Hi [[ session.user.profile.firstName ]]

IIA Detroit Chapter Internal Auditors

  • Date
  • Rating
  • Views
  • Evolution of Traditional Investigations and Modern Forensics Evolution of Traditional Investigations and Modern Forensics Bill Hickman, COO of CSI Corporate Security and Investigations Inc. and Peter L. Mansmann, president of Precise, Inc., a lit Recorded: Feb 16 2017 57 mins
    The use of web enabled devices has profoundly changed the world we live in. The average American now spends upwards of 10 hours per day in front of some form of electronic medium. More and more, the smart phone is becoming the device of choice to communicate, get news/information, and share social information on a real time basis. This is how people navigate through today's world and has had a significant behavioral impact as a result.

    Internal Auditors can benefit greatly from understanding how to best integrate this new wealth of information in their audits and investigations. The future of both audits and investigations will need to rely more on technology but cannot neglect the impact and role of the “human element”. Points of particular interest include:
    •social media searches to identify where someone has been and plans to be,
    •location enabled services identifying where someone's phone (and presumably they) have been,
    •devices and apps measuring and sharing individual’s mobility and activity,
    •the trend towards this data going directly to the public cloud, and
    •the emergence of the "internet of things".
  • Secrets of Deep/Dark Web Secrets of Deep/Dark Web Richard Cozart Recorded: Jan 25 2017 52 mins
    You may have heard the terms Deep and Dark web, but do you understand what they mean? There is a lot of confusion over these terms, this webinar will help give you a good understanding of the different layers of the world wide web.

    Richard Cozart, Technology administrator for IIA Detroit Chapter and Senior Security Architect at Securely Yours LLC will explain the secrets of deep dark web. He will clarify the terminology and will provide information on how to access it and what is generally available within the deep dark web.
  • Leading with Integrity & Authenticity Leading with Integrity & Authenticity Don Levonius, Principal Consultant and Master Facilitator at Victory Performance Consulting LLC Recorded: Oct 26 2016 120 mins
    Values-free leadership is an oxymoron, and leadership without authenticity is a misnomer. Integrity is the heart of leadership and authenticity is its soul. True leaders are not only ethical and transparent, they engage and influence others on a deeper, more personal level. By applying the ethical theories of notable moral philosophers and contemporary thought leaders, participants test proven ethical principles of authentic leadership.
  • Keeping Insider Risk at Bay Keeping Insider Risk at Bay Doug Copley, Deputy CISO and Senior Security & Privacy Strategist at Forcepoint Recorded: Sep 29 2016 60 mins
    Is that activity you’re seeing a malicious user? Is it someone who made a mistake? Is it coming from an account whose credentials were compromised? Is it command and control traffic? How confident are you? As security programs are maturing, attention is turning to threats emanating from inside the network. Doug Copley will discuss seven profiles of highly risky users, outline how your organization can reduce insider risk, and present a real-world case study of how a software organization protected themselves.
  • Minimizing Risks using Data Analytics Minimizing Risks using Data Analytics Opher Jackson, Retired EY Executive Director Recorded: Mar 29 2016 61 mins
    Do you want evidence that risk in your organization is not increasing?
    Do you want to address audit committee concerns about how you monitor risk within your internal audit or risk department at an enterprise or group level?
    Do you want to show that internal audit is integrating analytics to focus your audit efforts on emerging or high risk activities?
    Then this webinar may contain information you will find useful. The webinar discusses how analytics have monitored GL transactions to help internal audit and risk functions:
    •Ensure business behaviors are not changing
    •Provide visibility to executives on the impact of GL policy changes
    •Get ahead of whistle blower calls
    •Distinguish significant versus insignificant GL activity
  • Minimizing the Impact of Cyber-attacks Minimizing the Impact of Cyber-attacks Randy Gainer Recorded: Feb 23 2016 61 mins
    Randy will describe a few of the hundreds of cyberattacks he and his partners have helped clients respond to. He will describe the wider cyber-threat environment that generates such attacks. Randy will discuss the best-practice defenses businesses and other entities deploy to reduce the risk that they will be victims of cyberattacks and the tools “compromise-ready” organizations use to minimize the effects of attacks when they occur. Randy will also describe the steps business managers and internal auditors must take to respond to data security incidents.
  • Crisis Communication – How to Mitigate Potential Damage Crisis Communication – How to Mitigate Potential Damage Sheila Hyland and Judy McNeil Recorded: Jan 13 2016 50 mins
    It takes just one misstep, one careless quote in the news media or one misguided post on social media to damage the reputation of an entire company and its executives. The key to managing a crisis is to have a plan in place beforehand—and that includes the critical issue of communications, both internally and externally. At this webinar, our experts will talk about crisis communications and how to mitigate the damage when your organization’s worst nightmare comes true. We’ll show you how to craft key messages, how to choose the right spokesperson, how to respond to the media and take control of an interview. We’ll help you determine if and how you should respond to the media, and we’ll explore the critical top ten list for handling crisis communications within your organization. This webinar will not only provide valuable information to the internal auditors but also
    •discuss how internal auditors can prepare the organizations and executives they work with to prepare for and respond to the media in a crisis,
    •the importance of developing a crisis communications plan and key steps to take before and after a crisis hits. This should be information they can use to audit the readiness and effectiveness of their organizations crisis communications preparation.
  • Physical Security Governance:  A Metrics Based Approach Physical Security Governance: A Metrics Based Approach Pierre Bourgeix and Matt Neely Recorded: Dec 18 2015 60 mins
    Physical Security is often ignored but continues to be a key component of the overall information security strategy. This webinar will be centered on Physical Security Governance and the ability to take a holistic view of security components and apply them to the policies and procedures established within business units. This ensures that security exists to mitigate risk. Through the use of metrics we can then measure risk and once the information has been attained, then and only then can a proper security program be developed with security risk at its center point. The use of metrics will ensure also that there are checks and balances allowing an audit or assessment to succeed. Finally security governance will make sure that you have the proper people, processes, and technology in place to protect the business and take a risk-based approach to ensuring you have the proper level of protection.

    Matt Neely is the Director of Strategic Initiatives at SecureState. His main focus is helping clients understand and address security risks to foster business innovation. Matt has over 15 years of experience working in the physical and cybersecurity industry focused on risk management, penetration testing, and incident response. He is also the author of the book Wireless Reconnaissance in Penetration Testing.

    Pierre Bourgiex is the VP Business Development at SecureState. He has over 14 years of experience in security with a variety of companies such as, Tyco Integrated Security, ADT and Hysecurity. His primary focus is on creating, implementing and improving the mindset and strategy of an organization
  • Organizational Governance and Risk Mitigation in a Digital World Organizational Governance and Risk Mitigation in a Digital World Mohan Tanniru. Ph.D. Recorded: Oct 20 2015 60 mins
    Senior executives in the Forbes/Deloitte survey mentioned the following as their biggest concerns: Social media; Data mining and analytics; Mobile applications; Cloud computing; and Cyber attacks. Rethinking governance in the digital age, according to Deloitte, is moving from value protection to value creation. Such a value creation calls for a better management of customer journey, according to McKinsey, and this calls for a careful understanding of on-line presence, managing the digital media process, and engaging customer carefully to both recognize and address various risks. The digital services developed to support such a customer journey calls for an agile information system architecture, and this architecture has to be closely tied to an agile business architecture that is not just governing internal and external stakeholders relationships and addressing risks, but enabling the firm to creating value. Examples in health care are used to illustrate this approach.

    Dr. Mohan Tanniru is the Professor of MIS in the Decision and Information Science Department of the School of Business Administration at Oakland University. He has published extensively in information technology research for the last 30 years in areas such as IT strategy, knowledge base/expert systems, decision support and business analytics, and health care delivery management. His work has appeared in journals such as ISR, MIS Quarterly, Decision Sciences, DSS, JMIS, IEEE Transactions in Eng. Management, Expert Systems and Applications, Information and Management and Communications of ACM. He has taught at the University of Arizona, Syracuse, and the University of Wisconsin-Madison, and was the Dean of the School of Business Administration and the founding director of the Applied Technology of Business Program at Oakland University.
  • Costs and Risks of Globalization: Importance of Location, Institutions and ... Costs and Risks of Globalization: Importance of Location, Institutions and ... Dr. Raj Aggarwal, CFA, President, AB Associates Recorded: Sep 16 2015 62 mins
    Based on all your feedback, we are bringing Dr. Aggarwal back for another webinar. This is an introductory seminar on the major costs and risks faced by a business when it considers or engages in cross-border operations. Nevertheless, this seminar presents a powerful but intuitive and simple framework for thinking about and dealing with the challenges in globalization. Three major categories of such risks will be considered. 1) Those due to Distance, 2) Those due to Institutional Differences, and 3) Those due to Cultural Differences.

    This webinar is designed to be suitable not only for executives just starting to consider globalization, but also for executives with extensive experience in global business.

Embed in website or blog