Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
News

Conference from ISACA provides IT security insight in four streams

ISACA : 04 February, 2010  (New Product)
IT Governance, IT Audit and Assurance, Information Security Management and Compliance and Risk Management are all covered in the EuroCACS conference organised by ISACA taking place in Budapest in March
ISACA's European Computer Audit, Control and Security Conference (EuroCACS) is the must-attend, hot-topic event for IT audit, security and governance professionals in Europe. It attracts the best and brightest with its content-rich and thought-provoking sessions that delve into some of the biggest challenges facing IT professionals. ISACA's EuroCACS Conference will be held 21-24 March 2010 at the Kempinski Hotel Corvinus, Budapest, Hungary.

Organized by ISACA, a nonprofit association serving 86,000 IT governance professionals, the conference contains 40 sessions that will focus on the latest strategies to address the challenges from business, managerial and operational perspectives, as well as new technologies and system approaches, while identifying risks and opportunities. Reflective of ISACA's high standards, speakers are industry experts from all over the world.

Dániel Némethy, CIO of Hungarian Kereskedelmi es Hitelbank will present the keynote address on the best governance model to manage the challenges of aligning business goals with information and communication technology goals. Némethy will present a case study showing how the KBC Global Services branch in Hungary used the Pan-European model to continually improve processes, thus ensuring greater quality of services. The presentation will explain the governance model, share his implementation experience, discuss its advantages and disadvantages, and look to the future of the governance model.

EuroCACS will feature 40 sessions divided into four streams: IT Governance, IT Audit and Assurance, Information Security Management, and Compliance and Risk Management.



The IT governance stream looks at the most critical component of corporate governance. IT governance includes the leadership, internal and external relationships, processes and monitoring that ensure that IT sustains and extends the enterprise's strategies and objectives while managing any associated risk. This stream presents key topics, processes and the latest frameworks designed to provide a perspective on information systems and technology issues starting at the strategic level.

Speakers in this stream include Robert Stroud, CGEIT, Vice President Evangelist, Service Management and Governance, USA, who will present 'Governance of Your Operational Environment Using COBIT and ITIL'; Roger Southgate, CISA, CISM, IT Governance Consultant, UK, who will discuss the differing 'Roles and Responsibilities for Top Executives and Board Members'; and Matthew Pemble, Technical Director, Idrach Ltd, UK, who will examine the current need to 'Destroy for Victory: Proper Planning and Execution in the Disposal of Sensitive Information Assets'.



The IT Audit and Assurance stream will present new resources, processes and tools for IT assurance, including frameworks, processes, terminology, concepts approaches, tools, emerging issues and technologies. Finally, the stream will offer the latest thinking on assuring existing technologies.

Rolf von Roessing, CISA, CISM, CGEIT, KPMG, Germany, will provide guidance on 'Auditing in the Virtual World'; Paul Williams, IT Governance Advisor Protiviti, UK, will be presenting 'Value Management Guidance for Assurance Professionals'; and Ray Butler, CISA, Head of Information Policy and Security, Highways Agency, UK, will highlight the importance of 'Controlling End-user Computing: Putting the Genie Back in the Bottle'.



The Information Security Management stream will provide an understanding of the concepts and new trends related to information security and its management. This stream presents the key elements of information security, in relation to the threats of confidentiality, integrity, and the availability of information and systems. It explores the relevant management issues of the day to better equip security managers to meet the challenges and to provide IT audit professionals an insightful perspective on their responsibilities. The stream will offer examples of assurance steps needed to evaluate the enterprise's overall security management programme and ways to counter the threats.

In the Information Security Management stream, Mike Small, Information Security Management Advisor, UK, will define what is meant by 'Security in the Cloud'; Matt van der Wel, CISA, Managing Principal Forensics EMEA, Verizon Business, The Netherlands, recognizes today's top threats in 'Data Breaches: Can Something Good Come from Something Bad?'; and Leighton R. Johnson III, CISA, CISM, Chief Operations Officer and Senior Security Engineer, Information Security and Forensics Management Team, USA, identifies 'Modern Cyber Threats and How to Combat Them'.



The IT Risk Management and Compliance stream covers policies, procedures and activities that are continuing to burden enterprises. It will help them develop and implement effective solutions that meet the compliance requirements that govern an enterprise. This stream presents the concepts of Risk Management and will showcase how to apply Risk Management concepts and solutions to the benefit of the enterprise and its stakeholders. It explores a variety of specific regulations and compliance requirements. The stream also presents methods to test and assure compliance with these requirements from risk management, compliance and IT audit perspectives.

In the IT Risk Management and Compliance stream, Urs Fischer, CISA, chair of ISACA's Risk IT Task Force, Switzerland, , will explain 'ERM and IT: Principles, Issues and How ISACA's Risk IT Framework Helps', Marne E. Gordan, Regulatory Analyst, Corporate Security Strategy, IBM, USA, explores whether 'Compliance Means Never Having to Say You're Sorry', and Edward Schwartz, CISA, CISM, Chief Security Officer, NetWitness Corp., USA, explains that 'IT Risk Metrics Are Broken!: How to Measure Cyber Risk Correctly'.

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com