SPRING CONFERENCE 2012 SPRING MEMBERSHIP MEETING

Size: px
Start display at page:

Download "SPRING CONFERENCE 2012 SPRING MEMBERSHIP MEETING"

Transcription

1 ISACA NEW YORK METROPOLITAN CHAPTER SPRING CONFERENCE 2012 SPRING MEMBERSHIP MEETING Citi 388 Greenwich Street Greenwich Rooms New York City, NY April 30, 2012

2 A Message From the President: Dear ISACA NY Metro Member: On behalf of our Board of Directors, I'd like to welcome you to our 2012 Spring Conference. This is one of several major educational events we had planned for this year. We've selected our presenters based on feedback from you and what we believe are 'hot topics' in the industry. The chapter year is almost completed and I m very pleased with everything we ve accomplished. Our webinar series has received great feedback and we continue to offer many world-class educational opportunities at an unmatched price and value. Our next membership event will be our Annual Gala, held on June 18 at the Union League Club in Midtown. This is where we announce our Board of Directors and bestow the prestigious Wasserman Award to this year's winner, for doing the most for the profession. It's a top-notch event with an open bar and hors d'oeuvres, a sit-down dinner and plenty of networking opportunities. Details will be posted on our website and space is limited so please register soon. Thank you for all your support today, and throughout the year. We couldn t be the organization we are today without a strong and dynamic membership. I hope you enjoy today's event and we re already planning plenty more for the Fall, including a joint IIA and ISACA Conference. All the best, James C. Ambrosini CISA, CISSP, CFE, CRISC ISACA New York Metropolitan Chapter President Thank You to our Sponsors and Speakers 2

3 Spring Conference 2012 April 30, 2012 AGENDA Morning Session 08:30 AM 09:00 AM Registration and Networking, Continental Breakfast 09:00 AM 09:15 AM Welcome and Opening Remarks 09:15 AM 10:05 AM Keynote Address - Governance and Security Bart Stanco, Vice President & Executive Partner, Gartner Executive Programs 10:15 AM 11:05 AM Overview of National Cybersecurity & Communications Integration Center and Federal Cyber Response Capabilities Rick Lichtenfels, Deputy Director, Assist and Assess Branch, NCCIC, US Department of Homeland Security 11:15 AM 12:05 PM COBIT 5 Brian Barnier, Principal Analyst and Advisor, ValueBridge Advisors LLC 12:05 PM 12:30 PM Closing Remarks and Raffle Afternoon Session 01:30 AM 02:00 PM Registration and Networking 02:00 PM 02:15 PM Welcome and Opening Remarks 02:15 PM 03:05 PM Choosing the Most Appropriate Data Security Solution for an Organization Ulf Mattsson, Chief Technology Officer, Protegrity 03:15 PM 04:05 PM Operational Standards of Anti-Money Laundering / Combating Terrorist Financing (AML/CTF) Program John F. Walsh, President and Chief Executive Officer, SightSpan 04:15 PM 05:05 PM Enough on Mobile Problems, What About Solutions? Yan Kravchenko, Practice Lead, NetSpi 05:15 PM 05:30 PM Closing Remarks and Raffle 3

4 About the Speaker: Morning Session One 9:15 AM 10:05 AM Keynote Address Governance and Security Gartner defines a strategic technology as one with the potential for significant impact on the enterprise in the next three years. A strategic technology may be an emerging technology. It may also be an existing technology that has matured and/or become suitable for a wider range of uses. Factors that denote significant impact include a high potential for disruption to IT or the business, the need for a major dollar investment, or the risk of being late to adopt. These technologies impact the organization's long-term plans, programs and initiatives. Bart Stanco, Vice President and Executive Partner, Gartner Executive Programs Bart Stanco has more than 25 years of hands-on leadership experience working with key executives, providing business and technology strategy advice. His experience spans successful start-ups, IPOs, and mature companies - and he has worked from Wall Street to the White House. In his previous position at Gartner, Bart was the CIO. He led the team that developed a state-of-the-art operations practice while creating an exciting work environment that yielded high morale and award-winning business results. About the Speaker: Morning Session Two 10:15 AM to 11:05 AM Overview of National Cybersecurity & Communications Integration Center and Federal Cyber Response Capabilities The rapidly converging information technology (IT) and communications infrastructure, known as cyberspace, touches every corner of the globe and every facet of human life. The United States in particular continues to embrace cyberspace, utilizing it for diverse activities from increasing energy efficiency to conducting financial transactions. Recognizing this national reliance on cyberspace and the interdependent nature of the Nation s current cyber infrastructure, the President commissioned the Cyberspace Policy Review. This report, released on May 29, 2009, builds on the Comprehensive National Cybersecurity Initiative (CNCI) and calls for the development of a cybersecurity incident response plan. This National Cyber Incident Response Plan (NCIRP) was developed according to the principles outlined in the National Response Framework (NRF) and describes how the Nation responds to Significant Cyber Incidents. Per the terms of the NCIRP, the National Cybersecurity and Communications Integration Center (NCCIC) is the focal point for the Nation s federal response to a significant cyber incident. The NCIRP represents a significant innovation in how DHS executes its cybersecurity and communications mission and in how the country responds to significant cyber incidents. This session will provide an overview of the NCCIC, the means in which DHS engages government, industry, intelligence and law enforcement communities, and a summary of Federal resources available to state and local entities before, during and after a cyber incident. Rick Lichtenfels, Deputy Director, Assist and Assess Branch, NCCIC, US Department of Homeland Security Rick Lichtenfels is the Deputy Director for the National Cybersecurity and Communications Integration Center's (NCCIC) Assist and Assess Branch. Previously, he was the Deputy Director of the Department of Homeland Security s (DHS) Control Systems Security Program (CSSP), where he led efforts to improve the security of the control systems underlying the Nation s critical infrastructure. Prior to becoming the CSSP Deputy Director, Rick was with DHS National Communications System (NCS) where he led the NCS Modeling, Analysis and Technology Assessment branch. Rick has over 15 years of engineering and management experience within both the public and private sectors, and holds a B.S. degree in Electrical Engineering from the University of Maryland at College Park. 4

5 About the Speaker: Morning Session Three 11:45 AM to 12:05 PM COBIT 5 COBIT 5 is ISACA's next generation of guidance on the governance and management of enterprise IT. COBIT 5 helps enterprises increase value from information and technology assets in view of risks and resource use. It builds on the COBIT history to enable improved ROI from information systems, maintaining the level of support and service for which ISACA is known. COBIT 5 integrates COBIT 4.1, Val IT, Risk IT while adding new business-process related content and a new maturity model method. COBIT 5 provides five principles and seven enablers for the governance and management of enterprise IT assets. It is designed to work with all major IT frameworks and standards such as ITIL and ISO. As such, COBIT 5 not only supports compliance with relevant laws, regulations and policies but also dovetails seamlessly with any framework approaches that the organization already has in place. Brian Barnier, Principal Analyst and Advisor, ValueBridge Advisors LLC Brian Barnier, Principal Analyst and Advisor at ValueBridge Advisors, is also an OCEG Fellow. He served on the OCEG Red Book Review Committee, co-authored ISACA s Risk IT Based on COBIT, and served on the COBIT 5 development workshop team, the IIA Risk Leadership Summit and BITS/FS Roundtable committees, including the Shared Assessment Program. Brian has penned over 100 articles, serves on the editorial panels of the Taylor & Francis EDPACS newsletter, ISACA Journal, and Association for Financial Professionals Risk! newsletter, contributed to Risk Management in Finance (Wiley, San Francisco, 2009) and is the author of The Operational Risk Handbook for Financial Companies (Harriman House, London, 2011). He twice chaired ISACA s IT GRC Conference. A global businessperson with Finance, Operations and Product Management experience, he has also led teams to nine technology patents. About the Speaker: Afternoon Session One 2:15 PM to 3:05 PM Choosing the Most Appropriate Data Security Solution for an Organization The frequency and cost of data security breaches continue to escalate. External and internal breaches continue to highlight the need for companies to understand the flow of data within the enterprise and the need to take a more granular approach in terms of how it is secured. This session analyzes recent security breach investigative reports and trend/risk studies, opining on who are the hackers, what are they doing, and what are their possible next targets. Recent case studies will be presented, illustrating what the IT security industry is doing to improve data security. The role of risk management in balancing business needs vs. security demands will also be discussed. Ulf Mattsson, Chief Technology Officer, Protegrity Ulf Mattsson created the innovative architecture of the Protegrity database security technology. Prior to joining Protegrity, he was a consulting resource to IBM's Research organization for 20 years, specializing in the areas of IT Architecture and IT Security. Ulf is the inventor of more than 20 patents in the areas of Encryption Key Management, Policy Driven Data Encryption, Internal Threat Protection, Data Usage Control and Intrusion Prevention. He is a research member of the International Federation for Information Processing (IFIP) WG 11.3 Data and Application Security, ANSI X9, Information Systems Security Association (ISSA) and ISACA. Ulf received a master's degree in physics in 1979 from Chalmers University of Technology in Sweden, and holds degrees in electrical engineering and finance. 5

6 About the Speaker: Afternoon Session Two 3:15 PM to 4:05 PM Operational Standards of an Anti-Money Laundering / Combating Terrorist Financing Program Multiple operational segments of work are required for an effective Anti-Money Laundering/Combating Terrorist Financing (AML/CTF) program, ranging from client on-boarding processes, proper risk assessments, sanctions, transaction monitoring, investigations of suspicious activities and filings with government agencies and/or account closures. Operational effectiveness is necessary to build and manage a sound cost effective AML/CTF program that provides proper levels of risk management and value for the shareholder. This session will cover practical approaches to AML/CTF risk management and engage the group in an open dialog about the reputational and regulatory risk associated with AML/CTF. John F. Walsh, President and Chief Executive Officer, SightSpan John Walsh is the President and Chief Executive Officer of SightSpan Inc. and a well-regarded Industry Leader, Speaker, and Trainer on the subjects of Risk Management, Security, Anti-Money Laundering (AML) and Combating Terrorist Financing (CTF). Prior to joining SightSpan, John held several leadership positions within the financial services industry over the past 25 years, including roles at Wachovia Bank where he was the CIB Data Czar responsible for information management and corporate governance, Bank of America in the role of Global AML Technology and Process Executive, and Merrill Lynch where he led Wholesale Trading Initiatives and GMI ecommerce prior to assisting the firm build out an AML and CTF program after 9/11. About the Speaker: Afternoon Session Three 4:15 PM to 5:05 PM Enough on Mobile Problems, What About Solutions? Mobile remains one of the most talked about problems with regard to security. While better and less expensive Mobile Device Management (MDM) tools are still being developed, organizations are facing a very real risk that remains largely unaddressed. Some organizations choose to pretend that wireless does not exist, while others implement policies that prohibit use of wireless technologies. This presentation will side step the typical rhetoric of the size of the problem that wireless devices pose, and focus on real world meaningful solutions that organizations can implement today. This session will provide a deconstructed view of the mobile dilemma, and introduce different techniques by which organizations can stop ignoring mobile and embrace its usefulness along with the risks in a more constructive manner. Yan Kravchenko, Practice Lead, NetSpi Yan Kravchenko has over 14 years of consulting experience in Information Technology and Information Security, specializing in security program development and management, security assessments, and IT audits. He has performed and managed numerous security assessment and IT audit projects in the education, government, healthcare, manufacturing, and agriculture sectors. A particular focus recently has been information security in healthcare. Yan is a founding member of the HITRUST SIG in the Twin Cities, which helps organizations affected by healthcare regulations evaluate and begin implementing the HITRUST Common Security Framework, or CSF.

7 Spring Membership Meeting April 30, 2012 AGENDA 05:30 PM 06:30 PM Registration and Networking, Food and Beverages 06:30 PM 06:40 PM Welcome and Opening Remarks 06:40 PM 07:30 PM Exposing the Most Recent Spate of Targeted Attacks Why are They Successful? Bradley Anstis, Vice President Technical Strategy, M86 Security 07:30 PM 08:30 PM Networking, Cocktails, and Refreshments About the Speaker Exposing the Most Recent Spate of Targeted Attacks Why are They Successful? In the last several months, M86 Security has monitored an apparent surge in targeted attacks against organizations. There appear to be several motives for the attackers: either they are after customer information or intellectual property, or perhaps wish to wreak public havoc. This session reviews the methods and tactics used in the most recent attacks and discusses why they are succeeding in spite of investments in security. The presentation will look at the anatomy of common attacks such as spear-phishing, blended threat s and malicious attachments. Then it will look at how those attacks are successful, even against world leading IT security organizations, to identify any potential holes in your organization s security architecture. Bradley Anstis, Vice President Technical Strategy, M86 Security Bradley Anstis is a 20-year veteran of the IT industry and a leading authority on the topic of Internet threats and cybercrime. He is M86 Security s primary spokesperson on the evolution of technical and strategic products. He is also the primary spokesperson on all topics relevant to the M86 Security Labs, which provides 24/7 monitoring of and Internet traffic to ensure that M86 keeps ahead of emerging threats, security trends and market requirements to provide solutions that protect customers from the latest threats and attacks to their electronic communication channels. Bradley is a regular speaker at global industry conferences, and is frequently featured in security publications. 7

8 recognition success growth Be recognized as an expert in your profession. With a globally accepted and recognized ISACA certification, you hold the power to move ahead in your career, increase your earning potential, enhance your credibility and prove you have what it takes to add value to your employer s enterprise. Registration is closed for June 2012 exams. Next exams are in December Are you ready for the June 2012 Certification Exams? the isaca new york metropolitan chapter offers the following exam review classes: cisa exam review class 4 consecutive saturdays may 5, 12, 19 & 26 9 am to 5 pm st. john s university, manhattan campus crisc exam review class 3 day course may am to 5 pm ernst & young llc, times square, new york, ny spring 2012 it boot camp for cisa and cism may 11 9 am to 5 pm st. john s university, manhattan campus register on the chapter website isaca.org/nymetro or kwongmei.to@isacany.org registration is still available but seating is limited 8

Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi

Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi Invitation for Continuing Professional Education Session On November 16, 2013 (Saturday) Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi -110001 Time: 03:00

More information

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential

More information

ACAMS (Association of Certified AML Specialist)

ACAMS (Association of Certified AML Specialist) ACAMS (Association of Certified AML Specialist) Founded in 2001 Largest international membership organisation dedicated to enhancing the knowledge, skills and expertise of AML/CTF and financial crime detection

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity

More information

AFC Compliance Careers

AFC Compliance Careers AFC Compliance Careers ACAMS Education Program Date : December 6 th 2017 Donna Bucci Ireland Account Manager ACAMS ACAMS is a global community ACAMS is the world s largest international membership organisation

More information

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information

DUNS CAGE 5T5C3

DUNS CAGE 5T5C3 Response to Department of Management Services Cyber Security Assessment, Remediation, and Identity Protection, Monitoring and Restoration Services Request For Information 131 Guilford Road, Bloomfield

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)

More information

Memphis Chapter. President s Message. This annual event is designed to provide students with a

Memphis Chapter. President s Message. This annual event is designed to provide students with a Memphis Chapter F E B R U A R Y 2 0 1 5 Remember: Update your IIA profile for the most up-to-date news. RSVP for the Annual Student Day February 24, 2015 This annual event is designed to provide students

More information

SOC for cybersecurity

SOC for cybersecurity April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory

More information

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED

More information

Les joies et les peines de la transformation numérique

Les joies et les peines de la transformation numérique Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education

More information

A Global Look at IT Audit Best Practices

A Global Look at IT Audit Best Practices A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

ISACA International Perspective

ISACA International Perspective ISACA International Perspective 11 th October 2013 Allan Boardman ISACA International Vice President and Board Director Member of ISACA s Strategic Advisory Council Member of the IT Governance Institute

More information

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee

More information

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

building for my Future 2013 Certification

building for my Future 2013 Certification I am building for my Future 2013 Certification Let ISACA help you open new doors of opportunity With more complex IT challenges arising, enterprises demand qualified professionals with proven knowledge

More information

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES MANILA CHAPTER 2017 CALENDAR OF ACTIVITIES 2017 MANILA CALENDAR OF ACTIVITIES GMM Professionals Night Public Trainings Reviews Conferences Technical Session & MANILA PROFILE HISTORY AND MISSION Who we

More information

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN CENTRAL REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN TAKE THE STAGE Members: Register by Feb. 29 to save US$100. Take the Stage The IIA and IIA Nashville Chapter are excited to host the 2016 Central

More information

Security Program Design:

Security Program Design: Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident

More information

Training and Certifying Security Testers Beyond Penetration Testing

Training and Certifying Security Testers Beyond Penetration Testing Training and Certifying Security Testers Beyond Penetration Testing Randall W. Rice, CTAL (Full), CTAL-SEC Director, ASTQB Board of Directors www.astqb.org Most organizations do not know the true status

More information

Rethinking Information Security Risk Management CRM002

Rethinking Information Security Risk Management CRM002 Rethinking Information Security Risk Management CRM002 Speakers: Tanya Scott, Senior Manager, Information Risk Management, Lending Club Learning Objectives At the end of this session, you will: Design

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES MANILA CHAPTER 2017 CALENDAR OF ACTIVITIES 2017 MANILA CALENDAR OF ACTIVITIES GMM Professionals Night Public Trainings Reviews Conferences Technical Session & MANILA PROFILE HISTORY AND MISSION Who we

More information

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 Sponsored by: Kansas Municipal Utilities Kansas Municipal Energy Agency Kansas Power Pool CYBERSECURITY TRAINING EXERCISE DATE November

More information

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC

More information

Volume 2014, Number 4. Volunteers Needed!

Volume 2014, Number 4. Volunteers Needed! Volume 2014, Number 4 Volunteers Needed! Volunteering for NJ ISACA is a great opportunity to expand your professional contacts and your IT knowledge base. NJ ISACA needs talented professionals like you

More information

2018 CALENDAR OF ACTIVITIES

2018 CALENDAR OF ACTIVITIES 2018 CALENDAR OF ACTIVITIES WHO WE ARE AND WHAT WE OFFER Ý Public Trainings Technical Sessions Reviews GMM Other Chapter Activities Conferences Professionals Night ISACA was incorporated by individuals

More information

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Managing Cyber Risk Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Adam Thomas Principal Cyber Risk Services Deloitte & Touche LLP Give Us Your Feedback for this Session!

More information

2016 COBIT 5 Foundation Training Course

2016 COBIT 5 Foundation Training Course 1 of 5 For View this email in your browser Newsletter Decemeber 2015 With Father Christmas dusting off his sleigh, shining up his boots and trimming his beard, it s now time

More information

FDIC InTREx What Documentation Are You Expected to Have?

FDIC InTREx What Documentation Are You Expected to Have? FDIC InTREx What Documentation Are You Expected to Have? Written by: Jon Waldman, CISA, CRISC Co-founder and Executive Vice President, IS Consulting - SBS CyberSecurity, LLC Since the FDIC rolled-out the

More information

CYBER SOLUTIONS & THREAT INTELLIGENCE

CYBER SOLUTIONS & THREAT INTELLIGENCE CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world

More information

ISACA CyberSecurity All Day Event. October 17, 2014

ISACA CyberSecurity All Day Event. October 17, 2014 ISACA CyberSecurity All Day Event October 17, 2014 7:30 AM 8:00 AM 8:00 AM 8:15 AM Agenda Registration, Hot Breakfast Buffet and Networking Introductions 8:15 AM 10:00 AM Session 1 Preparing for Cybergeddon:

More information

National Cyber Security and Cyber Terrorism Summit

National Cyber Security and Cyber Terrorism Summit Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing

More information

Cybersecurity and Hospitals: A Board Perspective

Cybersecurity and Hospitals: A Board Perspective Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,

More information

Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m.

Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Increased use of technologies such as mobile devices, social media and cloud computing has increased

More information

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce

More information

SECURITY CODE. Responsible Care. American Chemistry Council. 7 April 2011

SECURITY CODE. Responsible Care. American Chemistry Council. 7 April 2011 American Chemistry Council Responsible Care SECURITY CODE 7 April 2011 Debra Phillips Managing Director, Responsible Care American Chemistry Council Why develop a Separate Security Code? Need for a clearly

More information

CYBERSECURITY AND THE BOARD OF DIRECTORS TIPS FOR SECURING SUPPORT FOR YOUR CYBER RISK MANAGEMENT PROGRAM

CYBERSECURITY AND THE BOARD OF DIRECTORS TIPS FOR SECURING SUPPORT FOR YOUR CYBER RISK MANAGEMENT PROGRAM WHITE PAPER CYBERSECURITY AND THE BOARD OF DIRECTORS TIPS FOR SECURING SUPPORT FOR YOUR CYBER RISK MANAGEMENT PROGRAM NICK SON VICE PRESIDENT, CYBER RISK & PUBLIC SECTOR CHRISTOPHER LIETZ PRINCIPAL, CYBER

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

Northeast Ohio Chapter Annual General Meeting

Northeast Ohio Chapter Annual General Meeting Northeast Ohio Chapter Annual General Meeting May 21, 2015 For professionals and organizations be the leading global provider of knowledge, certifications, community, advocacy and education on information

More information

IT in Healthcare Day

IT in Healthcare Day San Francisco ISACA Chapter Proudly Presents IT in Healthcare Day A Day-Long, Multi-Session Event, being held in Walnut Creek! Where: Walnut Creek Marriott - 2355 North Main Street Walnut Creek, CA 94596

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers 2017 PORT SECURITY SEMINAR & EXPO ISACA/CISM Information Security Management Training for Security Directors/Managers Agenda Introduction ISACA Information security vs. cybersecurity CISM certification

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

The web seminar has not yet started: A sound check will be performed 5 minutes before the start time.

The web seminar has not yet started: A sound check will be performed 5 minutes before the start time. The web seminar has not yet started: A sound check will be performed 5 minutes before the start time. COPYRIGHT NOTICE USE OF WEBEX LOGIN/PASSWORD FOR ACAMS WEB SEMINARS Each site license entitles registrant

More information

Effective COBIT Learning Solutions Information package Corporate customers

Effective COBIT Learning Solutions Information package Corporate customers Effective COBIT Learning Solutions Information package Corporate customers Thank you f o r y o u r interest Thank you for showing interest in COBIT learning solutions from ITpreneurs. This document provides

More information

WELCOME TO ISACA Claudio CILLI, CISA, CISM, CRISC, CGEIT

WELCOME TO ISACA Claudio CILLI, CISA, CISM, CRISC, CGEIT WELCOME TO ISACA 2015 Claudio CILLI, CISA, CISM, CRISC, CGEIT cilli@di.uniroma1.it http://dsi.uniroma1.it/~cilli WHO IS ISACA? ABOUT ISACA The trusted source of guidance, networking and career development

More information

Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY

Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY ACHIEVE SUCCESS with ICE ICE has given me a real edge in knowing more about the intricacies of credentialing and connecting with others in the

More information

The President s Message 3. ISACA Bookstore Updates 22

The President s Message 3. ISACA Bookstore Updates 22 Table of Content Editor Absar Khan The President s Message 3 ISACA Karachi Chapter AGM 2016 5 Chapter AGM held on 30-Mar-2016 at Royal Rodale Complex Karachi ISACA Karachi Chapter Won Two International

More information

MAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world

MAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world 8 MAY 2018 (Tue) Hong Kong CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world CYBERSECURITY AND RISK MANAGEMENT By HKUST Business School Executive Education Office

More information

Statement for the Record

Statement for the Record Statement for the Record of Seán P. McGurk Director, Control Systems Security Program National Cyber Security Division National Protection and Programs Directorate Department of Homeland Security Before

More information

Opening Doors to Cyber and Homeland Security Careers

Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Today s Presenters: Frederic Lemieux, Ph.D. Professor and Program Director, Cybersecurity Strategy

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

Cyber Risks, Coverage, and the Board of Directors.

Cyber Risks, Coverage, and the Board of Directors. Cyber Risks, Coverage, and the Board of Directors PCI Northeastern General Counsel Seminar September 19-20, 2016 Vincent J. Vitkowsky Seiger Gfeller Laurie LLP vvitkowsky@sgllawgroup.com CYBER RISKS and

More information

Driving Global Resilience

Driving Global Resilience Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute

More information

2018 Government Professional Accounting Seminar

2018 Government Professional Accounting Seminar 2018 Government Professional Accounting Seminar Thursday September 6, 2018 7:30 a.m. - Registration and Networking 8:00 a.m. 4:50 p.m. (Early Registration by Tuesday, July 31, 2018; Regular by Friday,

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

Legal and Regulatory Developments for Privacy and Security

Legal and Regulatory Developments for Privacy and Security Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions

More information

Global Security Consulting Services, compliancy and risk asessment services

Global Security Consulting Services, compliancy and risk asessment services Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment

More information

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016 Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION Telecommunication Development Bureau T E L E F A X Place des Nations Telephone +41 22 730 51 11 CH-1211 Geneva 20 Telefax Gr3: +41 22 733 72 56 Switzerland Gr4: +41

More information

INFORMATION TECHNOLOGY AUDIT &

INFORMATION TECHNOLOGY AUDIT & One day training on INFORMATION TECHNOLOGY AUDIT & 10 th May 2018 - Mövenpick Hotel, Karachi 14 th May 2018 - Sunfort Hotel, Lahore (10:00 AM to 5:00 PM) TRAINING OVERVIEW Every time people get to hear

More information

Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities

Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection IBM Security s Brooke Satti Charles on the Power of These New Capabilities SPONSORED BY As fraudsters continually refine their techniques

More information

The value of visibility. Cybersecurity risk management examination

The value of visibility. Cybersecurity risk management examination The value of visibility Cybersecurity risk management examination Welcome to the "new normal" Cyberattacks are inevitable. In fact, it s no longer a question of if a breach will occur but when. Cybercriminals

More information

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important

More information

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015 ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters

More information

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During

More information

ACCA Diploma in. Starting this January! International Financial Reporting (DipIFR)

ACCA Diploma in. Starting this January! International Financial Reporting (DipIFR) ACCA Diploma in International Financial Reporting (DipIFR) Starting this January! Suite 4, Level 1, Tower Business Centre, Tower street, Swatar, BKR4013 +356 21 314 896 info@aimacademy.com.mt Overview

More information

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability

More information

How Secure is Blockchain? June 6 th, 2017

How Secure is Blockchain? June 6 th, 2017 How Secure is Blockchain? June 6 th, 2017 Before we get started... This is a 60 minute webcast For better viewing experience, close all other applications For better sound quality, please use headphones

More information

Welcome October, 2013 INSIDE THIS ISSUE. Jesse A. Hanford Greater Cincinnati ISACA President

Welcome   October, 2013 INSIDE THIS ISSUE. Jesse A. Hanford Greater Cincinnati ISACA President October, 2013 INSIDE THIS ISSUE Welcome Message....1 Monthly Meeting......2 Events 3 Education......5 Meet A Board member...8 Editor s Corner....9 About Our Chapter... 10 Welcome Greater Cincinnati ISACA

More information

Risk Advisory Academy Training Brochure

Risk Advisory Academy Training Brochure Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty

More information

Department of Management Services REQUEST FOR INFORMATION

Department of Management Services REQUEST FOR INFORMATION RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President

More information

Cybersecurity is a Journey and Not a Destination: Developing a risk management culture in your business. Thursday, May 21, 2015

Cybersecurity is a Journey and Not a Destination: Developing a risk management culture in your business. Thursday, May 21, 2015 Cybersecurity is a Journey and Not a Destination: Developing a risk management culture in your business. Thursday, May 21, 2015 Cybersecurity is a Journey and Not a Destination: Developing a risk management

More information

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every

More information

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time TM Plan. Protect. Respond. Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time Registration is open for the April webinar:

More information

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce

More information

White Paper. View cyber and mission-critical data in one dashboard

White Paper. View cyber and mission-critical data in one dashboard View cyber and mission-critical data in one dashboard Table of contents Rising cyber events 2 Mitigating threats 2 Heighten awareness 3 Evolving the solution 5 One of the direct benefits of the Homeland

More information

The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018

The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018 The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018 Jeff Hemphill Partner and Central Region Leader, Risk Advisory Services Brian Kirkpatrick Managing Director, Risk Advisory

More information

The ACFE Law Enforcement and Government Alliance

The ACFE Law Enforcement and Government Alliance What is the ACFE? The Association of Certified Fraud Examiners (ACFE) is the world s largest anti-fraud organization and premier provider of anti-fraud training and education with more than 80,000 members

More information

2016 SPONSORSHIP OPPORTUNITIES

2016 SPONSORSHIP OPPORTUNITIES 14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION

More information

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats

More information

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Deloitte & Touche LLP 1 Speaker Introduction Sanjeev

More information

BRING SPEAR PHISHING PROTECTION TO THE MASSES

BRING SPEAR PHISHING PROTECTION TO THE MASSES E-Guide BRING SPEAR PHISHING PROTECTION TO THE MASSES SearchSecurity phishing. I n this expert tip, David Sherry describes how a combination of technical controls and user awareness training can help put

More information

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,

More information

Kaspersky Security. The Power to Protect Your Organization

Kaspersky Security. The Power to Protect Your Organization Kaspersky Security SOLUTIONS The Power to Protect Your Organization We believe that every organization from the smallest business to the largest corporation or government body should feel empowered to

More information

Monthly Meeting February 27, 2019

Monthly Meeting February 27, 2019 Monthly Meeting February 27, 2019 Updates to Meeting Schedule February 2019 5:15 to 5:45 Business Meeting 5:45 to 6:15 Networking and Dinner 6:15 to 7:45 Speaker and Q&A Agenda / Announcements Welcome

More information

About Issues in Building the National Strategy for Cybersecurity in Vietnam

About Issues in Building the National Strategy for Cybersecurity in Vietnam Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation

More information

DHS Cybersecurity: Services for State and Local Officials. February 2017

DHS Cybersecurity: Services for State and Local Officials. February 2017 DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated

More information

Partnership Information

Partnership Information SECOND INTERNATIONAL CONFERENCE ON ISO 31000 STANDARD USING ISO 31000 RISK MANAGEMENT STANDARD TO ACHIEVE OPTIMAL PERFORMANCE Conference Date: 28-29 May 2013 Master Classes Date: 30-31 May 2013 Location:

More information

AFCEA Welcome/Opening Keynote Speech. Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey

AFCEA Welcome/Opening Keynote Speech. Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey AFCEA Welcome/Opening Keynote Speech Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey A Turkish Perspective on the Challenges of Security in a Network-Enabled Environment I would like to

More information