|
New regulations, increasing IT security threats, evolving technologies, and staff shortages challenge today's IT Audit management to address the enterprise's increasing IT risks. To help avoid devastating harm to the organization's reputation from headline-making security breaches, IT Audit and Information Security management need to work together to address these IT risks. This Summit is designed to help IT Audit management get up-to-speed on a wide range of management issues, meet the new challenges posed by technological change, and provide assurance that IT risks are being adequately addressed.
View the e-brochure.
Wednesday, April 17
12:45 PM Networking Luncheon
1:30 PM - 2:00 PM
Opening Remarks
Fred C. Roth, CISA, Vice President, IT Audit Division, MIS Training Institute
2:00 PM - 3:15 PM
1 What's Keeping IT Audit and Security Management Up at Night? IT auditors and information security professionals are working in increasingly complicated and multifaceted organizations, with new regulations, security threats and technology evolving at an alarming rate. With this in mind, help us to kick off the symposium by identifying the key challenges that you deal with on a daily basis. This session will be your opportunity to influence the agenda and make sure your pressing concerns will be addressed during the next two days.
3:15 PM - 3:30 PM Refreshment Break
3:30 PM - 5:00 PM
2 Security and Audit Challenges Facing the Enterprise: What Can Be Done to Address Them?
Data Leakage Protection
Mobile Device Management
Security Information and Event Management (SIEM)
The cloud computing challenge
Global threats and intelligence
Thursday, April 18
8:30 AM - 10:00 AM
3 Understanding a Security Operations Center (SOC)
SOC components
Security Incident Response - incident identification, triage, remediate, tracking
Feeds for threat and vulnerability management
Forensics investigations and ties to a SOC
Tools to effectively track enterprise security compliance conditions
4 Sorting your SOCs: An Overview of the SSAE16 SOC Reports History of SAS70 and what the SAS70 reports were designed to do
Birth of SSAE16 in response to the misuse of the SAS70 and changes in service control organization environments
Review of SOC report types, the intended audience of each report, and the drivers for organizations to have the procedures performed
Analysis of the demand trends for SOC reports
Resources for furthering the understanding of the SOC reports
10:00 AM - 10:15 AM Refreshment Break
10:15 AM - 12:00 PM
5 COBIT 5 Update One-year status update on COBIT 5
Pros/cons of the new COBIT 5
Are users finding COBIT 5 adds value?
Examples of how organizations are using COBIT 5
Converting from COBIT 4.1 to COBIT 5
6 Understanding Your Audit Customer
Recognizing the need for better alignment
Building-blocks for establishing an auditee relationship program
Pre-planning to kick-start your program implementation
Roles and responsibilities of audit management and staff
Documenting, documenting, documenting
Balancing auditing with building relationships
12:00 PM Networking Luncheon
1:30 PM - 3:00 PM
7 Keeping Your Auditors Happy Security is from Mars, auditors are from Venus!
Aligning objectives
Providing a cooperative approach but remaining independent
Communication, communication, communication
Documentation diligence
Timeliness is key!
8 Social Media's Effects on Internal Auditors Introduction to selected social media tools with specific applications to business and internal audit
Practical guidance on using social media, including planning, consulting, recruiting audit fieldwork, and auditor self-development
Opportunities, challenges, risks and organizational policies needed for effective governance and risk management of social media
3:00 PM - 3:15 PM Refreshment Break
3:15 PM - 5:00 PM
Break-out sessions for security professionals and auditors according to department size
9 Overcoming Tough IT Audit Management Challenges IT audit staffing: recruiting and retaining the best
Staying current with the changing IT environment
Understanding new IT risks
Developing effective risk assessment models
Selling your IT recommendations to management
Metrics for measuring audit's performance
Using audit tools and technology
5:00 PM - 6:00 PM Networking Reception
Friday, April 19
8:30 AM - 10:00 AM
10 IT Audit Reports That Create Positive Change The ABCs of impactful audit reports
Developing audit concerns based on test results
Knowing your company's appetite for process improvement
What does your audience really want to know?
Streamlining without sacrificing quality
The lifecycle of report writing
11 IT Auditor Toolkit Demonstration of key tools to help gather evidence and analyze data
Rights management tools
Wireless network assessments
Password Assessment and cracking
Linux distros
Audit program resources
Software inventory and license compliance
10:00 AM - 10:15 AM Refreshment Break
10:15 AM - 11:45 AM
12 Maximizing IT Audit's Value to the Enterprise Strategically positioning IT Audit
Selling IT Audit's value to senior management
Providing value-added auditing in this compliance era
Components of successful strategic marketing plans
Strategies for leveraging relationships
Making the most out of your "good deeds"
11:45 AM - 12:00 PM
Determining Agenda for 2014 Summit
Summit Faculty Donna Cranmer, Information Security Analyst, International Speedway Corp. Motorsports
Stan Fromhold, CISA, CISSP, Security Solution Lead, Enterprise Security Services, Hewlett-Packard Company
Lisa Hollingshed, CISA, CRISC, PMP, IT Audit Manager, FedEx Services
Jeff Lemmermann, CPA, CISA, CITP, CEH, Chief Financial Officer/Chief Information Officer, Precision Plus, Inc.
Fred Roth, CISA, Vice President, IT Audit Division, MIS Training Institute
Chase Whitaker, CPA, CIA, Information Technology Audit Director, HCA Hospital Corporation of America
|