Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi
|
|
- Toby Bishop
- 5 years ago
- Views:
Transcription
1 Invitation for Continuing Professional Education Session On November 16, 2013 (Saturday) Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi Time: 03:00 pm to 05:00 pm CA.A.P.Singh Arora Program Chair 13 October, 2013 Dear colleagues, In our endeavour to continue the professional enrichment, New Delhi Chapter invites you to the CPE Event on Saturday November 16, Bridging the Gap Between Privacy, PCI DSS and Big Data Insight ISACA New Delhi is committed to the benefit of the community and wishes to state that benefits are available to Active Members who have renewed the membership. We may inform that ISACA membership renewal for 2014 has started. Renew your membership for year 2014 at the earliest opportunity to avail full benefits from the resources of ISACA as well as the New Delhi Chapter. As there are limited seats for the CPE event please confirm your attendance to the event by returning a mail to the following : Chairman CPE Program CA. A.P.Singh Arora, ap.singh.arora@gmail.com Deputy Chairman CPE Program Harsh Kumar, harshkumar.isaudit@gmail.com (*note the Venue details and directions)
2 Ulf Mattsson Ulf is the Chief Technology Officer of Protegrity, a leader in enterprise data security management, where he created the innovative architecture of the Protegrity Data Security Platform. He is commonly considered one of the founding fathers of tokenization and has been advising the industry s top analysts and stakeholders including PCI Security Standards Council, ISACA and Visa as they navigate the role of tokenization in payments security. Ulf is the inventor of more than 20 patents in the areas of encryption key management, policy driven data encryption, internal threat protection, data usage control and intrusion prevention. He also is a research member of the International Federation for Information Processing (IFIP) WG 11.3 Data and Application Security, ANSI X9, Information Systems Security Association (ISSA) and Information Systems Audit and Control Association (ISACA) Ulf frequently lectures about technology and research at security and database conferences in the United States and Europe, including IBM SHARE, Information Systems Security Association (ISSA), Information Systems Audit and Control Association (ISACA), RSA conferences, InfoSec Europe, Oracle Conferences, Teradata Conferences, and PCI Europe events. Prior to joining Protegrity, Ulf spent 20 years with IBM working in software development as a consulting resource to IBM s research organization, specializing in the areas of IT architecture and IT security. He received a master's degree in physics from Chalmers University of Technology in Sweden, and degrees in electrical engineering and finance. Mr. Ulf Mattsson CTO, Protegrity
3 Some of Ulf Mattsson s speaking engagements and articles: Articles: Bridging the Gap Between Privacy and Data Insight, New York Oracle Users Group, Summer General Meeting June 5, 2013 Understanding Your Data Flow: Using Tokenization to Secure Data Protegrity and Securosis Demystify PCI DSS Tokenization Guidelines Consumers are demanding better data security The Realities of Data Security and Compliance Is there a silver bullet to the payment industry's data security woes? Tokenization on the Node - Data Protection for Security and Compliance Ulf Mattsson is a member of the following Task Forces & Special Interest Groups (SIGs) on the PCI Security Standards Council (PCI SSC): PCI SSC Cloud SIG PCI SSC Encryption Task Force PCI SSC Point to Point Encryption Task Force PCI SSC Risk Assessment SIG PCI SSC ecommerce SIG PCI SSC Virtualization SIG PCI SSC Tokenization Task Force PCI SSC Pre-Authorization SIG PCI SSC Scoping SIG Working Group 2
4 Topic: Bridging the Gap Between Privacy, PCI DSS and Big Data Insight Understand how to bridge the gap between security regulations, privacy and compliance, yet still be able to provide powerful analysis and data insight to achieve the power behind a big data environment. Learn how to adapt to the ever-changing international data security landscape, including new compliance rules in the PCI DSS 3.0 and implementations in outsourced and cloud environments. Mr. Ulf Mattsson Companies are now faced with the obstacle of compliance and security regulations that had not been considered before. In addition, the data environment used today must adapt to the ever-changing data security landscape in the future. Now is the time to bridge the gap between security regulations, privacy and compliance, yet still be able to provide powerful analysis and data insight to achieve the power behind a big data environment. The traditional security approach for Big Data is not effective. Usual security recommendations for Big Data include Kerberos, file/os layer encryption, key/certificate management, log transactions, anomalies, and administrative activity, and use SSL or TLS network security. We need to bridge the Gap Between Privacy and Data Insight. An effective solution should be based on granular protection of fields to bring together data protection and data insight. The faulty approach of encrypting whole files that are containing any sensitive fields cannot bring together data protection and data insight. This session will explore the issues and provide solutions to bring together data protection and data insight.
5 CPE Session on November 16, 2013 (Saturday) S.No. Time Activity 1 2:30 pm 3:00 pm Registration & Tea 2 3:00 pm 5:00 pm Topic: Bridging the Gap Between Privacy, PCI DSS and Big Data Insight Speaker: Mr. Ulf Mattsson (CTO - Protegrity) 4 5:00 pm 5:10 pm Vote of thanks and Lucky Draw 5 5:10 pm 5:30 pm Networking High Tea The registration for event will close at 3:00 pm. Members are requested to reach in time and register before 3:00 pm. ISACA New Delhi Chapter look s forward to your active participation and interaction. Yours sincerely, Rajendra Kathal President Jagmohan Singh Vice President A.P.Singh Arora Chairman CPE Program Harsh Kumar Deputy Chairman CPE Program
6 Event Fee CPE Credits Other Benefits ISACA New Delhi Chapter. (Active Members) Free of Cost Two CPE Credits Opportunity to interact with speakers Opportunity to network with people
7 Venue for CPE Event Conference Hall, Second Floor, YMCA Building, Jai Singh Marg, Connaught Place, New Delhi Nearest Delhi Metro Station (Blue line/yellow line/ Airport line) Rajiv Chowk / Patel Chowk / Shivaji Stadium For more details on loacation / directions visit
2013 ISACA New Delhi Chapter All Rights Reserved
Mr. Rajendra Kathal President Invitation for Continuing Professional Education Session On May 25, 2013 (Saturday) from 04:30 pm to 06:30 pm Venue: Seminar Hall No. 1, USI Building Rao Tula Ram Marg, New
More informationInvitation for Continuing Professional Education Session On March 01, 2014 (Saturday)
24 February, 2014 Dear colleagues, Invitation for Continuing Professional Education Session On March 01, 2014 (Saturday) Venue : Seminar Hall No. 1, IDSA Building Institute for Defence Studies and Analyses
More informationISACA NEW DELHI CHAPTER CPE Held and Credits Earned Record
CPE EVENT * 72562 2 2 2 2 2 10 73823 2 2 4 100585 2 2 2 2 2 2 12 102198 2 2 110047 2 2 114610 2 2 125730 2 2 127962 2 2 156464 2 2 2 2 2 2 2 14 156791 2 2 2 2 2 10 176180 2 2 181426 2 2 2 6 185611 2 2
More informationThe Realities of Data Security and Compliance: Compliance Security
The Realities of Data Security and Compliance: Compliance Security Ulf Mattsson, CTO, Protegrity Ulf.mattsson @ protegrity.com Bio - A Passion for Sailing and International Travel 2 Ulf Mattsson 20 years
More informationProtecting Your Data in the Cloud. Ulf Mattsson Chief Technology Officer ulf.mattsson [at] protegrity.com
Protecting Your Data in the Cloud Ulf Mattsson Chief Technology Officer ulf.mattsson [at] protegrity.com Ulf Mattsson 20 years with IBM Development & Global Services Inventor of 22 patents Encryption and
More informationBridging the Gap Between Privacy and Data Insight
Bridging the Gap Between Privacy and Data Insight Ulf Mattsson CTO, Protegrity ulf. mattsson [at] protegrity. com 2 Bridging the Gap Between Privacy and Data Insight Ulf Mattsson, CTO Protegrity 20 years
More informationCOBIT 5 Foundation Workshop
COBIT 5 Foundation Workshop Dear Members, ISACA Pune chapter is pleased to organize Two / Three Days COBIT-5 Foundation course Dates of Training & Workshop: Date: Friday, 19 th Dec 2014 and Saturday, 20
More informationVice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security
Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More informationWorkshop description
Workshop description COBIT5 for Assurance With information and technology at the heart of creating value for enterprises, it is more important than ever for organizations to optimize their IT assurance
More informationA Global Look at IT Audit Best Practices
A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory
More informationMAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world
8 MAY 2018 (Tue) Hong Kong CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world CYBERSECURITY AND RISK MANAGEMENT By HKUST Business School Executive Education Office
More informationIT Audit Essentials. Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur
IT Audit Essentials Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur IT Audit Essentials Workshop Overview ISACA Malaysia Chapter is
More information2018 Government Professional Accounting Seminar
2018 Government Professional Accounting Seminar Thursday September 6, 2018 7:30 a.m. - Registration and Networking 8:00 a.m. 4:50 p.m. (Early Registration by Tuesday, July 31, 2018; Regular by Friday,
More informationINFORMATION SYSTEMS AUDITOR EXAM PREPARATION COURSE NICOSIA LIVE ON-LINE. 1 P a g e
CERTIFIED INFORMATION SYSTEMS AUDITOR EXAM PREPARATION COURSE NICOSIA LIVE ON-LINE 1 P a g e COURSE DESCRIPTION The Certified Information Systems Auditor () is a world renowned accreditation awarded by
More informationCertified Information Systems Auditor Training and Certification
Certified Information Systems Auditor Training and Certification Course Description Certified Information Systems Auditor (CISA) Training designation is a globally recognized certification for IS audit
More informationPCI Implementation Workshop [CPISI] PCI Version 3.2
PCI Implementation Workshop [CPISI] PCI Version 3.2 SISA, a Global Payment Security Specialist company and a certification body recognized PCI Security Standards Council (PCI SSC). With a large pool of
More informationModern Database Architectures Demand Modern Data Security Measures
Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing
More informationTHE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :
THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY 18 2017: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) MAY 15 AND 16 o INFORMATION
More informationPartnership Information
SECOND INTERNATIONAL CONFERENCE ON ISO 31000 STANDARD USING ISO 31000 RISK MANAGEMENT STANDARD TO ACHIEVE OPTIMAL PERFORMANCE Conference Date: 28-29 May 2013 Master Classes Date: 30-31 May 2013 Location:
More informationProtegrity Vaultless Tokenization
Protegrity Vaultless Tokenization Protegrity Vaultless Tokenization employs a patent-pending approach to tokenization that improves security and efficiency by eliminating the need for a token vault. By
More informationISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015
ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters
More informationCONTINUING PROFESSIONAL DEVELOPMENT SCHEME (CPD) FOR AATSL MEMBERS
CONTINUING PROFESSIONAL DEVELOPMENT SCHEME (CPD) FOR AATSL MEMBERS The members of the Association of Accounting Technicians of Sri Lanka (AATSL) are hereby informed that Continuing Professional Development
More informationBECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW
BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential
More informationCloud Security Alliance Quantum-safe Security Working Group
Don Hayford 3rd ETSI/IQC Workshop on Quantum-Safe Cryptography Seoul, Korea October 5, 2015 Session 3: Joint Global Efforts Cloud Security Alliance Quantum-safe Security Working Group 1 Cloud Security
More informationA FALSE SENSE OF SECURITY
Feature Ulf T. Mattsson is the chief technology officer (CTO) of Protegrity. He created the initial architecture of Protegrity s database security technology, for which the company owns several key patents.
More informationMobile Security and Public Networks
Mobile Security and Public Networks Victor Johnston, Future Leaders Executive Council June 7, 2016 RECORDING HERE: http://bit.ly/29t0bq7 Teleconference Settings This call is being recorded To see the slides,
More informationThe PCI Security Standards Council PCI DSS Virtualization Webinar
The PCI Security Standards Council PCI DSS Virtualization Webinar Bob Russo, General Manager Kurt Roemer, Citrix Systems, PCI SSC Virtualization SIG Chair June 2011 Agenda Introductions Council & Virtualization
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationFUNDAMENTALS OF CYBER SECURITY FOR UTILITIES
COURSE FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES November 13-14, 2018 EUCI Conference Center Denver, CO Furthered my learning regarding cyber security initiatives. Director, CPS Energy RELATED EVENT:
More informationSPRING CONFERENCE 2012 SPRING MEMBERSHIP MEETING
ISACA NEW YORK METROPOLITAN CHAPTER SPRING CONFERENCE 2012 SPRING MEMBERSHIP MEETING Citi 388 Greenwich Street Greenwich Rooms New York City, NY April 30, 2012 A Message From the President: Dear ISACA
More informationThe web seminar has not yet started: A sound check will be performed 5 minutes before the start time.
The web seminar has not yet started: A sound check will be performed 5 minutes before the start time. COPYRIGHT NOTICE USE OF WEBEX LOGIN/PASSWORD FOR ACAMS WEB SEMINARS Each site license entitles registrant
More informationIMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES
IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES Introductions Agenda Overall data risk and benefit landscape / shifting risk and opportunity landscape and market expectations Looking at data
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationFramewOrk to DeSign and implement ifc
Marketing Partner Hotel Radisson GRT, 15 Leveraging COSO internal COntrOLS FramewOrk to DeSign and implement ifc 8 CPE Hours Networking Opportunities Qualified CIA Faculty about the Seminar The COSO Internal
More informationAll the Latest Data Security News. Best Practices and Compliance Information From the PCI Council
All the Latest Data Security News Best Practices and Compliance Information From the PCI Council 1 What is the PCI Security Standards Council? Collaboration Education Simplified solutions for merchants
More informationBeyond PCI A Cost Effective Approach to Data Protection
Beyond PCI A Cost Effective Approach to Data Protection Ulf Mattsson CTO Protegrity Ulf.mattsson@protegrity.com August 5, 2010 1 Ulf Mattsson 20 years with IBM Software Development Received US Green Card
More informationWays Global FOR RETAIL
5 Ways Global RETAILERS Protect THEIR CUSTOMER Data In the new digital environment, keeping pace with security is the new reality Digital disruption over the last decade has impacted how retailers communicate,
More informationPCI DSS and VNC Connect
VNC Connect security whitepaper PCI DSS and VNC Connect Version 1.2 VNC Connect security whitepaper Contents What is PCI DSS?... 3 How does VNC Connect enable PCI compliance?... 4 Build and maintain a
More informationCyber, Information Security, and Data Protection
Cyber, Information Security, and Data Protection The past, the present, and th e future 15th, 16th & 17th October 2018 Muscat - Oman Intellectual Events And Conferences Private Limited For more information
More information21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong
Date: Time: 21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong The Chinese Manufacturers Industry About Vocational
More informationData Management and Security in the GDPR Era
Data Management and Security in the GDPR Era Franck Hourdin; Vice President, EMEA Security Russ Lowenthal; Director, Database Security Product Management Mike Turner; Chief Operating Officer, Capgemini
More informationDear Colleague, We are pleased to invite you to become a Charter Member of the National Association of Accessibility Consultants.
National Association of Accessibility Consultants Dear Colleague, We are pleased to invite you to become a Charter Member of the National Association of Accessibility Consultants. Membership The National
More information29-31 OCTOBER cyberethicaldays.com THE BEST WAY TO PROMOTE YOUR CYBER SECURITY SOLUTIONS IN EUROPE
29-31 OCTOBER 2019 cyberethicaldays.com THE BEST WAY TO PROMOTE YOUR CYBER SECURITY SOLUTIONS IN EUROPE CYBERSECURITY AND ETHICAL HACKING CONGRESS The Barcelona Cyber Ethical Days Congress will be the
More informationThis document/guide contains dated material; always check the ASMC website for the most recent information, policies, and other information.
December 2010 CDFM OVERVIEW The American Society of Military Comptrollers offers the Certified Defense Financial Manager (CDFM) program to those persons desiring to demonstrate proficiency in the core
More informationCyber Security Principles Mobile Devices Security Hazards And Threats 2nd Edition Computer Security
Cyber Security Principles Mobile Devices Security Hazards And Threats 2nd Edition Computer Security We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks
More informationNEWS ISSUE # 26
PRESIDENT S MESSAGE Dear Members, Time really flies and soon 2012 will be over and we will be welcoming the New Year 2013. ISACA Malaysia Chapter has kick started the year end celebration by having the
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationDan Lobb CRISC Lisa Gable CISM Katie Friebus
Dan Lobb CRISC Lisa Gable CISM Katie Friebus AGENDA Meet the speakers Compliance between QSA visits - Dan Lobb Transitioning from PCI DSS 3.1-3.2 - Katie Friebus Tips for Managing a PCI Compliance Program
More informationPCI DSS and the VNC SDK
RealVNC Limited 2016. 1 What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) compliance is mandated by many major credit card companies, including Visa, MasterCard, American Express,
More informationThe Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks
The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks Mark Nicolett Notes accompany this presentation. Please select Notes Page view. These materials
More informationInformation Security Officer (ISO) Education
Information Security Officer (ISO) Education October 16, 2018 TBA Barrett Training Center Nashville, Tenn. Information Security Officer (ISO) Education October 16, 2018 TBA Barrett Training Center Nashville,
More informationWelcome October, 2013 INSIDE THIS ISSUE. Jesse A. Hanford Greater Cincinnati ISACA President
October, 2013 INSIDE THIS ISSUE Welcome Message....1 Monthly Meeting......2 Events 3 Education......5 Meet A Board member...8 Editor s Corner....9 About Our Chapter... 10 Welcome Greater Cincinnati ISACA
More informationCOSS and COSM Recertification Guide
COSS and COSM Recertification Guide Introduction This recertification guide covers the requirements and processes for maintaining the Certified Occupational Safety Specialist (COSS) and Certificate for
More informationA-LIST 2016 Event Sponsorship Form
A-LIST 2016 Event Sponsorship Form Event Atlanta Local InfraGard Security Training (A-LIST) event Date February 10, 2016 Location Purchase and sponsorship contribution levels Kennesaw Center, Kennesaw
More informationPROJECT MANAGEMENT PROFESSIONAL (PMP)
PROJECT MANAGEMENT PROFESSIONAL (PMP) EXAM PREPARATION TRAINING WHAT IS PMP? Government, commercial and other organizations employ PMP certified project managers in an attempt to improve the success rate
More informationNomination Form Architecture Excellence Awards 2018
Nomination Form Architecture Excellence Awards 2018 Presented by: [Presenter's name] Company Overview 1. Name of the Company: 2. Name of the CEO (Chief Executive Officer): 3. Name of the CIO (Chief Information
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate
More informationRun the business. Not the risks.
Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.
More informationPCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1
PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman
More informationThe First Annual Privacy & Data Protection SOUTH AFRICA 2016
The First Annual Privacy & Data Protection SOUTH AFRICA 2016 TransAtlantic Events 2016 Conference Series "POPI, The new horizon for South Africa: linking GDPR, The Cloud, Social Media and Information Security."
More informationVirtustream Cloud and Managed Services Solutions for US State & Local Governments and Education
Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS
More informationINFORMATION SECURITY MANAGEMENT
ISMS (ISO/IEC 27001:2005 to ISO/IEC 27001:2013) Transition Training Course (A17700) Two (2) Days It is recommended for ISMS registered Provisional Auditors, Auditors, Lead Auditors, Principal Auditors
More informationUlf Mattsson CTO Protegrity ulf. mattsson AT protegrity. com
Securing Data Today and in the Future Ulf Mattsson CTO Protegrity ulf. mattsson AT protegrity. com Ulf Mattsson 20 years with IBM Development & Global Services Inventor of 22 patents Encryption and Tokenization
More informationISO/IEC JTC 1 Study Group on Smart Cities
ANSI WORKSHOP ISO/IEC JTC 1 Study Group on Smart Cities Presented by Alex Tarpinian Senior Manager, IBM ANSI WORKSHOP: Smart and Sustainable Cities November 21, 2013 1 Overview ISO/IEC JTC 1 Study Group
More informationISACA International Perspective
ISACA International Perspective 11 th October 2013 Allan Boardman ISACA International Vice President and Board Director Member of ISACA s Strategic Advisory Council Member of the IT Governance Institute
More informationFUNDAMENTALS OF CYBER SECURITY FOR UTILITIES
COURSE FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES February 21-22, 2018 Millennium Knickerbocker Hotel Chicago, IL RELATED EVENT: FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS February 22-23, 2018
More informationPCI compliance the what and the why Executing through excellence
PCI compliance the what and the why Executing through excellence Tejinder Basi, Partner Tarlok Birdi, Senior Manager May 27, 2009 Agenda 1. Introduction 2. Background 3. What problem are we trying to solve?
More informationNERC Staff Organization Chart Budget 2018
NERC Staff Organization Chart Budget 2018 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationMapping PCI DSS v2.0 With COBIT 4.1 By Pritam Bankar, CISA, CISM, and Sharad Verma
Volume 2, April 2011 Come join the discussion! Pritam Bankar and Sharad Verma will be responding to questions and comments in the discussion area of the COBIT Use It Effectively topic beginning 21 April
More informationCPA Ireland. Eamonn Siggins Chief Executive June 2012
Witamy w Irlandii CPA Ireland Eamonn Siggins Chief Executive June 2012 CPA Ireland Background Established 1943 Body of Auditors and Accountants Governed by a Council (16:3) Operate by delegated self regulation
More information2016 COBIT 5 Foundation Training Course
1 of 5 For View this email in your browser Newsletter Decemeber 2015 With Father Christmas dusting off his sleigh, shining up his boots and trimming his beard, it s now time
More informationNortheast Ohio Chapter Annual General Meeting
Northeast Ohio Chapter Annual General Meeting May 21, 2015 For professionals and organizations be the leading global provider of knowledge, certifications, community, advocacy and education on information
More informationThe President s Message 3. ISACA Karachi Chapter AGM & Elections Members Event: Cloud Adoption & (Secaas) 11. ISACA Book Store Update 11
Table of Content Editor Absar Khan The President s Message 3 ISACA Karachi Chapter AGM & Elections 2015 5 Members Event: Cloud Adoption & (Secaas) 11 Asia Leadership Conference Asia Pacific CACS ISRM 14
More informationExam Requirements v4.1
COBIT Foundation Exam Exam Requirements v4.1 The purpose of this document is to provide information to those interested in participating in the COBIT Foundation Exam. The document provides information
More informationImplementation of Business Continuity Management System (BCMS) based on ISO 22301:2012 requirements
Implementation of Business Continuity Management System (BCMS) based on ISO 22301:2012 requirements Summary This five-day intensive training course enables participants to develop the necessary expertise
More informationCENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN
CENTRAL REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN TAKE THE STAGE Members: Register by Feb. 29 to save US$100. Take the Stage The IIA and IIA Nashville Chapter are excited to host the 2016 Central
More informationExpand Your Cyber Expertise. Secure Your Future.
Expand Your Cyber Expertise. Secure Your Future. CSX 2018 Europe will help you stay on top of the latest cybersecurity trends, further your cyber career, and make new connections with professionals around
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationSAP Controls & Best Practices
To make sure you receive future emails,please add InfoNet@njisaca.org to your address book or safe list. Monthly Newsletter Published by ISACA NJ Chapter Volume 2013, Number 3 SAP Controls & Best Practices
More informationA MASTER CLASS AUDIT, LEADERSHIP & ADVANCED EXCEL WORKSHOP
A MASTER CLASS AUDIT, LEADERSHIP & ADVANCED EXCEL WORKSHOP NOVEMBER 22-23, 2018 KIGALI SERENA HOTEL For more information www.icparwanda.com BACKGROUND The institute exists to serve within the Public interest
More informationVademecum of Speakers
Vademecum of Speakers Session 1 - The response to the crisis: removing barriers and unleashing growth in services Ariane Kiesow Centre for European Policy Ariane Kiesow is a policy analyst at the Centre
More informationSPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG
SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense
More informationThirtieth Annual. Electrical & Computer Engineering Day
\ Thirtieth Annual Electrical & Computer Engineering Day Thursday, November 10, 2016 Villanova Room, Connelly Center Activities are scheduled from 3:00 PM to 7:00 PM ECE DAY 16 The 30th annual ECE Day
More information2018 CALENDAR OF ACTIVITIES
2018 CALENDAR OF ACTIVITIES WHO WE ARE AND WHAT WE OFFER Ý Public Trainings Technical Sessions Reviews GMM Other Chapter Activities Conferences Professionals Night ISACA was incorporated by individuals
More informationPayment Card Industry (PCI) Qualified Integrator and Reseller (QIR)
Payment Card Industry (PCI) Qualified Integrator and Reseller (QIR) Implementation Instructions Version 4.0 March 2018 Document Changes Date Version Description August 2012 1.0 Original Publication November
More informationCOBIT 5 With COSO 2013
Integrating COBIT 5 With COSO 2013 Stephen Head Senior Manager, IT Risk Advisory Services 1 Our Time This Evening Importance of Governance COBIT 5 Overview COSO Overview Mapping These Frameworks Stakeholder
More informationENTERPRISE RISK MANAGEMENT
International Program Batch XIII - / II ENTERPRISE RISK MANAGEMENT WORKSHOP in USA New York & Washington DC 15 22 September, Organized by In Cooperation with: GLOBAL Enterprise Risk Management Academy
More informationData Security and Privacy at Handshake
Data Security and Privacy at Handshake Introduction 3 A Culture of Security 3 Employee Background Checks 3 Dedicated Security and Privacy Teams 3 Ongoing Team Training 4 Compliance 4 FERPA 4 GDPR 4 Security
More informationThe President s Message 3. ISACA Karachi Chapter Presentation Flyer 5. ISACA Karachi Chapter Presentation Report 6. ISACA Book Store Update 9
Table of Content Editor Absar Khan The President s Message 3 ISACA Karachi Chapter Presentation Flyer 5 ISACA Karachi Chapter Presentation Report 6 ISACA Book Store Update 9 ISACA International News /
More informationISE Canada Executive Forum and Awards
ISE Canada Executive Forum and Awards September 19, 2013 "Establishing a Cost Effective PCI DSS Compliance Program by Having a Can Do Attitude Della Shea Chief Privacy & Information Risk Officer Symcor
More informationAGENDA: Cyber Essentials: The UK Government Scheme to improve cyber security (Dexter House, Royal Mint Court, London, 17 July 2014)
www.itgovernance.co.uk Time Session 09:00-9:30 Registration Tea and coffee Networking 09:30-09:35 Welcome to Cyber Essentials 2, and introduction to guest speaker, Richard Bach (Michael Shuff, IT Governance
More informationMemphis Chapter. President s Message. This annual event is designed to provide students with a
Memphis Chapter F E B R U A R Y 2 0 1 5 Remember: Update your IIA profile for the most up-to-date news. RSVP for the Annual Student Day February 24, 2015 This annual event is designed to provide students
More informationFUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS
COURSE FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS February 22-23, 2018 Millennium Knickerbocker Hotel Chicago, IL RELATED EVENT: FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES February 21-22, 2018
More informationHYDERABAD CHAPTER OF ISACA FIFTEENTH ANNUAL REPORT
Dear Members, It is my privilege and honor to present the 15 th Annual Report of the Hyderabad for the year. 1. FINANCIAL RESULTS Rs.in lakhs Particulars 2013 14 Income 9.84 8.96 Surplus 2.31 2.56 Investments(Bank
More informationConverged Security - Protect your Digital Enterprise May 24, Copyright 2016 Vivit Worldwide
Converged Security - Protect your Digital Enterprise May 24, 2016 Copyright 2016 Vivit Worldwide Brought to you by Copyright 2016 Vivit Worldwide Hosted By Richard Bishop Vivit Board United Kingdom Chapter
More informationIT in Healthcare Day
San Francisco ISACA Chapter Proudly Presents IT in Healthcare Day A Day-Long, Multi-Session Event, being held in Walnut Creek! Where: Walnut Creek Marriott - 2355 North Main Street Walnut Creek, CA 94596
More informationNational Cyber Security and Cyber Terrorism Summit
Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing
More informationSPONSORSHIP PROSPECTUS CONNECT WITH YOUR TARGET AUDIENCE
SPONSORSHIP PROSPECTUS CONNECT WITH YOUR TARGET AUDIENCE ABOUT ISACA For more than 50 years, ISACA (isaca.org) has been a pace-setting global professionals lead, adapt and assure trust in an evolving digital
More informationSite Data Protection (SDP) Program Update
Advanced Payments October 9, 2006 Site Data Protection (SDP) Program Update Agenda Security Landscape PCI Security Standards Council SDP Program October 9, 2006 SDP Program Update 2 Security Landscape
More information