2015 Spring Conference Sessions
Transcription
2015 Spring Conference Sessions
Southern California’s leading conference for IT governance, control, security and assurance 1001010101101 0 0 00 01 11 1 1 0 0 1 1 0110 1 0 0 1 0 0 0 100 1 10 10 11 01 010010101001011 001 1 0 01 0 11 0 1 1 10 010 10 01001 1001011 0 1 10 01001 10 0 01 0110 00110101 1 0 101 01 1 11 01 10110 001101011 0 1 0 1 0 01 0 11 1 NAME NAME 1 1 0 10 00101010101010 1 1 00 01101 0 10 1 1 00 00101010101010 10 101 Hilton Los Angeles/Universal City California, USA On behalf of the Los Angeles Chapter of ISACA (ISACA-LA) we want to welcome you to our 2015 Spring Conference, "Protecting the Cyber Enterprise," a theme developed in support of ISACA International’s Nexus initiative (www.isaca.org/cyber). We have come a long way since our now International organization was first formed in Los Angeles in 1967, when a small group of auditing professionals whose jobs were to audit controls in computer systems, sat down to discuss the need for a centralized source of information and guidance in the field. We are proud of our diverse membership today, which includes a variety of professional IT-related positions—to name just a few, IS auditor, consultant, educator, IS security professional, regulator, chief information officer and internal auditor. Some of us are new to the field, others are at middle management levels and still others are in the most senior ranks. (They) We work in nearly all industry categories, including financial and banking, public accounting, government and the public sector, utilities and manufacturing. Our Spring Conference 2015 gives good reason for (these) our diverse group(s) to come together - to learn, to fulfill our IT governance responsibilities and to better deliver value to the business. We hope you will join us in what promises to be an energizing and worthwhile Spring Conference 2015! David Alexander President, ISACA Los Angeles Chapter Debbie A. Lew Chair, Spring Conference 2015 Conference Committee Debbie Lew - Chair Cheryl Santor - Vice Chair, Sponsors and Vendors Anna Carlin - Student Volunteers David Alexander - Sponsors & Vendors Dean Kingsley - Sponsors Jonathan Chan - Conference Webmaster Karen Norton - Sponsors & Vendors Kelly Lin - Finance Larry Hanson - Communications & Registration Linda Moore - Facilities Lisa Kinyon - Facilities & Registration Micah Manquen - Student Volunteers Mike O. Villegas - Sponsors & Vendor Prasad Kodukulla - Marketing and Social Media Thomas Phelps IV - Sponsors & Vendors, Program Lisa Pompan - Conference Support Ernst and Young, LLP Cal Poly Pomona Deloitte & Touche DirecTV Southern California Edison Bank of America K3DES LLC Laserfiche Metropolitan Water District of Southern California Los Angeles Department of Water and Power Deloitte & Touche KPMG LLP AIG KPMG LLP Amgen ISACA-LA The ISACA Los Angeles Conference 2015 PROTECTING THE CYBER ENTERPRISE More topics. More insight. More ways to learn. The ISACA Los Angeles Chapter’s conference provides a unique opportunity for for IT assurance, security, risk management and governance professionals to explore cybersecurity topics with knowledgeable experts, expand professional skills and enhance career potential. Leverage the benefits of a powerful learning experience with the value of the ISACA Los Angeles Chapter’s Conference: • Sharpen your skills with practical and relevant sessions that apply to your current or prospective roles and responsibilities • Tailor a learning experience that fits your style, budget and professional goals. • Prepare for the CRISC exam by attending the CRISC two-day boot camp. • Obtain your COBIT® 5 certificate after taking the COBIT® 5 Foundation course and the exam at the end of the second day. • Revisit with old friends, make new friends and network throughout the conference including the networking reception on Monday night, sponsored by Laserfiche. • If you're an IT Audit Director, be invited to our IT Audit Directors' Forum to network and discuss emerging IT audit issues and risks • Learn about technology solutions at the Vendor Exhibition Fair that can address the challenges you face in your current role. • Earn up to 20 CPE credits, to help you become or remain certified. • Attend the CSX Cyber security fundamentals workshop to prepare for the cybersecurity fundamentals exam. Learn from experienced Cybersecurity leaders The ISACA Los Angeles Chapter has brought together leading IT governance, risk, security and assurance leaders to share their experience and knowledge with you. They live the topics they teach, and draw from a deep understanding of the complex issues facing IT professionals today. This real world perspective means that attendees benefit from proven solutions and best practices. Location and dates Registration April 11 – April 15, 2015 Hilton Los Angeles/Universal City, California USA Register online at www.isacala.org/conference. 1 Day Payment can be made by credit card, check or wire transfer NOTE: Registration will not guarantee acceptance into a session until the payment is also received. PAYMENT must be postmarked by the early registration date (March 22, 2015) in order to qualify for the Early Registration discount. 2 Day Conference Fees Pre-conference Workshop ISACA/ISSA Members $200 (+$150 for COBIT Exam) Non Members $200 (+$150 for COBIT Exam) Full Time Students $100 (+$150 for COBIT Exam) CRISC Boot camp or COBIT5 Foundations or Cybersecurity Fundamentals Workshops $400 $500 $150 3 Day 1 Day 2 Day Full Conference (Mon. – Wed.) Conference Conference $220 $550 $300 $650 $100 $250 $650 ($750 after 3/22/15) $750 ($850 after 3/22/15) $250 ($300 after 3/22/15) CONFERENCE REGISTRATION DISCOUNT: A $50.00 discount per three-day registration is available to companies with three or more paid three-day registrants. To request a discount code, please e-mail [email protected]. @isacala #isacalasc15 3 Keynote Session - Monday, April 13th Theme: Protecting the Cyber Enterprise Keynote Speaker Michele Robinson, California State CISO California is home to more than 38 million people and considered one of the largest economies in the world. We are a very diverse population consisting of tech innovators in the Silicon Valley and across the state, aerospace projects at more than 3 NASA centers located in California, the entertainment industry capital, the leader in small business development, venture capitalists, and with over half of the fruit production in the US. Every one of those businesses and consumers need technology to be competitive while operating in a secure environment. Investments in the secure use of technology is paramount to sustained growth in our state. Join Michele as she discusses the cyber threat, enterprise risk management strategy and how the California Cybersecurity Task Force is chartered with advancing California’s cyber security posture. About Michele Robinson Michele Robinson was appointed Director of the California Office of Information Security (OIS) and State Chief Information Security Officer (CISO) by Gov. Jerry Brown in May 2013. Robinson joined OIS in 2007 and assumed the position of Acting Director in February 2013, where she served as the liaison to federal, State and local government on cyber security policies and issues. From 2010 to 2013, she served as Deputy CISO and was responsible for managing the day-to-day operations of OIS and the statewide information security program, including enterprise policy development, disaster recovery planning, incident management, and compliance. From 2007 to 2010, Robinson served as Assistant CISO managing the statewide enterprise incident management program and effecting several significant policies. Prior to joining OIS, Robinson served as the CISO and Privacy Officer for the California Unemployment Insurance Appeals Board (CUIAB) for nearly 5 years. Prior to her appointment with CUIAB she worked for the Department of Consumer Affairs (DCA) for 8 years, serving on policy development, new program implementation, business process reengineering and system design and integration committees, and representing DCA and its constituent board and bureau programs at task force meetings, board meetings and special meetings with control agencies and members of the Legislature. Robinson has 10 years of experience in the finance and credit industry where she has held manager, supervisor, and fraud investigator positions. She holds a Bachelor of Science in information systems from the University of San Francisco, and CISSP, CISM, CIPP/US, and CIPP/IT certifications. @isacala #isacalasc15 4 Keynote Panel California Cybersecurity Task Force Panel Discussion Keynote Panel Moderator Robert Stroud, ISACA International President As the first coordinated step toward securing California’s cyber infrastructure, California Governor Edmund “Jerry” Brown commissioned the California Cybersecurity Task Force, a cybersecurity advisory committee comprised of representatives from the public and private sectors, academia, and law enforcement. Michele Robinson, CISO of the State of CA, has said that because of the interconnectedness of government and private-sector IT assets, collaboration has become crucial. And the ultimate goal, she said is to collaborate and work together to improve cybersecurity for the state. The California Cybersecurity Task Force is working to improve the state’s ability to adapt and respond to emerging cyber threats. The coalition includes public, private and educational partners and is led by the Governor’s Office of Emergency Services and the Department of Technology. Hear how the task force has been developing a statewide cybersecurity strategy and is organized into the following 7 subcommittees (Legislation and funding, workforce and education development, economic and business development, information sharing, risk mitigation, emergency preparedness, and hightech and digital forensics). Keynote Panelists Michele Robinson, California State CISO Stan Stahl, Ph.D., William “Bill” Britton, Citadel Information Group Visiting Director of & ISSA LA President Cybersecurity Center at Cal Poly San Luis Obispo Oliver Rosenbloom, Assoc. Governmental Program Analyst General Session - Tuesday, April 14th “The National Conversation No One Wants to Have: A New Paradigm for Cyber Resiliency” Dr. Ron Ross National Institute of Standards and Technology (NIST) Information Technology Laboratory Computer Security Division The increasing complexity of the IT infrastructure supporting our public and private sector organizations is becoming the number one threat to the economic and national security interests of the United States. Developing effective cybersecurity and risk management strategies that promote trustworthy and resilient information systems and networks is the key to future mission and business success. @isacala #isacalasc15 5 Conference Schedule Pre-Conference Workshops APRIL 11 - SATURDAY 08:30 to 05:00 W1 CRISC™ Review Bootcamp (Day 1) – Shawna Flanders, Business Technology Guidance Assoc. W2 COBIT 5 Foundation Course (Day 1) – Barry Lewis, Cerebus W3 CSX Cybersecurity Fundamentals (Day 1) – Mike O. Villegas, K3DES LLC APRIL 12 - SUNDAY W1 CRISC Review Bootcamp (Day 2) – Shawna Flanders, Business Technology Guidance Assoc. 08:30 to 05:00 W2 COBIT 5 Foundation Course and Exam (Day 2) – Barry Lewis, Cerebus W3 CSX Cybersecurity Fundamentals (Day 2) – Mike O. Villegas, K3DES LLC Mobile Device Security and Mobile Application Dissection – Lee Neely, Lawrence Livermore Laboratory W4 (1 Day Workshop) Main Conference APRIL 13 - MONDAY Accelerating Your Fundamentals Security Emerging Issues, Tools & Techniques Designing and Managing Governance, Risk and Compliance REGISTRATION and BREAKFAST BREAK sponsored by Accuvant 07:00 To 08:00 08:00 To 9:45 Cybersecurity Nexus ● Opening Remarks Michele Robinson, CISO, State of California ● Keynote Panel: California Cybersecurity Task Force moderated by Rob Stroud (ISACA International President) Panelists: Michelle Robinson, Stan Stahl, Oliver Rosenbloom, Bill Britton NETWORKING BREAK sponsored by Deloitte C1 10:15 To 11:30 S1 How to conduct an IT Risk Assessment Shawna Flanders, BusinessTechnology Guidance Associates, LLC Cybersecurity Task Force Panel Discussion and Workshop Moderater: Dan Manson, Professor, Cal Poly Pomona Panelists: Michele Robinson, Stan Stahl, Oliver Rosenbloom, Bill Britton T1 G1 Bridging the Gap between Data Privacy and Security Ali Zaiee, Nasr Husami, Deloitte & Touche LLP Audit Strategy: Ongoing Cybersecurity Assessments Brad Ames, HP LUNCH NETWORKING BREAK sponsored by RSA CISO Luncheon sponsored by Allgress (by invitation only) C2 12:45 To 02:00 S2 IT Audit Fundamentals Workshop– Part 1 Tom Donohue, Deloitte Frank Mariduena, SCE Protecting the Critical Infrastructure of the United States in the Digital Age: The Role of Government, Industry, and the Audit Community Hon Theresa Grafenstein, US House of Representatives Dr. Ron Ross, NIST T2 G2 Social Media Risks John Hicks, Walt Disney Company Richard Lee, Ernst & Young LLP How the COBIT Framework can help the Auditor Audit the Cyber Enterprise Mark Stanley, Toyota Financial Services NETWORKING BREAK sponsored by Ernst & Young LLP @isacala #isacalasc15 6 Conference Schedule Accelerating Your Fundamentals 02:30 To 03:45 C2 Cybersecurity Nexus S3 T3 Dealing with a Cyber Future that is Already Here Rob Clyde, ISACA Rob Stroud, CA Technologies Continued Security Emerging Issues, Tools & Techniques Designing and Managing Governance, Risk and Compliance G3 Six Forces: Developing a Resilient Security Program James Christiansen, Accuvant IT Vendor Risk Management Christopher Garlington Jeremy Yates, Disney Global Information Security SESSION CHANGE C2 04:00 To 05:15 S4 Continued 05:15 To 07:00 T4 The Value of Splunk and Big Data at Southern California Edison (SCE) Douglas Rhoades, SCE G4 “Where are the bad guys hiding?” – A Forensic Approach to Incident Response Peter Morin, Bell Aliant Practical steps to managing IT Risk: Value Creation and Governance Brian Barnier, ValueBridge Advisors CONFERENCE NETWORKING RECEPTION sponsored by LaserFiche APRIL 14 - TUESDAY 07:30 To 08:30 08:30 To 09:45 BREAKFAST BREAK sponsored by KPMG General Session The National Conversation No One Wants to Have: A New Paradigm for Cyber Resiliency Dr. Ron Ross, NIST NETWORKING BREAK sponsored by Bit9 S5 C3 10:30 To 11:45 IT Audit Fundamentals Workshop– Part 2 Stephanie Peel, PwC Diana Tran, Allergan T5 G5 NIST Cyber Security Frame- Industrial Control Systems work; What is the Status of (ICS) Threats and Solutions Douglas Rhoades, SCE Your Assessment? Cheryl Santor, Metropolitan Water District of Southern California David Alexander, Los Angeles Department of Water and Power Common GRC Management Mistakes Brian Barnier, ValueBridge Advisors LUNCH NETWORKING BREAK sponsored by Laserfiche - EXHIBITION FAIR 01:15 To 04:30 IT Audit Directors Forum - by Invitation Only Moderated by Marios Damianides, Ernst & Young LLP & Brian Barnier, ValueBridge Advisors C3 01:15 To 02:30 Continued S6 Better Safe Than Sorry Patrick J. Hynes, Ernst & Young, LLP Cybersecurity T6 G6 Contract and Records Management Jason Messer, Kelsey Frost, Laserfiche Douglas Van Gelder, Los Angeles Community Development Commission GRC Process Optimization through Effective Use of Technology Kevin Berman, Joe DeVita, PricewaterhouseCoopers LLP NETWORKING BREAK sponsored by PwC - EXHIBITION FAIR @isacala #isacalasc15 7 Conference Schedule Accelerating Your Fundamentals S7 C3 03:15 To 04:30 Cybersecurity Nexus Security Emerging Issues, Tools & Techniques T7 G7 High Tech Cyber Crime Case Web Application Security & SDLC Studies Peter Morin, Bell Aliant Donn Hoffman, Benyomin Forer, High Tech Crime Division, Los Angeles County District Attorney’s Office Continued Designing and Managing Governance, Risk and Compliance Devising Internal Controls for Enterprise SaaS Chong Ee, Twilio APRIL 15 - WEDNESDAY 07:30 To 08:30 08:30 To 09:30 BREAKFAST BREAK sponsored by Newegg Business C4 S8 Financial Auditing Support of Mainframe John Mee, KPMG T8 Cyber Threats: Industry Trends and Actionable Advice Michael Sprunger, EMC Consulting G8 Secure by Design, Privacy baked in and Defending Data Objects Rakesh Radhakrishnan, Princess Cruises COBIT In Action: Practical IT Audit Lessons Nelson Gibbs, Union Bank SESSION CHANGE C5 9:45 To 10:45 S9 Information Security 101 Janice Wong, Union Bank Is Your Organization Prepared to Manage a Cyber-attack? Ren Powers, City National Bank T9 G9 Architecture for Secure Cloud Computing Arshad Noor, StrongAuth, Inc. Governance, Compliance and Ethics of Potential Access Gaps in Complex Systems Eric Read, United Healthcare NETWORKING BREAK Sponsored by Palo Alto Networks 11:15 To 12:15 C6 S10 Auditing New Systems Development Projects DeeDee Owens, KPMG The Compliance of Cybersecurity Larry Stewart, PennyMac LLC T10 G10 Next Generation Firewalls (NGFW) Mike O Villegas, K3DES LLC Leveraging Pen Testing to Augment the Audit Lee Neely, Lawrence Livermoore Laboratory CONFERENCE CONCLUDES Technical Education Sessions / Lunch for Pre-Registered Attendees E1 12:30 To 01:30 Assuming Network Compromise : How changing your security perspective leads to proactive threat detection and prevention Nathan Swain, ANRC E2 Technical Education Session 2 Developing the most current content. Please check the website for the latest description! www.isacala.org/conference @isacala #isacalasc15 8 Pre-Conference Workshops Introducing the COBIT 5 Foundation Course and Exam (Two-day Course) Facilitator: Barry Lewis, Cerebus COBIT 5 is the only business framework for the governance and management of enterprise IT. Learn the importance of an effective framework to enable business value. Delve into the elements of ISACA’s evolutionary framework to understand how COBIT 5 covers the business end-to-end and helps you effectively govern and manage enterprise IT. Developed for anyone interested in obtaining foundation-level knowledge of COBIT, the course explains the COBIT framework and supporting materials in a logical and example-driven approach. This is a course that is typically offered at $1500 or higher, the chapter is pleased to offer it to our membership at a substantial discount. Introducing the CRISC™ Certification Review Course (Two-day Course) Facilitator: Shawna Flanders, Business/Technology Guidance Associates This boot camp will address the key areas of the CRISC certification and explain the importance of having an organization-wide risk management program backed up by risk management professionals holding individual certification. The presentation will outline each key topic area of the CRISC curriculum and explain how to improve each person's skills in effective and proactive risk management. Introducing the Cybersecurity Fundamentals (CSX) workshop (Two-day Course) Facilitator: Mike O. Villegas, K3DES LLC Why become a cybersecurity professional? The protection of information is a critical function for all enterprises. Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of Information Technologies (IT). The CSX Fundamentals workshop is designed for this purpose, as well as to provide insight into the importance of cybersecurity, and the integral role of cybersecurity professionals. This workshop will also prepare learners for the CSX Fundamentals Exam. @isacala #isacalasc15 9 Pre-Conference Workshops Mobile Device Security and Mobile Application Dissection Facilitator: Lee Neely - Lawrence Livermore Laboratory (One-day Course) Mobile devices are prevalent in the workspace and personal lives of all of us. With those devices comes a new set of security risks and challenges. This workshop will involve a series of lectures and hands-on exercises to help you understand mobile devices and their impact in the workplace, how they are secured, and how you can obtain a better understanding of their inner workings and the risks you are accepting. Syllabus: ● Mobile device ecosystem in the workplace, from uses and policies to mobile device management solutions. ● Mobile device security models, described and compared. ● Mobile application overview ● Mobile application testing, hands-on. ● Reverse engineering mobile applications ● Mobile application changing, hands-on. ● So what’s it all mean? Points to ponder, actions to take. You will need a laptop that you have administrative rights to as well as being able to run a virtual machine for the class exercises. Track #1 Accelerating Your Fundamentals Track #2 Cybersecurity Nexus Designed for the operational/financial auditor or anyone new to the information technology auditing, security and governance who want to learn the fundamentals to enable or change a new career or refresh knowledge. This track provides the participants with the concepts, methodologies and techniques to help improve upon their knowledge, expertise and skills. Selected session proposals will provide participants with valueadded tools such as audit programs, checklists, white papers and other reference material In this track, cutting-edge IT and cybersecurity issues will be discussed along with recommendations and solutions. Topics include issues and risks related to social media, mobile technology risks (BYOD) IAM, cybersecurity governance, cloud computing strategies, threats to privacy as well as internal controls and Sessions are designed to include the latest cybersecurity topics to enhance the skills of audit, cybersecurity, and IT professionals. Track #3 Emerging Security Issues, Tools and Techniques Track #4 Managing Governance, Risk and Compliance Through demonstration and discussions of real world issues, applications of solutions, this track will help assurance, security and risk professionals understand emerging security risks to the business and operational environments, and relevant security techniques and tools. Sessions include topics that will enable participants to take away security ideas and techniques to enhance their professional development and work. This track explores the concepts and terminology of emerging issues related to IT governance, frameworks and risk management. Included in this track is the ISACA research and tools designed and developed to aid the IT professional in recognizing today’s emerging issues and mitigating impact on the enterprise. Sessions also include governance topics that supports the enterprise’s IT ability to sustain and extend the organization’s strategies and objectives. @isacala #isacalasc15 10 2015 Spring Conference Sessions Accelerating Your Fundamentals C1 Speaker: How to Conduct an IT Risk Assessment Shawna Flanders Founder and CEO, Business Technology Guidance Associates, LLC This session will give the attendee an overview into conducting technology based risk assessments that provide benefit to the enterprise. This course is designed to provide insight for anyone participating in their company's risk assessment process. After completing this session, the participants will be able to: ● Describe the Risk Governance and the Risk Management Program ● Identify changes to the organization’s risk universe ● Develop Risk Scenario's ● Conduct Risk Identification, Analysis and Evaluations ● Track and Report on Risk ● Monitor the Risk Management Program C2 Speakers: IT Audit Fundamentals Workshop - Part 1 Tom Donohue Director, Deloitte Frank Mariduena IT Governance Manager, Southern California Edison In this session, participants will learn about IT auditor roles and relationships as well as the overall IT audit process from initial risk assessments through the development and use of control frameworks. This class is targeted toward IT auditors who are new to the profession, financial auditors learning IT audit, integrated auditors or IT personnel who are transitioning into greater involvement in IT audit. We will discuss the methodologies and frameworks that support IT audit such as CobiT®, general computing controls, application level controls, and how the Sarbanes-Oxley Act of 2002 affects the IT auditing profession. Participants will have the opportunity to apply acquired knowledge by the end of the day. After completing this session, the participants will be able to understand: ● The principles and practices of IT auditing ● The standards, guidance and procedures that ISACA recommends ● IT auditors role, the audit process and drivers, regulatory requirements (e.g., SOX, PCI, privacy), and the role of frameworks/methodologies (e.g., COBIT® 5/ITIL/ISO17799) ● IT risk assessment, developing the IA plan and conducting the audit ● Strategy & planning, business continuity, relationships with outsourced providers ● Applying COBIT® 5 in audits ● Information security ● Computer operations and change management (e.g., SDLC, change control) ● Application controls and the IT auditor’s role in business process audits @isacala #isacalasc15 11 11 2015 Spring Conference Sessions Accelerating Your Fundamentals C3 Speakers: IT Audit Fundamentals Workshop - Part 2 Stephanie Peel Managing Director, PwC Diana Tran IT Audit Director, Allergan In this session, participants will learn about IT auditor roles and relationships as well as the overall IT audit process from initial risk assessments through the development and use of control frameworks. This class is targeted toward IT auditors who are new to the profession, financial auditors learning IT audit, integrated auditors or IT personnel who are transitioning into greater involvement in IT audit. We will discuss the methodologies and frameworks that support IT audit such as CobiT®, general computing controls, application level controls, and how the Sarbanes-Oxley Act of 2002 affects the IT auditing profession. Participants will have the opportunity to apply acquired knowledge by the end of the day. After completing this session, partcipant will be able to identify: ● The principles and practices of IT auditing ● The standards, guidance and procedures that ISACA recommends ● IT auditors role, the audit process and drivers, regulatory requirements (e.g., SOX, PCI, privacy), and the role of frameworks/methodologies (e.g., CobiT®/ITIL/ISO17799) ● IT risk assessment, developing the IA plan and conducting the audit ● Strategy & planning, business continuity, relationships with outsourced providers ● Applying CobiT in audits ● Information security ● Computer operations and change management (e.g., SDLC, change control) ● Application controls and the IT auditor’s role in business process audits C4 Speaker: Financial Auditing Support of Mainframe John Mee Senior Associate, KPMG This session will provide the auditor with a broad understanding of the principles of the mainframe security architecture and key components that maintain confidentiality, integrity and availability of the system. System facilities and resources for the audit will be reviewed to help the auditor understand how to best use them. After completing this session, participants will be able to: ● Understand the basic mainframe architecture ● Understand mainframe terminology languae ● Understand how the mainframe is different from more familiar computing platform ● Understand the key elements of a mainframe and how to audit it with RACF as an example @isacala #isacalasc15 12 2015 Spring Conference Sessions Accelerating Your Fundamentals C5 Speaker: Information Security 101 Janice Wong AVP Information Security, Union Bank New to Information Security OR thinking about getting into Information Security? Grab a seat in Information Security 101 and build your foundation to understand how Information Security is structurally organized and understand the basic functions within this department. With all the media attention surrounding cyber-threats and securing customer data, you'll soon jump right into conversations with your new knowledge of Information Security Jargon. Don't stop there; discover the right certification for you to evaluate your career goals in Information Security. After completing this session, partipants will be able to: ● Better understand the Information Security Organization - via a general overview and the security roles ● Articulate the basic functions of Information Security ● Recognize Information Security Jargon/Key Terms in conversations ● Discover available certifications in Information Security to support career goals C6 Speaker: Auditing New System Development Projects Dee Dee Owens Managing Director, KPMG Implementing a new system or going through a system conversion is one of the highest risks that organizations can face. In order to address this risk and provide the most value to their organization, IT auditors must be involved throughout a system's life cycle and not just in post-implementation assessments. Join Dee Dee Owens as she addresses the value-added role of the IT Auditor in project development, including performing on-going audit planning and reporting on an iterative basis.. After completing this session, the participants will be able to: ● Assess key controls to review during each phase of project SDLC ● Identify potential findings for each phase of the SDLC ● Understand the roles of the IT Auditor in project development @isacala #isacalasc15 13 2015 Spring Conference Sessions Cybersecurity Nexus S1 Cybersecurity Task Force Panel Discussion Moderator: Dan Manson, Professor, Computer Information Systems, California State Polytechnic University, Pomona Panelists: Michele Robinson, California State CISO Stan Stahl, Ph.D., Citadel Information Group & ISSA LA President Oliver Rosenbloom Assoc. Governmental Program Analyst Bill Britton, Visiting Director of Cybersecurity Center at Cal Poly San Luis Obispo As the first coordinated step toward securing California’s cyber infrastructure, California Governor Edmund “Jerry” Brown commissioned the California Cybersecurity Task Force, a cybersecurity advisory committee comprised of representatives from the public and private sectors, academia, and law enforcement. Learn more about the California Cybersecurity Task Force, a cybersecurity advisory committee comprised of representatives from the public and private sectors, academia, and law enforcement. The California Cybersecurity Task Force is working to improve the state’s ability to adapt and respond to emerging cyber threats. The coalition includes public, private and educational partners and is led by the Governor’s Office of Emergency Services and the Department of Technology. The Task Force has been developing a statewide cybersecurity strategy. This session will be moderated by Dr Dan Manson, CalPoly Pomona. After completing this session, the participants will be able to understand cybersecurity strategy related to: ● Legislation and funding ● Workforce and education development ● Economic and business development ● Information sharing ● Risk mitigation ● Emergency preparedness ● High-tech and digital forensics S2 Speakers: Protecting the Critical Infrastructure of the United States in the Digital Age: The Role of Government, Industry, and the Audit Community Honorable Theresa Grafenstine Inspector General, US House of Representative Dr. Ron Ross Fellow, NIST The US Department of Homeland Security describes the nation's critical infrastructure as “the essential services that underpin American society.” Because of the importance in our everyday lives, critical infrastructure must be secure and able to withstand and rapidly recover from all hazards -including cyber threats. In a world where cyber-attacks are becoming more frequent and common place, protecting our critical infrastructure is a responsibility that cannot be limited to just the government. Adequate protection requires cooperation among the government, industry, and audit community. Join this interactive session with Dr. Ron Ross, Senior Fellow at NIST, and The Hon Theresa Grafenstine, Inspector General of the US House of Representatives. After completing this session, the participants will be able to: ● Understand the current risk landscape ● Understand how each of thse communities pay a vital role in protecting our nation's critical infrastructure @isacala #isacalasc15 14 2015 Spring Conference Sessions Cybersecurity Nexus S3 Speakers: Dealing with a Cyber Future that is Already Here Rob Clyde International VP and Board Member, ISACA Rob Stroud International President, ISACA The velocity of technological change in cyber space is unlike any time before. While we are yet figuring out security for recent technologies like social media, mobile, Big Data and the cloud, newer technologies such as the internet of things are already staring us in the face! The future seems to have already happened. Moreover, data breaches and cyber attacks from dedicated adversaries are accelerating. Are we agile enough to take on today's cyber security challenge and make a difference? How can I start or enhance a career in cyber security? Hear practical advice from two long-time security professionals and how ISACA's CSX can help. After completing this session, participants will be able to: ● Understand how recent and emerging technologies are affecting cyber security ● See how the pace and targeted nature of cyber attacks are creating challenges for traditional security approaches ● Learn how ISACA's CSX can help you and others to meet those challenges and enhance your career S4 Speaker: The Value of Splunk and Big Data at Southern California Edison (SCE) Douglas Rhoades Chief Engineer Cybersecurity, Southern California Edison Southern California Edison (SCE) is in the middle of a multi-year deployment of a Unified Monitoring and Data Analytics project that heavily leverages Splunk in order to increase Operational Intelligence. Splunk is used to continually aggregate data from networking equipment, firewalls, intrusion protection systems, the Windows Active Directory and most endpoints. The Splunk system then classifies, indexes and stores this data, currently up to 3TB daily, to provide a basis for SCE's Security Information and Event Management (SIEM) capability. This data is tapped for system performance monitoring, forensic investigations, and detection of Indicators of Compromise (IOCs), which are available as pre-staged reports or in interactive discovery sessions. SCE has barely scratched the surface of analytics' capability but has already found value in categorization of web traffic, trending of access and authentication events and detection of some types of anomalous behavior. SCE plans to expand the event correlation capability as data from additional sources is added in the future, but Splunk and its associated data warehouse have already become the "go-to" source for cybersecurity data. After completing this session, participants will be able to: ● Understand what Splunk is and how a typical large deployment is organized ● Know the data types that are in use at SCE and why they are relevant to so many ● Become familiar with the types of data analyses that are supported by the above data ● Be able to envision future analytic efforts that will be supported by additional data elements @isacala #isacalasc15 15 2015 Spring Conference Sessions Cybersecurity Nexus S5 Speakers: NIST Cyber Security Framework: What is the Status of Your Assessment? Cheryl Santor Director, Information Security, Metropolitan Water District of Southern California David Alexander Information Security Manager, Los Angeles Department of Water and Power Critical Infrastructure was asked to conduct a Cyber Security Assessment using the NIST Framework created by DHS/NIST as mandated by the Presidential Order of February 2013. This February Critical Infrastructure was to report on status of the effort to assess the Cyber Security of Critical Infrastructure entities. How did your organization perform the assessment? Both Speakers will outline the efforts conducted by their organizations and tell about findings and what was done about remediation. In reporting to DHS/NIST, what was discovered about the process, the findings and the status of the organizations in remediation efforts? How to move forward from the initial report? After completing this session, participants will be able to: ● Walk through the assessment process to provide examples of what was done at both organizations to conduct the assessment ● Gain an understanding of lessons learned from conducting the assessment ● Learn the resources needed to comply wiht the assessment findings ● Understand what remediation efforts can be conducted prior to obtaining funding S6 Speaker: Better Safe than Sorry Patrick J. Hynes Executive Director, Ernst & Young, LLP Cybersecurity Most companies face cyber incidents every day. Some fall under the radar, while few are only detected when it’s too late. Ask the few Fortune 500 companies that have announced that they have been breached. But what should companies do in this situation? Prepare for the worst, hope for the best? Companies need to learn how to better adopt or enhance their proactive incident response approach to ensure the right controls are in place. After completing this session, the participants will: ● Review several case studies from various global enterprises which, using this approach, could have detected massive breaches at an earlier stage, reduced the damage caused, and lowered the cost of recovery ● Learn about the common characteristics of the latest cyber attack patterns, be exposed to an alternative to the traditional approach, and identify how they can prepare their organization or clients for a rainy day @isacala #isacalasc15 16 2015 Spring Conference Sessions Cybersecurity Nexus S7 Speaker: High Tech Cyber Crime Case Studies Donn Hoffman & Benyomin Forer Deputy District Attorneys, High Technology Crime Division, Los Angeles County District Attorney's Office Prosecutors from the Los Angeles County DA’s office High Technology Crime Division will discuss the role of law enforcement in incident response and data breach situations. They will demonstrate emerging issues pertaining to technological crimes as well as bring awareness to the community on potential cyber threats. After completing this session, participants will be able to: ● Understand emerging issues pertaining to technological crimes ● Gain awareness as part of the community on potential cyber threats ● Know when and how to report an incident to law enforcement ● Learn about recent cybercrime cases prosecuted in Los Angeles S8 Speaker: Cyber Threats: Industry Trends and Actionable Advice Michael Sprunger Advisory Consultant, Practice Lead, EMC Consulting Cyber-attacks are becoming both more sophisticated and more common, with all types of systems, information, and devices being targeted. Recently there have been a number of high profile breaches that resulted in significant business impact for the targeted organization. If you can’t prevent, you must detect; if you can’t detect you can’t correct. Speaker's learning points ● examine common trends and strategies used in these attacks ● learn best practice advice for mitigating the risk @isacala #isacalasc15 17 2015 Spring Conference Sessions Cybersecurity Nexus S9 Speaker: Is Your Organization Prepared to Manage a Cyber-attack? Ren Powers Vice President & Manager, City National Bank While technically there are a variety of possible cyber-attacks and recovery options, this session will focus on the operational response and the associated risks of not being prepared to manage this type of incident. Using a playbook approach we will identify the activities associated with planning prior to an incident, the actions that are taken during the incident, and finally those tasks that must be done after the incident is over. This approach will enable us to define roles and responsibilities of the incident response team and to insert the business continuity aspects that will enhance the company's response to the incident. And throughout, the key operational activity: internal and external communications. Participants will be provided with a test scenario that can be used to either develop or evaluate an incident response plan. After completing this session, participants will be able to: ● Define the major cyber-attack categories ● Develop a cyber-attack response plan if you don't have one in place ● Evaluate your plan and maybe identify gaps to be remediated ● Review your organization's communications plan to determine if cyber-attacks are covered ● Define roles and responsibilities for a cyber-attack incident response team ● Understand how business continuity planning ties into the response to a cyber-attack incident, and what aspects of a business continuity program can be used to better focus the response S10 Speaker: The Compliance of Cybersecurity Larry Stewart VP of IT Compliance / Information Security, PennyMac LLC Compliance regulations and frameworks such as the Payment Card Industry (PCI), Data Security Standard (PCI/DSS), FFEIC and ISO 27000 offer the illusion of reasonable security but hardly provide effective protection against resolute attacks and lack the flexibility of adjusting to a company's true security needs.This session will provide the audience with the additional tools required to evaluate the options and develop an effective information security program that goes beyond the checklist approach. Continuous monitoring programs, the development of security metrics and the blend of frameworks such as ISO 27000 with the regulatory requirements are just some of the tools available to bridge the gap between compliance and risk reduction. After completing this session, partipants will be able to: ● Better understand cybersecurity regulations and the reasonable standard. ● Realize the benefits of going beyond the "checklist approach" and ensuring coverage of key controls and basics ● Benefit from insights gained regarding the incorporation of Continuous Control Monitoring into the Cybersecurity defense program @isacala #isacalasc15 18 2015 Spring Conference Sessions Cybersecurity Nexus T1 Speakers: Bridging the Gap between Data Privacy and Security Nasr Ziaee Manager, Deloitte & Touche LLP Ali Husami Senior Consultant, Deloitte & Touche LLP Organizations today are burdened by the risks associated with the protection of sensitive information, which includes both intellectual property and personal information. It does not help that increasingly stringent privacy regulatory requirements and customer/employee expectations often result in requirements that conflict with the organization's security requirements. These conflicts, make it difficult for the uniform implementation of security and privacy programs and this results in gaps - gaps that are increasingly being exploited by individuals and groups with malicious intent. This session provides an overview of what some of these typical conflicts and gaps are and options and means that organizations and security/privacy professionals may use to stay ahead of the curve as they reduce risk while nurturing and growing their organization's security and privacy programs. After completing this session, participants will be able to: ● Better understand current security risks associated with the use of company information resources by employees for their personal use ● Feel more confident in their knowledge of global privacy requirements and employee expectations for companies with global operations ● Come away with knowledge of the options available for companies to balance (conflicting) security and privacy requirements ● Determine what's the right option for your company and how to operationalize these changes at your company T2 Speakers: Social Media Risks John Hicks IT Audit Director, Walt Disney Company Richard Lee Senior Manager, Ernst & Young LLP Social media has reinvented the relationship between companies, customers, employees, suppliers and regulators, shortening processes that used to take days or weeks down to just hours or minutes. But in addition to the many opportunities that social media generates, there are also many new challenges. Social media and everyone who has internet access can quickly build a company’s brand, but it can, with equal, speed crush it. Only by building a broad and comprehensive approach to social media can organizations realize the effective governance and its resulting clarity needed to effectively protect and strengthen a brand. After completing this session, the participants will be able to: ● Understanding Social Media and how it affects your organization ● Gain a better understanding about common guidelines for Social Media Governance and what they entail ● How can a company’s Internal Audit function assist in assessing and mitigating the inherent risks of leveraging social media @isacala #isacalasc15 19 2015 Spring Conference Sessions Cybersecurity Nexus T3 Speaker: Six Forces: Developing a Resilient Security Program James Christiansen Vice President, Information Risk Management, Accuvant With more than 700 security technologies to consider, millions of threat actors to detect, and new attack vectors to defend against, today's information security leaders need to balance a more complex environment than ever before. And simply working harder will not solve the problem. Information security management must completely rethink the way they do business by transforming from being reactive and infrastructure-focused to proactive, business-aligned security leaders. They can start this evolution by developing a resilient security strategy considering the Six Forces of Information Security. This presentation will share thoughts from the corner office on how awareness and monitoring of these six forces is essential to effectively managing risk, maximizing capital effectiveness, and empowering your organization to pursue business advantages. After completing this session, participants will be able to: ● Understand the evolution of security landscapes requires a proactive, business-aligned security approach and how the Six Forces of Security Strategy can help security leaders make this transformation. ● Know how completing a threat analysis after understanding the business objectives and exposures leads to a business-aligned security program. ● Apply concepts, framework and tools essential for enabling people, process and technology to collaborate and rede fine a next-generation security strategy program. ● Employ actionable insights to recalibrate security defenses and protect intellectual property. T4 Speaker: “Where are the bad guys hiding?” – A Forensic Approach to Incident Response Peter Morin Senior Information Security Consultant, Bell Aliant Our networks and systems are under siege by attackers more now than ever. What a scary time to be a systems administrator, application owner or CEO. Organizations are looking everywhere for solutions to assist them in identifying threats on their networks and the real-time knowledge on when and how to respond to incidents. This session will provide the attendee an overview of basic incident response techniques and forensic practices to identify a potential breach in their network. It will assist the attendee to answer the real important questions of how the intruder got into the network, what they stole, and what type of defenses could mitigate a future attack. After completing this session, the participants will be able to: ● Understand some of the popular incident response processes ● Review the concept of indicators of compromise and specific forensics tips and tricks that organizations can use to identify possible attacks and breaches of their networks and applications ● Walk through some real-world examples such as the Target and Home Depot breaches and learn some valuable indicators of compromise, techniques and tools that could be used to identify and suppress these attacks @isacala #isacalasc15 20 2015 Spring Conference Sessions Cybersecurity Nexus T5 Speaker: Industrial Control Systems (ICS) Threats and Solutions Douglas Rhoades Chief Engineer Cybersecurity, Southern California Edison Cyber security is one of the most important policy and technology topics an organization must address. Critical infrastructure for energy and utilities is vital to personal safety, economic growth and national defense. Threat actors continue to seek to exploit potential vulnerabilities in the U.S. national electric grid and other energy infrastructures. Such attacks and disruptions are becoming increasingly sophisticated and dynamic. Also, as the planet becomes smarter and increasingly interconnected, this technology may represent new vectors of attack on information systems. This interconnectedness can enable many new efficiencies and conveniences, but it also means that, while every business must continue to refine and improve its security capabilities, critical infrastructure industries, like electric utilities, must become more and more proactive in their approach. After completing this session, participants will be able to: ● Better understand Threat actors ● Benefit from insights into the ICS threat environment ● Benefit from a better understanding of the weakness of ICS ● Plan with an enhanced understanding of mitigation strategies T6 Speakers: Contract and Records Management Jason Messer Senior Solutions Engineer, Laserfiche Douglas Van Gelder IT Manager, County of Los Angeles Community Development Commission Kelsey Frost Sales Engineer, Laserfiche Accumulation of electronic records on shared drives and other repositories are costly to an organization. But increased IT costs to support excess data is nothing compared to the potential cost of litigation and reputational risk. Improperly indexed data is difficult to delete, meaning old information remains on the system and is amenable to legal discovery. The Community Development Commission of the County of Los Angeles (CDC) has been using Laserfiche as an electronic document management system for years, and has recently undertaken a project to implement records management throughout the organization. This will allow the CDC to automatically find records eligible for deletion in their system keeping risk, and IT cost, at a minimum. Come join us as we speak about the records and information governance challenges LACDC has encountered, and the experiences and lessons learned in moving the LACDC to a recordscentric approach to electronic document management. We will also cover the DoD requirements for records manageement and other leading industry standards After completing this session, the participants will be able to: ● Articulate the risks associated with accumulation of excess data ● Understand the DoD requirements for records management ● Assess their organization's need for records management and governance ● Avoid common mistakes learned through experience by industry leaders @isacala #isacalasc15 21 2015 Spring Conference Sessions Cybersecurity Nexus T7 Speaker: Web Application Security & SDLC Peter Morin Senior Information Security Consultant, Bell Aliant Many traditional application development methodologies do not specifically incorporate security into their life cycles. Security requirements should provide input into every phase of the Software Development Life Cycle (SDLC), from requirements gathering to design, implementation, testing and deployment. This presentation discusses the importance of application security and describes how the role of application developers must change in response to new security threats. After completing this session, the participants will be able to understand: ● An introduction secure application coding methodologies - OWASP, NIST and WASC ● Web application security problem ● The effect of compliance on application security (i.e. PCI-DSS, SOX, etc) ● Some of the common attack scenarios (i.e. XSS, SQL Injection, Cookie Attacks, etc) ● The current state of web application development methodologies and the challenges faced when following these methodologies to develop secure web applications ● Integrating security into the SDLC (i.e. project plan, design reviews, test case development, defect tracking, etc.) ● Practical testing strategies and concepts as they relate to application security ● Use of automated tools in the testing process T8 Speaker: Secure by Design, Privacy baked in and Defending Data Objects Rakesh Radhakrishnan Senior Director, Security Architecture & Engineering, Princess Cruises Given the constant news around Identity Theft and Data Breaches, including the recent Anthem breach, Enterprises need to rethink their architecture, design and strategy for Data Security and Data Protection. It is imperative that we go beyond Intrusion Detection, Intrusion Prevention, and build systems that can Tolerate Intrusions (Intrusion Tolerance), where in the data objects themselves are self defending while at REST, in Use and in Transit. This presentation will describe an innovative approach to embedding access policies into data objects based on the "Privacy baked in" principle. It will cover the business value proposition of ensuring a common policy construct for DataBase Firewalls, DLP systems, and Cloud Data Tokenization ensuring an Integrated Defense strategy. After completing this session, participants will be able to: ● describe privacy use cases around PII, PCI, PHI etc. ● understand the pain points or GAPS in the as-is state of Data Security (global enterprises) ● understand the need for end to end, comprehensive, consistent, and cohesive controls ● understand how to design self defending data objects with standards based policy constructs ● gather key take aways/lessons learned from a multi-vendor POC study @isacala #isacalasc15 22 2015 Spring Conference Sessions Cybersecurity Nexus T9 Speaker: Architecture for Secure Cloud Computing Arshad Noor CTO, StrongAuth, Inc. Unless your organization is unique, not all your data is sensitive. This raises the question: should scarce security resources be used to protect 100% of your data? The logical approach should be to build your IT infrastructure in a manner that optimizes your investments: protecting what matters while managing non-sensitive data with minimal controls. This session presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management Infrastructure (EKMI) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. We call this Regulatory Compliant Cloud Computing, or RC3. After completing this session, participants will be able to: ● Distinguish between different application architectures used over the last four decades ● Understand why securing sensitive data in the Cloud is impossible with current technology ● Appreciate why a new application architecture is necessary for securing data in the Cloud ● Identify security gaps in securing sensitive data in the Cloud T10 Speaker: Next Generation Firewalls (NGFW) Miguel (Mike) O. Villegas Vice President, K3DES LLC Recent security breaches to some of the largest and seemingly more secure environments beg the question whether existing protection mechanisms are sufficient to deter unauthorized access to critical assets. Traditional firewalls, anti-virus and intrusion prevention systems appear to have lost their usefulness. In reality, they are still very much in use; however, more robust and effective solutions are needed to keep up with those that threaten our network infrastructures. Next-Generation Firewalls are integrated network platforms that consist of in-line deep packet inspection (DPI) firewalls, Intrusion Prevention Systems, Application Inspection and Control, SSL/SSH inspection, website filtering, and Quality of Service (QoS)/bandwidth management in the network to protect the network against latest sophisticated attacks. This session will cover NGFW features, uses, business case and vendor offerings. It will also provide the participant with a roadmap on how to audit and manage a NGFWs. After completing this session, participants will be able to: ● Better understand what is a Next Generation Firewall? ● Gain knowledge in how do they differ from UTM? ● Better understand what are NGFW features and how do they work? ● Better understand how to make a business case for a NGFW ● Gain knowledge in how to audit and manage a NGFW @isacala #isacalasc15 23 2015 Spring Conference Sessions Designing and Managing Governance, Risk and Compliance G1 Speaker: Audit Strategy: Ongoing Cybersecurity Assessments Brad Ames Director, Internal Audit, Hewlett Packer Corporation The velocity and impact of cybersecurity risk requires an innovative assurance strategy. Separate evaluations that offer a point-in-time report are not in step with the pace of cybersecurity risk. Rather, ongoing evaluations that provide a forward looking communication of cybersecurity risk will increase IT audit value. This segment will present a model for providing continuous assurance through ongoing evaluations of cybersecurity risk and controls. IT general controls are foundational, however unlikely to offer a complete solution for providing assurance related to cybersecurity. The complexity of cybersecurity requires added layers of controls such as monitoring for risk, detecting exploits as they happen and prompting corrective action. After completing this session, participants will be able to: ● Understand ongoing assurance techniques that will be required to measure changes to security configurations, monitor emerging risk outliers and trends and enact timely response and remediation ● Collaborate on key cybersecurity risk indicators for IT audit leadership in order to isolate outliers for the audit plan G2 Speaker: How the COBIT Framework can help the Auditor Audit the Cyber Enterprise Mark Stanley IT Audit Manager, Toyota Financial Services Cyber warfare is a reality. Major companies are being attacked and virtually destroyed. Reputation risk is a nice buzz word but the reality is companies are being held hostage, economically devastated and driven out of existence. Cyber Terrorism is real and can be devastating to your enterprise. Government response is antiquated. What can you do as the last line of defense in your organization? How can you adapt to this new universe and defend your virtual organization? You can adapt COBIT to meet your Audit Committee's demand for your assurance services. This session will demonstrate the possibilities. After completing this session, participants will be able to: ● Define the Cyber Enterprise and your Cyber Risk ● Gain a better understanding of the importance of Board and Management Cyber Awareness ● Extend their vision beyond the Conventional Security Management Program ● Learn how to build a Framework for Cyber Enterprise Audit Assurance ● Better understand Audit Program Considerations @isacala #isacalasc15 24 2015 Spring Conference Sessions Designing and Managing Governance, Risk and Compliance G3 Speakers: IT Vendor Risk Management Christopher Garlington Manager, IT Vendor Risk Assessments, Disney Global Information Security Jeremy Yates Senior Security Specialist, Disney Global Information Security Most companies are increasing their reliance upon third parties to improve key processes or realize cost savings. Depending on the third party’s role in the critical business process and the data involved, the risks may increase. Risks may include regulatory non-compliance, data breach, operational failure, or brand/reputational risks among others. This session will discuss the basic elements of an IT Vendor Risk Management program. This includes vendor discovery, assessment methodology, reporting, issue tracking, and contract best practices. This session hopes to provide you with the basic building blocks to create or refine your process for identifying and mitigating risks related to third parties. After completing this session, the participants will be able to understand: ● Basic building blocks for vendor risk management ● How to create or refine your process for identifying and mitigating risks related to third parties G4 Speaker: Practical steps to managing IT Risk: Value Creation and Governance Brian Barnier Principal Analyst & Advisor, ValueBridgeAdvisors “I need more business benefit from IT,” “I need to be able to seize more opportunity in the economic recovery,” “How do we get IT to do what we need and do it now?” Business leaders are asking tough questions, urgent questions and need good answers. Too often IT leaders shy away from direct answers. Clear answers begin with understanding how business value is selected, created, delivered and measured. This leads to clarity on how Business-IT initiatives deliver value. This leads to the importance of managing risk to the value cycle. After completing this session, the participants will be able to: ● Prioritize IT initiatives to create value ● Implement IT initiatives to enable value ● Operate the IT lifecycle to deliver value ● Manage risk to maximize return on the IT portfolio ● Manage change for continual improvement @isacala #isacalasc15 25 2015 Spring Conference Sessions Designing and Managing Governance, Risk and Compliance G5 Speaker: Common GRC Management Mistakes Brian Barnier Principal Analyst & Advisor, ValueBridgeAdvisors GRC is a hot topic. Hype has surrounded many techniques and software. Professionals and organizations have rushed to embrace these. Most recently, organizations are questioning the time and cost of many of these approaches. More they’re asking, are some of these techniques more than wasteful? Do they provide a false sense of security? Worse, are they dangerously distracting from more serious problems? Tough questions deserve answers. This session includes answers from the OCEG Red Book (the COBIT of the GRC world) and presented by Brian Barnier, co-chair of the OCEG Steering Committee. If you’ve got questions, this session is for you. After completing this session, the participants will be able to: ● Understand the differences between governance and program management, managing risk to compliance and man aging risk to performance objectives – and what each requires to be successful ● Describe the difference between types of compliance and implications for business objectives ● Describe the difference between tactical compliance and strategic compliance, and what that means for a GRC professional ● Identify the “serious six” dangerous techniques ● Understand the assumptions and limitations of the serious six G6 Speaker: GRC Process Optimization through Effective Use of Technology Kevin Berman Director - Southern California GRC Market Leader, PricewaterhouseCoopers LLP Joe DeVita Partner - GRC Technology, PricewaterhouseCoopers LLP In today's constantly changing Enterprise GRC environment, alignment between People, Process, and Technology is paramount to the success of building an effective GRC Program. While there is not a 'one size fits all' approach to building a GRC Program, the ability to understand the big picture within the Enterprise is a critical success factor understanding this alignment. After completing this session, participants will be able to: ● Understand key organizational drivers for Enterprise GRC Integration initiatives ● Better align Enterprise GRC Efforts in terms of standard Enterprise elements: People, Process, and Technology ● Conceptualize how Enterprise elements and business requirements align to GRC Technology ● Determine how to identify GRC Technologies which best addresses the needs of the business ● Benefit from lessons learned from past GRC Technology deployments @isacala #isacalasc15 26 2015 Spring Conference Sessions Designing and Managing Governance, Risk and Compliance G7 Speaker: Devising Internal Controls for Enterprise SaaS Chong Ee Senior Finance Systems Manager, Twilio With the enterprise increasing reliance on software as a service (SaaS) for operational and accounting processes, one is tempted to think that internal controls over transaction completeness, accuracy and validity have been redistributed to SaaS vendors armed with SSAE reports. Despite its ease of adoption, lack of sunk cost and pay as you go model, enterprise SaaS is not without accompanying risks. The presentation will demonstrate how a combination of factors - nontechnical users in smaller organizations, the ease of customization through point and click, as well as the high likelihood of integrating with other SaaS in completing a transaction lifecycle - can lead one to rethink existing internal controls. Other areas such as identifying and handling rogue IT - the use of SaaS not for its intended purpose or to compete with internal mandated products - would also be covered After completing this session, participants will be able to: ● Understand how enterprise SaaS is different from traditional ASP models ● Identify unique characteristics of users who adopt enterprise SaaS ● Appreciate the myriad of ways multiple SaaS can integrate to support an Order-to-Cash or Procure-to-Pay transaction lifecycle ● Gain insight into the ease of customizing SaaS, and accompanying risks ● Tailor internal controls to address an enterprise use of SaaS during implementation as well as post go-live G8 Speaker: COBIT In Action: Practical IT Audit Lessons Nelson Gibbs Director and Senior Audit Manager, Union Bank Where does IT Audit fit in the IT universe, and how can COBIT be used to strengthen an organization's technology use? Over the past two years I've led our IT Audit department as we pursue a predominantly COBIT aligned methodology and observed the challenges and benefits as we've become more mature and robust in our approach. At the same time our IT function has also begun to deploy COBIT to assist in risk management and governance of IT processes and activities. Come hear about some experiences and lessons learned in the field from the front line of COBIT use. After completing this session, participants will be able to: ● Understand how COBIT supports IT audits as part of the enterprise Internal Audit plan ● Learn how the generic COBIT framework is adapted for IT audits ● Identify how COBIT can benefit IT and other business functions ● Discuss how audit findings can help or hurt IT success ● Demonstrate how IT and IT Audit can work together to improve the organization @isacala #isacalasc15 27 2015 Spring Conference Sessions Designing and Managing Governance, Risk and Compliance G9 Speaker: Governance, Compliance and Ethics of Potential Access Gaps in Complex Systems Eric Read Associate Director, Audit, Risk Management and Compliance, UnitedHealth Care Logical access to most systems are governed by assigned roles. However, complex systems may require access controls outside of the defined roles. This may be due to requirements for specific access to the system front end, back end, database and even require options such as security levels and template access. If these points of access are not controlled within the specific roles, the annual Entitlement reviews used to demonstrate compliance may not be complete and accurate. This can easily lead to gaps in compliance. Accurate access compliance is a daily control, and additional processes may be necessary to manage compliance gaps in complex systems. So what do we do? Continue to hide the complex non-role based access controls from the auditors? We will review a sample complex systems, and discuss the Governance, Ethics and Compliance issues a complex system presents. After completing this session, participants will be able to: ● Better understand issues of compliance within a complex system ● Better understand the issue of access control in complex systems ● Gain knowledge in recognizing, managing and resolving compliance gaps within complex systems. ● Gain an understanding of the ethics of disclosure/non-disclosure of potential gaps in complex systems ● Discuss the value of improved Governance of access within Complex Systems G10 Speaker: Leveraging Pen Testing to Augment the Audit Lee Neely Senior Cyber Analyst, Lawrence Livermore National Laboratory (LLNL) Auditing and Pen Testing are both disciplines that find system weaknesses and confirm strengths for a customer who doesn't necessarily embrace the activity and resists accepting the results. In this talk Lee will discuss the phases of a Pen Test, and how that emulates a real cyber or physical attack, how Pen Tester's activities differ from real attacks, and the methods used to prove results while doing no harm. Specifics on how an audit can leverage Pen Testing to provide a customer a better overall assessment of their environment and the challenges of creating a final report that the customer can understand and is actionable will be reviewed as well. ● After completing this session, participants will be able to: ● Understand the five phases of a Pen Test ● Differentiate between a Pen Test and an Attack ● Benefit from the knowledge of how Pen Testing can augment Audit activities ● Utilize the gained insights into the similar challenges Auditors and Pen Testers face @isacala #isacalasc15 28 2015 Spring Conference Sessions Technical Eduction Luncheon Sessions Technical Education Session 1 (sponsored by ANRC) E1 Speaker: Assuming Network Compromise: How changing your security perspective leads to proactive threat detection and prevention Nathan Swain President, ANRC Computer and network security has come a long way at a rapid pace, yet we still have devastating data and security compromises each year in all industries. Producing and maintaining static attack signatures and Anti-Virus databases against modern and dynamic malware is no longer a viable option for information assurance. Today we have to be proactive and assume the bad guys are already past our defenses. The best defense is truly a good offense! After completing this session, the participants will be able to: ● Strategize the best approach for implementing a pro-active network defense posture ● Compare and contrast the differences between legacy network security and this new security paradigm Technical Education Session 2 E2 Developing the most current content. Please check the website for the latest description! www.isacala.org/conference @isacala #isacalasc15 29 The center of cybersecurity knowledge and expertise. TM CYBERSECURITY NEXUS Created by the leading minds in the field, Cybersecurity Nexus™ (CSX) brings you a single source for all things cybersecurity. From certification, education and training — to webinars, workshops, industry events, career management and community — you’ll find everything you need to take your career to the next level. And, we’ve designed CSX to help you every step of the way, no matter what your level of experience. Connect with the resources, people and answers you need… visit us today at isaca.org/cyber. global conferences membership certifications training knowledge education career management Sponsors Platinum Sponsor Laserfishe Since 1987, more than 35,000 organizations worldwide—including federal, state and local government agencies and Fortune 1000 companies—have chosen Laserfiche® enterprise content management (ECM) software to streamline document and business process management (e.g., accounts payable, case management, third party and contract management, records management). www.laserfiche.com The Laserfiche ECM system is designed to give IT central control over their information infrastructure, including standards, security and auditing. From securing database and communication channels to securing a specific word on a document or file, Laserfiche provides flexible, granular options to allow each organization to tailor a security policy to its needs. DoD 5015.2- and VERS-certified records management functionality provides a multi-faceted set of information governance tools to manage a document’s life cycle from initial capture to a lasting record. Laserfiche is headquartered in Long Beach, CA, with offices in Hong Kong, Shanghai, Toronto, Mexico, London, Washington, D.C., and Fort Lauderdale, FL. Gold Sponsor RSA RSA, The Security Division of EMC, is the premier provider of intelligencedriven security solutions. RSA helps the world’s leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats. RSA delivers agile controls for identity assurance, fraud detection, and data protection; robust Security Analytics and industry-leading GRC capabilities; and expert consulting and advisory services. www.emc.com/domains/rsa/ Silver Sponsors Newegg Business NeweggBusiness is a leading provider of a full range of IT products and solutions for small businesses, government agencies, healthcare, educational institutions and system integrators. Since our founding in 2009, we have been committed to helping our customers extend their IT capabilities by providing a suite of computing products, networking solutions, data management & storage, communications and secure cloud hosting services. It has always been our mission to continuously improve the learning, searching, buying and managing of all your IT procurement needs. www.newegg.com @isacala #isacalasc15 31 Sponsors Accuvant www.accuvant.com Accuvant is your source for information security success is the premier source for enterprise security solutions. We provide a comprehensive suite of information security strategy and IT security consulting services, managed security services, and technology resale and integration services. We are the only company that serves as a client advocate, holistically addressing information security needs ranging from the program level all the way down to the project level. We help organizations plan, build and run successful information security programs, solve focused security problems, and execute specific IT security projects. Deloitte www2.deloitte.com Deloitte provides industry-leading audit, consulting, tax, and advisory services to many of the world’s most admired brands, including 70% of the Fortune 500. Our people work across more than 20 industry sectors with one purpose: to deliver measurable, lasting results. We help reinforce public trust in our capital markets, inspire clients to make their most challenging business decisions with confidence, and help lead the way toward a stronger economy and a healthy society. As a member firm of Deloitte Touche Tohmatsu Limited, a network of member firms, we are proud to be part of the largest global professional services network, serving our clients in the markets that are most important to them. Clients count on Deloitte to help them transform uncertainty into possibility and rapid change into lasting progress. Our people know how to anticipate, collaborate, and innovate, and create opportunity from even the unforeseen obstacle. Palo Alto Networks, Inc. www.paloaltonetworks.com Palo Alto Networks, Inc. provides enterprise security platform to enterprises, service providers, and government entities worldwide. Its platform includes Next-Generation Firewall that delivers application, user, and content visibility and control, as well as protection against network-based cyber threats; and Threat Intelligence Cloud that offers central intelligence capabilities, as well as automated delivery of preventative measures against cyber attacks. We are leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Because of our deep expertise, commitment to innovation and game-changing security platform, thousands of customers have chosen us and we are the fastest growing security company in the market. With our platform, organizations can safely enable the use of all applications, maintain complete visibility and control, confidently pursue new technology initiatives like cloud and mobility, and protect the organization from cyber attacks - known and unknown. @isacala #isacalasc15 32 Sponsors Bronze Sponsors Bit9 Bit9 + Carbon Black provides the most complete solution against advanced threats that target organizations’ endpoints and servers, making it easier to see—and immediately stop—those threats. The company enables organizations to arm their endpoints by combining continuous, real-time visibility into what’s happening on every computer; real-time signature-less threat detection; incident response that combines a recorded history with live remediation; and prevention that is proactive and customizable. www.bit9.com More than 1,000 organizations worldwide—from Fortune 100 companies to small enterprises—use Bit9 + Carbon Black to increase security, reduce operational costs and improve compliance. Leading managed security service providers (MSSP) and incident response (IR) companies have made Bit9 + Carbon Black a core component of their detection and response services. EY www.ey.com About EY's Advisory Services: Improving business performance while managing risk is an increasingly complex business challenge. Whether your focus is on broad business transformation or, more specifically, on achieving growth or optimizing or protecting your business, having the right advisors on your side can make all the difference. Our 30,000 advisory professionals form one of the broadest global advisory networks of any professional organization, offering seasoned, multidisciplinary teams that work with our clients to deliver powerful and exceptional client service. We use proven, integrated methodologies to help you resolve your most challenging business problems, deliver a strong performance in complex market conditions and build sustainable stakeholder confidence for the longer term. We understand that you need services that are adapted to your industry issues, so we bring our broad sector experience and deep subject matter knowledge to bear in a proactive and objective way. Above all, we are committed to measuring the gains and identifying where your strategy and change initiatives are delivering the value your business needs. KPMG www.kpmg.com KPMG LLP, the audit, tax and advisory firm, is the U.S. member firm of KPMG International Cooperative ("KPMG International"). KPMG International’s member firms have 145,000 professionals, including more than 8,000 partners, in 152 countries. KPMG delivers a globally consistent set of multidisciplinary services based on deep industry knowledge. Our industry focus helps KPMG professionals develop a rich understanding of clients' businesses and the insight, skills, and resources required to address industry-specific issues and opportunities. @isacala #isacalasc15 33 Sponsors PWC www.pwc.com PwC is one of the world's largest providers of Assurance, Tax, and business consulting services. We believe that the best outcomes are achieved through close collaboration with our clients and the many stakeholder communities we serve. So every day, our people work hard to build strong relationships with others and understand the issues and aspirations that drive them. We provide industry-focused assurance, advisory and tax services for over 90% of the companies in the FT Global 500 list. And we advise and work with over 100,000 entrepreneurial and private businesses across the world. More than 195,000 people in 157 countries across our network share their thinking, experience, and solutions to develop fresh perspectives and practical advice. In the United States, PwC currently consists of more than 36,000 partners, principals, and staff The Walt Disney Company Disney Technology teams ensure we tell our stories in the most innovative ways. We deliver a full range of services that span across each of our businesses and provide the opportunity to engage people through innovative, immersive and interactive technology. We work on multiple platforms to connect with our audiences with our products such as Watch Apps at ESPN & ABC, Disney Movies Anywhere, My Disney Experience, Imagicademy and interactive games such as Disney Infinity and Star Wars Commander. thewaltdisneycompany.com Event Sponsors CISO Luncheon Meeting Sponsor Allgress www.allgress.com ● The Allgress Business Risk Intelligence Module provides security and risk professionals with an immediate, intuitive and comprehensive view of their organization-wide security and risk posture. ● The Allgress Security and Compliance Assessment Module enables security and risk professionals to perform security and compliance assessments that simplify the compliance audit process. ● The Allgress Vulnerability Management Module lets security and risk professionals make sense of vulnerability data collected across complex, global networks. ● The Allgress Incident Management Module allows security and risk professionals to manage security incidents and investigations. ● The Allgress Policy and Procedures module provides security and risk professionals with the ability to manage internal security and regulatory compliance policies and procedures that support the unique security and compliance goals of your organization. @isacala #isacalasc15 34 Sponsors Education Session Sponsor ANRC Services ANRC is an industry leading firm focused on Advanced Cyber Security Training, Enterprise Threat Assessments, and Innovative Security Solutions. ANRC draws upon experience obtained at the frontlines of today's cyber conflicts to develop its progressive and comprehensive security solutions for the defense of private enterprises. www.anrc-services.com