ISACA NEW DELHI CHAPTER CPE Held and Credits Earned Record

Similar documents
Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi

2013 ISACA New Delhi Chapter All Rights Reserved

Mohammad Shahadat Hossain

Cyber, Information Security, and Data Protection

ISACA International Perspective

Invitation for Continuing Professional Education Session On March 01, 2014 (Saturday)

building for my Future 2013 Certification

A Global Look at IT Audit Best Practices

Communication Networks & Cyber Security Workshop and Sixteenth GISFI Standardisation Series Meeting (GSSM),

International Policy Division, Global ICT Strategy Bureau

IT Audit Essentials. Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur

New Horizons in Audit & Assurance

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

Ben Eu. Summary. Experience. Associate Partner, Infrastructure & Endpoint Security at IBM

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Cybersecurity & Privacy Enhancements

2018 CALENDAR OF ACTIVITIES

ROI for Your Enterprise Through ISACA A global IS association helping members achieve organisational success.

HYDERABAD CHAPTER OF ISACA FIFTEENTH ANNUAL REPORT

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA

Opportunities to Integrate Technology Into the Classroom. Presented by:

Leveraging COBIT to Implement Information Security

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

Les joies et les peines de la transformation numérique

WELCOME TO ISACA Claudio CILLI, CISA, CISM, CRISC, CGEIT

แนวทางการพ ฒนา Information Security Professional ในประเทศไทย

DUNS CAGE 5T5C3

ISACA MADRID DECEMBER Robert E Stroud CEGIT CRISC International President December 2014

CYBERSECURITY: E-COMMERCE, GOVERNANCE AND APPLIED CERTIFICATIONS A ROUNDTABLE DISCUSSION 15 DECEMBER 2015

PROFILE FRANCIS KAITANO. Francis Kaitano is a strategic, innovative, delivery focused Cyber Security professional.

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

mission critical applications mission critical security Oracle Critical Patch Update July 2011 E-Business Suite Impact

Volume 2014, Number 4. Volunteers Needed!

CLOUD-CON: Management & Security

Cyber Security in M&A. Joshua Stone, CIA, CFE, CISA

CENTRE OF EXCELLENCE IN CLOUD COMPUTING

CSI Mumbai Chapter Yearly Training Calendar for April-14. May-14

Risk Based IT Auditing Master Class. Unlocking your World to a Sea of Opportunities

2018 Post Show Report. SMART ASIA India 2018

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

Using the NIST Cybersecurity Framework to Guide your Security Program August 31, 2017

ISACA Annual General Meeting 2006 President Report Vincent Chan

mission critical applications mission critical security Oracle Critical Patch Update October 2011 Oracle Database Impact

COBIT 5 Foundation Workshop

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers

Top Business/Technology Issues Survey 2011

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

IT in Healthcare Day

IT Governance and emerging trends

Healthcare HIPAA and Cybersecurity Update

Introduction. January 1, 2015

Business Context: Key for Successful Risk Management

mission critical applications mission critical security Oracle Critical Patch Update July 2011 Oracle Database Impact

NERC Staff Organization Chart Budget 2019

COBIT 5 With COSO 2013

BALA GANESHAN, PH.D. EXPERIENCE. Vice President and CTO Stellus Technologies, San Jose, CA. Technical Leadership. Ecosystem Engineering and Evangelism

mission critical applications mission critical security Oracle Critical Patch Update October 2011 E-Business Suite Impact

Transforming the Data Center Lenovo. All rights reserved.

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

MULTI-CLOUD REQUIRES NEW MANAGEMENT STRATEGIES AND A FORWARD-LOOKING APPROACH

Company Overview. global-lynx. Version: September 30, 2015

Northeast Ohio Chapter Annual General Meeting

Monthly Meeting September 28, 2016

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING

Advancing data governance to create improved data quality frameworks. Presented by: Micheal Axelsen Director Applied Insight Pty Ltd

Digital Transformation with HPE Cloud Management October 26, Copyright 2016 Vivit Worldwide

Protecting Your Data in the Cloud. Ulf Mattsson Chief Technology Officer ulf.mattsson [at] protegrity.com

NERC Staff Organization Chart Budget 2019

INTERACTIVE PANEL DISCUSSIONS

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

Learn How to Increase the Awareness of Risk Management at Your Enterprise

INDIA - UAE COMPREHENSIVE STRATEGIC PARTNERSHIP OVER THE YEARS

Helping you understand the impact of GDPR.

The Realities of Data Security and Compliance: Compliance Security

Jerry Luftman. Executive Director & Distinguished Professor SIM VP Chapter Relations & Academic Affairs, Emeritus

Important updates to Business Applications competencies

Welcome October, 2013 INSIDE THIS ISSUE. Jesse A. Hanford Greater Cincinnati ISACA President

Gopher Protocol. Technology Overview. Danny Rittman, PhD CTO Oct 2016

INFORMATION SECURITY GOVERNANCE, RISK & COMPLIANCE CLOUD CONSULTING SERVICES CIO & CISO SERVICES. forebrook

AT FIRST VIEW C U R R I C U L U M V I T A E. Diplom-Betriebswirt (FH) Peter Konrad. Executive Partner Senior Consultant

Digital government toolkit

The Widening Talent Gap: The greatest security challenge of our time

Exploring Emerging Cyber Attest Requirements

IT Audit Process Prof. Liang Yao Week Two IT Audit Function

Present. 5th May - Chennai. Internal. auditing. today: Beginning Auditor Tools and Techniques. 6 CPE hours.

Convergence of BCM and Information Security at Direct Energy

Dr. Imran Khan University of Nebraska-Lincoln Marketing (402)

Community Participation in the JCP Program: a winning combination November 2012

Creative Solutions Consulting, Inc. Commercial Price List (CPL) Price List Effective January 1, 2018 *

Featured event 1: Disaster Risk Resilient Infrastructure for Sustainable Development

Service Provider Consulting

MAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world

Certified Information Systems Auditor Training and Certification

Rethinking Information Security Risk Management CRM002

Heading Text. Manage your Organization s Governance, Risks, and Compliance Requirements and Transform your Business Potential with SAP GRC

BRING EXPERT TRAINING TO YOUR WORKPLACE.

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

FramewOrk t O DeSign and implement ifc

Risk Management and Cloud Security: Setting and Enforcing Policy

Transcription:

CPE EVENT * 72562 2 2 2 2 2 10 73823 2 2 4 100585 2 2 2 2 2 2 12 102198 2 2 110047 2 2 114610 2 2 125730 2 2 127962 2 2 156464 2 2 2 2 2 2 2 14 156791 2 2 2 2 2 10 176180 2 2 181426 2 2 2 6 185611 2 2 205302 2 2 207959 2 2 2 6 219817 2 2 2 2 8 235865 2 2 241296 2 2 2 2 2 10 242105 2 2 2 2 8 262578 2 2 2 2 8 265772 2 2 2 2 2 2 2 2 16 1

CPE EVENT * 266072 2 2 2 6 266189 2 2 4 273430 2 2 299416 2 2 2 2 2 2 12 300578 2 2 307656 2 2 310070 2 2 2 2 2 2 2 2 2 2 20 312700 2 2 2 2 2 10 314175 2 2 2 6 315619 2 2 2 2 2 2 2 14 323158 2 2 340937 2 2 4 353188 2 2 4 355169 2 2 2 2 8 358044 2 2 4 372492 2 2 4 379742 2 2 4 418171 2 2 2 2 2 2 2 14 440369 2 2 4 449204 2 2 4 451891 2 2 2 2 2 10 2

CPE EVENT * 458169 2 2 4 500963 2 2 4 513480 2 2 2 2 8 513536 2 2 2 2 2 10 537434 2 2 4 543953 2 2 4 544766 2 2 2 2 8 548254 2 2 2 6 550460 2 2 552312 2 2 555145 2 2 555738 2 2 565075 2 2 567704 2 2 2 2 2 10 568005 2 2 2 2 8 577385 2 2 2 6 587449 2 2 4 587809 2 2 2 2 8 589016 2 2 602250 2 2 2 2 2 10 604430 2 2 3

CPE EVENT * 618326 2 2 2 2 2 2 2 2 2 2 20 654529 2 2 2 2 2 2 12 661074 2 2 663052 2 2 4 665387 2 2 2 2 2 2 12 669654 2 2 2 6 682730 2 2 685184 2 2 688843 2 2 2 2 2 2 2 14 700048 2 2 708872 2 2 2 2 2 2 2 2 16 714378 2 2 2 2 8 714610 2 2 722291 2 2 727550 2 2 4 738541 2 2 4 749335 2 2 4 750689 2 2 751861 2 2 752346 2 2 2 6 756133 2 2 4

CPE EVENT * 766495 2 2 767097 2 2 767122 2 2 774455 2 2 775685 2 2 4 776255 2 2 2 2 8 776967 2 2 779585 2 2 2 6 780485 2 2 4 782218 2 2 4 782221 2 2 2 6 782749 2 2 2 2 8 796307 2 2 796567 2 2 800303 2 2 800351 2 2 4 806130 2 2 2 6 806907 2 2 2 6 807471 2 2 810214 2 2 2 2 2 10 812603 2 2 5

CPE EVENT * 813705 2 2 4 813902 2 2 818432 2 2 823146 2 2 832756 2 2 2 6 832945 2 2 4 837319 2 2 843610 2 2 847585 2 2 2 6 114853 2 2 CISA / CISM Aspirants 30 30 6

* CPE Event CPE Event Date ISACA NEW DELHI CHAPTER CPE CREDITs CPE 1 13 April, 2013 2 TOPIC(s) Topic 1: Carbon Foot Print Concept, relevance and Components Topic 2: Intellectual Property Rights - Copyrights in the context of the Virtual World Issues & Challenges CPE 2 11 May, 2013 2 CPE 3 25 May, 2013 2 Topic 1: Auditing in an ERP (SAP) Environment : The shifting Paradigm Topic 2: Aligning IT Strategy with Business Strategy Topic : COBIT 5 - IT Governance Simplified CPE 4 13 July 2013 2 CPE 5 24 August 2013 2 CPE 6 07 September 2013 2 CPE 7 21 September 2013 2 CPE 8 26 October 2013 2 Topic 1: Managing Large Enterprise Applications-Special Reference to IRCTC Topic 2 : COBIT 5 Documentation Walkthrough Topic 1: Oracle Talk - Advanced Controls to Manage Risk Topic 2 : Oracle Talk - Database Security Topic 1: Disaster Management and IT Topic 1: E-Mail Security Topic 2 : Software Security Topic 1: IS Audit and its Understanding CPE 9 16 November 2013 2 Topic 1: Bridging the Gap Between Privacy, PCI DSS and Big Data Insight CPE 10 21 December 2013 2 Topic 1: Information Security Topic 2 : Security in Indian Telecom Industry 6

* CPE Event Date of Event / Topic(s) / Speaker 1 13 April, 2013 Topic 1: Carbon Foot Print Concept, relevance and Components Topic 2: 2 11 May, 2013 Sh Navin Chopra CEO Agile Group Dr Madhukar Sinha Topic 1: Auditing in an ERP (SAP) Environment : The shifting Paradigm CA. Murali Narayanamurthy Topic 2: Aligning IT Strategy with Business Strategy 3 25 May, 2013 Mrs Padmaja Krishnan Topic : COBIT 5 - IT Governance Simplified Mr. Ashish Mahajan 4 13 July 2013 Intellectual Property Rights - Copyrights in the context of the Virtual World Issues & Challenges Professor, Centre for WTO Studies, Indian Institute of Foreign Trade, New Delhi. Chartered Accountant, Cost Accountant Co-Founder, Emerging Edges Consultants Private Limited & Consultant Guest Faculty Faculty of Management Studies, University of Delhi India Manager (IT Services & Knowledge Manager), K Solutions Topic 1: Managing Large Enterprise Applications-Special Reference IRCTC Mr. Amit Hardi Vice President, Consulting Services - Broadvision India Topic 2 : COBIT 5 Documentation Walkthrough Mr. Harsh Kumar Railway Officer, Indian Railways & Director ISACA New Delhi Chapter 7

5 24 August 2013 ISACA NEW DELHI CHAPTER Topic 1: Oracle Talk - Advanced Controls to Manage Risk Mr. Rajesh Ramdas Topic 2 : Oracle Talk - Database Security Mr. Swaminathan Babu 6 07 September 2013 Topic 1: Disaster Management and IT Major General R. K. Kaushal 7 21 September 2013 Topic 1: E-Mail Security Mr. Sanjiv Arora Topic 2 : Software Security Mr. Sandeep Sehgal 8 26 October 2013 Topic 1: IS Audit and its Understanding Mr. Neeraj Gupta 9 16 November 2013 Topic 1: Bridging the Gap Between Privacy, PCI DSS and Big Data Insight Mr. Ulf Mattsson 10 21 December 2013 Topic 1: Information Security Mr S.R. Balasubramanian Director Application Center of Excellence Oracle Director Technology Readiness. Oracle India Senior Specialist in the National Disaster Management Authority (NDMA) Founder, Principal Consultant at Technologics & Controls IBM India Country Manager & Senior Architect- Information Security at IBM India CTO, Protegrity, USA Consultant, IT Strategy and management. Topic 2 : Security in Indian Telecom Industry Mr. Pankaj Agrawal Independent consultant and Angel Investor 8