2014 SF ISACA FALL CONFERENCE 
  
  Download a zip file of all Presentations HERE
Download a zip file of all Speaker Bios/Session Abstracts HERE
| Core Competencies Track  | PRESENTATION | BIO/ABSTRACT | 
| C11 - New PCI DSS    Version 3.0 - Can it Reduce Breaches? | ||
| C12 - Innovative Business Continuity    Management | Conference presentation only | |
| C13 - COSO 2013: Moving from Five    Principles to Seventeen | ||
| C21 - Vulnerability Assessments,    Penetration Studies, eDiscovery - Not All the Same | ||
| C22 - Audit Interviewing Best Practices | ||
| C23 - Effective Segregation of Duties    (SOD) in ERPs | ||
| C24 - CSX: ISACA Initiatives on Cyber Security | ||
| C31 - Hackers Are Among Us:  Start Thinking Like a Bad Guy | ||
| C32 - ISO 27001: 2013 Updates | Posted when available  | |
| C33 - Data Analytics Tests for IT    Auditors | ||
| Governance, Risk & Compliance Track | PRESENTATION | BIO/ABSTRACT | 
| G11 - IT    Governance: The Fundamentals and a Radical View  | ||
| G12 - Performance GRC: A Well    Positioned GRC Program Protects & Enables Business | ||
| G13 - Compliance in the Cloud: Business    Enabler or Not? | Posted when available  | |
| G21 - FedRAMP Update and Lessons Learned    from an Accredited 3PAO | ||
| G22 - An Integrated Approach to Technology Risk Management and Compliance  | Posted when available  | |
| G23 - Internal Audit and GRC: Challenges    and Solutions to Alignment | ||
| G24 - Talent Crisis 2014: Recruiting and Retaining Talent in an Overheated Market  | ||
| G31 - Developments in Cloud and IT/Security Assurance: SOC2 and Other Standards | ||
| G32 - Programmatic Maintenance,    Development and Spending in Security  | Posted when available  | |
| G33 - How to Improve Your Risk    Assessments with Attacker-Centric Threat Modeling | ||
| Professional Techniques Track | PRESENTATION | BIO/ABSTRACT | 
| T11 -    Communicating Risk to Executive Leadership | ||
| T12 - Auditing Elephants: Tales from the    Trenches of Big Data | Posted when available  | |
| T13 - Best Practices for Securing Mobile    Content | ||
| T21 - Developing Legacy Platform Security  | ||
| T22 - Data Analytics/Continuous Controls Monitoring (CCM) | ||
| T23 - Taking an Enterprise Wide Approach    to Big Data Initiatives | ||
| T24 - Mobile Security  | ||
| T31 - Security & Privacy Working    Together to Achieve a Common Goal: A Case Study | Posted when available  | |
| T32 - Eliminating Data Security Threats  | ||
| T33 - Six Forces: Developing a Next-Generation Security Program  | Conference presentation only | |
| Professional Strategies Track | PRESENTATION | BIO/ABSTRACT | 
| S11 - Moving from    Reactive to Proactive Security | ||
| S12 - Leveraging the Cloud Adoption    Lifecycle to Reduce Security, Compliance & Governance Risk | Posted when available  | |
| S13 - Aligning Your Organization’s    Business Units to Achieve a Cohesive Cybersecurity Strategy | ||
| S21 - Securing ERP Applications  | ||
| S22 - Is Consumer-Oriented Strong    Authentication Finally Here to Stay? | ||
| S23 - Fine Tuning Security Strategies Using    Maturity Models | ||
| S24 - Security & Compliance: Taking    a Business Perspective | ||
| S31 - Audit by Design: Moving Beyond    Continuous Auditing - a Vision for Future Models | ||
| S32 - Right-sizing Risk and Compliance    for Small to Mid-size Companies | ||
| S33 - Information Security Leaders Forum | N/A - Panel Session  | Posted when available | 
| In-Depth Seminars Track | PRESENTATION | BIO/ABSTRACT | 
| D11 - The 10 Principles of Security in Modern Cloud Applications  | ||
| D12 - Bridging the Privacy Trust Gap for    Mobile BYOD Deployments | ||
| D13 - Auditing in an Internet of Things:    Getting Ahead of Mobile, Social & Cloud | Posted when available  | |
| D21 - The Current State of Cybersecurity | ||
| D22 - The Current State of Hacking and    Data Breaches | Posted when available  | |
| D23 - Insider Threat: Controlling the Wild Fires  | Posted when available  | |
| D24 - Cybercrime: What your Bank Should    be Doing to Protect your Business | ||
| D31 - Conducting a Personal Data    Protection Review Based on International Laws | ||
| D32 - Security, Compliance and Risk Management for Cloud Relationships  | ||
| D33 - Third Party Information Security Risk Management Programs  | ||
| Keynote/Luncheon Sessions | PRESENTATION | BIO/ABSTRACT | 
| O1    - General Session & Keynote Address- Future of Payment Card Security  | Conference presentation only   | |
| O2 - Building a    Security Program that Protects an Organization’s Most Critical Assets – A    Different Approach | ||
| O4 - Challenge of the Ever-Changing    Threat Landscape | 
SF ISACA 2014 Fall Conference from SF ISACA on Vimeo.
 
    
    
  
Contact CONFERENCE@sfisaca.org
Get Information About Sponsor Support for the Fall Conference here
Click here to go to the 2013 Conference Page
Click here to go to the 2012 Conference Page
Click here to go to the 2011 Conference Page
Click here to go to the 2010 Conference Page
Click here to go to the 2009 Conference Page
Click here to go to the 2008 Conference Page
Click here to go to the 2007 Conference Page
Click here to go to the 2006 Conference Page
Click here to go to the 2005 Conference Page
Click here to go to the 2004 Conference Page








 Current Events
 Current Events Current Events
Current Events