Download a new research paper submitted by 
    chapter member Milton Lee of Wells Fargo Bank.
Network Infrastructure Security
Presentations From Events:
Get presentations from the 2008 Fall Conference Here
Get presentations from the 2009 Fall Conference Here
Get presentations from the 2010 Fall Conference Here
MARCH 23, 2007 - IAPP PRIVACY PANEL PRESENTATIONS
Alex Fowler - How privacy Affects the Auditor and Security Manager 
Barbara Lawler - Privacy Overview (IAPP) 
Doron Rotman - Conducting Privacy Audits - an Overview 
Rena Mears, D&T - 2007 Privacy Panel  
MAY 4, 5 and 6, 2006 - End User and Network/Application Security - FULL DAY
Send In The Clones - The Fact and Fiction of Identity Theft, and What The Difference Can Mean for Your Organization
When things go wrong - Real examples of the results of losing your common sense online
Windows Server 2003 security
Application (Oracle) Controls 
April 20, 2006 - Integrating COBIT DOMAINS into the IT Audit Process - Lance Turcato, CPA, CISA, CISM
Integrating COBIT Domains into the IT Audit Process.pdf
COBIT Audit Report Template.doc 
COBIT Audit Universe Mapping Detailed.doc 
COBIT Audit Universe Mapping HighLevel.DOC
COBIT Control Assessment Questionnaire Template.DOC 
COBIT Joint Risk Assessment Report to Management template.doc 
COBIT Questionnaire Template General.doc 
COBIT Questionnaire Template Security.DOC  
COBIT v3 to FFIEC Mapping.doc 
Metrics Evaluation Template .doc 
Sample Engagement Memo .doc 
March 16, 2006 - Project Management - Jan Bono, Partner, Ernst & Young Click Here
November 17, 2005 - Change Management - Salil Durani, Director of IT Operations, Siebel Systems Click Here
October 20, 2005 - IT and Security Standards - A Practical Approach to Implementation, Mark Lundin, Senior Manager, KPMG LLP Click Here
2005 SF ISACA Fall Conference - Topics, Speaker   Bios, Presentations
    September 26 - 28, 2005 Click Here
  2004 SF ISACA Fall Conference - Topics, Speaker Bios,   Presentations
    October 2-4, 2004
  
  2003 SF ISACA Fall Conference - Presentations NOT on Conference Proceedings CD - September 22-24, 2003
- 
      C2 - Auditing Applications 
 Speaker: Maria Shaw - Deloitte & Touche
 
- 
      C3 - Introduction to Security Auditing 
 Speaker: Carey Carpenter - Deloitte & Touche
 
- 
      C5 - IT Architecture 
 Speaker: San Sri - Deloitte & Touche
 
- 
      C8 - IT Risk Assessments 
 Speaker: Kevin Fried - Deloitte & Touche
 
- 
      C10 - Business Continuity Management 
 Speaker: Rob Yewell & Neville Morcom - Deloitte & Touche
 
- 
      L2 - Laws of Vulnerabilities 
 Speaker: Gerhard Eschelbeck, CTO & VP Engineering - Qualys
 
- 
      S5 - Monitoring Risk and Control of Business Initiatives 
 Speaker: Tim Stephens, Tom Magee, & Jan Bono - Ernst & Young
 
- 
      S6 - Privacy - SB1386 - Cybersecurity 
 Speaker: Scott Pink, Deputy Chair of the American Bar Association's Cybersecurity Task Force and Special Counsel- Gray Cary
 
May 20, 2003
COBIT As An Audit & Risk   Management Tool (CACS Conference)
        Speaker:  Lance M. Turcato, Charles Schwab &   Co., Inc.
      
      Joint Risk Assessment Report Template
      
      
      
      Control Assessment Questionnaire
      
      
      
      Engagement Memorandum Template
      
       
 
January 16, 2003
Network Firewall   Security
        Speaker:    Kurt Kruse and Brett   Anderson, Wells Fargo
      
      Checkpoint Firewall Audit Program
      
      
      
      Network   Firewall Security Presentation
      
       
 
April 3, 2001
Establishing   Effective Audit Control Objectives for   UNIX
        Speaker:  Rick   Allen- Deloitte & Touche
          
          Morning Session
       
 
      
          Afternoon Session
       
 
December 12, 2000
Audit,   Control & Security of Oracle RDBMS
        Speaker:    Mary Ann Davidson
      Luncheon Presentation
      
October 17, 2000
Wells Fargo Audit   Services
      Speaker:  Randy Melby, Charles Hughes, and Tim   Stapleton
      Luncheon Presentation
       
 
      Afternoon Seminar Presentation
      
[Top]
March 21, 2000
Secure Network   Communications
        Speaker:  Deloitte & Touche,   LLP
      Luncheon Presentation
       
 
      Afternoon Seminar Presentation
      
July 20, 1999
An Overview of Trends in Network Security   & Controls
        Speaker:  Kathleen Macina, Charles Schwab   & Co., Inc.
      
Audit, Control & Security of   TCP/IP
    Speaker:  Edmund Lam, University of   California--Office of the President
    
March 16, 1999
Project Management For IS Auditors &   Security Professionals
        Speaker:  Brenda Bernal, Charles   Schwab & Co., Inc.
      
Security Awareness:  What Every Auditor   Should Know About Information Security
      Speaker:  Lance   Turcato, Charles Schwab & Co., Inc.
      
      Speaker:  James O'Neil, Ernst &   Young, LLP.
      
      Speaker:  Patrick Heim, Ernst &   Young, LLP.
      
February 16, 1999
Legal and Regulatory Developments Related to   Cyberspace
    Speaker:  Kevin O'neil, KPMG.
      
December 15, 1998
Internet Resources For IS Auditors &   Security Professionals
        Speaker:  David Fong, Charles Schwab   & Co., Inc.
      
November 17, 1998
Auditing The Development of Web-Based   Applications
        Speaker:  Jian Zhen, Charles Schwab & Co.,   Inc.
      
Web Site Design &   Development
    Speaker:  Brian Goldston, Information Architect   Consultant
    
October 20, 1998
Auditing Web & Firewall Technologies For   Electronic Commerce Web Sites
        Speaker:  Ed Ehrgott, Charles   Schwab & Co., Inc.
      
Audit / Evaluation Tools & Utilities
NOTE: Prior to installing/executing any software, the code should be carefully reviewed and tested prior to use on any production or mission critical machines. This reduces the risk of any malicious code that may have been embedded into the software.
Computer Oracle and Password System (COPS) - Computer Oracle and Password System is a free set of programs that checks UNIX systems for security problems.
Internet Security Scanner(ISS)
SATAN
Tripwire
Isof - Lists any open files.
TCP_Wrapper Program - Permits additional control on access to hosts on the system and provides tracking logs.








 Resources
 Resources Downloads
Downloads