2013 SF ISACA FALL CONFERENCE
Download a zip file of all Presentations here
Download a zip file of all Speaker Bios/Session Abstracts here
See the Conference Summary page here
Core Competencies Track |
PRESENTATION |
BIO/ABSTRACT |
C11 - Intro to IT Auditing for Non-IT Auditors (Part 1) |
||
C12 - Intro to IT Auditing for Non-IT Auditors (Part 2) |
||
C13 - SOC Reporting vs. ISO 27001 Certification |
||
C21 - Role of Internal Audit in Transformational Organization Change |
||
C22 - If It’s not a Business Initiative, It’s not COBIT 5 |
||
C23 - Using CAATs for Risk Reduction and Project Efficiencies |
||
C24 - Security Essentials |
||
C31 - IT Governance Isn’t One Thing — It’s Everything! |
||
C32 - Risk and Control Considerations for Outsourced IT Operations |
||
C33 - Policy and Compliance Management — The Next Generation of Policy and Compliance Programs |
||
Governance, Risk & Compliance Track |
PRESENTATION |
BIO/ABSTRACT |
G11 - Virtualize More While Improving Your Risk Posture - The 4 "Must Haves" of Virtualization Security |
||
G12 - Building a Risk Assessment Process from the Ground Up |
||
G13 - Approaches to Meeting Enterprise eDiscovery and ESI Challenges |
Will be posted when available |
|
G21 - Issues, Challenges and Practical Approaches to IT Security Risk Metrics and Reporting |
||
G22 - Optimizing Capability Maturity for Application Security in the Software Development Lifecycle |
||
G23 - Vendor security and Compliance — Shaking, Rebuilding and Retrofitting |
Will be posted when available |
|
G24 - What Audits Miss and How Penetration Testers Abuse Those Gaps |
||
G31 - Agile Risk Management — 30 Practical IT Security Evaluation Methods for IT Governance and Audit Professionals |
||
G32 - A web-application architecture for Secure Cloud Computing |
||
G33 - Creating Value for Management Through ERM |
||
Professional Techniques Track |
PRESENTATION |
BIO/ABSTRACT |
T11 - COBIT 5 Deep Dive |
||
T12 - Increasing ROI from Outsourcing and Other Third Party Relationships |
||
T13 - Shining the Light on Flashlight and the Security of Thousands of Mobile Apps |
||
T21 - Cyber Security Incident Management — Fighting Fire with Fire… |
||
T22 - Enhancing Vendor Risk and Compliance Management Using SOC2 and SOC3 Reports |
Will be posted when available |
|
T23 - Digital Forensic Techniques |
||
T24 - Hybrid and Private Clouds and What it Means to the Auditor |
||
T31 - Software Asset Management — Is Your Company Prepared for a Software Audit? |
||
T32 - Active Defense 2013 |
||
T33 - Data Analytics and Data Access: Best Practices |
||
Professional Strategies Track |
PRESENTATION |
BIO/ABSTRACT |
S11 - Privacy and Security Convergence |
N/A (panel session) |
|
S12 - Strategies for Managing Risks in the Cloud |
||
S13 - Creating an Effective Fraud Awareness Program |
||
S21 - Strategies for Integrating the HIPAA Security Rule |
||
S22 - Medical Identity Fraud |
||
S23 - Realities of Being PCI Compliant |
||
S24 - Who is Watching the Code? |
Will be posted when available |
|
S31 - Understanding Cryptography and Auditing Public Key Infrastructures |
||
S32 - BCP Strategies in a Cloud Environment |
||
S33 - Cyber Risk — What it Actually Means and How to Ignore the Buzz |
||
In-Depth Seminars Track |
PRESENTATION |
BIO/ABSTRACT |
D11 - Mobile Device Security Risks and Remediation Approaches |
||
D12 - Lesson Learned from the First Generation of Mobile Enterprise Apps |
Not available |
|
D13 - Secure Mobile Architecture for Enterprise Mobility and BYOD |
||
D21 - Auditing Big Data for Privacy, Security and Compliance |
||
D22 - #HeavyD — Stopping Malicious Attacks Against Data Mining and Machine Learning |
||
D23 - The Prism of Uncertainty and Big Data |
||
D24 - Cyber Security, Big Data and Risk |
||
D31 - Understanding ERP Architectures, Security and Risk |
||
D32 - ERP Security Risks and Auditing |
Not available |
|
D33 - Cloud Based ERP, Security and Risks |
Will be posted when available |
Not available |
Keynote/Luncheon Sessions |
PRESENTATION |
BIO/ABSTRACT |
O1 - General Session & Keynote Address- The Stormy Seas of "Social" — Redefining Control |
||
O2 - Together We Stand — How Standards, Audits and Public/Private Partnerships Help Us Manage Cyber Risk |
Will be posted when available |
Not available |
O4 - Enabling Cloud Security and Compliance Through Automation |
Will be posted when available |
Click here to go to the 2012 Conference Page
Click here to go to the 2011 Conference Page
Click here to go to the 2010 Conference Page
Click here to go to the 2009 Conference Page
Click here to go to the 2008 Conference Page
Click here to go to the 2007 Conference Page
Click here to go to the 2006 Conference Page
Click here to go to the 2005 Conference Page
Click here to go to the 2004 Conference Page