Message From The Chair, Fred C. Roth:
New regulatory compliance requirements, increasing numbers of headline-making information breaches, evolving technologies and staff shortages challenge today’s IT Audit and Information Security management to jointly address these increasing enterprise IT risks. This Summit’s agenda is based on the needs expressed by those attending the 2014 Summit to help management get up to speed on a wide range of issues, meet the new challenges posed by technological change and provide assurance that IT risks are being adequately addressed. Key interactive agenda topics include managing a breach event, threat management, data analytics on a budget, integrating exception management into ERM practices, harnessing the power of relationships, creating high impact audit reports, implementing an effective integrated auditing strategy, contributing to successful system development projects as well as other timely audit and security management agenda items. We hope you can join us!
Wednesday, March 25
1:00 PM – 1:45 PM Chair Opening Remarks & Summit Survey Review
Fred C. Roth, CISA, Vice President, IT Audit Division, MIS Training Institute
1:45 PM – 3:15 PM Critical Challenges Facing IT Audit and Security Management
Fred Roth, CISA, Vice President, IT Audit Division, MIS Training Institute
IT auditors and information security professionals are working in increasingly complicated and multifaceted organizations, with new regulations, security threats and technology evolving at an alarming rate. With this in mind, help us to kick off the symposium by identifying the key challenges that you deal with on a daily basis. This session will be your opportunity to influence the agenda and make sure your pressing concerns will be addressed during the next two days.
3:30 PM – 5:00 PM Breach Behavior: Prevention and Cure
Darrin A. Reynolds, CISSP, CISM, Vice President, Information Security, Diversified Agency Services, a Division of Omnicom Group
•How to tell your customer you just lost their data..to the Internet
•Common mistakes to avoid when responding to a breach incident
•Critical factors for conducting a breach investigation
•Managing a breach event for an improved client relationship
•Counter-intuitive tips for breach prevention.
5:00 PM – 6:00 PM Networking Reception
Thursday, March 26
7:45 AM – 9:15 AM Threat Management: Looking for Trouble
Darrin A. Reynolds, CISSP, CISM, Vice President, Information Security, Diversified Agency Services, a Division of Omnicom Group
•Threat management is more than getting alert bulletins from our favorite vendors
•Defending the doors BEFORE the siege ramp is built
•Don’t just lock the organization’s windows. Look beyond them.
•Choosing the types of tools and capabilities to gain the visibility needed
•“Facing” the enemy. The challenges and myths of attribution
7:45 AM – 9:15 AM Data Analytics on a Budget
Jim Tarantino, CISA, CRISC, ACDA, Client Solutions Director, High Water Advisors
•Features and capabilities of free and low-cost data analytic technologies
•Common data tasks including importing, preparing, analyzing, and visualizing data
•Use of free and low cost datasets to enhance analytic tests
•Best-practices for considering and using budget-friendly technologies
•Business case development and transitioning to more full-featured, premium data analytics technologies
9:30 AM – 11:00 AM The Power of Relationships
Robert Mainardi, CFSA, CRMA, President, Mainardi & Company
•Defining a relationship
•Listening for needs
•Key communication mistakes
•Identifying, building, and maintaining a relationship
•Meeting facilitation keys
9:30 AM – 11:00 AM Implementing an Effective Integrated Auditing Strategy
Fred Roth, CISA, Vice President, IT Audit Division, MIS Training Institute
•Defining integrated auditing
•Strategic planning for integrated auditing success
•Establishing enterprise risk coverage
•Using COSO as a basis
•Integrated auditing good practices
11:15 AM - 12:45 PM Security vs. Privacy: Painting a Clearer Picture
Darrin A. Reynolds, CISSP, CISM, Vice President, Information Security, Diversified Agency Services, a Division of Omnicom Group
•Understanding the critical difference between "security" and "privacy"
•Protecting the data without breaking the bank
•Responding to security inquiries, audits and contractual obligations without breaking your back
•Understanding the “Privacy Purpose” behind “Security Safeguards”
•Painting the picture: Adding the privacy color to the black and white of security
•Accomplishing compliance goals without becoming mired in the technical implementation
11:15 AM – 12:45 PM You’ve Found Exceptions, Now What?
Jim Tarantino, CISA, CRISC, ACDA, Client Solutions Director, High Water Advisors
•Methods to deal with false-positives
•Using a triage process to organize and prioritize exceptions
•Routing exceptions to responsible parties for follow up and resolution
•Monitoring the exception remediation process
•Integrating exception management into ERM and governance practices
1:30 PM – 3:00 PM Creating High Impact Audit Reports
Robert Mainardi, CFSA, CRMA, President, Mainardi & Company
•Five component writing
•Documenting audit exceptions
•Starting with a strong condition – blank sheet of paper approach
•Current report writing themes
•Writing in a clear, concise, format
•Keeping it simple – avoiding noise
1:30 PM – 3:00 PM Contributing to Successful System Development Projects
Fred Roth, CISA, Vice President, IT Audit Division, MIS Training Institute
•Getting involved EARLY
•Providing effective coverage
•Determining appropriate staffing skills
•Addressing project management risks
•Making value added contributions
•Adding to the probability of success
3:15 PM – 5:00 PM Can Audit and Security Add REAL Value?
Fred Roth, CISA, Vice President, IT Audit Division, MIS Training Institute
•Strategically positioning IT Audit & Information Security
•Selling Audit and Security’s value to senior management
•Providing value-added contribution in this compliance era
•Strategies for leveraging relationships
•Earning respect throughout the organization
•Making the most out of your “good deeds”