WELCOME TO ISACA Claudio CILLI, CISA, CISM, CRISC, CGEIT

Similar documents
ISACA MADRID DECEMBER Robert E Stroud CEGIT CRISC International President December 2014

ISACA Enterprise. Solutions and Resources

ISACA International Perspective

BRING EXPERT TRAINING TO YOUR WORKPLACE.

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers

2018 CALENDAR OF ACTIVITIES

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

Effective COBIT Learning Solutions Information package Corporate customers

building for my Future 2013 Certification

TRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I.

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA 2017 OVERVIEW. 3º Fórum IBGP de Tecnologias da Informação. Paulo Henrique Abreu Moreira. Brasília Chapter Associate & CSX Director 08/11/2017

COURSE BROCHURE CISA TRAINING

Invest in. ISACA-certified professionals, see the. rewards.

The President s Message 3. ISACA Karachi Chapter Presentation Flyer 5. ISACA Karachi Chapter Presentation Report 6. ISACA Book Store Update 9

ROI for Your Enterprise Through ISACA A global IS association helping members achieve organisational success.

A Global Look at IT Audit Best Practices

Implementation PREVIEW VERSION

Hearing Voices: The Cybersecurity Pro s View of the Profession

แนวทางการพ ฒนา Information Security Professional ในประเทศไทย

Driving Global Resilience

ISACA Survey Results. 27 April Ms. Nancy M. Morris, Secretary Securities and Exchange Commission 100 F Street NE Washington, DC

Learn How to Increase the Awareness of Risk Management at Your Enterprise

Cloud Security Alliance Quantum-safe Security Working Group

Report of the Nominating Committee

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA

Les joies et les peines de la transformation numérique

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Barcelona October, 2012

Training + Information Sharing: Pillars of enhancing cybersecurity posture

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Top Business/Technology Issues Survey 2011

AEA. Washington, DC July 15, Birgit Hartje Program Manager. 8 New England Executive Park Burlington, MA USA.

CYBERSECURITY NEXUSTM (CSX) The Premier Source For Cyber Security Knowledge and Expertise

26 February Office of the Secretary Public Company Accounting Oversight Board 1666 K Street, NW Washington, DC

ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

Data Security Standards

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway.

Volume 2014, Number 4. Volunteers Needed!

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS

DUNS CAGE 5T5C3

International Auditing and Assurance Standards Board (IAASB) International Federation of Accountants 545 Fifth Avenue, 14 th Floor New York, NY 10017

Expand Your Cyber Expertise. Secure Your Future.

COPYRIGHTED MATERIAL. Index

The President s Message 3. ISACA Karachi Chapter AGM & Elections Members Event: Cloud Adoption & (Secaas) 11. ISACA Book Store Update 11

Workshop description

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Workforce Development Training Curriculum & Management Program

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

A Controls Factory Approach To Building a Cyber Security Program Based on the NIST Cybersecurity Framework (NCSF)

Risk Advisory Academy Training Brochure

CISCO NETWORKING ACADEMY CASE STUDY

Certified in the Governance of Enterprise IT Training - Brochure

ITIL Intermediate Continual Service Improvement (CSI) Certification Boot Camp - Brochure

The Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation. ISACA All Rights Reserved.

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Digital Transformation (Dx) Enterprise Training Curriculum

354 & Index Board of Directors Responsibilities Audit Committee and Risk Committee Coordination, 244 Audit Committee Functions and Responsibilities, 2

Spring Education Conference. Securing the Organization (Ensuring Trustworthy Systems)

Cybersafety Culture Assessment

SPONSORSHIP PROSPECTUS CONNECT WITH YOUR TARGET AUDIENCE

Brink s Modern Internal Auditing. Eighth Edition

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

COBIT 5 Foundation Workshop

Risk Based IT Auditing Master Class. Unlocking your World to a Sea of Opportunities

2014 IT Risk/Reward Barometer United States Results. November Number of respondents (n) = 452

General Data Protection Regulation (GDPR): Securing Data, Leading with both Legal and Technical Expertise

Fostering Competitiveness, Growth and Jobs. Wrocław, Poland, 15 October 2014

IS Audit and Assurance Guideline 2002 Organisational Independence

Assurance through the ISO27002 Standard and the US NIST Cybersecurity Framework. Keith Price Principal Consultant

Predstavenie štandardu ISO/IEC 27005

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA

itsm003 v.3.0 NISTCSF.COM NICE Training Curriculum & Workforce Planning Program

CISA Training.

World Broadcasting Unions Cyber Security Recommendations

A Controls Factory Approach To Operationalizing a Cyber Security Program Based on the NIST Cybersecurity Framework

ISACA January 2016 Cybersecurity Snapshot US Results. Number of respondents (n) = 862

SOC for cybersecurity

ISSP Sustainability Professional Credentials UPDATE: March 20, 2019

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Cyber Security and Cyber Fraud

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

Drive Your Career Forward IIA Certifications and Qualifications

First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh.

Updated: 2014 January. Continuing Professional Education (CPE) Policy

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

Security as a Service (Implementation Guides) Research Sponsorship

Implementing ITIL v3 Service Lifecycle

IS305 Managing Risk in Information Systems [Onsite and Online]

Certified Information Security Manager (CISM) Course Overview

Certified in Risk and Information Systems ControlTM Certification Training - Brochure

Expand Your Cyber Expertise. Secure Your Future.

Transcription:

WELCOME TO ISACA 2015 Claudio CILLI, CISA, CISM, CRISC, CGEIT cilli@di.uniroma1.it http://dsi.uniroma1.it/~cilli

WHO IS ISACA?

ABOUT ISACA The trusted source of guidance, networking and career development for professionals working in cybersecurity, assurance, risk management, privacy and IT governance Nonprofit professional association More than 140,000 professionals in 180 countries Provider of knowledge and tools to assure trust in a dynamically changing digital world World-renowned certifications

ISACA CHAPTERS International Headquarters Office in Chicago 200+ Chapters Worldwide Chapters provide: Access to affordable local continuing education Networking with professional peers Opportunity to make a positive impact on the local business community and the profession Information exchange opportunities through chapter meetings Leadership experience on local boards and committees

ISACA ACTIVITIES Cybersecurity Nexus, offering credentials, training and guidance for cybersecurity professionals and their organizations Advances and validates business-critical skills and knowledge through globally respected certifications and certificates Conferences, training and education, including face-to-face events, training weeks, webinars, virtual conferences and onsite training COBIT, a business framework that helps enterprises govern and manage their information and technology IS auditing standards and guidelines Periodicals, including the peer-reviewed ISACA Journal Research and publications, including guidance, frameworks, white papers, surveys

CYBERSECURITY NEXUS (CSX) ISACA launched CSX to help address the growing worldwide cybersecurity skills crisis. CSX fills an unmet need for a single, central location where security professionals and their enterprises can find cybersecurity research, guidance, certificates and certifications, education, mentoring and community. CSX offers: CSX 2015, Washington DC, USA, 19-21 October 2015 Cybersecurity Fundamentals Certificate (including workshop and study guide) Certifications, including Certified Information Security Manager (CISM) European Cybersecurity Implementation Series Implementing the NIST Cybersecurity Framework Advanced Persistent Threat Awareness Study Results 83% believe cyberattacks are one of the top three threats facing organizations today 86% say there is a global shortage of skilled cybersecurity professionals Only 38% feel prepared to fend off a sophisticated attack* * 2015 Global Cybersecurity Status Report, ISACA

ISACA CERTIFICATIONS provide assurance by conducting audits and assessments of information systems oversee, direct and manage information security activities define, establish, maintain and manage a framework of governance over IT identify, evaluate and manage risk through the development, implementation and maintenance of information systems controls

CONFERENCES AND TRAINING Asia-Pacific Computer Audit, Control and Security (CACS) EuroCACS Latin America CACS North America CACS COBIT Conference CSX 2015 North America www.isaca.org/conferences

COBIT 5 AND OTHER ISACA RESEARCH

COBIT 5 www.isaca.org/cobit Framework for the governance and management of enterprise IT Leverages proven practices, global thought leadership and ground-breaking tools to inspire IT innovation and fuel business success COBIT ONLINE cobitonline.isaca.org Get timely content from ISACA and external sources covering the top issues and factors facing the industry, as well as ISACA exclusive white papers. Customize the Automated Goals Cascade and RACI Planner tool for your organization or clients. COBIT RECOGNITIONS COBIT 5 is included as an informative reference in the core of the US Cybersecurity Framework. COBIT is recognized by the Information Technology Department of the Government of Kerala (India) as the standard for IT governance representing its national e-governance plan. COBIT is accepted by His Highness Rulers Court (HHRC) Financial Audit Department (Supreme Audit Institution of Dubai) as its IT governance framework and is used in within all government organizations. COBIT is recognized and its use promoted or required by the Banking Regulator in Brazil, Colombia, Costa Rica, Mexico, Paraguay, Uruguay and Venezuela.

COBIT CASE STUDIES Energy company Ecopetrol S.A. knew it needed a clear approach for governance and management of IT services as well as best global reference standards and a framework, so it used the COSO and COBIT frameworks, which helped consolidate strong IT governance practices that were totally aligned with the corporative internal control initiatives. IESO used COBIT 5 for the procurement of IT services, helping to accelerate the procurement process and improve the contract and how it is managed. An early adopter of COBIT 4.1, HDFC integrated the seven enablers introduced by COBIT 5. Maitland has found that the governance principles in COBIT are universally applicable not exclusive to the ICT domain and is in the process of applying them enterprisewide.

ISACA SURVEYS IT Risk/Reward Barometer www.isaca.org/risk-reward-barometer The annual IT Risk/Reward Barometer polls thousands of business and IT professionals and consumers worldwide to uncover attitudes and behaviors about essential technologies and information, and the trade-offs people make to balance risk and reward. 2015 Global Cybersecurity Status Report www.isaca.org/cybersecurityreport ISACA conducted the 2015 Global Cybersecurity Status Report in January 2015 to obtain real-time insights on cybersecurity threats, skills gaps and plans outlined in US President Barack Obama s cybersecurity address. 2014 Risk/Reward Barometer: A global look at the benefits and challenges of the Internet of Things

OTHER ISACA RESEARCH Audit programs COBIT 5 audit programs, PII, BYOD, software assurance, identify management, biometrics and many other topics White papers Topics such as Internet of Things, DevOps, cloud adoption and ROI, business continuity management, VDI, incident management, APTs, big data Books Cybersecurity, IT contol objectives for Sarbanes-Oxley, cloud security, SOC 2, Oracle PeopleSoft Surveys Cloud computing market maturity (with CSA), APT awareness Model curricula For information systems audit and control and information security management

ISACA Capitolo di Roma Via del Poggio Laurentino, 118 00144 Roma Phone: +39.06.5455.0588 Fax: +39.06.592.0924 Email: info@isacaroma.it Web Site: www.isacaroma.it