2014 SF ISACA FALL CONFERENCE

Download a zip file of all Presentations HERE

Download a zip file of all Speaker Bios/Session Abstracts HERE

Core Competencies Track
PRESENTATION
BIO/ABSTRACT
C11 - New PCI DSS Version 3.0 - Can it Reduce Breaches?
C12 - Innovative Business Continuity Management
Conference presentation only
C13 - COSO 2013: Moving from Five Principles to Seventeen
C21 - Vulnerability Assessments, Penetration Studies, eDiscovery - Not All the Same
C22 - Audit Interviewing Best Practices
C23 - Effective Segregation of Duties (SOD) in ERPs
C24 - CSX: ISACA Initiatives on Cyber Security
C31 - Hackers Are Among Us:  Start Thinking Like a Bad Guy
C32 - ISO 27001: 2013 Updates
Posted when available
C33 - Data Analytics Tests for IT Auditors
Governance, Risk & Compliance Track
PRESENTATION
BIO/ABSTRACT
G11 - IT Governance: The Fundamentals and a Radical View
G12 - Performance GRC: A Well Positioned GRC Program Protects & Enables Business
G13 - Compliance in the Cloud: Business Enabler or Not?
Posted when available
G21 - FedRAMP Update and Lessons Learned from an Accredited 3PAO
G22 - An Integrated Approach to Technology Risk Management and Compliance
Posted when available
G23 - Internal Audit and GRC: Challenges and Solutions to Alignment
G24 - Talent Crisis 2014: Recruiting and Retaining Talent in an Overheated Market
G31 - Developments in Cloud and IT/Security Assurance: SOC2 and Other Standards
G32 - Programmatic Maintenance, Development and Spending in Security
Posted when available
G33 - How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
Professional Techniques Track
PRESENTATION
BIO/ABSTRACT
T11 - Communicating Risk to Executive Leadership
T12 - Auditing Elephants: Tales from the Trenches of Big Data
Posted when available
T13 - Best Practices for Securing Mobile Content
T21 - Developing Legacy Platform Security
T22 - Data Analytics/Continuous Controls Monitoring (CCM)
T23 - Taking an Enterprise Wide Approach to Big Data Initiatives
T24 - Mobile Security
T31 - Security & Privacy Working Together to Achieve a Common Goal: A Case Study
Posted when available
T32 - Eliminating Data Security Threats
T33 - Six Forces: Developing a Next-Generation Security Program
Conference presentation only
Professional Strategies Track
PRESENTATION
BIO/ABSTRACT
S11 - Moving from Reactive to Proactive Security
S12 - Leveraging the Cloud Adoption Lifecycle to Reduce Security, Compliance & Governance Risk
Posted when available
S13 - Aligning Your Organization’s Business Units to Achieve a Cohesive Cybersecurity Strategy
S21 - Securing ERP Applications
S22 - Is Consumer-Oriented Strong Authentication Finally Here to Stay?
S23 - Fine Tuning Security Strategies Using Maturity Models
S24 - Security & Compliance: Taking a Business Perspective
S31 - Audit by Design: Moving Beyond Continuous Auditing - a Vision for Future Models
S32 - Right-sizing Risk and Compliance for Small to Mid-size Companies
S33 - Information Security Leaders Forum
N/A - Panel Session
Posted when available
In-Depth Seminars Track
PRESENTATION
BIO/ABSTRACT
D11 - The 10 Principles of Security in Modern Cloud Applications
D12 - Bridging the Privacy Trust Gap for Mobile BYOD Deployments
D13 - Auditing in an Internet of Things: Getting Ahead of Mobile, Social & Cloud
Posted when available
D21 - The Current State of Cybersecurity
D22 - The Current State of Hacking and Data Breaches
Posted when available
D23 - Insider Threat: Controlling the Wild Fires
Posted when available
D24 - Cybercrime: What your Bank Should be Doing to Protect your Business
D31 - Conducting a Personal Data Protection Review Based on International Laws
D32 - Security, Compliance and Risk Management for Cloud Relationships
D33 - Third Party Information Security Risk Management Programs
Keynote/Luncheon Sessions
PRESENTATION
BIO/ABSTRACT
O1 - General Session & Keynote Address- Future of Payment Card Security
Conference presentation only
O2 - Building a Security Program that Protects an Organization’s Most Critical Assets – A Different Approach
O4 - Challenge of the Ever-Changing Threat Landscape

 

SF ISACA 2014 Fall Conference from SF ISACA on Vimeo.

 

 

Contact CONFERENCE@sfisaca.org

Get Information About Sponsor Support for the Fall Conference here

 

Click here to go to the 2013 Conference Page

Click here to go to the 2012 Conference Page

Click here to go to the 2011 Conference Page

Click here to go to the 2010 Conference Page

Click here to go to the 2009 Conference Page

Click here to go to the 2008 Conference Page

Click here to go to the 2007 Conference Page

Click here to go to the 2006 Conference Page

Click here to go to the 2005 Conference Page

Click here to go to the 2004 Conference Page