Hi [[ session.user.profile.firstName ]]

ISACA Online Events

  • Date
  • Rating
  • Views
  • In a recent cloud predictions article, Oracle CIO, Mark Sunday predicts “Today, the #1 reason organizations are not moving to the cloud is security. However, tomorrow, security will be one of the most important drivers to move to the cloud.” A survey by Harvard Business Review Analytic Services (sponsored by Oracle) found that 62 percent of respondents thought security issues were by far the biggest barriers to expanding cloud adoption at their companies. But those very same concerns will soon drive organizations to the cloud. Join this Oracle and ISACA webcast to learn how established cloud vendors with a solid security track record have the expertise and resources to deploy layers of defense that many companies can’t hope to duplicate in-house.
  • In recognition of Data Privacy Day – ISACA, in conjunction with the International Association of Privacy Professionals (IAPP) will host a webinar on the implications of the EU General Data Protection Regulation (GDPR).

    The GDPR will bring big changes for data protection in Europe. However, it will not only impact European organizations, but will have significant impact on all companies that operate globally. Companies need to start planning for the impact that the changes from GDPR will bring and move toward compliance sooner rather than later.

    The session will involve a panel discussion with both US and European professionals providing their perspective on the Regulation and how it will impact global businesses.
  • Why you need to know about mentoring:
    • Finding mentors and building excellent mentoring relationships is critical in today’s hypercompetitive job market.
    • Studies have shown that employees who receive mentoring, more likely to find well-suited career roles and move up the organizational ladder faster.
    • Employees who mentor others typically earn more (because of their role as a mentor) and are recognized as leaders.

    This webinar on mentoring will provide you with the practical how-to’s for finding mentors, establishing the relationship, being an outstanding mentee, and developing yourself as a mentor to others. We will start with understanding what mentoring is and how it works, particularly in organizations where there is no formal mentoring program and you have to do it yourself.

    We will take a pragmatic look at the elements of a sound mentoring relationship including expectations, goal-setting, feedback, reciprocity and boundaries. We will also address the process of identifying mentors and how to curate your mentor pool as your career advances. Finally, we will look at what it takes to be a great mentor, and how to develop mentoring opportunities throughout your career.
  • Discovering a breach after the malware has had time to corrupt your systems is bad. First hearing about a breach from customers or the FBI is even worse. In either case, the pressure to know what happened, to whom, and how many were affected couldn’t be greater.
    Preparation reduces the time required to resolve the breach, and includes access to network packets that may contain the malware. That preparation also means knowing how to use those packets most effectively.

    Join Savvius and renowned security investigator Keatron Evans for a live webinar on strategies for storing the network packets you need and how to effectively use the information.

    You’ll learn:
    Effective strategies for using network packets to enhance security investigations
    Making network packets available for investigations into recent breaches
    Long-term network packet storage strategies
  • Los proyectos son la herramienta para la ejecución estratégica y en esta charla se brindará un marco general sobre el aseguramiento a proyectos de TI, los principales riesgos a ser cubiertos y una síntesis sobre cuál debe ser el rol del auditor visto desde la experiencia en ambos lados: dirección de proyectos y auditoria.
  • As cybersecurity gains momentum in industries as a hot topic and buzz word, how many know how it is really impacting businesses in today’s corporate and government arenas? Where do you focus your energies? How do you know where your greatest vulnerabilities exist? Is it in e-commerce with the collection of sensitive data and credit card information on everything from a smart phone to a desktop? What do government organizations have to be concerned with to comply? How does the certifications and education you gain get applied to produce real world results?

    Join this trio of women in technology for a live webinar as they share with you the areas they see cybersecurity practically being applied in business and government. See some shocking statistics that will help you focus your cybersecurity view. Understand how wide the range of cybersecurity spans and how to get a more focused view by strategically looking at what holds the greatest risk and how companies decide where to apply their security resources.

    In this webinar, you’ll learn:
    •Cybersecurity – Living with the new reality
    •Strategic Investments to mitigate cyber risk
    •Corporate and government alignment challenges
    •Is there a false sense of security?
    •From zero tolerance to full acceptance – what does the future hold
    •Key differences with infrastructure, software, and mobility
  • As you face an increasing number of identities with the inclusion of different types of business users, techniques such as risk-based access and entitlement catalogs become essential to mitigating the risks to your business.

    Join CA Technologies for a look at current trends in the industry such as how increased interaction with business users impacts the identity management lifecycle, and the privileged identity management strategies and techniques necessary to guard against breaches. This session will offer recommendations for increasing engagement with identity services across your open enterprise.
  • Emerging technology will be the dominant driver of business innovation for the foreseeable future – research shows the biggest constraint on their adoption is the lack of awareness amongst business leaders of their likely business value. This presentation will give timely and authoritative information to help enterprise leaders be more agile in strategy-setting and execution by evaluating both the opportunities and risks of new technology.
  • While we hear about data breaches in the news, until now, there has been very little information available on data exfiltration – the unauthorized transfer of data from the organization.

    In this webinar, data protection experts from McAfee Foundstone Professional Services and Intel Security will discuss the results of Intel Security’s 2015 primary research on data exfiltration. Take a deep dive into the latest research results on common data exfiltration techniques used by both external and internal actors, quantitative data on data loss attempts, and data loss prevention processes and tools used by companies.

    If you are responsible for data privacy or in charge of compliance enforcement at your company, don’t miss this webinar to learn about:

    • Top exfiltration actors and the data they target
    • Common exfiltration tools and techniques
    • How to prepare your data protection defense
  • Large, established enterprises may inadvertently limit their potential to innovate. Risk controls put in place to ensure industry compliance, information security, and operational oversight can also slow the pace of change. Well-meaning legacy risk controls, may thereby contribute to a larger risk: the viability and success of new products and the relevance of a firm itself.

    To help innovators within large firms move their initiatives forward, a new kind of risk manager is useful; an Innovation Risk Manager. In this session, we will examine the hard and soft skills necessary to manage innovation risk, including:

    · Aligning risk analysis with product roadmaps and rapid release cycles

    · Mediating disagreements between product and risk professionals

    · Developing Key Risk Indicators (KRIs)

    · The role of formal governance and approvals

Embed in website or blog