HISP Certification Course (5 days) - 35 CPEs ***HISP stands for Holistic Information Security Practitioner.

Size: px
Start display at page:

Download "HISP Certification Course (5 days) - 35 CPEs ***HISP stands for Holistic Information Security Practitioner."

Transcription

1 HISP Certification Course (5 days) - 35 CPEs ***HISP stands for Holistic Information Security Practitioner. This is the only integration course available today, which teaches the integration of ISO 27002/27001 with COBIT, COSO, ITIL and Multiple Regulations, pertaining to Information Security & Privacy. The Holistic Information Security Practitioner (HISP) Certification course is an internationally recognized differentiator in the Information Security space and one of the fastest growing information security certifications for Information Security Practitioners, Managers and Officers. In the current global economic recession, a recent CareerBuilder.com report indicates that the Information Security Manager position falls within one of the top 5 industries that are considered to be recession proof. The objective of this course is to provide participants with the necessary skills to implement a corporate Information Security Management System (ISMS) framework that is compliant with the requirements of ISO 27002, UK Data Protection Act, EU Directive on Privacy, HIPAA Security, GLB Act, Sarbanes-Oxley Act (Security), FACT Act, PCI Data Security, NIST , PIPEDA, PIPA and California SB-1386 and meets the certification requirements of ISO This is the only integration class that provides practical education on the integration of best practices for Information Security Management, Information Systems Auditing and multiple Regulatory Compliance requirements and how to map multiple regulatory requirements to the internationally accepted best practices framework of ISO 27001/ Who should attend? Staff tasked with the implementation and management of an formal internationally accepted Information security management system (ISMS). Staff tasked with ensuring compliance with standards and requirements such as (but not limited to) UK Data Protection Act, EU Directive on Privacy, HIPAA Security, SOX Security, FFIEC, GLBA, California SB1386, FACT Act, PCI Data Security, NIST , OSFI, PIPEDA, PIPA, Canadian Bill C-168 and other regulations. Information Security Consultants or Third Party Auditors. Auditors (External and Internal). Information Security Officers. IT Managers/Directors. Privacy/Compliance Officers.

2 Course Curriculum: Day 1 3 Content: ISO 27001/27002 Compliance Description: 5 days / 35 CPEs / (On Demand web based class also available) Benefits to Your Business Learn how to adopt international best practices pertaining to Information Security. Take the knowledge and skills imparted during this exercise and use them to improve confidentiality, integrity and availability of information systems. Gain competitive advantage. Improve customer and investor confidence. Show due diligence and due care. Content This module is designed for people who have a reasonable awareness of Information security management. History of the ISO series. Evolution of the ISO Series ISO certification requirements. Determination of scope. Identification of information assets. Determination of the value of information assets. Determination of risk. Determination of policy(ies) and the degree of assurance required from controls. Identification of control objective and controls. Definition of polices, standards and procedures to implement the controls. Production and implementation of policies, standards and procedures. Completion of ISMS documentation requirements. Establishment of Management Framework and Security Forum. Audit and review of ISMS. Case Studies. Course Curriculum: Day 3-4 Module: COBIT auditing framework. Description: The objective of this module is to provide delegates with the necessary skills to audit information technology systems using COBIT as a benchmarking standard.

3 Benefits to Your Business Learn how to adopt COBIT as an IT governance framework. Take the knowledge and skills imparted during this exercise and use them to improve confidentiality, integrity and availability of information systems. Gain competitive advantage. Improve customer and investor confidence. Show due diligence and due care. Content History of COBIT. Understanding COBIT Controls. Understanding COBIT mapping to ISO Understanding COBIT mapping to COSO. Understanding COBIT mapping to ISO and ITIL. COBIT case studies. Course Curriculum: Day 5 Module: Mapping Methodology Description: The objective of this module is to provide delegates with the knowledge of how ISO (Annex A of ISO 27001) requirements map to HIPAA, FFIEC, GLB Act, Sarbanes-Oxley Act, OSFI, PIPEDA, PIPA, Canadian Bill C-168 and other various regulations. Benefits to Your Business Learn how to effectively map multiple standards through a Compliance Matrix. Take the knowledge and skills imparted during this exercise and use them to improve confidentiality, integrity and availability of information systems. Gain competitive advantage. Improve customer and investor confidence. Show due diligence and due care Learn how to use your management system to track a measurable return on investment Content Regulatory Compliance Mapping: Regulatory Haystack

4 Case Study/Group Exercise Certification Exam Attendees can chose to take the HISP Certification Exam the afternoon of Day 5, consisting of: 100 multiple-choice questions. Questions covering the entire HISP course curriculum.

5 Instructor Biographies Taiye Lambo CISSP, CISM, CISA, HISP, ISO Auditor Taiye Lambo is a Security subject matter expert in the area of Information Security Governance; with years of experience in design & implementation of Intrusion detection and prevention systems, Honeypots, Computer Forensics, Ethical Attack & Penetration Testing, Biometric Identification, Network Security Architecture, Information security governance. He founded the UK Honeynet project and the Holistic Information Security Practitioner (HISP) Institute He has successfully executed information security projects for a number of United Kingdom government agencies and also provided information security consulting to State of Georgia agencies. In the commercial sector he has completed Consulting engagements for clients, in the Manufacturing, Financial Services and Healthcare sector. He was the Director of Information Security for John H. Harland (now Harland Clarke), the leading provider of solutions to the Financial Services industry, including check and check related products and accessories, direct marketing solutions, and contact center solutions. He has dual expertise as a hybrid technical and business information security consultant with a pragmatic holistic approach to the management of information security and regulatory compliance, as well as a subject matter expert on Information Security governance and compliance relating to regulatory standards such as HIPAA, Sarbanes-Oxley Act, Gramm-Leach Bliley Act (GLBA), FDIC and others. His presentations at security events include conferences organized by organized by ISSA, InfraGard, ISACA, CPM, SOFE, EDUCAUSE, Kuwait Information Security Conference and HITRUST. Taiye is President and Founder of efortresses, an Atlanta based Cyber security, risk and compliance management solutions company founded in In the United Kingdom, he founded a successful information security firm CyberCops Europe, gained assignments in the USA for commercial and government agencies where he continued Information security and compliance consulting and became a subject matter expert in several of the current regulations. His involvement in the USA grew with speaking engagements at leading seminars & conferences. He left CyberCops Europe, came to the USA and founded efortresses in October He has established numerous valuable contacts nationwide and has name recognition in the information security/regulatory compliance space. efortresses developed the industry s first integrated security and compliance assessment product, Compliantz - an automated process to assess an organization's processes, policies, procedures and standards against internationally accepted information security best practices and multiple regulatory requirements, including HIPAA Security, Sarbanes-Oxley Act (Security), GLB Act, California SB-1386, NIST , FACT Act and PCI Data Security. efortresses also developed and holds classes nationwide in the industry's very first information security, audit and compliance certification course - Holistic Information Security Practitioner (HISP). With a Bachelors degree in Electrical Engineering, he also earned a Masters degree in Business Information Systems from the University of East London (United Kingdom).

6 Charles Edward Wilson CISM, ISSM, HISP, MTS Ed Wilson is CISM, DoD Certified Information Systems Security Manager (ISSM), and a retired US Navy Cryptologic Technical Technician with over 27 years experience in INFOSEC - securing, auditing, and accrediting IT systems to include protection of sensitive corporate information in compliance with DoD regulations, ISO 9000, BS7799/ISO 17799, ISO 15408, FISMA, COSO, COBIT, GLBA, SOX, and HIPAA legislation. Ed Wilson is a Certified Master Training Specialist, Testing Officer/Testing Supervisor, Curriculum Developer, and Technical Writer that strengthens his demonstrated excellence in leadership, technical competence, application of instructional methodology, and desire to improve educational awareness through quality instruction. As an INFOSEC Subject Matter Expert, Ed Wilson developed 3 Information Systems Security Manager (ISSM) courses, consisting of 31 INFOSEC topics at the master level. Ed was an adjunct lecturer on INFOSEC manners for the National Security Agency (NSA) having taught twenty-six (26) National Cryptologic School courses for NSA. John A. DiMaria Certified Six Sigma Black Belt; HISP; Master HISP, CBCI John DiMaria (Co-Author of How to Deploy BS ) is a management system professional and certified Holistic Information Security Practitioner (HISP) with 25 years of successful experience in Management System Development, including Information Systems, Quality Assurance, International Quality Standards, Statistical Process Control, Regulatory Affairs, Customer Service, Subcontractor Analysis and Marketing/Sales in a highly competitive National and international environment. As the former Product Manager for BSI Management Systems America, John was the technical, audit, scheme and marketing specialist responsible for overseeing development, education and expertise for BSI Americas regarding all information security and business continuity activities including ISO 27001, World Lottery Association (WLA), ISO and BS John was also the recipient of the BSI Global Innovation Award. He serves on committees that influence legislation and drive international harmonization such as the ANAB PS- Prep (Title IX) committee of experts and the BITS Shared Assessment Program. He is the President of the HISPI (Holistic Information Security Practitioner Institute) and has been featured in many publications concerning various topics regarding information security and business continuity. such as Computer World, Quality Magazine, QSU, SC Magazine, Campus Technology, Continuity Insights, ABA Banking Journal, CPM Magazine, GSN Magazine (dubbed Business Continuity s new standard bearer ) and the featured interview on the cover and of PENTEST Magazine. Prior to joining BSI, DiMaria was the Managing Consultant responsible for Information Security Services for LECG a global expert services firm. He has experience working with both national and international environments.

7 John holds formal BSI qualifications in several areas of ISMS, ITSM and BCMS: I001 BSI Learning Instructor, I003 Instructor Trainer, I0LA BSI Lead Auditor Instructor (ISO 27001, BS Business Continuity Instructor), IHIS Holistic IS Practitioner, BSI ITSM ISO Technical Audit and standards Specialist (TS), BSI ISMS ISO Technical audit and Standards Specialist, BS Assessor. HIGHLIGHTED EXPERIENCE Served as the BSI Americas Technical & Marketing specialist in the areas of ISO 27001, ISO 20000, BS and all other areas of Information Security and Business Continuity. Designed and delivered training to Field Development Staff on ISO/BS 7799/27001 processes and mapping an ISMS to best practice regulatory and IT Standards. Designed and delivered projects for building, training and servicing in all areas of TQM, Regulatory Affairs, Information systems, Risk Analysis, the International Management System Standards, Statistical Process Control, Customer Service and Marketing and Sales, showing a cost savings through process improvement These projects included but were not limited to: Complete ISMS and other Management System Implementation Management System Analysis and Improvement Process Mapping Process Flow Analysis Process Control Planning Fault Tree Analysis Technical Writing Preventive Action Planning and Implementation Use Case Modeling EXPERIENCE CONT. Six Sigma Statistical Analysis Failure Mode Effect Analysis Regulatory Analysis and Compliance (Including EMS & OSHA processes) Employee Engineering Training Development & Delivery Auditing (Internal and External) Subcontractor Evaluation Risk Assessment & Management Business Process Re-engineering Served 4 years as member of the Top Management Operations Board of Directors for a multi-site $100M corporation. Prior 16 years managed implementation of SPC, Regulatory Affairs, process controls, information systems and international management systems standards. Performed over 100 internal quality system and external supplier quality audits.

8 Served on an Automotive Advisory Committee to represent the Chemical Industry during the original conception of the QS 9000 international automotive standard. Implemented Six Sigma strategies and led a cross-functional team for a major multi-million dollar corporation in St. Louis, MO. EDUCATION HISP (Holistic Information Security Practitioner); Certification B.B.(Black Belt) Six Sigma Certification, GE Six Sigma Academy Certificate, Six Sigma Leadership Certificate, Quality Operating Systems(QOS) FMEA; Eastern Michigan University Certificate. Electronic Data Interchange; EDI, INC Certification; Internal Auditor, Quality Management Institute DMACS Computerized Process Controls A.S. Computer Information Systems, Columbia College PUBLICATIONS How to Deploy BS Version 2, April 2008 How to Deploy BS 25999; September 1, 2007 BS 7799 Audit Preparation; BSI Management Systems, March 2005 Benefits of BS 7799 and ISO 17799; BSI Management Systems, April 2005 BS 7799 Drivers and Advantages; BSI Management Systems, March 2005 PROFESSIONAL AFFILIATIONS HISP (Holistic Information Security Practitioner Institution); President Business Continuity Institute (BCI) Member Business Continuity Institute (BCI) Training Affiliate BITS Financial Institution Shared Assessment Program Working Group Member DHS PS-Prep Program Committee of Experts EC Union iaffiliate Rainmakers Marketing Group Founding Member American Society for Quality (Secretary; Board of Directors; ) CHARITABLE AFFILIATIONS St. Patrick Center for the homeless and addicted St. Louis, MO New Life Evangelistic Center (NLEC) for the homeless St. Louis, MO Catholic Charities Association (Board of Directors) St. Louis, MO Over 44 Speaking Engagements both national and international 6 Keynotes.

9 Gary Sheehan; CISSP, HISP Professional Summary Gary Sheehan possesses over 20 years of information security experience. Gary has held a variety of information technology positions since Gary has strong leadership, communication and people management skills. As Director of GRC Services, Gary is responsible for managing the design, delivery and implementation of governance, risk, security and compliance solutions that meet customer needs and keep pace with the constantly evolving regulatory and security requirements. Gary has assisted a number of companies with large-scale security management initiatives to facilitate the voluntary and mandatory compliance requirements of their organizational directives. Achievements & Accomplishments Speaker at industry events such as Information Security Summit, CSI Conference and MIS Institute InfoSec World. Developed and implemented security policy, security awareness programs, vulnerability management solutions, risk management solutions, security process improvements, security organization studies, and wireless security solutions for multiple organizations. Provided Security Advisory services to a number of Northeast Ohio organizations Certificate of Appreciation from the Cleveland FBI office for exceptional service in the public interest. Letter of commendation from the Cleveland FBI office for exemplary service to the local chapter Winner of the Linda Franklin Award. Founded the Information Security Summit Education & Certifications Graduated cum laude from Baldwin-Wallace College in 1989 with a Bachelor of Arts Degree in Business Administration. Continued education including classes, seminars and self-study in multiple security areas. Obtained CISSP certification in 2002 Completed the FBI Citizen s Academy in Cleveland, Ohio in Obtained HISP certification in 2007 Professional Affiliations Northern Ohio Members Alliance of InfraGard President. Information Security Summit - Executive Director. Northeast Ohio Think Tank Advisory Board HISP Institute Board of Directors Skill Summary OS system Security Mainframe Security (Top Secret, ACF2, RACF) Windows NT Security ISS Security Product Suite QualysGuard Enterprise Security Organization Implementation Security Strategy & Design

10 ISO ISO Security Policy Security Process Improvement Project Management Vulnerability Management Risk Management Security Awareness & Training M&A Security Program Implementation ISO Frameworks Ralph Johnson; CISSP, CISM, HISP, CIPP/G Ralph Johnson is the Chief Information Security and Privacy Officer for King County, Washington and Secretary to the Governance Board of the Holistic Information Security Practitioners Institute (HISPI). Mr. Johnson s has filled numerous positions within King County over the past 22 years. King County is Located on Puget Sound in Washington State, and covering 2,134 square miles, King County is nearly twice as large as the average county in the United States. With more than 1.9 million citizens, it ranks as the 14th most populous county in the nation, with approximately 15,000 employees, 14 departments and multiple lines of business. For the past 7 years Mr. Johnson has held the position of Chief Information Security and Privacy Officer in which he oversees information security and privacy issues for the entire county infrastructure. In this capacity he established the information assurance program from policy development to controls selection, implementation, monitoring and evaluation. Mr. Johnson has served as Security Architect for King County, Network Services Manager, PC Support Supervisor, and Network Engineer for the county s department of Public Health. He has held the position of Secretary of the HISPI Governance Board for the past three years. Mr. Johnson has a Bachelor s degree in Business Administration from Eastern Oregon University and an Associate s degree in Mortuary Science form San Francisco College of Mortuary Science. He holds multiple certifications in information security, information privacy, network administration and project management.

Achieving Governance, Risk and Compliance Requirements with HISP Certification Course

Achieving Governance, Risk and Compliance Requirements with HISP Certification Course Achieving Governance, Risk and Compliance Requirements with HISP Certification Course in corporation with A unique information security and regulatory compliance certification course that provides IT security

More information

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank

More information

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

AN OVERVIEW OF INFORMATION SECURITY STANDARDS AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced

More information

Table of Contents EXECUTIVE SUMMARY ACKNOWLEDGEMENT AND DISCLAIMERS ENGAGEMENT SCOPE AND OBJECTIVES EXECUTIVE SUMMARY OF ASSESSMENT RESULTS

Table of Contents EXECUTIVE SUMMARY ACKNOWLEDGEMENT AND DISCLAIMERS ENGAGEMENT SCOPE AND OBJECTIVES EXECUTIVE SUMMARY OF ASSESSMENT RESULTS Table of Contents EXECUTIVE SUMMARY ACKNOWLEDGEMENT AND DISCLAIMERS ENGAGEMENT SCOPE AND OBJECTIVES EXECUTIVE SUMMARY OF ASSESSMENT RESULTS Jefferson Wells has prepared this report for Corporate Creations.

More information

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Importance of Effective Internal Controls and COSO COSO

More information

About MicroSolved, Inc. Company Profile, Experience, Capabilities and Differentiators

About MicroSolved, Inc. Company Profile, Experience, Capabilities and Differentiators About MicroSolved, Inc. Company Profile, Experience, Capabilities and Differentiators Profile MicroSolved, Inc. is an Ohio corporation with a Dun and Bradstreet number of 022904119. Since 1992, MSI has

More information

Panel Session: High Impact Workforce Initiatives Redefine the Government Information Security Workforce

Panel Session: High Impact Workforce Initiatives Redefine the Government Information Security Workforce Panel Session: High Impact Workforce Initiatives Redefine the Government Information Security Workforce Moderator: Lynn McNulty, CISSP Director of Government Affairs for (ISC)2 Co-Chair (ISC)2 Government

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

Product Group Microsoft Corporation I would recommend this instructor and training course to others.

Product Group Microsoft Corporation I would recommend this instructor and training course to others. Chief Information Security Officer (CISO) Georgia State University. What I like most about this training class is the approach of clarifying and reinforcing the information contained in the standards and

More information

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Harmonizing Your Compliance and Security Objectives. Bonnie A. Goins Adjunct Professor, Illinois Institute of Technology

Harmonizing Your Compliance and Security Objectives. Bonnie A. Goins Adjunct Professor, Illinois Institute of Technology Harmonizing Your Compliance and Security Objectives Bonnie A. Goins Adjunct Professor, Illinois Institute of Technology Make sure efforts serve multiple purposes Use standards to guide effort Repeatable

More information

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, 2004 9:00 AM

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, 2004 9:00 AM Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance RSA Security and Accenture February 26, 2004 9:00 AM Agenda Laura Robinson, Industry Analyst, RSA Security Definition of

More information

How to Lead the People in a Program Based Environment

How to Lead the People in a Program Based Environment SESSION ID: GRC-W01 Balancing Compliance and Operational Security Demands Steve Winterfeld Bank Information Security Officer CISSP, PCIP What is more important? Compliance with laws / regulations Following

More information

ERIC M. WRIGHT, cpa, citp

ERIC M. WRIGHT, cpa, citp ERIC M. WRIGHT, cpa, citp ERIC M. WRIGHT, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He specializes in and oversees the design, setup, installation and

More information

-Blue Print- The Quality Approach towards IT Service Management

-Blue Print- The Quality Approach towards IT Service Management -Blue Print- The Quality Approach towards IT Service Management The Qualification and Certification Program in IT Service Management according to ISO/IEC 20000 TÜV SÜD Akademie GmbH Certification Body

More information

CASPR Commonly Accepted Security Practices and Recommendations

CASPR Commonly Accepted Security Practices and Recommendations hhhhhhhhhhhhhh CASPR Commonly Accepted Security Practices and Recommendations CASPR is an open-source project aimed at documenting the information security common body of knowledge through commonly accepted

More information

National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work

National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work National Cyber Security Awareness Month Week Two: Creating a Culture of Cybersecurity at Work Webinar Recording and Evaluation Survey This webinar is being recorded and will be made available online to

More information

KEY TRENDS AND DRIVERS OF SECURITY

KEY TRENDS AND DRIVERS OF SECURITY CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures

More information

State of South Carolina InfoSec and Privacy Career Path Model

State of South Carolina InfoSec and Privacy Career Path Model State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available

More information

kamai Technologies Inc. Commonly Accepted Security Practices and Recommendations (CASPR)

kamai Technologies Inc. Commonly Accepted Security Practices and Recommendations (CASPR) kamai Technologies Inc. Commonly Accepted Security Practices and Recommendations (CASPR) June 2015 Table of Contents CASPR... 2 FIPS 140-2: Security Requirements For Cryptographic Modules... 2 Federal

More information

KLC Consulting, Inc. All Rights Reserved. 1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT

KLC Consulting, Inc. All Rights Reserved. 1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT 1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT About Kyle Lai 2 Kyle Lai, CIPP/G/US, CISSP, CISA, CSSLP, BSI Cert. ISO 27001 LA President of KLC Consulting, Inc. Over 20 years in IT and Security Security

More information

ITIL v3 Service Manager Bridge

ITIL v3 Service Manager Bridge ITIL v3 Service Manager Bridge Course Length: 5 Days Course Overview This 5 day hands on, certification training program enables ITIL Version 2 certified Service Managers to upgrade their Service Manager

More information

THOMAS WELCH, CISSP, CPP, CISA, CISM, CFI, CHS-III twelch@bullzisecurity.com SUMMARY

THOMAS WELCH, CISSP, CPP, CISA, CISM, CFI, CHS-III twelch@bullzisecurity.com SUMMARY , CISSP, CPP, CISA, CISM, CFI, CHS-III twelch@bullzisecurity.com SUMMARY Mr. Welch has over twenty years in the Security and Information Systems business, twelve of which he was directly responsible for

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

{Are you protected?} Overview of Cybersecurity Services

{Are you protected?} Overview of Cybersecurity Services {Are you protected?} Overview of Cybersecurity Services Why Plante Moran is built on thousands of success stories. CLIENT FOCUS The confidence that the client s needs are put ahead of the firm s by a professional

More information

IT Security & Compliance Risk Assessment Capabilities

IT Security & Compliance Risk Assessment Capabilities ATIBA Governance, Risk and Compliance ATIBA provides information security and risk management consulting services for the Banking, Financial Services, Insurance, Healthcare, Manufacturing, Government,

More information

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA Volume 3, July 2014 Come join the discussion! Alberto León Lozano will respond to questions in the discussion area of the COBIT 5 Use It Effectively topic beginning 21 July 2014. Mapping COBIT 5 with IT

More information

A Flexible and Comprehensive Approach to a Cloud Compliance Program

A Flexible and Comprehensive Approach to a Cloud Compliance Program A Flexible and Comprehensive Approach to a Cloud Compliance Program Stuart Aston Microsoft UK Session ID: SPO-201 Session Classification: General Interest Compliance in the cloud Transparency Responsibility

More information

Choosing Ascentor as your cyber security partner. Secure your information Strengthen your business

Choosing Ascentor as your cyber security partner. Secure your information Strengthen your business Secure your information Strengthen your business Choosing Ascentor as your cyber security partner www.ascentor.co.uk Ascentor Ltd 5 Wheatstone Court, Davy Way Waterwells Business Park Quedgeley, Gloucester

More information

TOPSECRETPROTECTION.COM (TSP)

TOPSECRETPROTECTION.COM (TSP) TOPSECRETPROTECTION.COM (TSP) OVERVIEW OF CYBER SECURITY-INFORMATION SYSTEMS SECURITY PROGRAM MANAGEMENT TRAINING COURSE CYBER SECURITY-ISSPM PROFESSIONAL CERTIFICATION Introduction To TSP TSP has over

More information

BENJAMIN TOMHAVE, MS, CISSP

BENJAMIN TOMHAVE, MS, CISSP Herndon, VA tomhave@secureconsulting.net +1 703-282-8600 SENIOR SECURITY PROFESSIONAL An Information Security Leader with demonstrated success driving proactive security initiatives in a variety of organizations

More information

Pishdad Service Management

Pishdad Service Management Pishdad Service Management Service Proposal 20 October 2010 Version 1 We assist our clients to achieve IT Governance and resiliency through continuous process improvement and innovation. Table of Contents

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda

More information

Security Testing. Claire L. Lohr, CSQE, CSDP, CTAL clohr@computer.org. F. Scot Anderson, CISSP scot@securixx.comcom. April 7, 2009 V 1.

Security Testing. Claire L. Lohr, CSQE, CSDP, CTAL clohr@computer.org. F. Scot Anderson, CISSP scot@securixx.comcom. April 7, 2009 V 1. Standards Based Security Testing Claire L. Lohr, CSQE, CSDP, CTAL clohr@computer.org F. Scot Anderson, CISSP scot@securixx.comcom 1 Topics Why use standards? Secure systems component parts (1st level taxonomy)

More information

State of Information Security

State of Information Security State of Information Security Second Annual Assessment Study 2013 Table of Contents: Synopsis and Methodology _ page 2 A Snapshot of Participants _ page 2 Survey Findings _ page 5 Final Thoughts _ page

More information

CASRO Digital Research Conference Data Security: Don t Risk Being the Weak Link

CASRO Digital Research Conference Data Security: Don t Risk Being the Weak Link CASRO Digital Research Conference Data Security: Don t Risk Being the Weak Link Peter Milla CASRO Technical Consultant/CIRQ Technical Advisor peter@petermilla.com Background CASRO and Standards CASRO takes

More information

Achieving Business Imperatives through IT Governance and Risk

Achieving Business Imperatives through IT Governance and Risk IBM Global Technology Services Achieving Business Imperatives through IT Governance and Risk Peter Stremus Internet Security Systems, an IBM Company Introduction : Compliance Value Over the past 15 years

More information

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014 IT Cloud / Data Security Vendor Risk Management Associated with Data Security September 9, 2014 Speakers Brian Thomas, CISA, CISSP In charge of Weaver s IT Advisory Services, broad focus on IT risk, security

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA Robert Stroud International President, ISACA VP Strategy & Innovation, CA Technologies

More information

Terms of Reference for an IT Audit of

Terms of Reference for an IT Audit of National Maritime Safety Authority (NMSA) TASK DESCRIPTION PROJECT/TASK TITLE: EXECUTING AGENT: IMPLEMENTING AGENT: PROJECT SPONSOR: PROJECT LOCATION: To engage a professional and qualified IT Auditor

More information

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

CYBERSECURITY: ISSUES AND ISACA S RESPONSE CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services

More information

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance

More information

Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA

Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Mr. Rojas has over 25 years of information systems consulting, supervisory, managerial and executive experience in various industries. He is considered

More information

Designing & Building an Information Security Program. To protect our critical assets

Designing & Building an Information Security Program. To protect our critical assets Designing & Building an Information Security Program To protect our critical assets Larry Wilson Version 1.0 March, 2014 Instructor Biography Larry Wilson is responsible for developing, implementing and

More information

Mark T. Edmead MBA, CISSP, CISA P.O. Box 2487 Escondido, CA 92033 (760) 489-2721 (760) 809-4947 (Mobile) E-mail: mark@mteadvisors.

Mark T. Edmead MBA, CISSP, CISA P.O. Box 2487 Escondido, CA 92033 (760) 489-2721 (760) 809-4947 (Mobile) E-mail: mark@mteadvisors. Mark T. Edmead MBA, CISSP, CISA P.O. Box 2487 Escondido, CA 92033 (760) 489-2721 (760) 809-4947 (Mobile) E-mail: mark@mteadvisors.com PROFESSIONAL SUMMARY AND ACCOMPLISHMENTS Over 25 years experience in

More information

There are a number of reasons why more and more organizations

There are a number of reasons why more and more organizations Christopher G. Nickell and Charles Denyer Statement on Auditing Standard No. 70 (SAS 70) is an internationally recognized auditing standard developed by the American Institute of Certified Public Accountants

More information

JAMES R. SWAUGER Digital Forensic Examiner

JAMES R. SWAUGER Digital Forensic Examiner CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 726 East Main Street, Suite F #150 Lebanon, Ohio 45036 Phone: 866.246.2794 x703 Email: jswauger@binaryintel.com CERTIFICATIONS

More information

SECURITY. Risk & Compliance Services

SECURITY. Risk & Compliance Services SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize

More information

Payment Card Industry (PCI) Data Security Standard (DSS) Motorola PCI Security Assessment

Payment Card Industry (PCI) Data Security Standard (DSS) Motorola PCI Security Assessment Payment Card Industry (PCI) Data Security Standard (DSS) Motorola PCI Security Assessment Retail establishments have always been a favorite target of thieves and shoplifters, but today s worst criminals

More information

Contents. Facts. Contact. Company Biography...4. Qualifications & Accolades...5. Executive Leadership Team...6. Products & Services...

Contents. Facts. Contact. Company Biography...4. Qualifications & Accolades...5. Executive Leadership Team...6. Products & Services... Contents Company Biography...4 Qualifications & Accolades...5 Executive Leadership Team...6 Products & Services...8 Company History...10 Facts Founded: 2000 CEO: Brad Caldwell Website: www.securitymetrics.com

More information

AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives

AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives AUD105-2nd Edition Auditor s Guide to IT - 20 hours Objectives More and more, auditors are being called upon to assess the risks and evaluate the controls over computer information systems in all types

More information

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP All about CPEs David Gittens CISA CISM CISSP CRISC HISP The Designer David Gittens ISSA Barbados Past President Certified in ethical hacking and computer forensics Certified in security management and

More information

IT Governance: The benefits of an Information Security Management System

IT Governance: The benefits of an Information Security Management System IT Governance: The benefits of an Information Security Management System Katerina Cai, CISSP Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

How To Improve Your Business

How To Improve Your Business IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends

More information

Certification and Training

Certification and Training Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel

More information

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc. Table of Contents PART I. IS Audit Process. CHAPTER 1. Technology and Audit. Technology and Audit. Batch and On-Line Systems. CHAPTER 2. IS Audit Function Knowledge. Information Systems Auditing. What

More information

The Hunt for Fraud. September 25, 2014. Seminar / Training. September 26, 2014

The Hunt for Fraud. September 25, 2014. Seminar / Training. September 26, 2014 BYOD and Securing Mobile Devices September 25, 2014 The Hunt for Fraud September 26, 2014 Seminar / Training Central Arkansas Chapter Information Systems Audit and Control Association, Arkansas Division

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

Curriculum Vitae. Personal information. VASILEIADIS Nikolaos. Work experience. Surname / First name

Curriculum Vitae. Personal information. VASILEIADIS Nikolaos. Work experience. Surname / First name Curriculum Vitae Personal information Surname / First name Addresses VASILEIADIS Nikolaos Home: Koumoundourou 32, 15341,, Greece Work: Yakinthou 3C, 15343,, Greece Telephones Home: +30 210 6084531 Work:

More information

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber

More information

ITIL 2011 Service Design Certification Program - 3 Days

ITIL 2011 Service Design Certification Program - 3 Days ITIL 2011 Service Design Certification Program - 3 Days Program Overview ITIL is a set of best practices guidance that has become a worldwide-adopted framework for Information Technology Services Management

More information

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe Introduction to QualysGuard IT Compliance SaaS Services Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe A Unified and Continuous View of ICT Security, Risks and

More information

Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority

Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority Cloud Security Standards Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority Introduction Sign Off December 2012 Information Technology Authority

More information

ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER

ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER CERTIFICATIONS ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER Certified Information Privacy Professional (CIPP) by the International Association of Privacy Professionals (IAPP) Certified Information

More information

Paul Vlissidis Group Technical Director NCC Group plc paulv@nccgroup.com

Paul Vlissidis Group Technical Director NCC Group plc paulv@nccgroup.com Managing IT Fraud Using Ethical Hacking Paul Vlissidis Group Technical Director NCC Group plc paulv@nccgroup.com Agenda Introductions Context for Ethical Hacking Effective use of ethical hacking in fraud

More information

Governance Simplified

Governance Simplified Information Security Governance Simplified From the Boardroom to the Keyboard TODD FITZGERALD, cissp; cisa, cism Foreword by Tom Peltier CRC Press Taylor & Francis Croup Boca Raton London NewYork CRC Press

More information

Cloud Security Trust Cisco to Protect Your Data

Cloud Security Trust Cisco to Protect Your Data Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive

More information

"Black Hat Webcast Series. Digital Forensics, What Is The Meaning Of This? Wednesday, September 28, 2011

Black Hat Webcast Series. Digital Forensics, What Is The Meaning Of This? Wednesday, September 28, 2011 "Black Hat Webcast Series Digital Forensics, What Is The Meaning Of This? Wednesday, September 28, 2011 Taylor Banks Dov Yoran Pamela Fusco Principal, Booz Allen CSO Digex, CISO Merck, EVP Citi Industry

More information

13 th Annual General Meeting

13 th Annual General Meeting 13 th Annual General Meeting Meet the Candidates You can hear from the candidates in the 2016 Board of Director Election by attending the Meet the Candidates webinar on Tuesday, May 3, 2016 from 3:00 pm

More information

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA

More information

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization Outside View of Increased Regulatory Requirements Regulatory compliance is often seen as sand in the gears requirements

More information

Committees Date: Subject: Public Report of: For Information Summary

Committees Date: Subject: Public Report of: For Information Summary Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security

More information

Preparation Guide. Side entry to the EXIN Expert in IT Service Management based on ISO/IEC 20000

Preparation Guide. Side entry to the EXIN Expert in IT Service Management based on ISO/IEC 20000 Preparation Guide Side entry to the EXIN Expert in IT Service Management based on ISO/IEC 20000 Edition June 2015 Copyright 2015 EXIN All rights reserved. No part of this publication may be published,

More information

White Paper. IT Security in Higher Education

White Paper. IT Security in Higher Education White Paper IT Security in Higher Education 3BIntroduction: The Growing Need for Improved IT Security on Campuses IT security is a hot topic these days, especially at colleges and universities. An April

More information

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)

More information

What can HITRUST do for me?

What can HITRUST do for me? What can HITRUST do for me? Dr. Bryan Cline CISO & VP, CSF Development & Implementation Bryan.Cline@HITRUSTalliance.net Jason Taule Chief Security & Privacy Officer Jason.Taule@FEIsystems.com Introduction

More information

IT Governance Implementation Workshop

IT Governance Implementation Workshop IT Governance Implementation Workshop 3 Full day power packed workshop facilitated by Mr. Gary Allan Banister and Mr. Sreechith Radhakrishnan About the Programme Information is created, used, retained,

More information

EDUCORE ISO 20000 Expert Training

EDUCORE ISO 20000 Expert Training EDUCORE ISO 20000 Expert Training Overview ISO/IEC 20000 is the first international standard for IT service management. It was developed in 2005, by ISO/IEC JTC1 SC7 and revised in 2011. ISO/IEC 20000-1:2005

More information

Governance For Compliance The Convergence of Central and Distributed IT Compliance Presented to VASCAN Conference 2009

Governance For Compliance The Convergence of Central and Distributed IT Compliance Presented to VASCAN Conference 2009 Governance For Compliance The Convergence of Central and Distributed IT Compliance Presented to VASCAN Conference 2009 JASON C. RICHARDS CHIEF INFORMATION SECURITY OFFICER VIRGINIA COMMUNITY COLLEGE SYSTEM

More information

Data Privacy & Security in the Cloud: Legal Basics and New Developments

Data Privacy & Security in the Cloud: Legal Basics and New Developments Data Privacy & Security in the Cloud: Legal Basics and New Developments Lawrence R. Freedman Partner, Edwards Wildman Palmer LLP lfreedman@edwardswildman.com (202) 939-7923 1 The Basics Two basic data

More information

Defending the Database Techniques and best practices

Defending the Database Techniques and best practices ISACA Houston: Grounding Security & Compliance Where The Data Lives Mark R. Trinidad Product Manager mtrinidad@appsecinc.com March 19, 2009 Agenda Understanding the Risk Changing threat landscape The target

More information

Bio Summary and CV. curriculum vitae of John C. Villines; Introduction; page 1 of 5 (rev Jan 2013)

Bio Summary and CV. curriculum vitae of John C. Villines; Introduction; page 1 of 5 (rev Jan 2013) Bio Summary and CV John Villines has dedicated his adult life to security, investigations and crime prevention. He has maintained a company license (Security and Investigations) in Georgia for approximately

More information

Recession Calls for Better Change Management Separation of duties, logging paramount in times of great, rapid change

Recession Calls for Better Change Management Separation of duties, logging paramount in times of great, rapid change Recession Calls for Better Change Management Separation of duties, logging paramount in times of great, rapid change Rebecca Herold, CIPP, CISSP, CISA, CISM, FLMI Final Draft for March 2009 CSI Alert I

More information

Cloud Security Panel: Real World GRC Experiences. ISACA Atlanta s 2013 Annual Geek Week

Cloud Security Panel: Real World GRC Experiences. ISACA Atlanta s 2013 Annual Geek Week Cloud Security Panel: Real World GRC Experiences ISACA Atlanta s 2013 Annual Geek Week Agenda Introductions Recap: Overview of Cloud Computing and Why Auditors Should Care Reference Materials Panel/Questions

More information

Certification for Information System Security Professional (CISSP)

Certification for Information System Security Professional (CISSP) Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by

More information

WENDY L. FRASER, PhD 9628 Regency Loop SE Olympia, Washington 98513 360-556-6056 WendyFraser@comcast.net Curriculum Vita

WENDY L. FRASER, PhD 9628 Regency Loop SE Olympia, Washington 98513 360-556-6056 WendyFraser@comcast.net Curriculum Vita WENDY L. FRASER, PhD 9628 Regency Loop SE Olympia, Washington 98513 360-556-6056 WendyFraser@comcast.net Curriculum Vita PROFESSIONAL STRENGTH Growing people and organizations; enhancing interpersonal

More information

Cloud Computing An Auditor s Perspective

Cloud Computing An Auditor s Perspective Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP sgadia@kpmg.com December 9, 2010 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,

More information

TRAINING TITLE: Internal Auditing Workshop (WORK-008)

TRAINING TITLE: Internal Auditing Workshop (WORK-008) TRAINING TITLE: Internal Auditing Workshop (WORK-008) OVERVIEW: GMP regulations worldwide as well as FDA and ICH guidances require that companies have in place an internal quality audit program. Auditing

More information

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013 Regulatory Updates Eric M. Wright, CPA, CITP Schneider Downs & Co., Inc. December 5, 2013 Eric M. Wright, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He

More information

Understanding the Federal IT Security Professional (FITSP) Certification

Understanding the Federal IT Security Professional (FITSP) Certification Understanding the Federal IT Security Professional (FITSP) Certification Jim Wiggins Executive Director Federal IT Security Institute ISACA NCAC Conference Certification and Emerging Standards Holiday

More information

CFPB Readiness Series: Compliant Vendor Management Overview

CFPB Readiness Series: Compliant Vendor Management Overview CFPB Readiness Series: Compliant Vendor Management Overview Legal Disclaimer This information is not intended to be legal advice and may not be used as legal advice. Legal advice must be tailored to the

More information

Database Security and Auditing

Database Security and Auditing Database Security and Auditing COURSE DESCRIPTION: This seminar aims to provide the Database Administrators, System Administrators, Auditors and IT Security Officers an overview on how to secure and audit

More information

JUANITA HARRIS-PRICE 4221 20 th Street NE Washington, District of Columbia juanitaharrisp@aol.com (202) 246-1942

JUANITA HARRIS-PRICE 4221 20 th Street NE Washington, District of Columbia juanitaharrisp@aol.com (202) 246-1942 JUANITA HARRIS-PRICE 4221 20 th Street NE Washington, District of Columbia juanitaharrisp@aol.com (202) 246-1942 EXECUTIVE MANAGEMENT Behavioral Health Care Children and Family Services State and Local

More information

CLASSIFICATION SPECIFICATION FORM

CLASSIFICATION SPECIFICATION FORM www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information

More information

Off-Line. Auditing Wireless Networks. Auditing Microsoft Windows. Newsletter of the SC Midlands Chapter of ISACA. This Month s Seminar:

Off-Line. Auditing Wireless Networks. Auditing Microsoft Windows. Newsletter of the SC Midlands Chapter of ISACA. This Month s Seminar: Newsletter of the SC Midlands Chapter of ISACA CHAPTER 54 MARCH 2006 This Month s Seminar: Auditing Wireless Networks Wireless networks have been met with immense popularity allowing users to communicate

More information