Hi [[ session.user.profile.firstName ]]

Auditing the Management and Security of Smart Devices Webinar

According to some of the industry experts, the security and management of smart devices like iPads, iPhones and Android phones are quickly becoming the weakest link in most organizations. The internal auditors would like to audit the management and security of these devices and are looking for a structured audit approach.
Recorded Nov 14 2012 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sajay Rai
Presentation preview: Auditing the Management and Security of Smart Devices Webinar

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Leading with Integrity & Authenticity Recorded: Oct 26 2016 120 mins
    Don Levonius, Principal Consultant and Master Facilitator at Victory Performance Consulting LLC
    Values-free leadership is an oxymoron, and leadership without authenticity is a misnomer. Integrity is the heart of leadership and authenticity is its soul. True leaders are not only ethical and transparent, they engage and influence others on a deeper, more personal level. By applying the ethical theories of notable moral philosophers and contemporary thought leaders, participants test proven ethical principles of authentic leadership.
  • Keeping Insider Risk at Bay Recorded: Sep 29 2016 60 mins
    Doug Copley, Deputy CISO and Senior Security & Privacy Strategist at Forcepoint
    Is that activity you’re seeing a malicious user? Is it someone who made a mistake? Is it coming from an account whose credentials were compromised? Is it command and control traffic? How confident are you? As security programs are maturing, attention is turning to threats emanating from inside the network. Doug Copley will discuss seven profiles of highly risky users, outline how your organization can reduce insider risk, and present a real-world case study of how a software organization protected themselves.
  • Minimizing Risks using Data Analytics Recorded: Mar 29 2016 61 mins
    Opher Jackson, Retired EY Executive Director
    Do you want evidence that risk in your organization is not increasing?
    Do you want to address audit committee concerns about how you monitor risk within your internal audit or risk department at an enterprise or group level?
    Do you want to show that internal audit is integrating analytics to focus your audit efforts on emerging or high risk activities?
    Then this webinar may contain information you will find useful. The webinar discusses how analytics have monitored GL transactions to help internal audit and risk functions:
    •Ensure business behaviors are not changing
    •Provide visibility to executives on the impact of GL policy changes
    •Get ahead of whistle blower calls
    •Distinguish significant versus insignificant GL activity
  • Minimizing the Impact of Cyber-attacks Recorded: Feb 23 2016 61 mins
    Randy Gainer
    Randy will describe a few of the hundreds of cyberattacks he and his partners have helped clients respond to. He will describe the wider cyber-threat environment that generates such attacks. Randy will discuss the best-practice defenses businesses and other entities deploy to reduce the risk that they will be victims of cyberattacks and the tools “compromise-ready” organizations use to minimize the effects of attacks when they occur. Randy will also describe the steps business managers and internal auditors must take to respond to data security incidents.
  • Crisis Communication – How to Mitigate Potential Damage Recorded: Jan 13 2016 50 mins
    Sheila Hyland and Judy McNeil
    It takes just one misstep, one careless quote in the news media or one misguided post on social media to damage the reputation of an entire company and its executives. The key to managing a crisis is to have a plan in place beforehand—and that includes the critical issue of communications, both internally and externally. At this webinar, our experts will talk about crisis communications and how to mitigate the damage when your organization’s worst nightmare comes true. We’ll show you how to craft key messages, how to choose the right spokesperson, how to respond to the media and take control of an interview. We’ll help you determine if and how you should respond to the media, and we’ll explore the critical top ten list for handling crisis communications within your organization. This webinar will not only provide valuable information to the internal auditors but also
    •discuss how internal auditors can prepare the organizations and executives they work with to prepare for and respond to the media in a crisis,
    •the importance of developing a crisis communications plan and key steps to take before and after a crisis hits. This should be information they can use to audit the readiness and effectiveness of their organizations crisis communications preparation.
  • Physical Security Governance: A Metrics Based Approach Recorded: Dec 18 2015 60 mins
    Pierre Bourgeix and Matt Neely
    Physical Security is often ignored but continues to be a key component of the overall information security strategy. This webinar will be centered on Physical Security Governance and the ability to take a holistic view of security components and apply them to the policies and procedures established within business units. This ensures that security exists to mitigate risk. Through the use of metrics we can then measure risk and once the information has been attained, then and only then can a proper security program be developed with security risk at its center point. The use of metrics will ensure also that there are checks and balances allowing an audit or assessment to succeed. Finally security governance will make sure that you have the proper people, processes, and technology in place to protect the business and take a risk-based approach to ensuring you have the proper level of protection.

    Matt Neely is the Director of Strategic Initiatives at SecureState. His main focus is helping clients understand and address security risks to foster business innovation. Matt has over 15 years of experience working in the physical and cybersecurity industry focused on risk management, penetration testing, and incident response. He is also the author of the book Wireless Reconnaissance in Penetration Testing.

    Pierre Bourgiex is the VP Business Development at SecureState. He has over 14 years of experience in security with a variety of companies such as, Tyco Integrated Security, ADT and Hysecurity. His primary focus is on creating, implementing and improving the mindset and strategy of an organization
  • Organizational Governance and Risk Mitigation in a Digital World Recorded: Oct 20 2015 60 mins
    Mohan Tanniru. Ph.D.
    Senior executives in the Forbes/Deloitte survey mentioned the following as their biggest concerns: Social media; Data mining and analytics; Mobile applications; Cloud computing; and Cyber attacks. Rethinking governance in the digital age, according to Deloitte, is moving from value protection to value creation. Such a value creation calls for a better management of customer journey, according to McKinsey, and this calls for a careful understanding of on-line presence, managing the digital media process, and engaging customer carefully to both recognize and address various risks. The digital services developed to support such a customer journey calls for an agile information system architecture, and this architecture has to be closely tied to an agile business architecture that is not just governing internal and external stakeholders relationships and addressing risks, but enabling the firm to creating value. Examples in health care are used to illustrate this approach.

    Dr. Mohan Tanniru is the Professor of MIS in the Decision and Information Science Department of the School of Business Administration at Oakland University. He has published extensively in information technology research for the last 30 years in areas such as IT strategy, knowledge base/expert systems, decision support and business analytics, and health care delivery management. His work has appeared in journals such as ISR, MIS Quarterly, Decision Sciences, DSS, JMIS, IEEE Transactions in Eng. Management, Expert Systems and Applications, Information and Management and Communications of ACM. He has taught at the University of Arizona, Syracuse, and the University of Wisconsin-Madison, and was the Dean of the School of Business Administration and the founding director of the Applied Technology of Business Program at Oakland University.
  • Costs and Risks of Globalization: Importance of Location, Institutions and ... Recorded: Sep 16 2015 62 mins
    Dr. Raj Aggarwal, CFA, President, AB Associates
    Based on all your feedback, we are bringing Dr. Aggarwal back for another webinar. This is an introductory seminar on the major costs and risks faced by a business when it considers or engages in cross-border operations. Nevertheless, this seminar presents a powerful but intuitive and simple framework for thinking about and dealing with the challenges in globalization. Three major categories of such risks will be considered. 1) Those due to Distance, 2) Those due to Institutional Differences, and 3) Those due to Cultural Differences.

    This webinar is designed to be suitable not only for executives just starting to consider globalization, but also for executives with extensive experience in global business.
  • Are You Safe? Managing Risks in the Age of Security Breaches Recorded: Feb 4 2015 64 mins
    Michael Gerdes, CISSP and Molly Talafuse CISA, CRISC
    How safe is your organization? With many recent, highly publicized security breaches, it’s clear that we’re all at risk. Hacking has literally become a global business with personal data at the top of the list of commodities up for sale. With all the breaches in the news, many media outlets have focused on the susceptibility of companies to malware, while ignoring other critical flaws that likely contributed to the success of these breaches. Among these are failures in common IT processes such as change management, software release control, and access control to production environments. A common thread in these flaws is most often the lack of effective governance and oversight of the information risks inherent in these processes. This webinar will help you 1) learn about some common flaws in security and IT practices, 2) understand the critical role a partnership between security and Internal Audit has in breach prevention, and 3) identify some practical steps your information security and audit teams can take to reduce risks.
  • Ethical Leadership: How Internal Audit Can Influence the Tone at the Top Recorded: Nov 18 2014 120 mins
    Don Levonius
    According to IIA guidance, internal auditors are charged with monitoring organizational ethics and assessing whether management policies, procedures, and practices support ethical operations. And while management usually seeks to set, promote, and perpetuate an ethical climate, some leaders seem either motivated by self-interest or so focused on other operational priorities that they overlook their obligation to steward organizational ethics.

    What can internal audit do to articulate this risk of unethical behavior? How can internal audit influence the tone at the top? How can internal auditors persuade management to see the value proposition for ethical leadership? This webinar addresses these questions and equips auditors, audit directors, and CAEs to make a compelling argument as to how ethical leadership drives bottom-line results.

    By the end of this webinar, participants should be able to:

    -Compare contrasting views of behavioral ethics
    -Differentiate between moral and conditioned honesty
    -Examine rationalizations commonly indicative of moral disengagement
    -Explain why ethical stewardship is a primary leadership responsibility
    -Correlate ethical leadership to organizational results
    -Formulate a compelling argument in favor of an ethical tone at the top
  • Auditing Windows event log Recorded: Sep 24 2014 58 mins
    Richard Cozart
    Richard Cozart will provide insights into the mysteries of windows logs. He will discuss the following:

    •Configuring Audit Policies
    •What information is contained in windows logs?
    •How to interpret the windows logs?
    •Recommendations for event monitoring
    •Security Information & Event Management (SIEM) Software

    We all have heard that everyone should review logs, this is your chance to get details on how to do it.
  • Managing Social Media Risks Recorded: Aug 20 2014 47 mins
    Sajay Rai Securely Yours LLC
    By
    Sajay Rai
    Securely Yours LLC
  • Auditing the Incident Response Program Recorded: Apr 23 2014 54 mins
    Edward Napoleon
    From political hacktivists to international cybercrime organizations, enterprise security has been under a barrage of attacks that run the gamut of complexity. Security breaches now seem inevitable even at organizations that invest heavily in their information security operations. With numerous recent examples of cybercriminals and malware penetrating corporate networks almost at will, the role of incident response teams has been thrust into the spotlight. In this presentation I will discuss the fundamentals of incident response planning and the critical role audit has in reviewing incident response plans, documentation and the plan testing process.
    At the end of this session:
    You will understand:
    -incident response
    -identify the different types of incidents
    -planning process
    -roles and responsibilities
    -team activation process
    -response process flows
    -response scenarios, and
    -auditing incident response
  • Target, Neiman Marcus, What Next? Recorded: Feb 26 2014 63 mins
    Jeff Ingalsbe
    We all heard of the recent hacks of Target and Neiman Marcus. Millions of consumers were affected as their Personally Identifiable Information (PII) were stolen. This incident raised a reg flag for majority of the organizations. The question is being asked: What can we do to protect our environment from such an incident? And usually the auditor is asked if the organization is prepared to protect its PII.
    This webinar will identify the information each auditor must understand regarding PII and also list out the tasks each auditor must do to protect the PII.
  • The Board, The Auditor and BCP Recorded: Jan 22 2014 50 mins
    Dr. Raj Aggarwal
    As a member of several corporate boards, Dr. Aggarwal is well aware of the responsibilities of being a board of directors member. One of the primary responsibilities, according to Tom Horton (“Directors & Boards” author), is to secure the future of the organization. According to Mr. Horton, the very survival of the organization depends on the ability of the board and management not only to cope with future events but to anticipate the impact those events will have on both the company and the industry as a whole.”
    According to Dr. Aggarwal, it is incumbent on directors to demand information and insight that will help them secure the future of the organization—which could be everything from the seemingly most innocuous moves by a competitor to the most threatening moves by a foreign nation potentate.
    Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) are a couple topics about which the directors should demand information and insight. When is the last time these two topics were discussed during your board meeting? You could have discussed the succession plan of a CEO as part of business continuity. But with BCP and DRP, we are implying the readiness of your organization in event of a natural or man-made disasters.
    In this webinar, Dr. Aggarwal will provide a series of ten questions which every board member must consider, and every internal auditor must be prepared to answer.
  • Apple’s iOS7 security features – must for every auditor Recorded: Oct 23 2013 52 mins
    Jeff Ingalsbe
    Most of you are probably excited about the new release of Apple’s operating system, iOS7. This operating system not only has enhanced user features but has several cool security features. Jeff Ingalsbe will present the key security enhancements in iOS7 and identify those features which every auditor must know and understand.

    Jeff Ingalsbe is an Assistant Professor, Department Chair, and Director of University of Detroit Mercy’s “Center for Cyber Security and Intelligence Studies.” Mr. Ingalsbe runs a state-of-the-art cyber security laboratory where students gain real world competencies through exploration of cyber security problems. Until recently, Mr. Ingalsbe managed the Information Technology Security Consulting Group at Ford Motor Company. He was involved in information security solutions for the enterprise, consumerization exploration, threat modeling efforts, and strategic security research. His BSEE and MSCIS degrees are from Michigan Technological University and the University of Detroit Mercy, respectively. He is currently working on a PhD Information Systems Engineering at the University of Michigan Dearborn.
  • Foreign Exchange Risk Management Webinar Recorded: Sep 25 2013 59 mins
    Raj Aggarwal
    This webinar will cover the details of assessing and managing risks of changing currencies.
    Some of the major topics covered in this webinar will include:
    •Why Exchange Rates Change?
    •Changing Exchange Rates, Trade, and Investment
    •Corporate Impact of Exchanges Rate Changes
    •Determining Transactions, Translation, and Economic Exposures
    •Financial Hedging of Net Exchange Rate Risks
    •Operational Hedging of Net Exchange Rate Risks
    •Audit Considerations in Exchange Rate Risk Management
  • Developing World Class Process Maps Recorded: May 22 2013 64 mins
    Adam Golden, Keith Fournier
    Mapping process flows is critical to understanding, documenting, and improving your processes. Learn how to develop world-class business process maps that highlight automation, best practices, manual steps, task assignment, activities of internal partners and external vendors, and more while ensuring accurate documentation and key participant input. This session will demystify the complexity around process mapping and provide hands on tools and tips that you can begin using immediately.
  • Critical Success Factors and Integration Key Drivers Webinar Recorded: Feb 13 2013 64 mins
    Opher Jackson
    Leveraging Analytics in IA – Critical Success Factors and Integration Key Drivers
    This webinar will assist participants in developing a roadmap to accelerate the integration of analytics within the internal audit function. During this webinar participants will learn how characteristics of their organization's strategic vision, business environment and technology impact the use of analytics. By understanding these characteristics, or critical success factors, internal audit can determine the type of analytic they should use to support various audits.
    During this webinar we will also discuss the types of audit evidence supported by different forms of analytics, and what internal audit should do to accelerate the integration of analytics into the audit when they work in an analytic "friendly" organization. We will also discuss techniques internal audit can use to help organizations develop good analytic practices and become analytic “friendly.”
  • 2013 and Beyond: Staying One Step Ahead of Reporting and Regulatory Changes Recorded: Jan 16 2013 56 mins
    Michelle Search-Winters
    The dynamic nature of accounting standards, filing rules and financial market regulations demands that you stay one step ahead of the changes. This presentation will provide an overview of accounting and compliance requirements with a focus on two elements of a myriad of critical items to consider in your financial reporting and internal audits for 2013 – the JOBS Act and Conflict Minerals.
    •JOBS Act: Establishes SEC requirements for emerging growth companies that makes it easier to raise capital and provides an IPO ‘on-ramp’ to phase in certain requirements.
    •Conflict Minerals Rule: Mandated by the Dodd-Frank Act with direct impact to half of all public companies including technology, automotive, and industrial products industries.
    Learn how these and other changes may impact your audit scope and work plans and why you must partner with your accounting organization to stay one step ahead.
Live Chapter meeting on internal auditing, risk management and control
Lively topics for new and seasoned internal auditors, students and others are presented montlhly between September and May.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Auditing the Management and Security of Smart Devices Webinar
  • Live at: Nov 14 2012 5:00 pm
  • Presented by: Sajay Rai
  • From:
Your email has been sent.
or close