NORTH AMERICA EMEA ASIA
All programs BankAudit 2013 InfoSec World Conference & Expo 2013 SuperStrategies Conference & Expo 2013 The Conference on Big Data Security
All programs The Audit Directors & Managers Symposium The MIS Audit Leadership Institute The MIS CAE Master's Program
 
     Conferences            >      Seminars            >      Symposia            >      Webinars      Online Self Study      Training Weeks      In-House Training      Certificate Programs>      Exhibiting Info      Ways to Save      Request Info      Event Downloads      White Papers      Call for Instructors      Contact MIS      Site Map
Internal Audit IT Audit Info Security
Internal Audit IT Audit Info Security
   
IT Audit Management Summit

New regulations, increasing IT security threats, evolving technologies, and staff shortages challenge today's IT Audit management to address the enterprise's increasing IT risks. To help avoid devastating harm to the organization's reputation from headline-making security breaches, IT Audit and Information Security management need to work together to address these IT risks. This Summit is designed to help IT Audit management get up-to-speed on a wide range of management issues, meet the new challenges posed by technological change, and provide assurance that IT risks are being adequately addressed.

View the e-brochure.

Wednesday, April 17
12:45 PM Networking Luncheon

1:30 PM - 2:00 PM
Opening Remarks
Fred C. Roth, CISA, Vice President, IT Audit Division, MIS Training Institute

2:00 PM - 3:15 PM
1 What's Keeping IT Audit and Security Management Up at Night?
IT auditors and information security professionals are working in increasingly complicated and multifaceted organizations, with new regulations, security threats and technology evolving at an alarming rate. With this in mind, help us to kick off the symposium by identifying the key challenges that you deal with on a daily basis. This session will be your opportunity to influence the agenda and make sure your pressing concerns will be addressed during the next two days.

3:15 PM - 3:30 PM Refreshment Break

3:30 PM - 5:00 PM
2 Security and Audit Challenges Facing the Enterprise: What Can Be Done to Address Them?
• Data Leakage Protection
• Mobile Device Management
• Security Information and Event Management (SIEM)
• The cloud computing challenge
• Global threats and intelligence

Thursday, April 18
8:30 AM - 10:00 AM
3 Understanding a Security Operations Center (SOC)
• SOC components
• Security Incident Response - incident identification, triage, remediate, tracking
• Feeds for threat and vulnerability management
• Forensics investigations and ties to a SOC
• Tools to effectively track enterprise security compliance conditions

4 Sorting your SOCs: An Overview of the SSAE16 SOC Reports
• History of SAS70 and what the SAS70 reports were designed to do
• Birth of SSAE16 in response to the misuse of the SAS70 and changes in service control organization environments
• Review of SOC report types, the intended audience of each report, and the drivers for organizations to have the procedures performed
• Analysis of the demand trends for SOC reports
• Resources for furthering the understanding of the SOC reports

10:00 AM - 10:15 AM Refreshment Break

10:15 AM - 12:00 PM
5 COBIT 5 Update
• One-year status update on COBIT 5
• Pros/cons of the new COBIT 5
• Are users finding COBIT 5 adds value?
• Examples of how organizations are using COBIT 5
• Converting from COBIT 4.1 to COBIT 5

6 Understanding Your Audit Customer
• Recognizing the need for better alignment
• Building-blocks for establishing an auditee relationship program
• Pre-planning to kick-start your program implementation
• Roles and responsibilities of audit management and staff
• Documenting, documenting, documenting
• Balancing auditing with building relationships

12:00 PM Networking Luncheon

1:30 PM - 3:00 PM
7 Keeping Your Auditors Happy
• Security is from Mars, auditors are from Venus!
• Aligning objectives
• Providing a cooperative approach but remaining independent
• Communication, communication, communication
• Documentation diligence
• Timeliness is key!

8 Social Media's Effects on Internal Auditors
• Introduction to selected social media tools with specific applications to business and internal audit
• Practical guidance on using social media, including planning, consulting, recruiting audit fieldwork, and auditor self-development
• Opportunities, challenges, risks and organizational policies needed for effective governance and risk management of social media

3:00 PM - 3:15 PM Refreshment Break

3:15 PM - 5:00 PM
Break-out sessions for security professionals and auditors according to department size

9 Overcoming Tough IT Audit Management Challenges
• IT audit staffing: recruiting and retaining the best
• Staying current with the changing IT environment
• Understanding new IT risks
• Developing effective risk assessment models
• Selling your IT recommendations to management
• Metrics for measuring audit's performance
• Using audit tools and technology

5:00 PM - 6:00 PM Networking Reception

Friday, April 19
8:30 AM - 10:00 AM
10 IT Audit Reports That Create Positive Change
• The ABCs of impactful audit reports
• Developing audit concerns based on test results
• Knowing your company's appetite for process improvement
• What does your audience really want to know?
• Streamlining without sacrificing quality
• The lifecycle of report writing

11 IT Auditor Toolkit
• Demonstration of key tools to help gather evidence and analyze data
• Rights management tools
• Wireless network assessments
• Password Assessment and cracking
• Linux distros
• Audit program resources
• Software inventory and license compliance

10:00 AM - 10:15 AM Refreshment Break

10:15 AM - 11:45 AM
12 Maximizing IT Audit's Value to the Enterprise
• Strategically positioning IT Audit
• Selling IT Audit's value to senior management
• Providing value-added auditing in this compliance era
• Components of successful strategic marketing plans
• Strategies for leveraging relationships
• Making the most out of your "good deeds"

11:45 AM - 12:00 PM
Determining Agenda for 2014 Summit

Summit Faculty
Donna Cranmer, Information Security Analyst, International Speedway Corp. Motorsports
Stan Fromhold, CISA, CISSP, Security Solution Lead, Enterprise Security Services, Hewlett-Packard Company
Lisa Hollingshed, CISA, CRISC, PMP, IT Audit Manager, FedEx Services
Jeff Lemmermann, CPA, CISA, CITP, CEH, Chief Financial Officer/Chief Information Officer, Precision Plus, Inc.
Fred Roth, CISA, Vice President, IT Audit Division, MIS Training Institute
Chase Whitaker, CPA, CIA, Information Technology Audit Director, HCA – Hospital Corporation of America

 Follow Us on Twitter

Platinum Sponsors

Gold Sponsors

Global Education Sponsor

Association Sponsors

Media Sponsors