On the 5th of December 2011, the Pittsburgh chapter of ISACA will be hosting a one-day "Information Technology Audit & Control" Conference; with Acunetix reseller Jacadis -- specialists in network and web security -- as one of the gold corporate sponsors for the event aimed at IT auditors, network administrators, and security administrators.
The one-day conference is structured around a series of five unmissable segments each hosted by a member of the event's corporate sponsors, who between them will be sharing decades of security experience in the form of presentations that will cover some of the key security topics impacting IT professionals today.
- Jerod Brennen: This presentation will provide insight into the Social Media Audit/Assurance Program issued by ISACA from a practitioner's perspective. Auditors will gain insight into social media programs from an operational perspective to bridge the gap between implementation and audit. Attendees will learn: What they should audit in a social media program, how to introduce social media auditing to the organization, and resources for staying current in social media security trends.
- Rob Barnes: The evolution of software to a service (SaaS) delivery model frees users from the limitations of traditional infrastructure such as scalability, performance bottlenecks, and capacity. But these are raditional infrastructure such as scalability, performance bottlenecks, and capacity. Data breaches and audit failures can occur just as easily within the cloud as within traditional computing infrastructures.
- Angie Singer Keating: Attendees will be introduced to the fundamentals of IRP and will learn how to craft and implement an incident response planning program which relies on processes and documentation. A special emphasis will be placed on the requirements, responsibility, processes and procedures needed to provide a rapid and reliable incident response capability.
- Tim Maloney: IT Governance has become a focus area for both IT and Web Security Audit organizations. Recent research shows that IT organizations see IT governance activities as areas “needing improvement” in their organizations. Similarly, Internal Audit departments are increasingly being asked to assess the strategic performance of IT and to consider the appropriateness of the IT organization‟s response to new and emerging risk areas.
- Don Shepherd: This presentation will focus on: The Encryption/Masking of sensitive data, Separation of duty (How to control when and where a DBA can use elevated privileges, providing fine grained access control for DBAs), and Audit/Monitoring activity (Database activity monitoring, know what happens and when inside your database.)
Four Points Sheraton
910 Sheraton Drive
Mars, PA 16046
Registration – 7:15 a.m.
Session – 8:00 – 4:1
ISACA Member - Free
Non-Member - $30
Students - $10
November 30, 201