Session |
Topic / Speaker |
Presentation |
Mon |
Keynote Address
> Victor Nichols |
No |
C11 |
Introduction to General Computer Controls
> Ed Byers & Muna Sheikh |
Yes |
S11 |
Audit Risks and Issues for RFID
> Lionel Yee & Sagi Leizerov |
No |
E11 |
Internet's Impact on Financial Crime
> Wilbourne |
No |
T1 |
Audit and Security of Unix
> Rodney Kocot |
Yes |
C12 |
Auditing Application Systems
> Monica O'Reilly & Maria Shaw |
Yes |
S12 |
Control Implications of Outsourcing
> Mark Ludin |
No |
E12 |
Sarbanes-Oxley and Identity Management
> Ehab Dawoud |
Yes |
C13 |
Introduction to Security Auditing
> Carey Anne Carpenter & Monica O'Reilly |
Yes |
S13 |
Streamlining Security Audits
> Douglas Barbin |
Yes |
E13 |
Hacking: New Trends in Exploits and Vulnerabilities
> Brian Christian |
Yes |
C21 |
Data Analysis - Leverage CAATs in Your Audits
> Sheryl Eberhardt & Duy Nguyen |
Yes |
S21 |
AICPA/CICA Enterprise Wide Privacy Framework
> Doron Rotman |
Yes |
E21 |
Intrusion Detection and Intrusion Prevention
> Eugene Schultz |
Yes |
T2 |
Best Practice / Compliance: Network Audit Requirements
> David Flame & Thomas Moore |
No |
C22 |
Business Continuity Management
> Neville Morcom |
Yes |
S22 |
Federal Perspective on Info Security Governance
> Mike Nelson |
Yes |
Tue |
Lunch Topic: Sarbanes- Oxley
> Steven Wilkens |
No |
C23 |
IT Architectural Reviews
> San Sri & Shawn Mattar |
Yes |
E22 |
Regulatory Compliance, Response, and Technology
> Albert Barsocchini |
Yes |
C24 |
Intro to Project Risk Management / SDLC Reviews
> Greg Thomas & Stephen Madler |
Yes |
S23 |
Use of COBIT as a Risk Management Framework
> Lance Turcato |
Yes |
E23 |
Security Development: Applications and Infrastructure
> Himanshu Dwivedi |
Yes |
C31 |
Software Development Lifecycle
> Heather Stewart |
Yes |
S31 |
Personal and Corporate Identity Theft
> Chris Pick |
Yes |
E31 |
Threats of Tomorrow
> Eric Levin |
Yes |
T3 |
Auditing in a Windows Environment
> Nicholas Green |
Yes |
C32 |
Oracle Application Security and Controls
> Ellen Chan & Yogita Parulekar |
Yes |
S32 |
Web Services Risk, Controls, and Audit Implementations
> Ayan Roy |
Yes |
E32 |
Minimizing Operational Risks in IT Security Breaches
> Arthur Coleman |
Yes |
Wed |
Lunch Topic: OWASP
> Mark Curphey |
Yes |
S33 |
Introduction to Security Event Management
> Matthew Klunder |
Yes |
E33 |
Web Site Grey Box Testing
> Bob Grill |
Yes |
|
ZIP file of all Summary Documents (30MB) |
|