2011 SF ISACA FALL CONFERENCE
Download a zip file of all Presentations here
Download a zip file of all Speaker Bios/Session Abstracts here
Core Competencies Track |
||
C11 - Introduction to IT Auditing For The Non-IT Auditor (part 1) |
PRESENTATION HANDOUTS |
Speaker Bio |
C12 - Introduction to IT Auditing For The Non-IT Auditor (part 2) |
Speaker Bio | |
C13 - Introduction to SDLC and Change Management |
PRESENTATION | Speaker Bio |
C21 - Introduction to User Access Control & Management |
PRESENTATION | Speaker Bio |
C22 - Introduction to Advanced Security Threats |
PRESENTATION | Speaker Bio |
C23 - Understanding and Evaluating SOC Reports (The New SAS-70) |
PRESENTATION | Speaker Bio |
C24 - Introduction to Segregation of Duties |
PRESENTATION | Speaker Bio |
C31 - Automated Controls 101 |
PRESENTATION | Speaker Bio |
C32 - Introduction to Auditing Outsourced Processes and Services |
PRESENTATION | Speaker Bio |
C33 - IT Governance Isn’t One Thing, It’s Everything |
PRESENTATION | Speaker Bio |
Governance, Risk & Compliance Track |
||
G11 - Security Incident Response Panel |
N/A (panel session) | Speaker Bio |
G12 - Implementation to Business Value: An ISO 27001 Journey at McKesson |
PRESENTATION | Speaker Bio |
G13 - Using the NIST Risk Management Framework in your Enterprise |
PRESENTATION | Speaker Bio |
G21 - Issues and Trends for Electronic Medical Records |
PRESENTATION | Speaker Bio |
G22 - Understanding & Securing Electronic Medical Records Panel |
N/A (panel session) | Speaker Bio |
G23 - HIPAA/HITECH: Lessons Learned: Hard Data from 300 Breaches |
PRESENTATION | Speaker Bio |
G24 - Responding to a Data Breach and its Impact |
PRESENTATION | Speaker Bio |
G31 - Detecting and Preventing Fraud |
PRESENTATION | Speaker Bio |
G32 - The Influence of Social Media, WikiLeaks and Whistleblowers Upon The Future of IT Auditing: An Introductory Landscape |
PRESENTATION PRESENTATION |
Speaker Bio |
G33 - The Future of Information |
PRESENTATION | Speaker Bio |
Professional Techniques Track |
||
P11 - Medical Identity Theft: The Health Plan Perspective |
PRESENTATION | Speaker Bio |
P12 - GRC – Ecosystem in the Cloud |
PRESENTATION | Speaker Bio |
P13 - Leveraging Active Directory to Secure and Audit Access to Non-Windows Systems |
PRESENTATION | Speaker Bio |
P21 - Service Organization Control (SOC) Reports – Overview and Considerations |
PRESENTATION | Speaker Bio |
P22 - Top Risks in an IT Environment |
PRESENTATION | Speaker Bio |
P23 - IT Audit Tests with ACL |
PRESENTATION HANDOUT |
Speaker Bio |
P24 - Best Practices for Data Access |
PRESENTATION | Speaker Bio |
P31 - Who Owns SoD? |
PRESENTATION | Speaker Bio |
P32 - Moving Your Company into the Cloud |
PRESENTATION | Speaker Bio |
P33 - Building an Effective Cloud Security Program |
PRESENTATION | Speaker Bio |
Professional Strategies Track |
||
S11 - Introduction to COBIT with Update on COBIT 5.0 Development |
PRESENTATION | Speaker Bio |
S12 - Implementing COBIT In Your Organization |
PRESENTATION | Speaker Bio |
S13 - Adding Value Through Integrated Audits |
PRESENTATION | Speaker Bio |
S21 - Secure Coding Standards and Procedures |
PRESENTATION | Speaker Bio |
S22 - Mobile Computing: Risks, Evolution, Governance...Oh My! |
N/A (panel session) | Speaker Bio |
S23 - Securing and Auditing Private and Hybrid Cloud Applications |
PRESENTATION | Speaker Bio |
S24 - Virtualization Security from the Auditor Perspective |
PRESENTATION | Speaker Bio |
S31 - The Future of Identity Management – A Hybrid Architecture |
PRESENTATION | Speaker Bio |
S32 - Visa’s Payment System Risk Strategy and Global Data Compromise Trends |
Not yet available | Speaker Bio |
S33 - Rethink PCI Compliance: Shifting to a Life Cycle Management Approach |
PRESENTATION | Speaker Bio |
In-Depth Seminars Track |
||
T1 - Auditing *NIX Servers and Databases - an Interactive Session |
PRESENTATION | Speaker Bio |
T2 - Risks & Controls In Cloud Computing |
PRESENTATION 1 PRESENTATION 2 PRESENTATION 4 |
Speaker Bio |
T3 - Auditing Oracle Financials |
PRESENTATION | Speaker Bio |
Keynote/Luncheon Sessions |
||
Keynote: Bruce W. McConnell, Senior Counselor and Director, Cyber+Strategy, National Protection and Programs Directorate (NPPD), U.S. Department of Homeland Security - "How Do We Secure Cyberspace: The DHS Perspective" |
N/A | Speaker Bio |
Monday Luncheon Session: Dave Cullinane, CISO & VP, eBay Global Fraud, Risk & Security |
Not yet available | Speaker Bio |
Wednesday Luncheon Session: Kenneth DeJarnette - Principal, Deloitte "The Future of Security – Evolve or Die" |
PRESENTATION | Speaker Bio |
Photos from the 2011 Conference
Click here to go to the 2010 Conference Page
Click here to go to the 2009 Conference Page
Click here to go to the 2008 Conference Page
Click here to go to the 2007 Conference Page
Click here to go to the 2006 Conference Page
Click here to go to the 2005 Conference Page
Click here to go to the 2004 Conference Page