2005 San Francisco ISACA Fall Conference
Monday, September 26, 2005
Core Competencies
Information Security
Risk Management
In-Depth Technical
7:15 - 8:45
Registration and Breakfast
8:45 - 10:00
Keynote Address Everett C. Johnson, CPA International President of ISACA/ITGI, 2005-2006
10:00 - 10:15
Networking Break sponsored by Ernst & Young
10:15 - 11:45
Session C11 Intro to General Computer Controls Ed Byers / Rajeev Ramchandani
Session S11 Developing an Effective and Measurable Security Awareness Program Barak Engel
Session R11 IT Governance Policy Steven Romero
Session T1 Audit and Security of Unix Rodney Kocot
11:45 - 1:15
Lunch Speaker - Steve Wilkens of PricewaterhouseCoopers
1:15 - 2:45
Session C12 Auditing Application Systems Conny Cheng
Session S12 The Subversion Problem: Increasing IT Dependency Carries Unseen Pervasive Effects Bora Turan
Session R12 Risk Management Basics (COSO and ERM) Deborah Frazer
Session T1 Audit and Security of Unix (continued)
2:45 - 3:00
Networking Break sponsored by PricewaterhouseCoopers
3:00 - 4:30
Session C13 Intro to Security Auditing Christina Cheng
Session S13 Monitoring Strategies in Computer Operations Dave McCandless
Session R13 Current IT Audit Marketplace Drivers Lawrence Jewik
Tuesday, September 27, 2005
8:30 - 10:00
Session C21 Data Analysis - Leverage CAATs into Your Audits (Part 1) Sheryl Eberhardt / Duy Nguyen
Session S21 System Certification and Accreditation Mike Nelson
Session R21 Evolving from SDLC Auditing to Project Portfolio Monitoring John Putis
Session T2 Network Assessments and Audits Tabitha Gallo
Networking Break sponsored by KPMG
Session C22 Data Analysis - Leverage CAATs into Your Audits (Part 2) San Sri / Shawn Mattar
Session S22 Wireless Security: Understanding and Mitigating Risks Chad Kalmes
Session R22 Sustaining SOX Compliance via Continuous Monitoring Marta O'Shea
Session T2 Network Assessments and Audits (continued)
11:45 - 2:15
Exhibition Fair and Luncheon
2:15 - 3:45
Session C23 Business Continuity Management Neville Morcom / Kathleen McGrorty / Ianne Nagem
Session S23 Audit, Control and Protection of Mobil Computing Devices and Data Mary Van Zandt
Session R23 Auditing Mission Critical Offshoring Initiatives Bill Chan
3:45 - 4:00
Networking Break sponsored by Protiviti
4:00 - 5:30
Session C24 Intro to ERP Auditing Anna Tchernina / Steve Ossher
Session S24 Security Best Practices and Compliance: What You Need to Know Thomas Moore
Session R24 Business Impact Analysis Techniques Jon Bronson
6:00 - 9:00
30th Anniversary Gala
Wednesday, September 28, 2005
Session C31 Intro to Project Risk Management/SDLC Reviews Tania Adams / Steve Wakefield
Session S31 Identity and Access Management Tony Goulding
Session R31 Current Drivers of Business Contingency Planning Jill Bean
Session T3 Auditing Oracle Financials 11i Nicholas Ah Kun / Scott Lowry
Networking Break sponsored by Grant Thornton
Session C32 Change Management Steve Wakefield / Lynette Jones
Session S32 COBIT Fundamentals Nejat Aksoy
Session R32 AICPA Privacy Framework Doron Rotman
Session T3 Auditing Oracle Financials 11i (continued)
11:45 - 1:30
Lunch Speaker - Mike Shema of NT Objectives
1:30 - 3:00
Session C33 Software Quality Assurance/ Software Testing Suzanne Ravera / Lynette Jones
Session S33 Hacking Live: An Introductory Demonstration to Hacker Tools and Techniques Dan Henage
Session R33 SOX Compliance - Real World Experiences Tony Samer
> Download ZIP file of all Speaker Bio’s and Topic Summaries <