2013 SF ISACA FALL CONFERENCE

Download a zip file of all Presentations here

Download a zip file of all Speaker Bios/Session Abstracts here

See the Conference Summary page here

Core Competencies Track
PRESENTATION
BIO/ABSTRACT
C11 - Intro to IT Auditing for Non-IT Auditors (Part 1)

Presentation
Handouts

C12 - Intro to IT Auditing for Non-IT Auditors (Part 2)
C13 - SOC Reporting vs. ISO 27001 Certification
C21 - Role of Internal Audit in Transformational Organization Change
C22 - If It’s not a Business Initiative, It’s not COBIT 5
C23 - Using CAATs for Risk Reduction and Project Efficiencies
C24 - Security Essentials
C31 - IT Governance Isn’t One Thing — It’s Everything!
C32 - Risk and Control Considerations for Outsourced IT Operations
C33 - Policy and Compliance Management — The Next Generation of Policy and Compliance Programs
Governance, Risk & Compliance Track
PRESENTATION
BIO/ABSTRACT
G11 - Virtualize More While Improving Your Risk Posture - The 4 "Must Haves" of Virtualization Security
G12 - Building a Risk Assessment Process from the Ground Up
G13 - Approaches to Meeting Enterprise eDiscovery and ESI Challenges
Will be posted when available
G21 - Issues, Challenges and Practical Approaches to IT Security Risk Metrics and Reporting

Presentation
Handouts1

Handouts2

G22 - Optimizing Capability Maturity for Application Security in the Software Development Lifecycle
G23 - Vendor security and Compliance — Shaking, Rebuilding and Retrofitting
Will be posted when available
G24 - What Audits Miss and How Penetration Testers Abuse Those Gaps
G31 - Agile Risk Management — 30 Practical IT Security Evaluation Methods for IT Governance and Audit Professionals
G32 - A web-application architecture for Secure Cloud Computing
G33 - Creating Value for Management Through ERM
Professional Techniques Track
PRESENTATION
BIO/ABSTRACT
T11 - COBIT 5 Deep Dive
T12 - Increasing ROI from Outsourcing and Other Third Party Relationships
T13 - Shining the Light on Flashlight and the Security of Thousands of Mobile Apps
T21 - Cyber Security Incident Management — Fighting Fire with Fire…
T22 - Enhancing Vendor Risk and Compliance Management Using SOC2 and SOC3 Reports
Will be posted when available
T23 - Digital Forensic Techniques
T24 - Hybrid and Private Clouds and What it Means to the Auditor
T31 - Software Asset Management — Is Your Company Prepared for a Software Audit?
T32 - Active Defense 2013
T33 - Data Analytics and Data Access: Best Practices
Professional Strategies Track
PRESENTATION
BIO/ABSTRACT
S11 - Privacy and Security Convergence
N/A (panel session)
S12 - Strategies for Managing Risks in the Cloud
S13 - Creating an Effective Fraud Awareness Program
S21 - Strategies for Integrating the HIPAA Security Rule
S22 - Medical Identity Fraud
S23 - Realities of Being PCI Compliant
S24 - Who is Watching the Code?
Will be posted when available
S31 - Understanding Cryptography and Auditing Public Key Infrastructures
S32 - BCP Strategies in a Cloud Environment
S33 - Cyber Risk — What it Actually Means and How to Ignore the Buzz
In-Depth Seminars Track
PRESENTATION
BIO/ABSTRACT
D11 - Mobile Device Security Risks and Remediation Approaches
D12 - Lesson Learned from the First Generation of Mobile Enterprise Apps
Not available
D13 - Secure Mobile Architecture for Enterprise Mobility and BYOD
D21 - Auditing Big Data for Privacy, Security and Compliance
D22 - #HeavyD — Stopping Malicious Attacks Against Data Mining and Machine Learning
D23 - The Prism of Uncertainty and Big Data
D24 - Cyber Security, Big Data and Risk
D31 - Understanding ERP Architectures, Security and Risk
D32 - ERP Security Risks and Auditing
Not available
D33 - Cloud Based ERP, Security and Risks
Will be posted when available
Not available
Keynote/Luncheon Sessions
PRESENTATION
BIO/ABSTRACT
O1 - General Session & Keynote Address- The Stormy Seas of "Social" — Redefining Control
O2 - Together We Stand — How Standards, Audits and Public/Private Partnerships Help Us Manage Cyber Risk
Will be posted when available
Not available
O4 - Enabling Cloud Security and Compliance Through Automation
Will be posted when available

 

Click here to go to the 2012 Conference Page

Click here to go to the 2011 Conference Page

Click here to go to the 2010 Conference Page

Click here to go to the 2009 Conference Page

Click here to go to the 2008 Conference Page

Click here to go to the 2007 Conference Page

Click here to go to the 2006 Conference Page

Click here to go to the 2005 Conference Page

Click here to go to the 2004 Conference Page