Past Chapter Presentations

Rating ( vote)

Oct 2017 T Ridpath - ISACA Presentation
Oct 2017 I Bramson - Business At the Speed of Cyber
Sep 2017 J Jones, FAIR Institute - Modern Cyber & Technology Risk Measurement
Apr 2017 T Baccam - Auditing Web and Mobile Applications
Mar 2017 J Hare - Current SOX Trends
Mar 2017 J Hare - Decryption of Credit Card and Bank Data Risks and Controls v3
Mar 2017 J Hare - ERP Risk Advisors The One Profile Option that Could Undermine Your Journal Entry Controls
Mar 2017 J Hare - ERP Risk Advisors The One Function that Could Undermine Your Journal Entry Controls
Mar 2017 J Hare - ERP Risk Advisors The One Configuration that Could Undermine Your Journal Entry Controls
Mar 2017 J Hare - Change Management Best Practices for Oracle E-Business Suite
Mar 2017 J Hare - Best Practices in Application Security Design for Oracle E-Business Suite
Jan 2017 R Clyde - ISACA Int'l Update and Safely Embracing the Cyber Future
Nov 2016 J Trull - Threat Detection and IR
Nov 2016 J Plucienkowski - Threat Detection and IR
Nov 2016 A Anderson - Threat Detection and IR
Nov 2016 R Lazarony - Threat Detection and IR
Oct 2016 Securing Privileged Access - SecureWorld
Apr 2016 AGM Presentation
Jan 2016 SQL Server Security Audit
Jan 2016 SQL Server Security Audit - slide notes
Jan 2016 SQL Server Audit Scripts (offered as is; no warranty implied)
Dec 2015 Building & Evolving a Cyber Security Program
Nov 2015 Balancing Compliance & Security
Oct 2015 Understanding SOC Reports
Sep 2015 Emerging Issues in IT Auditing
Sep 2015 Securing It All
Sep 2015 Using Service Supportability
Apr 2015 Privacy Trends (Corp Outreach Rndtble)
Apr 2015 Breach Response (Corp Outreach Rndtble)
Apr 2015 NIST Cyber Security Framework
Apr 2015 Insider Threat Report
Apr 2015 AGM Presentation
Mar 2015 Data Analytics-A Practical Approach
Feb 2015 Collaboration and Communication
Jan 2015 Automating Controls
Dec 2014 Evolving Role of the CISO
Nov 2014 SOC2 Report Updates
Oct 2014 Oracle Audit and Security
Sep 2014 Auditing Windows and Unix
Feb 2014 Security Metrics that Matter
Dec 2013 PCI DSS 3.0 The Good, The Bad, The Confusing
Oct 2013 HIPAA ISACA Presentation
Apr 2013 CoBIT 5.0 Overview
Mar 2013 IT Risk Management and GRC Tech Enablement
Jan 2013 End User Computing: Risks of Convenience
Oct 2012 SOC 2 Breakout from October Meeting
Sep 2012 Managing Info Sec Risk in Dist and Dynamic Business
Apr 2012 Defending the United States in the Digital Age
Feb 2012 Mobile Security
Jan 2012 Beyond Compliance, Design Assessment
Dec 2011 Trusted Cloud & VMware, VMware Vision
Sep 2011 XBRL
May 2011 If I Wake Up Evil
Apr 2011 Retirement of SAS 70
Mar 2011 Web Application Security
Dec 2010 Data Loss Prevention
Nov 2010 Cloud Computing Security
Oct 2010 IT Blind Side
Sep 2010 Advanced Persistent Threats
Feb 2010 Secure the Coding
Jan 2010 Cloud Security
Oct 2009 Strategies for Managing Risk
Sep 2009 Database Security & Auditing
Apr 2009 PCI Stds, Updates and Trends
Mar 2009 GAPP Overview and Uses
Feb 2009 Enterprise Computing in the Open Network
Jan 2009 Bot Network Risks and Strategies
Nov 2008 Red Flag Rules
Sep 2008 How to Engineer an Effective Access Review Program
May 2008 Foundational Controls
Mar 2008 High Value IT Auditing
Feb 2008 Application-Level IT Risk Assessment
Sep 2006 Email Governance, Compliance, and Archiving
Apr 2006 Document Retention Policies
Apr 2005 Incident Response and Digital Forensics
Sep 2004 ISACA Sarbanes-Oxley
May 2004 Securing & Auditing Cisco Routers
Apr 2003 Creating, Using, & Justifying the Auditor's Toolkit Part 1
Apr 2003 Creating, Using, & Justifying the Auditor's Toolkit Part 2
Feb 2003 FBI Cyber Investigations
Feb 2003 FBI Cyber Squad
Nov 2002 Checkpoint Firewall
Oct 2002 Oracel Database Q&A
Mar 2002 Impact of P3P
Feb 2002 Incident Response and Forensic Planning
Nov 2001 Self Hack Audit
Oct 2001 IT Assurance and Reliability
Jan 2001 Virtual Private Network
Feb 2000 CMM