2012 SF ISACA FALL CONFERENCE
Download a zip file of all Presentations here
Download a zip file of all Speaker Bios/Session Abstracts here
Core Competencies Track |
||
C11 - Introduction to IT Auditing (part 1) |
PRESENTATION HANDOUTS |
Speaker Bio |
C12 - Introduction to IT Auditing (part 2) |
Speaker Bio | |
C13 - Introduction to Change Management and SDLC |
PRESENTATION | Speaker Bio |
C21 - IT Governance Isn’t One Thing – It’s Everything! |
PRESENTATION | Speaker Bio |
C22 - Introduction to Advanced Security Threats |
PRESENTATION | Speaker Bio |
C23 - Risk Management in Role-Based Applications, Segregation of Duties in Oracle |
PRESENTATION | Speaker Bio |
C24 - Designing and Operationalizing Corporate GRC Infrastructure - Challenges, Tools and Strategies |
PRESENTATION | Speaker Bio |
C31 - Introduction to COBIT & COSO |
PRESENTATION | Speaker Bio |
C32 - By Design, not Afterthought! – A Case Study in Embedding Security & Compliance into IT Services |
PRESENTATION | Speaker Bio |
C33 - Automated Controls 101 |
PRESENTATION | Speaker Bio |
Governance, Risk & Compliance Track |
||
G11 - The Future of the Advanced Security Operations Center (SOC) |
PRESENTATION | Speaker Bio |
G12 - Habits of Highly Effective Security Awareness Programs |
PRESENTATION | Speaker Bio |
G13 - HIPAA Security Rule Compliance – Lessons from the Front Line |
PRESENTATION | Speaker Bio |
G21 - Visa's Payment System and Authentication Strategy |
Not yet available | Speaker Bio |
G22 - COBIT 5 Process Assessment Model (PAM) |
PRESENTATION | Speaker Bio |
G23 - Quantifying Risks and Controls - Methods that Work and Methods that Don't |
PRESENTATION | Speaker Bio |
G24 - What You Can Learn from Bad Guys and Hackers About Cracking Passwords |
PRESENTATION | Speaker Bio |
G31 - The ABCs of Business Continuity Planning |
PRESENTATION | Speaker Bio |
G32 - Creating an Information Risk Intelligent Enterprise |
PRESENTATION |
Speaker Bio |
G33 - An IT GRC Leadership Discussion on Program Evolution Considerations |
PRESENTATION | Speaker Bio |
Professional Techniques Track |
||
T11 - Briefing on Identity Theft, Cybersecurity and Foreign Espionage |
Not yet available | Speaker Bio |
T12 - Big Data in Action - Predictive Risk Analytics Solution for Airport Security |
PRESENTATION | Speaker Bio |
T13 - Achieving a Trusted Cloud |
PRESENTATION | Speaker Bio |
T21 - Virtualize More While Improving Your Risk Posture – The 4 “Must Haves” of Virtualization Security |
PRESENTATION | Speaker Bio |
T22 - How to Survive an Audit |
PRESENTATION | Speaker Bio |
T23 - Mobile Security / Mobile Payments |
PRESENTATION |
Speaker Bio |
T24 - In(sta)Security - Managing the BYOD Risk |
PRESENTATION | Speaker Bio |
T31 - A Love Affair - Cyber Security, Big Data, and Risk |
PRESENTATION | Speaker Bio |
T32 - Information Privacy Panel - Balancing Trust In, and Value From, Personal Data |
PRESENTATION | Speaker Bio |
T33 - Accelerating System Development – IT Audit Fieldwork Using Visual Constructs |
PRESENTATION | Speaker Bio |
Professional Strategies Track |
||
S11 -The Impact of Social Media on Information Security and Assurance |
PRESENTATION | Speaker Bio |
S12 - Hacking in 2022 – Security in a Post-Scarcity Internet |
PRESENTATION | Speaker Bio |
S13 - Maintaining Compliance with Your Service Providers |
PRESENTATION | Speaker Bio |
S21 - Panel – What Keeps CISOs Up at Night? |
N/A (panel session) | Speaker Bio |
S22 - IT Audit Director Roundtable |
N/A (panel session) | Speaker Bio |
S23 - Risk - Security's New Compliance |
PRESENTATION | Speaker Bio |
S24 - Audit Considerations for Outsourced Relationships |
PRESENTATION | Speaker Bio |
S31 - Career Survival Guide - Keeping Your Head Above Water While Swimming with the Sharks |
PRESENTATION | Speaker Bio |
S32 - Audit Capabilities - Beyond Checklists |
PRESENTATION | Speaker Bio |
S33 - Managing Cost, Coverage and Capacity in IT Audit |
PRESENTATION | Speaker Bio |
In-Depth Seminars Track |
||
D1 - Road to Governance and Compliance in the Cloud |
PRESENTATION 1 PRESENTATION 2 PRESENTATION 3 |
Speaker Bio |
D2 - Electronic Medical Records |
PRESENTATION 1 PRESENTATION 2 PRESENTATION 3&4 |
Speaker Bio |
D3 - Wireless Hacking - A Hands On Workshop |
PRESENTATION | Speaker Bio |
Keynote/Luncheon Sessions |
||
Friending Your Life Away |
Not yet available | Speaker Bio |
Business Context: Key for Successful Risk Management |
PRESENTATION | Speaker Bio |
SOC 1, SOC 2, SOC 3 -- Forget About Running Out of Oil, I’m Worried About the World Running Out of Acronyms |
PRESENTATION | Speaker Bio |
Photos from the 2011 Conference
Click here to go to the 2011 Conference Page
Click here to go to the 2010 Conference Page
Click here to go to the 2009 Conference Page
Click here to go to the 2008 Conference Page
Click here to go to the 2007 Conference Page
Click here to go to the 2006 Conference Page
Click here to go to the 2005 Conference Page
Click here to go to the 2004 Conference Page