29 Sep 2009 3:00 pm Presenting David Hoelzer; Enclave Forensics, Director of Research
As IT auditors we spend a great deal of time focused on configuration settings.
29 Sep 2009 2:00 pm Presenting Lenny Zeltser SANS Technology Institute
Malicious software is an integral and dangerous component of many breaches.
29 Sep 2009 11:00 am Presenting Shreeraj Shah; Blueinfy Solutions, Founder and Director
Enterprise application source code, independent of languages and platforms, is a major source of vulnerabilities.
8 Sep 2009 6:00 am
Presenting David Hobson, Global Secure Systems Ltd, Managing Director
Threat Assessments, Attacks, & Countermeasure are . .
29 Sep 2009 4:00 pm Presenting Paul Reymann; CEO of Reymann Group in association with Tripwire
Compliance used to be a periodic and mostly manual project driven by audit dates and deadlines.
8 Sep 2009 10:00 am Presenting Becky Pinkard, Barclays Bank, Head of Attack and Data Monitoring
Becky was recruited by Barclays to develop the global monitoring programme with the goal of supplying real-time alerting of critical security and data leakage
27 Aug 2009 5:00 pm Presenting Robert Brownstone; Law & Technology Director; Fenwick & West LLP
Information-Risk-Management (IRM)- Policies and Protocols Maximizing preparedness for eDiscovery and Litigation.
30 Sep 2009 2:00 pm Presenting Lily Bi; The Institute of Internal Auditors; Director, Technology Practices
-Explore the relationship between IT and Business
-Define IT audit universe
8 Sep 2009 5:00 am Presenting James Rendell, IBM, Senior Technology Specialist
James Garnered Extensive pre and post-sales consulting experience while working for US-based technology companies . . .
27 Aug 2009 3:00 pm Presenting Linda Kostic; Director, ERM at E*Trade Financial
Many organizations are learning that in today's environment, an information security risk management program has become a key component of an Enterprise Risk Management program.
29 Sep 2009 12:00 pm Presenting Michael Juergens; Deloitte & Touche LLP, Principal
Compliance requirements and resource constraints have focussed IT Audit procedures on the bare essentials of IT controls.
8 Sep 2009 12:00 pm Presenting John Moynihan; Managing Director at Minuteman Governance
John will provide attendees with an overview of how to confront unauthorized database access, an emerging threat within all industries and sectors.
27 Aug 2009 12:00 pm Presenting Jack Jones, Founder, Risk Management Insight
Frustrated with management's lack of support for security initiatives, priorities and efforts?