Welcome March, Greetings Fellow Cincinnati ISACA Members,

Similar documents
Welcome October, 2013 INSIDE THIS ISSUE. Jesse A. Hanford Greater Cincinnati ISACA President

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

2018 CALENDAR OF ACTIVITIES

Updated: 2014 January. Continuing Professional Education (CPE) Policy

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

(ISC) 2 CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES AND GUIDELINES

COBIT 5 Foundation Workshop

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

(ISC) 2 CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES AND GUIDELINES

Northeast Ohio Chapter Annual General Meeting

building for my Future 2013 Certification

The President s Message 3. ISACA Karachi Chapter Presentation Flyer 5. ISACA Karachi Chapter Presentation Report 6. ISACA Book Store Update 9

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

COURSE BROCHURE CISA TRAINING

The President s Message 3. ISACA Karachi Chapter AGM & Elections Members Event: Cloud Adoption & (Secaas) 11. ISACA Book Store Update 11

Monthly Meeting February 27, 2019

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES

Workshop description

Volume 2014, Number 4. Volunteers Needed!

Strengthening Capacity in Cyber Talent sans.org/cybertalent

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

ISACA International Perspective

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Building the Cybersecurity Workforce. November 2017

ISACA Enterprise. Solutions and Resources

Information Security Officer (ISO) Education

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

Training Opportunities

Les joies et les peines de la transformation numérique

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Career Paths In Cybersecurity

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

International Auditing and Assurance Standards Board (IAASB) International Federation of Accountants 545 Fifth Avenue, 14 th Floor New York, NY 10017

(ISC) 2 Continuing Professional Education (CPE) Handbook

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Professional Evaluation and Certification Board Frequently Asked Questions

IT Audit Essentials. Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

Security Program Design:

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

26 February Office of the Secretary Public Company Accounting Oversight Board 1666 K Street, NW Washington, DC

President's Letter. March Meeting Details: Date: Wednesday, March 15, 2006

Partnership Information

DATA CENTER DESIGN: CONSTRUCTION CONSIDERATIONS

Certification and Re-Certification Policies and Procedures

GUIDELINES FOR SUBMITTING CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS

Memphis Chapter. President s Message. This annual event is designed to provide students with a

2013 ISACA New Delhi Chapter All Rights Reserved

Business Process Design and Internal Audit UNIVERSITY OF TEXAS AT DALLAS Course Syllabus Spring 2005

2018 Government Professional Accounting Seminar

A United States Cyber Academy Program

Choosing the CGFM designation:

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com

Number of CPE Hours Required for CCSA, CFSA, CGAP, CRMA. Specialty Certification CPE Requirements. Required Attestations at Time of CPE Reporting

raining Meeting your training needs and CPE requirements opportunities April-June Group-Live Course Group Internet- Based Course

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course

MAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world

CERTIFICATION PROGRAM OF THE NORTH CAROLINA LOCAL GOVERNMENT BUDGET ASSOCIATION

Continuing Professional Education Policy: Requirements for Certification and Qualification Programs. (formerly known as Administrative Directive #4)

The Widening Talent Gap: The greatest security challenge of our time

Mohammad Shahadat Hossain

SAVE International Certification Program Transition Summary

Monthly Meeting November 16, 2016

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN

NEWS ISSUE # 26

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

A Global Look at IT Audit Best Practices

What is the CISSP? Certified Ethical Hacker v8 or higher Certified Forensic Computer Examiner (CFCE) Certified Fraud Examiner (CFE)

August Objectives. Agenda. Promoting Your Professional Development with ACMPE. Describe the foundation and value of certification and fellowship

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

ISACA Certifications Overview

INFORMATION SECURITY OFFICER (ISO) EDUCATION Securing Your Bank s Future. May 17, 2017 TBA Barrett Training Center Nashville, Tenn.

Position Description IT Auditor

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

ContinuingProfessionalEducation(CPE)Guide

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course

CONTINUING PROFESSIONAL DEVELOPMENT SCHEME (CPD) FOR AATSL MEMBERS

The fast track to top skills and top jobs in cyber. Guaranteed.

Application for Certification

Tim Kubu, CIA, CISA WMISACA President

IASA CONTINUING EDUCATION UNITS

CISA Training.

Recertification Handbook

Become a Certified Association Executive through the CAE Program

CFA CHARTER FINANCIAL ANALYST. The time is now to build a better tomorrow. IMA Educational Partner in KSA

American Society for Quality

Welcome to the Next Level Purchasing Association. Next Level Purchasing is absolutely delighted to have you as a member.

ISACA Survey Results. 27 April Ms. Nancy M. Morris, Secretary Securities and Exchange Commission 100 F Street NE Washington, DC

CFE Exam Review Course

Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY

Effective COBIT Learning Solutions Information package Corporate customers

Tim Heagarty, CISA CISSP - (859) Lexington, KY

Transcription:

March, 2014 Welcome INSIDE THIS ISSUE Welcome Message..1 Monthly Meeting 2 Membership News..3 Education...4 Job Opportunities...8 Editor s Corner 9 About Our Chapter..10 Greetings Fellow Cincinnati ISACA Members, Although Punxatawney Phil and Canada's Wiarton Willie both saw their shadow on February 2, I think the worst of winter is behind us. Come celebrate Spring with us in the next few months. We have a great lineup! Our March meeting features two University of Cincinnati Information Security professionals presenting on Network Hacking. With the recent data breaches in the retail industry, this is a meeting you don t want to miss. As our VP of Membership announced, we have a goal set for membership renewal for 2014 of 400 members. Mike has my full support in retaining our diverse membership community. If our goal is reached, we would like to hold a celebration. Read more about it here. Our Spring Seminar has been announced! It will be held May 8-9 at the Horseshoe Casino Cincinnati, a 16 CPE Event. The topics will be Threat Modeling: Finding Security Threats before They Happen and Big Data: How to Control (Not Fight) It. For more information and registration, click here. Jesse Hanford Chapter President WWW.ISACA-CINCINNATI.ORG

Monthly Meeting Paradigm Shift: Breaking away from your parent s approach to data security. Speakers: Emily Morgan and Bo Vykhovanyuk, UC IT Office of Information Security Date & Time: Tuesday, March 4, 2014, 5.30pm Location: The Original Montgomery Inn, Montgomery, OH Summary Not a day goes by without a data security breach being reported in the news. At first glance, many of these breaches appear to be no different than the last; however significant changes in the ways that attacks are being carried out, demonstrate that the traditional approaches to data security can no longer effectively keep up with the new threat environment. Adding insult to injury, many organizations are not well prepared to respond to the breach once occurred turning a bad situation into something worse. The goal of this presentation is to challenge the traditional approaches to data security and incident response readiness and to provide attendees with the information needed to ask the difficult questions to their organizations. About the Speakers Bogdan ( Bo ) Vykhovanyuk began his career with a Big-4 public accounting firm providing IT audit, security and other consulting services to Fortune 500 companies. In 2008, he started his tenure with the University of Cincinnati originally in an IT audit role, and later transitioned to the Office of Information Security as an Associate Director. In addition to his daily data security and compliance responsibilities, he enjoys teaching Network Security and Computer Forensics classes at UC. He is an active member and 2013 President for Ohio High Technology Crime Investigation Association (HTCIA). Bo s education includes Masters of Science in Management of Information Systems (MSIS) from Northern Kentucky University, and professional certifications including CISM, CRISC, CISA and CISSP. Emily Morgan has knowledge and expertise in all of the major functional areas of the department including Incident Response, Cyber Forensic Investigations, and Security Policy and Governance. In her current role as the Incident Response Manager, she is responsible for managing, responding to and investigating cyber incidents as well as managing all the digital forensic functions at the University. She is currently working toward her MBA with a concentration in international business from the UC Lindner College of Business, as well as serving as an Adjunct Faculty member at UC teaching Information Security and Assurance. Her professional certifications include CISM, CISSP, and GIAC GCIH (Certified Incident Handler). Cincinnati ISACA members and non-members can register by using this link. For those who prefer to pay at the door, please select that option when you register at the link above. Upcoming meetings Tuesday, April 1 st, 2014 Topic: Metrics that Matter-Security Risk Analytics Speaker: Rich Skinner, Brinqa Tuesday, May 6th, 2014 Topic: COBIT 5 Speaker: Veronica Sanford WWW.ISACA-CINCINNATI.ORG Page 2

Membership News We Cannot Celebrate Without YOU! A message from Mike Smith CISA, CRISC, VP of Membership... Fellow ISACA Cincinnati ISACA Members, As you know, ISACA International is currently conducting an annual renewal drive. We need your help. If you have renewed your 2014 membership, THANK YOU and we look forward to a continued partnership in 2014. If you have not renewed your ISACA membership for 2014, please take a moment to visit ISACA's Membership Page. This year, the Cincinnati Chapter set a renewal retention rate of 400 members (approximately 91%). Upon meeting our goal, we want to hold a special celebration. However, as the title says, We Cannot Celebrate Without You. Details of the celebration will be coming soon. We want to let you know that during the renewal drive, various communications are planned from both ISACA International and the Cincinnati Chapter. Did you know that the Cincinnati Chapter members have earned an impressive 384 industry recognized certifications and the numbers continue to increase each year? Whether you have earned or are working toward certification, our chapter has a tremendous wealth of knowledge and experience at each meeting and seminar. It is easy to see that all of our members are the reason our chapter is highly successful. Our greatest asset is our diverse membership community, and it shows at every event! We have a great lineup of seminars and meetings for 2014 with the opportunity to earn up to 36 CPEs annually. It has been our pleasure to serve you and we look forward to celebrating your continued partnership in 2014! WWW.ISACA-CINCINNATI.ORG Page 3

Spring Seminar Mark your calendar and register for this two-day seminar on Threat Modeling: Finding Security Threats Before They Happen and Big Data: How to Control (Not Fight) It. Earn 16 Continuing Professional Education (CPE) credits for this seminar. Date & Time: Topic: Speaker: Education May 8 th & 9 th, 2014, 8:30am-4:30pm Threat Modeling: Finding Security Threats Before They Happen and Big Data: How to Control (Not Fight) It Jeff Kalwerisky, CA, CISA, CPE Interactive Location: Horseshoe Casino: 1000 Broadway, Cincinnati, OH 45202 (Ph: 513-252-0777) Free Garage Parking is available with direct access to the casino. Breakfast and lunch will be provided on both days. Tuition: $425 for members of ISACA ($525 for non-members) until April 30, 2014 Overview: $525 for members of ISACA ($625 for non-members) after April 30, 2014 The ISACA Greater Cincinnati Chapter is helping to provide this training at a much reduced price; technical training from a comparable source is typically $1500 or more. To ensure an interactive and comprehensive course, space has been limited to 50 participants. This seminar will focus on: 1) The major classes of threats, building/documenting threat surfaces for applications and systems, and creating a database of the threat surface for the life of an application. Day One of the seminar will focus on Threat Modeling: Finding Security Threats Before They Happen 2) What is Big Data, who is using it, and how it differs from small data. Day Two of the seminar will focus on How to Control (Not Fight) Big Data. About the instructor: The instructor, Jeff Kalwerisky, CA, CISA, is Vice President and Director of Information Security and Technical Training for CPE Interactive. Jeff has specialized in information security, information risk management, and IT auditing for over 20 years and has held executive positions in information security and risk management with Accenture and Booz Allen Hamilton consulting firms. In both of these capacities, he has consulted with Fortune 100 companies and national governments, assisting in their development and deployment of enterprise security governance policies and frameworks, and technology solutions that strengthen information security and data privacy/protection. Jeff served as infrastructure security architect on the world s largest electronic health project on behalf of the British Government s National Health Service, the world s largest electronic medical records deployment project, where he developed security governance to oversee 1,500 software architects and developers. Jeff has published security and audit guides, and has developed training courses throughout the USA and internationally on a wide range of technical topics focusing on Windows security, secure e-commerce, IT auditing, cryptography, and biometric security. Registration: We welcome both members and non-members to the seminar. To register, or find out more details regarding the seminar visit here. Attendees will not be registered or have a guaranteed spot until payment is received. In case of cancellation, a fee of $100 will be applied to the refund if notification is received less than 15 days prior to the course to pay for non-refundable materials and venue costs. If you are unable to attend, an individual may attend in your place with communication of the substitution. For enrollment, questions, or cancellations, please send an email to Lei Zhao (lei.zhao@bankatfirst.com). WWW.ISACA-CINCINNATI.ORG Page 4

Education ISACA 2014 Certification The next opportunity to sit for an ISACA certification exam is June 14 2014. Registration is now open for the following exams: Certified Information Systems Auditor (CISA) Certified Information Systems Manager (CISM) Certified in the Governance of Enterprise IT (CGEIT) Certified in Risk and Information Systems Control (CRISC) Registration deadline is April 11, 2014 and the fees are as follows: Member Non-Member Online registrations $470 $650 Mailed/Faxed registrations $545 $725 To register or find out more details visit this link WWW.ISACA-CINCINNATI.ORG Page 5

Education COBIT 5 The latest edition of ISACA s globally accepted framework, COBIT has been released. COBIT provides an end-to-end business view of the governance of enterprise IT that reflects the central role of information and technology in creating value for enterprises. The principles, practices, analytical tools and models found in the latest edition -COBIT 5 embody thought leadership and guidance from business, IT and governance experts around the world. COBIT 5: Enabling Information is a reference guide that provides a structured way of thinking about information governance and management issues in any type of organization. This structure can be applied throughout the life cycle of information, from conception and design, through building information systems, securing information, using and providing assurance over information, and to the disposal of information. ISACA Members and Non-Members can purchase a hard copy or download the ebook at the following prices: ebook Format: Free to members only; Non-Members $135 Print Book Format: Members $35; Non-Members $135 Click on this link to download or purchase WWW.ISACA-CINCINNATI.ORG Page 6

Education How to Earn and Report CPE Did you know that ISACA certified members can earn up to 72 FREE CPEs per year! ISACA offers opportunities to earn CPE through participation in a variety of programs and events. Several of these choices are listed below with specific instructions. Webinars and Virtual Conferences: Up to 36 free CPEs per year. CPE quizzes are for members only. Journal quizzes: Earn one CPE for each of six journals per year. 6 FREE CPEs per year Serving as an ISACA Volunteer: Participate on an ISACA or ITGI board, committee, task force or as an officer of an ISACA chapter, and gain one CPE credit (up to 20 per year) for each hour of active participation. (Consult Qualifying Educational Activities for CISA, CISM, CGEIT and CRISC members.) 20 FREE CPEs per year Mentoring: Earn one CPE for each hour of mentoring efforts directly related to coaching, reviewing or assisting an individual with CISA/CISM/CGEIT/CRISC exam preparation or providing career guidance through the credentialing process. 10 FREE CPEs per year TOTAL Possible FREE CPEs for ISACA Certified Members: 72 FREE CPEs per year How to Report CPEs in your Profile CPEs are reported annually during the renewal process. CPEs earned in the current year may be entered in your profile once the next year s renewal period opens. Reporting of CPEs can be done online or by submitting the information on the annual renewal invoice. To update CPE hours through the ISACA website, log on using your personalized log in credentials and follow the steps below. Click on the MY ISACA tab at the top of the page Click on the MY CERTIFICATIONS tab Click on the EDIT MY CPE Hours link The CPE reporting is located on the My Demographic, Certification CPE and Other Information tab. Scroll to the bottom of the page to view and edit the appropriate CPE fields. If you do not see a CPE section, CPE hours are not being accepted or you are not required to report CPEs yet. Enter CPE hours then click SAVE at the bottom of the page For more information about the specific Continuing Professional Education (CPE) requirements for your certification, please see the following link. WWW.ISACA-CINCINNATI.ORG Page 7

Job Opportunities Company: Federal Home Loan Bank of Cincinnati Position: Information Security Analyst II Responsibilities: Provides high level security and technical guidance to identify and assist in establishing practices and system configurations that ensure the safety of information systems assets and protect information systems from intentional or inadvertent access or destruction. May develop, implement, and maintain enterprise, department or system information security policies, standards and procedures. Monitors and audits information systems activities and systems to confirm information security policy compliance and provides management with security policy compliance assessments and system monitoring reports. Identifies security vulnerabilities, associated risk, and mitigation strategies and provides recommendations to management. Requires daily interaction with PCs and terminals for majority of duties. Normal business office environment with little physical discomfort due to temperature, dust, or noise. Occasional exposure to moderate noise volume working in the Computer Room. Must be able to quickly respond to problems affecting system security, occasionally requiring work outside the Bank's normal business hours (i.e. weekends, evenings or early mornings). Qualifications: Bachelor s degree in Computer Science or Information Systems preferred, or equivalent work experience in a programming or technical environment. Five to eight years of experience in the field of information security. Strong working knowledge of information systems security standards and practices. Experience with security tools that perform vulnerability assessment and threat management, compliance reporting, security monitoring, and/or intrusion detection and prevention. Working knowledge of one or more of the following tools a plus: MBSA, McAfee Vulnerability Manager, Tripwire, IBM AppScan, McAfee epo, ControlPoint, Ecora, BigIP Application Security Manager, Snort, ActiveGuard. Working knowledge of three or more technologies (emphasis on security infrastructure): Microsoft Windows, IIS, SQL Server, SharePoint, UNIX, Cisco, Exchange. Experience with three or more: vulnerability assessments, penetration testing, intrusion detection/prevention, security monitoring, SQL database security, policy and procedure, Active Directory, cryptography/pki, system forensics, incident handling, application security assessments, risk assessments, security awareness, or related information security subject area. Possession of security certification(s): CISSP (highly preferred), SSCP, Security+, GSEC, MCSE, CISA, or CISM. How to Apply: Individuals who are interested and feel they meet the qualifications for this can do so at the URL below https://home2.eease.adp.com/recruit/?id=10151912 WWW.ISACA-CINCINNATI.ORG Page 8

Editor s Corner I hope you have enjoyed reading this newsletter. Please continue to send me your job postings and help bring jobs and job seekers together by promoting opportunities at your organization; your fellow ISACA members will appreciate it. Email me at buky.thorpe@gmail.com and the Webmaster at andrew.selig@53.com with the details of any job opportunities you are aware of. Please note that positions may have been filled or new positions added prior to the newsletter publication, so always see our website for any updates and for complete details. As always, I would like to hear from any member that is willing to write a brief article for the newsletter that would be of interest to fellow members. Some examples of articles/content include: 1. A description of a productive or cost-saving audit/security technique that your organization uses 2. Your take and/or opinion on the latest PCAOB standard/update 3. A review of an audit/security tool used by your organization 4. A review of a book that you have read recently that has helped you do your job better 5. Tips and techniques for auditing/securing a particular risk area 6. A summary of an emerging technology being used in your organization and how you are controlling it 7. Live or virtual opportunities to earn CPE credits. The articles or content can be sent to buky.thorpe@gmail.com. Finally, you can also reach out to me to let me know what you think of the newsletter; What do you like? What don t you like so much? What other content would you like to see in the newsletter? I would love to hear from you. Thank you, Buky Thorpe WWW.ISACA-CINCINNATI.ORG Page 9

About Our Chapter Founded in 1973, the Greater Cincinnati ISACA Chapter is a not-for-profit professional organization serving IT Audit, Risk, Security, and Governance professionals in the Greater Cincinnati market. The chapter consists of over 450 professionals that represent a diverse mix of public, private, and not-for-profit business sectors at all levels within those industries. Members of the Greater Cincinnati ISACA Chapter have the opportunity to earn 36 CPE hours annually through various events and seminars. The greatest asset to the Greater Cincinnati ISACA Chapter is its membership community. Purpose To promote the education of individuals for the improvement and development of their capabilities relating to IT Audit, Security, Risk, and Governance in the field of Information Technology audit and control. Please visit the chapter website at www.isaca-cincinnati.org to learn more. Connect with other chapter members by joining the Greater Cincinnati ISACA LinkedIn group. Visit www.isaca.org to learn more about the organization. WWW.ISACA-CINCINNATI.ORG Page 10