| Session |
Topic / Speaker |
Presentation |
| Mon |
Keynote Address
> Victor Nichols |
No |
| C11 |
Introduction to General Computer Controls
> Ed Byers & Muna Sheikh |
Yes |
| S11 |
Audit Risks and Issues for RFID
> Lionel Yee & Sagi Leizerov |
No |
| E11 |
Internet's Impact on Financial Crime
> Wilbourne |
No |
| T1 |
Audit and Security of Unix
> Rodney Kocot |
Yes |
| C12 |
Auditing Application Systems
> Monica O'Reilly & Maria Shaw |
Yes |
| S12 |
Control Implications of Outsourcing
> Mark Ludin |
No |
| E12 |
Sarbanes-Oxley and Identity Management
> Ehab Dawoud |
Yes |
| C13 |
Introduction to Security Auditing
> Carey Anne Carpenter & Monica O'Reilly |
Yes |
| S13 |
Streamlining Security Audits
> Douglas Barbin |
Yes |
| E13 |
Hacking: New Trends in Exploits and Vulnerabilities
> Brian Christian |
Yes |
| C21 |
Data Analysis - Leverage CAATs in Your Audits
> Sheryl Eberhardt & Duy Nguyen |
Yes |
| S21 |
AICPA/CICA Enterprise Wide Privacy Framework
> Doron Rotman |
Yes |
| E21 |
Intrusion Detection and Intrusion Prevention
> Eugene Schultz |
Yes |
| T2 |
Best Practice / Compliance: Network Audit Requirements
> David Flame & Thomas Moore |
No |
| C22 |
Business Continuity Management
> Neville Morcom |
Yes |
| S22 |
Federal Perspective on Info Security Governance
> Mike Nelson |
Yes |
| Tue |
Lunch Topic: Sarbanes- Oxley
> Steven Wilkens |
No |
| C23 |
IT Architectural Reviews
> San Sri & Shawn Mattar |
Yes |
| E22 |
Regulatory Compliance, Response, and Technology
> Albert Barsocchini |
Yes |
| C24 |
Intro to Project Risk Management / SDLC Reviews
> Greg Thomas & Stephen Madler |
Yes |
| S23 |
Use of COBIT as a Risk Management Framework
> Lance Turcato |
Yes |
| E23 |
Security Development: Applications and Infrastructure
> Himanshu Dwivedi |
Yes |
| C31 |
Software Development Lifecycle
> Heather Stewart |
Yes |
| S31 |
Personal and Corporate Identity Theft
> Chris Pick |
Yes |
| E31 |
Threats of Tomorrow
> Eric Levin |
Yes |
| T3 |
Auditing in a Windows Environment
> Nicholas Green |
Yes |
| C32 |
Oracle Application Security and Controls
> Ellen Chan & Yogita Parulekar |
Yes |
| S32 |
Web Services Risk, Controls, and Audit Implementations
> Ayan Roy |
Yes |
| E32 |
Minimizing Operational Risks in IT Security Breaches
> Arthur Coleman |
Yes |
| Wed |
Lunch Topic: OWASP
> Mark Curphey |
Yes |
| S33 |
Introduction to Security Event Management
> Matthew Klunder |
Yes |
| E33 |
Web Site Grey Box Testing
> Bob Grill |
Yes |
| |
ZIP file of all Summary Documents (30MB) |
|