| | |
Dec | 2019 |
Joshua Neil - Demystifying Data Science for Cyber Security |
Dec | 2019 |
Chris Calvert - The Power of AI to Disrupt Security Operations |
Dec | 2019 |
Christina Richmond - Security Analytics in the Cloud Era—Top 5 Industry Trends |
Sep | 2019 |
Richard Spilde - State of Digital Privacy |
Apr | 2019 |
Marios Diamedes and John Russo - Robotics Process Automation (RPA) andArtificial Intelligence (AI):A New World Order (slides show LA Chapter from 2018, but this is same deck as presented at Denver AGM) |
Mar | 2018 |
Lanny Morrow - Forensic Analytics |
Oct | 2017 |
T Ridpath - ISACA Presentation |
Oct | 2017 |
I Bramson - Business At the Speed of Cyber
|
Sep | 2017 |
J Jones, FAIR Institute - Modern Cyber & Technology Risk Measurement |
Sep | 2017 |
J Jones, FAIR Institute - Controls Chapter |
Apr | 2017 |
T Baccam - Auditing Web and Mobile Applications |
Mar | 2017 |
J Hare - Current SOX Trends |
Mar | 2017 |
J Hare - Decryption of Credit Card and Bank Data Risks and Controls v3 |
Mar | 2017 |
J Hare - ERP Risk Advisors The One Profile Option that Could Undermine Your Journal Entry Controls |
Mar | 2017 |
J Hare - ERP Risk Advisors The One Function that Could Undermine Your Journal Entry Controls |
Mar | 2017 |
J Hare - ERP Risk Advisors The One Configuration that Could Undermine Your Journal Entry Controls |
Mar | 2017 |
J Hare - Change Management Best Practices for Oracle E-Business Suite |
Mar | 2017 |
J Hare - Best Practices in Application Security Design for Oracle E-Business Suite |
Jan | 2017 |
R Clyde - ISACA Int'l Update and Safely Embracing the Cyber Future |
Nov | 2016 |
J Trull - Threat Detection and IR |
Nov | 2016 |
J Plucienkowski - Threat Detection and IR |
Nov | 2016 |
A Anderson - Threat Detection and IR |
Nov | 2016 |
R Lazarony - Threat Detection and IR |
Oct | 2016 |
Securing Privileged Access - SecureWorld |
Apr | 2016 |
AGM Presentation |
Jan | 2016 |
SQL Server Security Audit |
Jan | 2016 |
SQL Server Security Audit - slide notes |
Jan | 2016 |
SQL Server Audit Scripts (offered as is; no warranty implied) |
Dec | 2015 |
Building & Evolving a Cyber Security Program |
Nov | 2015 |
Balancing Compliance & Security |
Oct | 2015 |
Understanding SOC Reports |
Sep | 2015 |
Emerging Issues in IT Auditing |
Sep | 2015 |
Securing It All |
Sep | 2015 |
Using Service Supportability |
Apr | 2015 |
Privacy Trends (Corp Outreach Rndtble) |
Apr | 2015 |
Breach Response (Corp Outreach Rndtble) |
Apr | 2015 |
NIST Cyber Security Framework |
Apr | 2015 |
Insider Threat Report |
Apr | 2015 |
AGM Presentation |
Mar | 2015 |
Data Analytics-A Practical Approach |
Feb | 2015 |
Collaboration and Communication |
Jan | 2015 |
Automating Controls |
Dec | 2014 |
Evolving Role of the CISO |
Nov | 2014 |
SOC2 Report Updates |
Oct | 2014 |
Oracle Audit and Security |
Sep | 2014 |
Auditing Windows and Unix |
Feb | 2014 |
Security Metrics that Matter |
Dec | 2013 |
PCI DSS 3.0 The Good, The Bad, The Confusing |
Oct | 2013 |
HIPAA ISACA Presentation |
Apr | 2013 |
CoBIT 5.0 Overview |
Mar | 2013 |
IT Risk Management and GRC Tech Enablement |
Jan | 2013 |
End User Computing: Risks of Convenience |
Oct | 2012 |
SOC 2 Breakout from October Meeting |
Sep | 2012 |
Managing Info Sec Risk in Dist and Dynamic Business |
Apr | 2012 |
Defending the United States in the Digital Age |
Feb | 2012 |
Mobile Security |
Jan | 2012 |
Beyond Compliance, Design Assessment |
Dec | 2011 |
Trusted Cloud & VMware, VMware Vision |
Sep | 2011 |
XBRL |
May | 2011 |
If I Wake Up Evil |
Apr | 2011 |
Retirement of SAS 70 |
Mar | 2011 |
Web Application Security |
Dec | 2010 |
Data Loss Prevention |
Nov | 2010 |
Cloud Computing Security |
Oct | 2010 |
IT Blind Side |
Sep | 2010 |
Advanced Persistent Threats |
Feb | 2010 |
Secure the Coding |
Jan | 2010 |
Cloud Security |
Oct | 2009 |
Strategies for Managing Risk |
Sep | 2009 |
Database Security & Auditing |
Apr | 2009 |
PCI Stds, Updates and Trends |
Mar | 2009 |
GAPP Overview and Uses |
Feb | 2009 |
Enterprise Computing in the Open Network |
Jan | 2009 |
Bot Network Risks and Strategies |
Nov | 2008 |
Red Flag Rules |
Sep | 2008 |
How to Engineer an Effective Access Review Program |
May | 2008 |
Foundational Controls |
Mar | 2008 |
High Value IT Auditing |
Feb | 2008 |
Application-Level IT Risk Assessment |
Sep | 2006 |
Email Governance, Compliance, and Archiving |
Apr | 2006 |
Document Retention Policies |
Apr | 2005 |
Incident Response and Digital Forensics |
Sep | 2004 |
ISACA Sarbanes-Oxley |
May | 2004 |
Securing & Auditing Cisco Routers |
Apr | 2003 |
Creating, Using, & Justifying the Auditor's Toolkit Part 1 |
Apr | 2003 |
Creating, Using, & Justifying the Auditor's Toolkit Part 2 |
Feb | 2003 |
FBI Cyber Investigations |
Feb | 2003 |
FBI Cyber Squad |
Nov | 2002 |
Checkpoint Firewall |
Oct | 2002 |
Oracel Database Q&A |
Mar | 2002 |
Impact of P3P |
Feb | 2002 |
Incident Response and Forensic Planning |
Nov | 2001 |
Self Hack Audit |
Oct | 2001 |
IT Assurance and Reliability |
Jan | 2001 |
Virtual Private Network |
Feb | 2000 |
CMM |