Download a new research paper submitted by
chapter member Milton Lee of Wells Fargo Bank.

Network Infrastructure Security

Presentations From Events:

Get presentations from the 2008 Fall Conference Here

Get presentations from the 2009 Fall Conference Here

Get presentations from the 2010 Fall Conference Here

MARCH 23, 2007 - IAPP PRIVACY PANEL PRESENTATIONS

Alex Fowler - How privacy Affects the Auditor and Security Manager
Barbara Lawler - Privacy Overview (IAPP)
Doron Rotman - Conducting Privacy Audits - an Overview
Rena Mears, D&T - 2007 Privacy Panel

MAY 4, 5 and 6, 2006 - End User and Network/Application Security - FULL DAY

Send In The Clones - The Fact and Fiction of Identity Theft, and What The Difference Can Mean for Your Organization
When things go wrong - Real examples of the results of losing your common sense online
Windows Server 2003 security
Application (Oracle) Controls

April 20, 2006 - Integrating COBIT DOMAINS into the IT Audit Process - Lance Turcato, CPA, CISA, CISM

Integrating COBIT Domains into the IT Audit Process.pdf
COBIT Audit Report Template.doc
COBIT Audit Universe Mapping Detailed.doc
COBIT Audit Universe Mapping HighLevel.DOC
COBIT Control Assessment Questionnaire Template.DOC
COBIT Joint Risk Assessment Report to Management template.doc
COBIT Questionnaire Template General.doc
COBIT Questionnaire Template Security.DOC
COBIT v3 to FFIEC Mapping.doc
Metrics Evaluation Template .doc
Sample Engagement Memo .doc

March 16, 2006 - Project Management - Jan Bono, Partner, Ernst & Young Click Here

November 17, 2005 - Change Management - Salil Durani, Director of IT Operations, Siebel Systems Click Here

October 20, 2005 - IT and Security Standards - A Practical Approach to Implementation, Mark Lundin, Senior Manager, KPMG LLP Click Here

2005 SF ISACA Fall Conference - Topics, Speaker Bios, Presentations
September 26 - 28, 2005 Click Here

2004 SF ISACA Fall Conference - Topics, Speaker Bios, Presentations
October 2-4, 2004

2003 SF ISACA Fall Conference - Presentations NOT on Conference Proceedings CD - September 22-24, 2003

May 20, 2003

COBIT As An Audit & Risk Management Tool (CACS Conference)
Speaker:
  Lance M. Turcato, Charles Schwab & Co., Inc.

Joint Risk Assessment Report Template


Control Assessment Questionnaire


Engagement Memorandum Template

 

January 16, 2003

Network Firewall Security
Speaker:
  Kurt Kruse and Brett Anderson, Wells Fargo

Checkpoint Firewall Audit Program


Network Firewall Security Presentation

 

April 3, 2001

Establishing Effective Audit Control Objectives for UNIX
Speaker:
  Rick Allen- Deloitte & Touche

Morning Session


Afternoon Session

Secure Systems Checklist

December 12, 2000

Audit, Control & Security of Oracle RDBMS
Speaker:
  Mary Ann Davidson
Luncheon Presentation

[Top]

October 17, 2000

Wells Fargo Audit Services
Speaker:
  Randy Melby, Charles Hughes, and Tim Stapleton
Luncheon Presentation

Afternoon Seminar Presentation

[Top]

March 21, 2000

Secure Network Communications
Speaker:
  Deloitte & Touche, LLP
Luncheon Presentation

Afternoon Seminar Presentation

[Top]

July 20, 1999

An Overview of Trends in Network Security & Controls
Speaker:
  Kathleen Macina, Charles Schwab & Co., Inc.

Audit, Control & Security of TCP/IP
Speaker:
  Edmund Lam, University of California--Office of the President

[Top]

March 16, 1999

Project Management For IS Auditors & Security Professionals
Speaker:
  Brenda Bernal, Charles Schwab & Co., Inc.

Security Awareness:  What Every Auditor Should Know About Information Security
Speaker:
  Lance Turcato, Charles Schwab & Co., Inc.

Speaker:  James O'Neil, Ernst & Young, LLP.

Speaker:  Patrick Heim, Ernst & Young, LLP.

[Top]

February 16, 1999

Legal and Regulatory Developments Related to Cyberspace
Speaker:
  Kevin O'neil, KPMG.

[Top]

December 15, 1998

Internet Resources For IS Auditors & Security Professionals
Speaker:
  David Fong, Charles Schwab & Co., Inc.

[Top]

November 17, 1998

Auditing The Development of Web-Based Applications
Speaker:
  Jian Zhen, Charles Schwab & Co., Inc.

Web Site Design & Development
Speaker:
  Brian Goldston, Information Architect Consultant

[Top]

October 20, 1998

Auditing Web & Firewall Technologies For Electronic Commerce Web Sites
Speaker:
  Ed Ehrgott, Charles Schwab & Co., Inc.

[Top]

 

Audit / Evaluation Tools & Utilities

NOTE: Prior to installing/executing any software, the code should be carefully reviewed and tested prior to use on any production or mission critical machines. This reduces the risk of any malicious code that may have been embedded into the software.

Computer Oracle and Password System (COPS) - Computer Oracle and Password System is a free set of programs that checks UNIX systems for security problems.

ftp://coast.cs.purdue.edu/pub/tools/unix/cops

ftp://info.cert.org/pub/tools/cops

Internet Security Scanner(ISS)

ftp://coast.cs.purdue.edu/pub/tools/unix/iss

http://www.iss.net/prod/products.html

SATAN

ftp://coast.cs.purdue.edu/pub/tools/unix/satan

Tripwire

ftp://coast.cs.purdue.edu/pub/COAST/Tripwire

Isof - Lists any open files.

ftp://vic.cc.purdue.edu:/pub/tools/unix/lsof/

TCP_Wrapper Program - Permits additional control on access to hosts on the system and provides tracking logs.

ftp://info.cert.org/pub/tools/tcp_wrappers/

 

[Top]