security s (DHS) Control Systems Security Program (CSSP), where he led efforts to improve the security of the control systems underlying the Nation s critical infrastructure. Prior to becoming the CSSP Deputy Director, Rick was with DHS National Communications System (NCS) where he led the NCS Modeling, Analysis and Technology Assessment branch. Rick has over 15 years of engineering and management experience within both the public and private sectors, and holds a B.S. degree in Electrical Engineering from the University of Maryland at College Park. 4
5 About the Speaker: Morning Session Three 11:45 AM to 12:05 PM COBIT 5 COBIT 5 is ISACA's next generation of guidance on the governance and management of enterprise IT. COBIT 5 helps enterprises increase value from information and technology assets in view of risks and resource use. It builds on the COBIT history to enable improved ROI from information systems, maintaining the level of support and service for which ISACA is known. COBIT 5 integrates COBIT 4.1, Val IT, Risk IT while adding new business-process related content and a new maturity model method. COBIT 5 provides five principles and seven enablers for the governance and management of enterprise IT assets. It is designed to work with all major IT frameworks and standards such as ITIL and ISO. As such, COBIT 5 not only supports compliance with relevant laws, regulations and policies but also dovetails seamlessly with any framework approaches that the organization already has in place. Brian Barnier, Principal Analyst and Advisor, ValueBridge Advisors LLC Brian Barnier, Principal Analyst and Advisor at ValueBridge Advisors, is also an OCEG Fellow. He served on the OCEG Red Book Review Committee, co-authored ISACA s Risk IT Based on COBIT, and served on the COBIT 5 development workshop team, the IIA Risk Leadership Summit and BITS/FS Roundtable committees, including the Shared Assessment Program. Brian has penned over 100 articles, serves on the editorial panels of the Taylor & Francis EDPACS newsletter, ISACA Journal, and Association for Financial Professionals Risk! newsletter, contributed to Risk Management in Finance (Wiley, San Francisco, 2009) and is the author of The Operational Risk Handbook for Financial Companies (Harriman House, London, 2011). He twice chaired ISACA s IT GRC Conference. A global businessperson with Finance, Operations and Product Management experience, he has also led teams to nine technology patents. About the Speaker: Afternoon Session One 2:15 PM to 3:05 PM Choosing the Most Appropriate Data Security Solution for an Organization The frequency and cost of data security breaches continue to escalate. External and internal breaches continue to highlight the need for companies to understand the flow of data within the enterprise and the need to take a more granular approach in terms of how it is secured. This session analyzes recent security breach investigative reports and trend/risk studies, opining on who are the hackers, what are they doing, and what are their possible next targets. Recent case studies will be presented, illustrating what the IT security industry is doing to improve data security. The role of risk management in balancing business needs vs. security demands will also be discussed. Ulf Mattsson, Chief Technology Officer, Protegrity Ulf Mattsson created the innovative architecture of the Protegrity database security technology. Prior to joining Protegrity, he was a consulting resource to IBM's Research organization for 20 years, specializing in the areas of IT Architecture and IT Security. Ulf is the inventor of more than 20 patents in the areas of Encryption Key Management, Policy Driven Data Encryption, Internal Threat Protection, Data Usage Control and Intrusion Prevention. He is a research member of the International Federation for Information Processing (IFIP) WG 11.3 Data and Application Security, ANSI X9, Information Systems Security Association (ISSA) and ISACA. Ulf received a master's degree in physics in 1979 from Chalmers University of Technology in Sweden, and holds degrees in electrical engineering and finance. 5
6 About the Speaker: Afternoon Session Two 3:15 PM to 4:05 PM Operational Standards of an Anti-Money Laundering / Combating Terrorist Financing Program Multiple operational segments of work are required for an effective Anti-Money Laundering/Combating Terrorist Financing (AML/CTF) program, ranging from client on-boarding processes, proper risk assessments, sanctions, transaction monitoring, investigations of suspicious activities and filings with government agencies and/or account closures. Operational effectiveness is necessary to build and manage a sound cost effective AML/CTF program that provides proper levels of risk management and value for the shareholder. This session will cover practical approaches to AML/CTF risk management and engage the group in an open dialog about the reputational and regulatory risk associated with AML/CTF. John F. Walsh, President and Chief Executive Officer, SightSpan John Walsh is the President and Chief Executive Officer of SightSpan Inc. and a well-regarded Industry Leader, Speaker, and Trainer on the subjects of Risk Management, Security, Anti-Money Laundering (AML) and Combating Terrorist Financing (CTF). Prior to joining SightSpan, John held several leadership positions within the financial services industry over the past 25 years, including roles at Wachovia Bank where he was the CIB Data Czar responsible for information management and corporate governance, Bank of America in the role of Global AML Technology and Process Executive, and Merrill Lynch where he led Wholesale Trading Initiatives and GMI ecommerce prior to assisting the firm build out an AML and CTF program after 9/11. About the Speaker: Afternoon Session Three 4:15 PM to 5:05 PM Enough on Mobile Problems, What About Solutions? Mobile remains one of the most talked about problems with regard to security. While better and less expensive Mobile Device Management (MDM) tools are still being developed, organizations are facing a very real risk that remains largely unaddressed. Some organizations choose to pretend that wireless does not exist, while others implement policies that prohibit use of wireless technologies. This presentation will side step the typical rhetoric of the size of the problem that wireless devices pose, and focus on real world meaningful solutions that organizations can implement today. This session will provide a deconstructed view of the mobile dilemma, and introduce different techniques by which organizations can stop ignoring mobile and embrace its usefulness along with the risks in a more constructive manner. Yan Kravchenko, Practice Lead, NetSpi Yan Kravchenko has over 14 years of consulting experience in Information Technology and Information Security, specializing in security program development and management, security assessments, and IT audits. He has performed and managed numerous security assessment and IT audit projects in the education, government, healthcare, manufacturing, and agriculture sectors. A particular focus recently has been information security in healthcare. Yan is a founding member of the HITRUST SIG in the Twin Cities, which helps organizations affected by healthcare regulations evaluate and begin implementing the HITRUST Common Security Framework, or CSF.
7 Spring Membership Meeting April 30, 2012 AGENDA 05:30 PM 06:30 PM Registration and Networking, Food and Beverages 06:30 PM 06:40 PM Welcome and Opening Remarks 06:40 PM 07:30 PM Exposing the Most Recent Spate of Targeted Attacks Why are They Successful? Bradley Anstis, Vice President Technical Strategy, M86 Security 07:30 PM 08:30 PM Networking, Cocktails, and Refreshments About the Speaker Exposing the Most Recent Spate of Targeted Attacks Why are They Successful? In the last several months, M86 Security has monitored an apparent surge in targeted attacks against organizations. There appear to be several motives for the attackers: either they are after customer information or intellectual property, or perhaps wish to wreak public havoc. This session reviews the methods and tactics used in the most recent attacks and discusses why they are succeeding in spite of investments in security. The presentation will look at the anatomy of common attacks such as spear-phishing, blended threat s and malicious attachments. Then it will look at how those attacks are successful, even against world leading IT security organizations, to identify any potential holes in your organization s security architecture. Bradley Anstis, Vice President Technical Strategy, M86 Security Bradley Anstis is a 20-year veteran of the IT industry and a leading authority on the topic of Internet threats and cybercrime. He is M86 Security s primary spokesperson on the evolution of technical and strategic products. He is also the primary spokesperson on all topics relevant to the M86 Security Labs, which provides 24/7 monitoring of and Internet traffic to ensure that M86 keeps ahead of emerging threats, security trends and market requirements to provide solutions that protect customers from the latest threats and attacks to their electronic communication channels. Bradley is a regular speaker at global industry conferences, and is frequently featured in security publications. 7
8 recognition success growth Be recognized as an expert in your profession. With a globally accepted and recognized ISACA certification, you hold the power to move ahead in your career, increase your earning potential, enhance your credibility and prove you have what it takes to add value to your employer s enterprise. Registration is closed for June 2012 exams. Next exams are in December Are you ready for the June 2012 Certification Exams? the isaca new york metropolitan chapter offers the following exam review classes: cisa exam review class 4 consecutive saturdays may 5, 12, 19 & 26 9 am to 5 pm st. john s university, manhattan campus crisc exam review class 3 day course may am to 5 pm ernst & young llc, times square, new york, ny spring 2012 it boot camp for cisa and cism may 11 9 am to 5 pm st. john s university, manhattan campus register on the chapter website isaca.org/nymetro or kwongmei.to@isacany.org registration is still available but seating is limited 8
Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi
Invitation for Continuing Professional Education Session On November 16, 2013 (Saturday) Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi -110001 Time: 03:00
More informationBECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW
BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential
More informationACAMS (Association of Certified AML Specialist)
ACAMS (Association of Certified AML Specialist) Founded in 2001 Largest international membership organisation dedicated to enhancing the knowledge, skills and expertise of AML/CTF and financial crime detection
More informationCYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More informationVice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security
Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity
More informationAFC Compliance Careers
AFC Compliance Careers ACAMS Education Program Date : December 6 th 2017 Donna Bucci Ireland Account Manager ACAMS ACAMS is a global community ACAMS is the world s largest international membership organisation
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More informationDUNS CAGE 5T5C3
Response to Department of Management Services Cyber Security Assessment, Remediation, and Identity Protection, Monitoring and Restoration Services Request For Information 131 Guilford Road, Bloomfield
More informationCybersecurity and the Board of Directors
Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education
More informationCYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD
CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)
More informationMemphis Chapter. President s Message. This annual event is designed to provide students with a
Memphis Chapter F E B R U A R Y 2 0 1 5 Remember: Update your IIA profile for the most up-to-date news. RSVP for the Annual Student Day February 24, 2015 This annual event is designed to provide students
More informationSOC for cybersecurity
April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory
More informationISACA MOSCOW CHAPTER Chapter meeting 22 September 2016
ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationMY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.
MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED
More informationLes joies et les peines de la transformation numérique
Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education
More informationA Global Look at IT Audit Best Practices
A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationISACA International Perspective
ISACA International Perspective 11 th October 2013 Allan Boardman ISACA International Vice President and Board Director Member of ISACA s Strategic Advisory Council Member of the IT Governance Institute
More informationInstitute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI
Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationbuilding for my Future 2013 Certification
I am building for my Future 2013 Certification Let ISACA help you open new doors of opportunity With more complex IT challenges arising, enterprises demand qualified professionals with proven knowledge
More informationISACA MANILA CHAPTER CALENDAR OF ACTIVITIES
MANILA CHAPTER 2017 CALENDAR OF ACTIVITIES 2017 MANILA CALENDAR OF ACTIVITIES GMM Professionals Night Public Trainings Reviews Conferences Technical Session & MANILA PROFILE HISTORY AND MISSION Who we
More informationCENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN
CENTRAL REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN TAKE THE STAGE Members: Register by Feb. 29 to save US$100. Take the Stage The IIA and IIA Nashville Chapter are excited to host the 2016 Central
More informationSecurity Program Design:
Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident
More informationTraining and Certifying Security Testers Beyond Penetration Testing
Training and Certifying Security Testers Beyond Penetration Testing Randall W. Rice, CTAL (Full), CTAL-SEC Director, ASTQB Board of Directors www.astqb.org Most organizations do not know the true status
More informationRethinking Information Security Risk Management CRM002
Rethinking Information Security Risk Management CRM002 Speakers: Tanya Scott, Senior Manager, Information Risk Management, Lending Club Learning Objectives At the end of this session, you will: Design
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationISACA MANILA CHAPTER CALENDAR OF ACTIVITIES
MANILA CHAPTER 2017 CALENDAR OF ACTIVITIES 2017 MANILA CALENDAR OF ACTIVITIES GMM Professionals Night Public Trainings Reviews Conferences Technical Session & MANILA PROFILE HISTORY AND MISSION Who we
More informationCYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017
CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 Sponsored by: Kansas Municipal Utilities Kansas Municipal Energy Agency Kansas Power Pool CYBERSECURITY TRAINING EXERCISE DATE November
More informationSALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually
SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC
More informationVolume 2014, Number 4. Volunteers Needed!
Volume 2014, Number 4 Volunteers Needed! Volunteering for NJ ISACA is a great opportunity to expand your professional contacts and your IT knowledge base. NJ ISACA needs talented professionals like you
More information2018 CALENDAR OF ACTIVITIES
2018 CALENDAR OF ACTIVITIES WHO WE ARE AND WHAT WE OFFER Ý Public Trainings Technical Sessions Reviews GMM Other Chapter Activities Conferences Professionals Night ISACA was incorporated by individuals
More informationManaging Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust
Managing Cyber Risk Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Adam Thomas Principal Cyber Risk Services Deloitte & Touche LLP Give Us Your Feedback for this Session!
More information2016 COBIT 5 Foundation Training Course
1 of 5 For View this email in your browser Newsletter Decemeber 2015 With Father Christmas dusting off his sleigh, shining up his boots and trimming his beard, it s now time
More informationFDIC InTREx What Documentation Are You Expected to Have?
FDIC InTREx What Documentation Are You Expected to Have? Written by: Jon Waldman, CISA, CRISC Co-founder and Executive Vice President, IS Consulting - SBS CyberSecurity, LLC Since the FDIC rolled-out the
More informationCYBER SOLUTIONS & THREAT INTELLIGENCE
CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world
More informationISACA CyberSecurity All Day Event. October 17, 2014
ISACA CyberSecurity All Day Event October 17, 2014 7:30 AM 8:00 AM 8:00 AM 8:15 AM Agenda Registration, Hot Breakfast Buffet and Networking Introductions 8:15 AM 10:00 AM Session 1 Preparing for Cybergeddon:
More informationNational Cyber Security and Cyber Terrorism Summit
Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing
More informationCybersecurity and Hospitals: A Board Perspective
Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,
More informationChief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m.
Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Increased use of technologies such as mobile devices, social media and cloud computing has increased
More informationNISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions
NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce
More informationSECURITY CODE. Responsible Care. American Chemistry Council. 7 April 2011
American Chemistry Council Responsible Care SECURITY CODE 7 April 2011 Debra Phillips Managing Director, Responsible Care American Chemistry Council Why develop a Separate Security Code? Need for a clearly
More informationCYBERSECURITY AND THE BOARD OF DIRECTORS TIPS FOR SECURING SUPPORT FOR YOUR CYBER RISK MANAGEMENT PROGRAM
WHITE PAPER CYBERSECURITY AND THE BOARD OF DIRECTORS TIPS FOR SECURING SUPPORT FOR YOUR CYBER RISK MANAGEMENT PROGRAM NICK SON VICE PRESIDENT, CYBER RISK & PUBLIC SECTOR CHRISTOPHER LIETZ PRINCIPAL, CYBER
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationNortheast Ohio Chapter Annual General Meeting
Northeast Ohio Chapter Annual General Meeting May 21, 2015 For professionals and organizations be the leading global provider of knowledge, certifications, community, advocacy and education on information
More informationIT in Healthcare Day
San Francisco ISACA Chapter Proudly Presents IT in Healthcare Day A Day-Long, Multi-Session Event, being held in Walnut Creek! Where: Walnut Creek Marriott - 2355 North Main Street Walnut Creek, CA 94596
More informationSage Data Security Services Directory
Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time
More information2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers
2017 PORT SECURITY SEMINAR & EXPO ISACA/CISM Information Security Management Training for Security Directors/Managers Agenda Introduction ISACA Information security vs. cybersecurity CISM certification
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationThe web seminar has not yet started: A sound check will be performed 5 minutes before the start time.
The web seminar has not yet started: A sound check will be performed 5 minutes before the start time. COPYRIGHT NOTICE USE OF WEBEX LOGIN/PASSWORD FOR ACAMS WEB SEMINARS Each site license entitles registrant
More informationEffective COBIT Learning Solutions Information package Corporate customers
Effective COBIT Learning Solutions Information package Corporate customers Thank you f o r y o u r interest Thank you for showing interest in COBIT learning solutions from ITpreneurs. This document provides
More informationWELCOME TO ISACA Claudio CILLI, CISA, CISM, CRISC, CGEIT
WELCOME TO ISACA 2015 Claudio CILLI, CISA, CISM, CRISC, CGEIT cilli@di.uniroma1.it http://dsi.uniroma1.it/~cilli WHO IS ISACA? ABOUT ISACA The trusted source of guidance, networking and career development
More informationYour CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY
Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY ACHIEVE SUCCESS with ICE ICE has given me a real edge in knowing more about the intricacies of credentialing and connecting with others in the
More informationThe President s Message 3. ISACA Bookstore Updates 22
Table of Content Editor Absar Khan The President s Message 3 ISACA Karachi Chapter AGM 2016 5 Chapter AGM held on 30-Mar-2016 at Royal Rodale Complex Karachi ISACA Karachi Chapter Won Two International
More informationMAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world
8 MAY 2018 (Tue) Hong Kong CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world CYBERSECURITY AND RISK MANAGEMENT By HKUST Business School Executive Education Office
More informationStatement for the Record
Statement for the Record of Seán P. McGurk Director, Control Systems Security Program National Cyber Security Division National Protection and Programs Directorate Department of Homeland Security Before
More informationOpening Doors to Cyber and Homeland Security Careers
Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Today s Presenters: Frederic Lemieux, Ph.D. Professor and Program Director, Cybersecurity Strategy
More informationHow Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework
More informationCybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com
Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationCyber Risks, Coverage, and the Board of Directors.
Cyber Risks, Coverage, and the Board of Directors PCI Northeastern General Counsel Seminar September 19-20, 2016 Vincent J. Vitkowsky Seiger Gfeller Laurie LLP vvitkowsky@sgllawgroup.com CYBER RISKS and
More informationDriving Global Resilience
Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute
More information2018 Government Professional Accounting Seminar
2018 Government Professional Accounting Seminar Thursday September 6, 2018 7:30 a.m. - Registration and Networking 8:00 a.m. 4:50 p.m. (Early Registration by Tuesday, July 31, 2018; Regular by Friday,
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationLegal and Regulatory Developments for Privacy and Security
Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions
More informationGlobal Security Consulting Services, compliancy and risk asessment services
Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment
More informationCyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016
Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception
More informationINTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION Telecommunication Development Bureau T E L E F A X Place des Nations Telephone +41 22 730 51 11 CH-1211 Geneva 20 Telefax Gr3: +41 22 733 72 56 Switzerland Gr4: +41
More informationINFORMATION TECHNOLOGY AUDIT &
One day training on INFORMATION TECHNOLOGY AUDIT & 10 th May 2018 - Mövenpick Hotel, Karachi 14 th May 2018 - Sunfort Hotel, Lahore (10:00 AM to 5:00 PM) TRAINING OVERVIEW Every time people get to hear
More informationFighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities
Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection IBM Security s Brooke Satti Charles on the Power of These New Capabilities SPONSORED BY As fraudsters continually refine their techniques
More informationThe value of visibility. Cybersecurity risk management examination
The value of visibility Cybersecurity risk management examination Welcome to the "new normal" Cyberattacks are inevitable. In fact, it s no longer a question of if a breach will occur but when. Cybercriminals
More informationSteps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.
Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important
More informationISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015
ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters
More informationCybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.
Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During
More informationACCA Diploma in. Starting this January! International Financial Reporting (DipIFR)
ACCA Diploma in International Financial Reporting (DipIFR) Starting this January! Suite 4, Level 1, Tower Business Centre, Tower street, Swatar, BKR4013 +356 21 314 896 info@aimacademy.com.mt Overview
More informationTechnical Conference on Critical Infrastructure Protection Supply Chain Risk Management
Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability
More informationHow Secure is Blockchain? June 6 th, 2017
How Secure is Blockchain? June 6 th, 2017 Before we get started... This is a 60 minute webcast For better viewing experience, close all other applications For better sound quality, please use headphones
More informationWelcome October, 2013 INSIDE THIS ISSUE. Jesse A. Hanford Greater Cincinnati ISACA President
October, 2013 INSIDE THIS ISSUE Welcome Message....1 Monthly Meeting......2 Events 3 Education......5 Meet A Board member...8 Editor s Corner....9 About Our Chapter... 10 Welcome Greater Cincinnati ISACA
More informationRisk Advisory Academy Training Brochure
Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty
More informationDepartment of Management Services REQUEST FOR INFORMATION
RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President
More informationCybersecurity is a Journey and Not a Destination: Developing a risk management culture in your business. Thursday, May 21, 2015
Cybersecurity is a Journey and Not a Destination: Developing a risk management culture in your business. Thursday, May 21, 2015 Cybersecurity is a Journey and Not a Destination: Developing a risk management
More informationPlenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.
Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every
More informationWelcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time
TM Plan. Protect. Respond. Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time Registration is open for the April webinar:
More informationNISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions
NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce
More informationWhite Paper. View cyber and mission-critical data in one dashboard
View cyber and mission-critical data in one dashboard Table of contents Rising cyber events 2 Mitigating threats 2 Heighten awareness 3 Evolving the solution 5 One of the direct benefits of the Homeland
More informationThe Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018
The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018 Jeff Hemphill Partner and Central Region Leader, Risk Advisory Services Brian Kirkpatrick Managing Director, Risk Advisory
More informationThe ACFE Law Enforcement and Government Alliance
What is the ACFE? The Association of Certified Fraud Examiners (ACFE) is the world s largest anti-fraud organization and premier provider of anti-fraud training and education with more than 80,000 members
More information2016 SPONSORSHIP OPPORTUNITIES
14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION
More informationIBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats
More informationEngaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,
Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Deloitte & Touche LLP 1 Speaker Introduction Sanjeev
More informationBRING SPEAR PHISHING PROTECTION TO THE MASSES
E-Guide BRING SPEAR PHISHING PROTECTION TO THE MASSES SearchSecurity phishing. I n this expert tip, David Sherry describes how a combination of technical controls and user awareness training can help put
More informationTIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE
TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,
More informationKaspersky Security. The Power to Protect Your Organization
Kaspersky Security SOLUTIONS The Power to Protect Your Organization We believe that every organization from the smallest business to the largest corporation or government body should feel empowered to
More informationMonthly Meeting February 27, 2019
Monthly Meeting February 27, 2019 Updates to Meeting Schedule February 2019 5:15 to 5:45 Business Meeting 5:45 to 6:15 Networking and Dinner 6:15 to 7:45 Speaker and Q&A Agenda / Announcements Welcome
More informationAbout Issues in Building the National Strategy for Cybersecurity in Vietnam
Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation
More informationDHS Cybersecurity: Services for State and Local Officials. February 2017
DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated
More informationPartnership Information
SECOND INTERNATIONAL CONFERENCE ON ISO 31000 STANDARD USING ISO 31000 RISK MANAGEMENT STANDARD TO ACHIEVE OPTIMAL PERFORMANCE Conference Date: 28-29 May 2013 Master Classes Date: 30-31 May 2013 Location:
More informationAFCEA Welcome/Opening Keynote Speech. Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey
AFCEA Welcome/Opening Keynote Speech Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey A Turkish Perspective on the Challenges of Security in a Network-Enabled Environment I would like to
More information