2010 SF ISACA FALL CONFERENCE
Click here to download a zip file of all Presentations
Click here to download a zip file of all Speaker Bios
Core Competencies Track |
||
C11/12 - Introduction to IT Auditing |
Presentation | Speaker Bio |
C13 - Current Threats and Countermeasures - 2010 |
Presentation | Speaker Bio |
C21 - Introduction to Change Management and SDLC |
Presentation | Speaker Bio |
C22 - SAS 70 Practices and Developments |
Presentation | Speaker Bio |
C23 - Segregation of Duties: What's the Risk and What Do We Do About It? |
Presentation | Speaker Bio |
C24 - Three Mock Trials: Summary |
Presentation | Speaker Bio |
C31 - Introduction to Application Controls / Auditing IT System Configurations |
Presentation | Speaker Bio |
C32 - GRC (Pro)(Con)Fusion - Tools, Processes and Pitfalls |
Presentation | Speaker Bio |
C33 - Accelerating System Development: IT Audit Fieldwork Using Visual Constructs |
Presentation | Speaker Bio |
Governance, Risk & Compliance Track |
||
G11 - Convergence of Security and Compliance - An Integrated Approach to Information Risk Management |
Presentation | Speaker Bio |
G12 - Putting Teeth Into Your Privacy Compliance |
Presentation | Speaker Bio |
G13 - Is Network Security Dead or Obsolete? |
Presentation | Speaker Bio |
G21 - HIPAA, HITECH, and Latest Trends |
Presentation | Speaker Bio |
G22 - IFRS Conversion: More than an Accounting Change |
Presentation | Speaker Bio |
G23 - Unified IT Compliance |
Presentation | Speaker Bio |
G24 - Audits of Controls at a Service Organization: New Standards SSAE 16 and ISAE 3402 |
Presentation | Speaker Bio |
G31 - Encryption and Key Management |
Presentation | Speaker Bio |
G32 - PCAOB Latest Trends |
Presentation | Speaker Bio |
G33 - "Enterprise Information Security Compliance" and "Outsourcing Security Compliance per ISO 27001/2 Standards |
Presentation | Speaker Bio |
Professional Techniques Track |
||
T11 - Incident Response Clinic |
Presentation | Speaker Bio |
T12 - Virtualization - Security and Audit Perspective |
Presentation | Speaker Bio |
T13 - Compliance in the Cloud |
Presentation | Speaker Bio |
T21 - Windows 7, Vista and Server 2008 R2 |
Presentation | Speaker Bio |
T22 - Overview and Current Trends with ITIL |
Presentation | Speaker Bio |
T23 - Using Risk Portfolio Management and Self-Assessments to Mitigate Risk |
Presentation | Speaker Bio |
T24 - The Anatomy of a Data Breach |
Not yet available | Speaker Bio |
T31 - Before, During and After Outsourcing |
Presentation | Speaker Bio |
T32 - Visa's Strategy to Secure Payment System |
Presentation | Speaker Bio |
T33 - Addressing Botnets via Continuous Security Monitoring Models |
Presentation | Speaker Bio |
Professional Strategies Track |
||
S11 - Conducting Enterprise-Wide IT Risk Assessments |
Presentation | Speaker Bio |
S12 - CASE STUDY - Medical Identity Theft and Red Flag Rules: The Health Plan Perspective |
Presentation | Speaker Bio |
S13 - Hallmarks of a Strong Audit Function |
Presentation | Speaker Bio |
S21 - Top Industry Trends Panel Discussion |
Not yet available | Speaker Bio |
S22 - Implementing Risk Management Framework Within a Technology Organization |
Presentation | Speaker Bio |
S23 - You Have Been Hacked, But Where's the Evidence? A Quick Intro to Digital Forensics |
Presentation | Speaker Bio |
S24 - Value Management Governance |
Presentation | Speaker Bio |
S31/S32 - Strategies for Sustained Career Success: Lessons Learned from the Boom and Bust Economy of the New Millennium |
Presentation | Speaker Bio |
S33 - How to Take Control of Your Job Search |
Presentation | Speaker Bio |
In-Depth Seminars Track |
||
D1 - Database Activity Scanning and Monitoring |
Presentation | Speaker Bio |
D2 - Mobile Phone Security Risk: The Monkey Steals the Berries |
Presentation | Speaker Bio |
D3 - Enabling Technology to Automate GRC |
Not yet available | Speaker Bio |
Keynote/Luncheon Sessions |
||
O1 - Keynote - Brett Wahlin (CSO of McAffe) |
Not yet available | Speaker Bio |
O2 - Realising Business Benefits from an IT Management Framework |
Presentation | Speaker Bio |
O4 - Application Risk Management - Matt Moynahan (CEO of Veracode) |
Not yet available | Speaker Bio |
Thank you to our Sponsors!!
Click here to go to the 2009 Conference Page
Click here to go to the 2008 Conference Page
Click here to go to the 2007 Conference Page
Click here to go to the 2006 Conference Page
Click here to go to the 2005 Conference Page
Click here to go to the 2004 Conference Page