Hi {{ session.user.profile.firstName }}

ISACA Online Events

  • Date
  • Rating
  • Views
  • Emerging technology will be the dominant driver of business innovation for the foreseeable future – research shows the biggest constraint on their adoption is the lack of awareness amongst business leaders of their likely business value. This presentation will give timely and authoritative information to help enterprise leaders be more agile in strategy-setting and execution by evaluating both the opportunities and risks of new technology.
  • While we hear about data breaches in the news, until now, there has been very little information available on data exfiltration – the unauthorized transfer of data from the organization.

    In this webinar, data protection experts from McAfee Foundstone Professional Services and Intel Security will discuss the results of Intel Security’s 2015 primary research on data exfiltration. Take a deep dive into the latest research results on common data exfiltration techniques used by both external and internal actors, quantitative data on data loss attempts, and data loss prevention processes and tools used by companies.

    If you are responsible for data privacy or in charge of compliance enforcement at your company, don’t miss this webinar to learn about:

    • Top exfiltration actors and the data they target
    • Common exfiltration tools and techniques
    • How to prepare your data protection defense
  • Large, established enterprises may inadvertently limit their potential to innovate. Risk controls put in place to ensure industry compliance, information security, and operational oversight can also slow the pace of change. Well-meaning legacy risk controls, may thereby contribute to a larger risk: the viability and success of new products and the relevance of a firm itself.

    To help innovators within large firms move their initiatives forward, a new kind of risk manager is useful; an Innovation Risk Manager. In this session, we will examine the hard and soft skills necessary to manage innovation risk, including:

    · Aligning risk analysis with product roadmaps and rapid release cycles

    · Mediating disagreements between product and risk professionals

    · Developing Key Risk Indicators (KRIs)

    · The role of formal governance and approvals
  • Security threats and increased regulation of personally identifiable information, payment card data, healthcare records, and other sensitive information have expanded the use of encryption in the data center and cloud. As a result, management of encryption keys, certificates, wallets, and other secrets has become a vital part of an organization’s ecosystem, impacting both security and business continuity. Join this ISACA and Oracle webcast as we examine the challenges with encryption, on premise and in cloud, and how key management best practices can help facilitate the secure deployment of encryption across the enterprise. Challenges we’ll address include:
    •Managing encryption keys, Oracle Wallets, Java Keystores and Credential files across the enterprise
    •Securely sharing keys across authorized endpoints
    •Auditing key access controls and key lifecycle changes
    •Detailed management reports
  • The immediate role of audit independence is to serve the audit, and the objective of the audit is to improve the reliability of information used for investment, critical decisions, and compliance. However, auditors possess knowledge of risk and assurance as well as other concepts that can be of benefit to the enterprise with implementing new processes and systems. As a result auditors are called upon to contribute to strategic projects. Ultimately, audit must evaluate if their involvement presents a risk of impaired objectivity.

    Nathan Anderson, CISA, CRISC
    Jim Enstrom
    Diana Kelley, Executive Security Advisor (ESA) to IBM Security
  • We live in a world where everything is driven by applications, connectivity, and mobility. Your customers are now far more likely to interact with your enterprise through software than a live person, and employees are conducting more business on mobile devices than traditional laptops and workstations. A critical success factor for thriving in this new reality is the ability for the enterprise to accurately identify users in a way that is both convenient to them and cost effective, while also protecting their identities and data from potential fraudsters.

    Join this webcast where Carol Alexander, Head of Authentication Solutions, and Charley Chell, Security Advisor, from CA Technologies will discuss how you can transparently leverage data from mobile devices to help identify the legitimacy of a user attempting to login or perform a sensitive transaction. Learn the key factors and considerations in using contextual authentication within your mobile applications to protect against inappropriate access and data breaches.
  • Vivimos en tiempos de cambios acelerados y retos constantes. La cantidad de datos que se crea cada día, cada minuto, cada segundo, alcanza volúmenes sorprendentes. Eric Schmidt, Chairman Ejecutivo de Google dijo: “Desde el nacimiento de la civilización hasta 2003, la raza humana generó 5 exabytes de datos. Ahora, producimos 5 exabytes cada dos días... y el ritmo se está acelerando”. Así, el volumen de datos que generamos, la velocidad con que los creamos y la variedad que utilizamos, forman lo que ha sido conceptualizado como Big Data. Un complejo y vasto mar de datos que está ahí disponible para ser usado, estudiado y comprendido a través de poderosas y complejas técnicas de análisis que permitirán a organizaciones de todo tipo comprender mejor su entorno, pero ¿Qué riesgos enfrentamos al explorar estos modelos? ¿Cómo puede afectarse a la seguridad de la información? y, más importante ¿Qué efectos puede tener en la gente?

    Acompañe a ISACA y a Carlos Chalico en una conversación sobre Riesgos en el Manejo de Big Data y Analíticos, familiarícese con estos conceptos, con los riesgos que se les relacionan y con las medidas de control que puede definir al respecto. Le recomendaremos algunos libros que leer y, sobre todo, le prepararemos para que esté listo para atender las conferencias del próximo LatinCACS que tendrá lugar del 21 al 22 de septiembre en la Ciudad de México.
  • Greg will discuss his views on Career Insights, the challenges and hidden opportunities that lie in front of you.

    Also, in light of personal and career development towards the management ladder, Greg will discuss his views on developing executive presence in order to recognize behaviors and actions to ensure a more successful journey.
  • Data breaches and their aftermath are commonplace, with no signs of slowing. The threats you face today are created by savvy criminals leveraging advanced techniques to surgically target network openings you may not know you have. And while the situation is serious, with certain smart network changes and a healthy-dose of ‘knowing your enemy,’ the prognosis is quite good.

    Join Intel Security experts as they offer forensic insight into recent research that identified five of the most common network attack methods that data thieves love to use. This session will provide practical guidance on how criminals view your network, how to use that information to maintain a dynamic security profile, and ways to minimize the likelihood of a breach and its injurious repercussions.
  • ISACA and the RSA undertook a survey in early 2015 to understand the State of Cybersecurity and the implications on you, your role and your organization. The session will present the key results from the survey including the current threats and vulnerabilities, changes in the threat landscape and where the threats are coming from, how enterprises are responding and where are the gaps in the industry and with staff. The results will include implications including skills gaps for employers who are looking to solve their growing cyber challenges.

Embed in website or blog