IT Governance, Assurance and Security Conference

Size: px
Start display at page:

Download "IT Governance, Assurance and Security Conference"

Transcription

1 ISACA Malaysia & MNCC Proudly Presents the11 th Annual IT Governance, Assurance and Security Conference 10 & 11 July 2012 Organised By : Supported By : Register Early to Avoid Disappointment Venue - One World Hotel, First Avenue, Bandar Utama City Centre, Petaling Jaya, Selangor

2 IT Governance marks the 11th year of our highly successful ISACA/MNCC IT Governance Conference. For this year's conference, we continue with the 2011 Conference format, where on Day 1, our panel of speakers will deliver presentations on topics related to core issues on IT Governance, Assurance and Security and on Day 2, master classes will be conducted on practical issues with hands-on delivery sessions. As we hit the midway mark for 2012, we continue to see how major trends in technology, such as the push for cloud services, consumerisation of IT and adoption of mobile computing in our daily activities change the way we think, work and play. Organisations now not only have to battle with the ever changing internal and external IT landscape that will impact IT Governance, Assurance and Security practices in their organisation but are also challenged to comply with latest governance and security related laws. This is especially so with the Malaysian Personal Data Protection Act 2010 (PDPA), which we first presented in our 2010 conference. In January 2012, the Information, Communication and Culture Ministry has established the Personal Data Protection Department (Jabatan Perlindungan Data Peribadi Malaysia) under the PDPA legislation and this is the strongest signal as to date for organisations who are affected by this Act to start preparing for compliance. On Day 1, our panel of speakers will deliver presentations on topics related to emerging trends such as Cloud Computing Governance issues, Security for Mobile Computing, System Forensics, Investigation and Response and Lessons to the IT Auditors from an SAP Implementation Project. Our speakers will then gather for a Panel Discussion which provides our participants with a platform to interact with the speakers on the topic presented. On Day 2, there will be 4 master classes conducted. The aim of these master classes is to provide a practical session to the participants on emerging trends in IT Governance, Assurance and Security. These 4 master classes are: 1. Auditing Security Risks in Virtual IT Systems 2. Fundamentals of Penetration Testing 3. The Essentials of COBIT Time to Act : Complying with the Malaysian Personal Data Protection Act 2010 Our distinguished panel of speakers and master class presenters are selected based on their vast experience and expertise in each topic. Be prepared to connect, discuss and challenge yourself in our conference. Most importantly, participate and take home valuable knowledge and skills that will provide: Management with up-to-date trends and issues on IT Governance, Assurance and Security An understanding that in challenging economic times, there will be increased demands on IT to deliver and support business goals Practical approaches to improve assurance practices and skills in key areas of the IT environment Insights on balancing risks and controls to maximise opportunities in line with emerging regulations Who Should Attend This Conference has been structured with both management and technical professionals in mind and will appeal to: Chief Executive Officers Chief Information/Technology Officers IT Auditors IT Governance Professionals Information Security Professionals Auditors, Compliance and Assurance Professionals IT Consultants and Practitioners Risk Management Professionals Business Managers Day One 10 July :00-08:50 Arrival and Registration Opening Remarks by the Chairperson of the Conference Organising Committee 09:00-10:00 KEYNOTE ADDRESS CyberSecurity 2012: What did the Dragon bring you and will it continue to breathe fire on your security practice? The Water Dragon has not dampened security and privacy news in As early as the first quarter of 2012, we have already seen major companies such as Verisign and Symantec disclosing security breaches to their network. From the other side of the ocean, USA have introduced the Stop Online Privacy Act (SOPA) while Google and Facebook continue to lead users into unchartered territories with their privacy guidelines. This paper examines what lies in store as we cross the half-way mark into the Year of the Dragon from the perspective of a practitioner. Speaker: Mr. Pelle Aardewerk IT Audit Manager - ITS and Asia Pacific Shell 10:00-10:45 Vendor Lock-in Issues in Cloud Computing : Strategies for Overcoming Them Speaker: Mr. Abu Mansor bin A. Manaf Principal Consultant, Government & Education Sectors Red Hat Malaysia 10:45-11:15 MORNING TEA BREAK 11:15-12:00 Cloud Computing Governance : Is your Security policy ready for the sky? Speaker: Mr. Abdul Hamid Abdullah Audit Director Singapore Auditor-General s Office 12:00-12:45 Security Issues for Mobile Computing : Making your Smart-phones safer Speaker: Mr. Jason Yuen Director, Advisory Services Ernst & Young Advisory Services Sdn Bhd 12:45-02:00 LUNCH 02:00-02:45 System Forensics, Investigation and Response : Technically Speaking Speaker: Mr. Mohd. Zabri Adil Talib Head of Digital Forensics Department CyberSecurity Malaysia 02:45-03:30 Implementing SAP : Translating Lessons learned to Audit Considerations Speaker: Mr. Lee Chin Hon Director and Secretary ISACA Malaysia Chapter 03:30-04:00 AFTERNOON TEA BREAK 04:00-05:00 PANEL OF DISCUSSION Is Technology Driving the Need for Data Privacy or Vice-versa? Chairperson: Mr. Arthur Leong Panel: Invited Speakers

3 Day Two 11 July 2012 MANAGEMENT TRACK: MASTER CLASSES (MT1) TECHNICAL TRACK: MASTER CLASSES (TT1) 09:00-10:30 The Essentials of COBIT Describe the COBIT 5 Principles 2. Understand the structure and components of the COBIT 5 Framework 3. Apply the Process Reference Guide 4. Plan for transitioning from COBIT 4.1 to COBIT 5 5. Apply ISACA COBIT 5 Resources for future activities Server Virtualization : Understanding security breaches and what auditors need to look out for 1. Understand the basics of virtualization technology 2. Describe the advantages and disadvantages of virtualization 3. Comprehend virtualization risks and issues 4. Have an overview on how to secure virtualization planning and deployment 5. Plan how to audit the virtualized environment 10:30-11:00 MORNING TEA BREAK 11:00-12:30 COBIT 5 is a major strategic improvement providing the next generation of ISACA guidance on the governance and management of enterprise information and technology (IT) assets. Building on more than 15 years of practical application, ISACA designed COBIT 5 to meet the needs of stakeholders, and to align with current thinking on enterprise governance and management techniques as they relate to IT. Speaker: Ms Foo Mei Ling Professional Services Manager APAC, Methodaware Ltd President, ISACA Malaysia Chapter Organizations have widely adopted virtualization products and services driven primarily by operational efficiency. With efficiency comes serious security considerations. Virtualization technology is the focus of many new potential threats and exploits that must be managed. Virtualization adds layers of technology, which can increase the need to understand new security protocols and security controls. While IT Security manages these, IT Auditors must understand the impact of new potential risks and provide assurance that these risks are managed properly. Speakers: Mr. Arthur Leong, Business Development Manager CCH TeamMate Mr. S. Retnendran, Associate Audit Director AmBank Group Mr. Adrian Foo, Senior IT Auditor Maybank Members of ISACA Malaysia Chapter Special Interest Group on Virtualisaion 12:30-01:30 LUNCH MANAGEMENT TRACK: MASTER CLASSES (MT2) TECHNICAL TRACK: MASTER CLASSES (TT2) 01:30-03:00 Time to Act : Complying with the Malaysian Personal Data Protection Act (PDPA) Have a general overview of the PDP Act Understanding the function of the Personal Data Protection Department of Malaysia 3. Appreciate Organisational Issues in relation to the Act 4. Understand specific IT Issues in relation to the Act 5. Outline a Roadmap for Compliance Fundamentals of Penetration Testing 1. Understand network and system vulnerabilities and threats and general IT Security fundamentals 2. Plan the activities required to conduct a Penetration Testing 3. Appreciate the legal and reporting issues 4. Describe how to perform a penetration testing based on best practices 5. Understand what to look out for from a completed test 03:00-03:30 AFTERNOON TEA BREAK 03:30-05:00 This master class is designed to take you through the initial stages of implementing a programme to comply with the PDP Act It is based on applying tools and techniques that will take the participant from knowing 'what-to-do', to 'how-to-do' stage. Best practices from various sources will be used and discussed. This workshop will benefit anyone who is tasked to start or strengthen Data Loss Prevention/Privacy in his/her organisation. Speaker: Professor Abu Bakar Munir Law Faculty University of Malaya A penetration test, sometimes called a pen test, is a method of evaluating the security of a computer system or network by simulating an attack from an unauthorised user. The process involves an active analysis of the system for any potential vulnerabilities that could result from poor or improper system configuration, both known and unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures. This analysis is carried out from the position of a potential attacker and can involve active exploitation of security vulnerabilities. Speaker: Mr. Meiling Mudin Independent Security Consultant 05:00-05:30 LUCKY DRAW / CLOSING CEREMONY

4 Speakers Profile KEYNOTE SPEAKER Pelle Aardewerk, CISA, CISM IT Audit Manager ITS and Asia Pacific, Shell International BV Pelle manages Shell s global IT audits that include managing international teams on audits, perform Independent Reviews of other audits, being responsible for the Annual Audit plan and stakeholder management within ITS, IT Asia-Pacific, PCD Security and Corporate Security. He is a Certified Information Systems Auditor (CISA) and Certified Information Security Manager (CISM); and possesses certifications on PMP, ITIL and Business Continuity. Professor Abu Bakar Munir Professor of Law and former Dean at the Faculty of Law, University of Malaya He served as the Advisor to the Government of Malaysia on Data Protection and was instrumental in the development of the Personal Data Protection Act He is also the recipient of the prestigious Minister s Award 2010 at the National Cyber Security Awards, and speaks extensively around the world including at Oxford, Cambridge and MIT. His research interests are Air and Space Law, Information and Communications Technology (ICT) Law and Nanotechnology Law and Policy. Ms Foo Mei Ling, CGEIT Professional Services Manager, APAC, Methodware Ltd. President, ISACA Malaysia Chapter Mei Ling has over 11 years of Enterprise Risk Management and IT Governance implementation experience, including implementing Methodware's premier risk management and internal audit systems for clients in the APAC region. Retnendran Sivasupramaniam, CISA Associate Audit Director of the AmBank Group Retnendran has more than 16 years working experience in IT Audit, Controls and Security. His work includes performing and managing teams in performing IT audit and security. Arthur Leong, CISA Business Development Manager, CCH TeamMate A Certified Information Systems Auditor (CISA) and a Microsoft Certified Professional, Arthur has extensive experience in IT auditing, consulting and implementation of audit management systems. Abdul Hamid Bin Abdullah, CISA, CPA, FIIA Singapore Audit Director, Singapore Auditor-General s Office Abdul Hamid has 32 years of public sector auditing experiences. His work includes information security audits of government agencies. He was Director of IT Audit in the Auditor-General s Office, Singapore and is now Audit Director in charge of audit of four ministries and related statutory boards. Mohd Zabri Adil Talib, GCFA, EnCE Specialist/Head of Digital Forensics Department of Cyber Security Malaysia He has vast experiences in handling computer crimes and computer-related crimes forensics examination for various law enforcement agencies in Malaysia. He has testified in the Intellectual Property Court, Magistrate Court, Session Court, High Court and Royal Commission of Inquiry including in the high-profile Altantuya murder case, the Lingam Tape case and the Anwar s Sodomy 2 trial. Jason Yuen Chee Mun, CISA, CISSP Director, Advisory Services, Ernst & Young Advisory Services Sdn. Bhd. Jason has over 15 years of IT Security, Audit and Assurance experiences. He has performed and led many IT audit and security assignments. Adrian Foo, CISA Senior IT Auditor, Malayan Banking Berhad He performs IT assurance activities across all the business entities within the Maybank Group, which include the insurance, investment banking arm. He has over 15 years of IT auditing experience in the financial services industry covering areas such as IT Governance, IT General Controls, Post Implementation Review, Network and Infrastructure Security, Application Controls, Disaster Recovery and Business Continuity. Adrian is currently a Certified Information Systems Auditor (CISA). Lee Chin Hon, CPA (Malaysia, N. Zealand), CISA Chin Hon was the Data Management Lead for an SAP Implementation project for a major airline company based in Malaysia. In addition to his experiences in IT and Financial Operations, he has over 10 years working experiences as an IT Auditor in both professional services and corporate organisations. Chin Hon is an ISACA Malaysia Chapter trainer for the CISA Certification Review classes. Meling Mudin Independent Security Consultant Meling has over 10 years of technical experience in computer security. He currently works for a MNC, where he performs technical security assessments including web application reviews, network and hosts assessments for the company's global IT infrastructure. He is also a respected member of the local security community, and has designed and organized hacking competitions. He is the founder of Hackerspace Kuala Lumpur. Abu Mansur bin A Manaf Principal Consultant, Government & Education Sectors, Red Hat Malaysia Abu Mansur was formerly the CTO at Sun Microsystems Malaysia. He has almost 28 years experience in technology sales and marketing beginning with Rank Xerox Malaysia in Currently, one of his responsibilities is to create the awareness on the strategic value of Open Standards and Open Source Software as a means of achieving competitive edge for Malaysia. About Us ISACA has become a pace-setting global organization for information governance, control, security and audit professionals. Today, ISACA s membership-more than 95,000 strong worldwide-is characterized by its diversity. Members live and work in more than 160 countries and cover a variety of professional IT-related positions. Through its comprehensive guidance and services, ISACA defines the roles of information systems governance, security, audit and assurance professionals worldwide. ISACA Certifications i.e. the Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in the Governance of Enterprise IT (CGEIT) and Certified in Risk and Information Systems Control (CRISC) designations defines the roles of information systems governance, security, audit and assurance professionals worldwide. ISACA Malaysia Chapter is the local chapter affiliate of ISACA. ISACA Malaysia was established in 1984, with current membership exceeding over 600 members and more than 350 professionals holding various ISACA certifications. Malaysian National Computer Confederation (MNCC) MNCC is a confederation dedicated to the development of IT Professionals and the creation of an Information Rich Society. First established in 1967, MNCC is recognized as the IT professional body in Malaysia and its mission is to achieve global competitive advantage through IT Professional excellence. MNCC is a member of the International Federation of Information Processing and the South East Asia Regional Computer Confederation (SEARCC).

5 IT Governance, Assurance and Security Conference 2012 Organisation Name : Address : Registration Form / Details Contact Name : Designation : Tel : Fax : No. Delegate Name Delegate ISACA/MNCC Supporting Master Classes Designation Membership No. Organisation Selection** 1 (am) MT1 or TT1 2 (am) MT1 or TT1 3 (am) MT1 or TT1 ** Please circle ONE MASTER CLASS each for the (am) and (pm) session respectively. This selection is MANDATORY for each participant to enable the organisers to prepare the required training materials. Payment / Details Please cross Cheque or Bank Draft and make payable to ISACA Conference Account Cheque / Draft Number Bank Amount Confirmation of Booking Send / Fax this entire form (or photocopy) to : IT Governance 2012 Conference Secretariat c/o Malaysian National Computer Confederation, Unit 916, 9th Floor, Block A, Damansara Intan, No 1 Jalan SS 20/27, Petaling Jaya TELEPHONE : (603) FAX : (603) [email protected] Conference Fee (Per Person) Your investment for attending this Conference is: Vital Information 1 Delegate RM1, Government Officials RM1, Delegates (same organisation) RM1, Delegates from supporting organisations RM1, Delegates (same organisation) RM1, ISACA & MNCC member RM1, * Special Package for 5 or more participants from the same organisation. Please contact the organiser at: Substitution / Cancellation A refund minus a service charge of 10% will be levied for cancellations received in WRITING by 03 July No refund can be made for cancellations received after 03 July Substitutions are allowed for a registered delegate. All payments must be made prior to event proper. The organisers reserves the right to make any amendments and/or changes to the programme if warranted by circumstances beyond its control. Conference Venue & Accommodation Info One World Hotel, First Avenue, Bandar Utama City Centre, Petaling Jaya, Selangor Tel : (603) For reservations, please make your bookings directly with the hotel. To enjoy the special room rates, please quote IT Governance Hotel bills are to be settled by delegates directly with the hotel. Hotel reservations and travel arrangements are the responsibility of the delegate. IMPORTANT NOTICE: Payment must be paid in advance of the event to guarantee your place. Walk-in delegates, with payment will be admitted based on space availability basis.

IT Governance, Assurance and Security Conference 18 & 19 June 2013

IT Governance, Assurance and Security Conference 18 & 19 June 2013 ISACA Malaysia & MNCC 12th Annual IT Governance, Assurance and Security Conference 18 & 19 June 2013 ISACA 14 CPE Points IIA Malaysia 8 CPD Points MIA 16 CPE Hours Register Early to Avoid Disappointment

More information

Advanced IT Audit Training

Advanced IT Audit Training Advanced IT Audit Training Date: 28 th 30 th October 2014 Time: 8.30 am to 5.30 pm Venue: Iverson Associates, Center Point, Bandar Utama, Kuala Lumpur Advanced IT Audit Training Workshop Overview ISACA

More information

Auditing & Securing Enterprise Mobility Management

Auditing & Securing Enterprise Mobility Management Auditing & Securing Enterprise Mobility Management Date: 30 th September and 1 st October 2014 Time: 9.00am to 5.00pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur Auditing & Securing

More information

Big Data Analytics Using CAATs

Big Data Analytics Using CAATs Big Data Analytics Using CAATs Date: 28 th 29 th January 2015 Time: 9.00am to 5.00pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur Big Data Analytics Using CAATs Big Data Analytics

More information

IT Governance, Assurance and Security Conference

IT Governance, Assurance and Security Conference IT Governance, Assurance and Security Conference ISACA Malaysia & MNCC 14th Annual 16 &17 June 2015 Register Early to Avoid Disappointment FREE Tablet for each delegate ISACA 14 CPE Points IIA Malaysia

More information

Project Management Managing successful PCI DSS project

Project Management Managing successful PCI DSS project Project Management Managing successful PCI DSS project INTRODUCTION PCI-DSS is Payment Card Industry Data Security Standard, one of the fastest growing compliance currently affecting banks, payment service

More information

Newsletter ISACA@MY. ISACA Malaysia Chapter. Issue # 27 October 2013 I N S I D E T H I S I S S U E : President Message 1

Newsletter ISACA@MY. ISACA Malaysia Chapter. Issue # 27 October 2013 I N S I D E T H I S I S S U E : President Message 1 ISACA Malaysia Chapter Newsletter ISACA@MY I N S I D E T H I S I S S U E : President Message 1 Events Calendar, Oct-Dec 2013 2 Trainings Calendar, 2014 2 Annual General Meeting 3 BOD 2013/14 4 Previous

More information

Deloitte TaxMax Growing in strength and sustainability

Deloitte TaxMax Growing in strength and sustainability Deloitte TaxMax Growing in strength and sustainability Friday, 13 November 2015 8:00 a.m. to 5:30 p.m. Weil Hotel, Ipoh Perak An event by Deloitte Tax Academy Overview Key takeaways TaxMax, brought to

More information

Database Security and Auditing

Database Security and Auditing Database Security and Auditing COURSE DESCRIPTION: This seminar aims to provide the Database Administrators, System Administrators, Auditors and IT Security Officers an overview on how to secure and audit

More information

Training Course on Big Data Analytics for Managers and Executives. 6-8 October, 2015 Laguna Redang Island Resort, Terengganu

Training Course on Big Data Analytics for Managers and Executives. 6-8 October, 2015 Laguna Redang Island Resort, Terengganu Training Course on Big Data Analytics for Managers and Executives 6-8 October, 2015 Laguna Redang Island Resort, Terengganu Course Background Big Data Analytics is currently a hot topic being discussed

More information

Managing your Project using Microsoft Project 2013

Managing your Project using Microsoft Project 2013 Applied Technology Group Sdn Bhd (1012178-W) W-5-3, Subang Square Business Centre, Jalan SS15/4G, 47500 Subang Jaya, Selangor, Malaysia. Tel: (+603) 5634 7905 Fax: (+603) 5637 9945 Email: [email protected]

More information

IN-DEPTH OPERATIONAL SECURITY KNOW HOW 5 DAYS TRAINING PROGRAM DELIVERED BY ASIS CERTIFIED PROTECTION PROFESSIONAL (CPP) SUPPORTING PARTNER:

IN-DEPTH OPERATIONAL SECURITY KNOW HOW 5 DAYS TRAINING PROGRAM DELIVERED BY ASIS CERTIFIED PROTECTION PROFESSIONAL (CPP) SUPPORTING PARTNER: IN-DEPTH OPERATIONAL SECURITY KNOW HOW 5 DAYS TRAINING PROGRAM DELIVERED BY ASIS CERTIFIED PROTECTION PROFESSIONAL (CPP) SUPPORTING PARTNER: In- Depth Operational Security Know How 5 Day Course Location:

More information

SECURING PAYMENTS IN THE CYBER WORLD

SECURING PAYMENTS IN THE CYBER WORLD The Central Bank of Kuwait Presents An Information Security Forum on SECURING PAYMENTS IN THE CYBER WORLD 16th NOVEMBER 2014 JUMEIRAH MESSILAH BEACH HOTEL, KUWAIT WELCOME In the last few years, the usages

More information

Dear Industry Partners, EXHIBITOR PROSPECTUS THE 11 TH ALLIED HEALTH SCIENTIFIC CONFERENCE MALAYSIA 2016 (11 TH AHSC 2016)

Dear Industry Partners, EXHIBITOR PROSPECTUS THE 11 TH ALLIED HEALTH SCIENTIFIC CONFERENCE MALAYSIA 2016 (11 TH AHSC 2016) Dear Industry Partners, EXHIBITOR PROSPECTUS THE 11 TH ALLIED HEALTH SCIENTIFIC CONFERENCE MALAYSIA 2016 (11 TH AHSC 2016) It gives me great pleasure to announce that the Association of Allied Health Sciences

More information

PROJECT MANAGEMENT PROFESSIONAL PMP EXAM PREPARATION

PROJECT MANAGEMENT PROFESSIONAL PMP EXAM PREPARATION HRDF CLAIMABLE MY PROCERT PROGRAM PROJECT MANAGEMENT PROFESSIONAL PMP EXAM PREPARATION Course Dates:- Session 1: 13 th - 14 th Sept & 20 th - 21 st Sept 2014 Session 2: 11 th - 12 th Octr & 18 th - 19

More information

Century Software (M) Sdn. Bhd. (445590-U) Century Financials Comprehensive Payments Processing & Reconciliation Training

Century Software (M) Sdn. Bhd. (445590-U) Century Financials Comprehensive Payments Processing & Reconciliation Training Your Caring Credible Committed Training Partner Century Financials Comprehensive Payments Processing & Reconciliation Training 8 th - 10 th March 2016 Langkawi, Kedah In Collaboration with Lembaga Pembangunan

More information

How To Use Kpi System For Talent Management

How To Use Kpi System For Talent Management KPI Based Performance Management System for Productivity Improvement & Talent Management Complimentary - KPI System formats in Ms Excel, templates and 5 ebooks on KPI! Free KPI & Performance Management

More information

STRATEGIC PROCUREMENT & GLOBAL SOURCING CONFERENCE DATE: 22 & 23 JULY 2008 VENUE: HOTEL ISTANA,KUALA LUMPUR

STRATEGIC PROCUREMENT & GLOBAL SOURCING CONFERENCE DATE: 22 & 23 JULY 2008 VENUE: HOTEL ISTANA,KUALA LUMPUR z STRATEGIC PROCUREMENT & GLOBAL SOURCING CONFERENCE DATE: 22 & 23 JULY 2008 VENUE: HOTEL ISTANA,KUALA LUMPUR CHAIRPERSONS Ms Maria Luisa V. Alvendia Assistant Vice President, Procurement Center PLDT Philippines

More information

RISK MANAGEMENT CONFERENCE SERIES 2013 RENAISSANCE KUALA LUMPUR

RISK MANAGEMENT CONFERENCE SERIES 2013 RENAISSANCE KUALA LUMPUR RISK MANAGEMENT CONFERENCE SERIES 2013 RENAISSANCE KUALA LUMPUR ENTERPRISE RISK MANAGEMENT & DISASTER RECOVERY CONFERENCE 26 & 27 November 2013 REPUTATIONAL RISK & CRISIS MANAGEMENT CONFERENCE 3 & 4 December

More information

P R O G R A M M E. MSWG SEMINAR on Investigative Audit & Forensic Accounting. SIDC CPE-Approved : 5 CPE Points

P R O G R A M M E. MSWG SEMINAR on Investigative Audit & Forensic Accounting. SIDC CPE-Approved : 5 CPE Points MSWG SEMINAR on Investigative Audit & Forensic Accounting Today s complex corporate and financial market, with its use of blinding new technologies, has made accounting fraud more difficult to detect than

More information

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25

More information

Why CISM? Who Earns CISM Certification? CISA, CISM and CGEIT Program Accreditation Renewed Under ISO/IEC 17024:2003

Why CISM? Who Earns CISM Certification? CISA, CISM and CGEIT Program Accreditation Renewed Under ISO/IEC 17024:2003 The Certified Information Security Manager (CISM) certification is a unique management-focused certification that has been earned by more than 16,000 professionals since its introduction in 2003. Unlike

More information

3 4 SEPTEMBER 2012 TAN SRI ABDUL KADIR YUSOF HALL ATTORNEY GENERAL S CHAMBERS LEVEL 3, NO. 45, LOT 4G7 PERSIARAN PERDANA, PRECINT 4 PUTRAJAYA

3 4 SEPTEMBER 2012 TAN SRI ABDUL KADIR YUSOF HALL ATTORNEY GENERAL S CHAMBERS LEVEL 3, NO. 45, LOT 4G7 PERSIARAN PERDANA, PRECINT 4 PUTRAJAYA Providing the participants with the legal knowledge and information necessary to develop and implement programmes that will effectively prevent catastrophic losses brought on by recalls and product liability

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

GRCCS-BCI International Conference & Exhibition 2016

GRCCS-BCI International Conference & Exhibition 2016 GRCCS-BCI International Conference & Exhibition 2016 Transforming Business Continuity Management Through Organisational Resilience and Readiness 23 24 May 2016 Putrajaya International Convention Centre

More information

Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity ( Framework )

Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity ( Framework ) 10 October 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Re: Experience with the Framework for Improving Critical Infrastructure

More information

Internal audit and risk management

Internal audit and risk management Strengthening governance worldwide Internal and risk management Adding value BRITISH ACCREDITATION COUNCIL ACCREDITED SHORT COURSE PROVIDER ACCREDITED SHORT COURSE PROVIDER One-week workshop 7 to 11 March

More information

C L A R I D E N 18 19 June 2014

C L A R I D E N 18 19 June 2014 C L A R I D E N 18 19 June 2014 Knowledge for the world business leaders Shangri-La Hotel Kuala Lumpur, Malaysia Handling Employment Disputes, Termination and Dismissal in Malaysia Faculty Director Trevor

More information

Certification Programs

Certification Programs Registration Questions? Please contact us directly. 507 S. Grand Ave., Lansing, MI 48933 [email protected] (517) 342-9057 Certification Programs 2015 Following the lecture on day 2, students have the

More information

EFFECTIVE ISLAMIC EVENTS MANAGEMENT

EFFECTIVE ISLAMIC EVENTS MANAGEMENT ISLAMIC EVENTS PRO PRO WORKSHOP Series 2 DAYS WORKSHOP 26-27 Jan 2015 DePalma Hotel, Ampang Kuala Lumpur EFFECTIVE ISLAMIC EVENTS MANAGEMENT Bahasa Melayu English PANEL OF TRAINERS FADZULI WAHAB Operation

More information

THE BABSON SYMPOSIUM FOR ENTREPRENEURSHIP EDUCATORS

THE BABSON SYMPOSIUM FOR ENTREPRENEURSHIP EDUCATORS UNIRAZAK and Babson College proudly present THE BABSON SYMPOSIUM FOR ENTREPRENEURSHIP EDUCATORS Venue : UNIRAZAK, CapSquare, Kuala Lumpur Date : 11 to 14 July 2011 Hosted by Babson College is ranked the

More information

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING forebrook Forebrook offers a range of information security, governance, IT systems and infrastructure related

More information

1. Why did MICPA and ACCA enter into this agreement?

1. Why did MICPA and ACCA enter into this agreement? ACCA to MICPA FAQs 1. Why did MICPA and ACCA enter into this agreement? This Mutual Recognition Agreement (MRA) strengthens the already excellent relationship between the two bodies. It provides a route

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

CYBERSECURITY: ISSUES AND ISACA S RESPONSE CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services

More information

2010 Critical Thinker Series

2010 Critical Thinker Series Malaysian Organisation of Pharmaceutical Industries (MOPI) & PharmEng Technology Presents cgmp Case Studies a T rra ini ing i P rrog rram ffo rr cgmp P rro ffe ss ss ionai l ss 2010 Critical Thinker Series

More information

Towards Business Continuity Management Compliance & Certification 21 July 2011, Thursday Hotel Istana, Kuala Lumpur

Towards Business Continuity Management Compliance & Certification 21 July 2011, Thursday Hotel Istana, Kuala Lumpur Towards Business Continuity Management Compliance & Certification 21 July 2011, Thursday Hotel Istana, Kuala Lumpur Introduction As earthquake, tsunami and other disasters of nature threaten and disrupt

More information

COBIT 5 Implementation Certifi cate. Training Course & Exam

COBIT 5 Implementation Certifi cate. Training Course & Exam COBIT 5 Implementation Certifi cate Training Course & Exam Introduction The COBIT 5 Implementation Certifi cate is a Practitioner Level Training Course that focuses on how to apply COBIT 5 (The Framework

More information

ISACA Tools Help Develop Cybersecurity Expertise

ISACA Tools Help Develop Cybersecurity Expertise Volume 21, 8 October 2014 ISACA Tools Help Develop Cybersecurity Expertise Nominate Qualified Candidates for the ISACA Board of Directors Tips for Solving Data Classification Challenges Earn CPE at Professional

More information

An innovation programme to equip technology professionals with Business Innovation skills...

An innovation programme to equip technology professionals with Business Innovation skills... An innovation programme to equip technology professionals with Business Innovation skills... PIKOM Training Centre, Empire Damansara** The National ICT Association of Malaysia (PIKOM) in collaboration

More information

PROJECT MANAGEMENT FOR EXECUTIVE ASSISTANTS AND PERSONAL ASSISTANTS

PROJECT MANAGEMENT FOR EXECUTIVE ASSISTANTS AND PERSONAL ASSISTANTS PROJECT MANAGEMENT FOR EXECUTIVE ASSISTANTS AND PERSONAL ASSISTANTS 2 Separately Bookable Seminars, 1 Mega Professional Development Forum for EAs and Pas 25 th & 26 th August, Marque Hotel, Brisbane Including

More information

IT Conference: From Gatekeepers to Strategic Partners Leveraging IT to become CPAs of the Information Age

IT Conference: From Gatekeepers to Strategic Partners Leveraging IT to become CPAs of the Information Age IT Conference: From Gatekeepers to Strategic Partners Leveraging IT to become CPAs of the Information Age Date Saturday, 22 November 2008 Time Venue 9:00 am 1:00 pm Ballroom, The Mira Hong Kong Hotel,

More information

CERTIFICATE IN OCCUPATIONAL SAFETY AND HEALTH MANAGEMENT

CERTIFICATE IN OCCUPATIONAL SAFETY AND HEALTH MANAGEMENT SBL Scheme CERTIFICATE IN OCCUPATIONAL SAFETY AND HEALTH MANAGEMENT The MEF Academy Certificate Program in Occupational Safety and Health (OSH) Management is designed to provide practical knowledge and

More information

Service Offering. Company Profile. 2005 Allied Consulting Services Pte Ltd. All rights reserved

Service Offering. Company Profile. 2005 Allied Consulting Services Pte Ltd. All rights reserved Service Offering Company Profile & Service Offering 2005 Allied Consulting Services Pte Ltd. All rights reserved Our Mission and Vision We want to be your partner of success creating lasting values in

More information

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA vandeke@gmail.com 11.16.2013 Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013 AGENDA IT s Changing Landscape ISACA s Response Vision and Mission COBIT 5

More information

CCSK Prep Course 2015

CCSK Prep Course 2015 CCSK Prep Course 2015 25 May 2015 Early registration 27 April 2015 Final registration 11 May 2015 Offered by ISACA Athens Chapter has been awarded four times as Best Large Chapter in Europe/Africa (2009,

More information

KEY TRENDS AND DRIVERS OF SECURITY

KEY TRENDS AND DRIVERS OF SECURITY CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures

More information

M&A clients and markets event

M&A clients and markets event M&A clients and markets event Date: 13 August 2015 Time: 9.00 a.m. - 12.00 p.m. (registration starts at 8.30 a.m.) Venue: Deloitte (Kuala Lumpur office) Meetpoint 1 & 2 Level 15 Menara LGB 1 Jalan Wan

More information

Strategic Recruitment, Selection & Retention Seminar By BG Consulting Date: August 4-7, 2014 (4 days) Venue: Resort World Sentosa Singapore

Strategic Recruitment, Selection & Retention Seminar By BG Consulting Date: August 4-7, 2014 (4 days) Venue: Resort World Sentosa Singapore Jfam Synergy Pte Ltd Strategic Recruitment, Selection & Retention Seminar By BG Consulting Date: August 4-7, 2014 (4 days) Venue: Resort World Sentosa Singapore A must attend intensive and practical seminar

More information

fast track digital marketing training

fast track digital marketing training fast track digital marketing training UK s Most Popular Digital Marketing Course is Now in Malaysia! A 2 day digital university. We ll introduce you to the essentials of a wide range of digital marketing

More information

Athens, 2 December 2011 Hellenic American Union Conference Center

Athens, 2 December 2011 Hellenic American Union Conference Center Athens, 2 December 2011 Hellenic American Union Conference Center ISACA Athens Chapter and the Hellenic American Union are organizing the 1 st ISACA Athens Chapter Conference on December 2 nd, 2011. The

More information

C L A R I D E N 29 September - 1 October 2014

C L A R I D E N 29 September - 1 October 2014 C L A R I D E N 29 September - 1 October 2014 Knowledge for the world business leaders Shangri-La Hotel, Singapore Preparation Course for Project Management Masterclass Leading to PMP Certification Aligned

More information

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning Val-EdTM Valiant Technologies Education & Training Services 2-day Workshop on Business Continuity & Disaster Recovery Planning All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies.

More information

Certification Programs

Certification Programs Certification Programs 2014 The SBS Institute serves community banks by providing educational programs that will certify a banker has the knowledge and skills to protect against todays information security

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

SUBSCRIPTION AGREEMENT FOR SELF MONITORING SERVICES

SUBSCRIPTION AGREEMENT FOR SELF MONITORING SERVICES Manual Registration Version SUBSCRIPTION AGREEMENT FOR SELF MONITORING SERVICES SME Credit Bureau (M) Sdn Bhd (820050-T) Level 5, Bangunan CGC, Kelana Business Centre 97, Jalan SS7/2, 47301 Petaling Jaya

More information

To be a well recognised body representing, promoting and advancing the management science/operations research.

To be a well recognised body representing, promoting and advancing the management science/operations research. MANAGEMENT SCIENCE/OPERATIONS RESEARCH SOCIETY OF MALAYSIA (MSORSM) The Professional Association for the Advancement of the Management Sciences [Reg. 3935/86 (Selangor)] (Incorporated under Socie=es Act

More information

Information Security Management Systems

Information Security Management Systems Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector

More information

INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA

INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA By THAIB MUSTAFA, CHAIRMAN TECHNICAL COMMITTEE FOR INFORMATION SECURITY (TC/G/5) INDUSTRY STANDARDS COMMITTEE FOR INFORMATION TECHNOLOGY, COMMUNICATION

More information

Managerial Decision Making and leadership

Managerial Decision Making and leadership Managerial Decision Making and leadership Lead your team to make quality decisions for long-term success 5-6 Sep 2016 (Mon-Tue) Hong Kong Managerial Decision Making and Leadership by HKUST Business School

More information

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls

More information

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and

More information

CERTIFICATE IN HUMAN RESOURCE MANAGEMENT

CERTIFICATE IN HUMAN RESOURCE MANAGEMENT Claimable under SBL Scheme CERTIFICATE IN HUMAN RESOURCE MANAGEMENT The MEF Academy Certificate Program in Human Resources Management is approved by the Pembangunan Sumber Manusia Berhad (Human Resource

More information

Cyber Risk and Insurance What companies need to know

Cyber Risk and Insurance What companies need to know Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the

More information

Asia Pacific the Future of Cloud Computing

Asia Pacific the Future of Cloud Computing Asia Pacific the Future of Cloud Computing Presented by the CSA and CEPREI 1-3 December 2015 Guangzhou, China The 1-3 December 2015 Guangzhou, China Contents Backgroud Why Join the CSA APAC Congress Why

More information

MICG MEDICAL NEGLIGENCE,MEDIATION AND MEDICAL RECORDS UPKEEPING CONFERENCE 2011

MICG MEDICAL NEGLIGENCE,MEDIATION AND MEDICAL RECORDS UPKEEPING CONFERENCE 2011 MICG MEDICAL NEGLIGENCE,MEDIATION AND MEDICAL RECORDS UPKEEPING CONFERENCE 2011 UPDATES IN CURRENT MEDICO - LEGAL ISSUES TO SAFEGUARD AGAINST CLAIMS AND LITIGATION The increasing number of medical negligence

More information

University Leadership Development Workshops

University Leadership Development Workshops SEAMEO RIHED - AGB Spring 2014 University Leadership Development Workshops Preliminary Programme Malaysia Thailand 2 3 June 5 6 June Day 1 Preliminary Programme Who Should Attend The University Leadership

More information

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup. Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.com DA! (by Global knowledge & TechRepublic) Top certifications by salary:

More information

G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING

G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING IS AUDITING GUIDELINE G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply

More information

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile JOINT EVENT WITH IIBA-LA Trends & Best Practices in Cybersecurity for networks, cloud computing and mobile April 23 rd, 2015 Hands-on Experts Share Current Strategies to Manage Cybersecurity Today s enterprise

More information

CERTIFICATE IN HUMAN RESOURCE MANAGEMENT

CERTIFICATE IN HUMAN RESOURCE MANAGEMENT SBL Scheme CERTIFICATE IN HUMAN RESOURCE MANAGEMENT The MEF Academy Certificate Program in Human Resources Management is designed to provide practical knowledge and skills for individuals currently employed

More information

SIA Event: SIA Fire Safety Seminar 2015: Unprotected Openings, Means of Escape, Fire Forensic Cases

SIA Event: SIA Fire Safety Seminar 2015: Unprotected Openings, Means of Escape, Fire Forensic Cases EVENT DETAILS Programme: 1.30pm 2.00pm 2.45pm 3.15pm 4.00pm 4.30pm Registration Presentation by Mdm Eng Yew Hoon Unprotected Openings Part 1: Interpretation & Application of Clause 3.5 Presentation by

More information

Governance and Management of Information Security

Governance and Management of Information Security Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information

More information

The Influence of Software Vulnerabilities on Business Risks 1

The Influence of Software Vulnerabilities on Business Risks 1 The Influence of Software Vulnerabilities on Business Risks 1 Four sources of risk relevant for evaluating the influence of software vulnerabilities on business risks Authors Hilbrand Kramer, MSc (Royal

More information

IT Governance Implementation Workshop

IT Governance Implementation Workshop IT Governance Implementation Workshop 3 Full day power packed workshop facilitated by Mr. Gary Allan Banister and Mr. Sreechith Radhakrishnan About the Programme Information is created, used, retained,

More information

Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?

More information

3rd Annual Cust Contact Asia Pacific Summit A Frost & Sullivan Executive MindXchange Crown Prince Galleria, Manila, Philippines 26-27 June 2008 Processes and Technologies That Deliver Cust Satisfaction

More information

Chayuth Singtongthumrongkul

Chayuth Singtongthumrongkul IT is complicated. IT Governance doesn t have to be. Chayuth Singtongthumrongkul CISSP, CISA, ITIL Intermediate, PMP, IRCA ISMS (ISO/IEC 27001) Director of International Academic Alliance, ACIS Professional

More information

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications Thomas K. Lee, Executive Director/CIO Human Resources Department (518) 447-2906 Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) The New York State

More information

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA Quality and security in application development Round Table Meeting/Discussion Group Wednesday 23rd May 2007 Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA 1 The International

More information

Big 4 Information Security Forum

Big 4 Information Security Forum San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL

More information

Grow your own talent. Agribusiness Management Development Program. Prepare your next generation of leaders and win the war for talent

Grow your own talent. Agribusiness Management Development Program. Prepare your next generation of leaders and win the war for talent Grow your own talent Agribusiness Management Development Program Prepare your next generation of leaders and win the war for talent Welcome. Your journey starts now. We are excited to bring you the inaugural

More information

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service G-Cloud Service Definition Atos Information Security Wireless Scanning Service Keeping your wireless networks secure Atos Information Security Wireless Scanning Service The Atos Wireless Scanning Service

More information

C015 Certification Report

C015 Certification Report C015 Certification Report NexCode National Security Suite Release 3 File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please

More information

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

LAWTECH NZ 3 rd Annual New Zealand Law & Technology Conference

LAWTECH NZ 3 rd Annual New Zealand Law & Technology Conference LAWTECH NZ 3 rd Annual New Zealand Law & Technology Conference 18 March, 2015 Pullman, Auckland EY s ediscovery Services offer rapidly deployable litigation support and professional Gold sponsor Proudly

More information

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some

More information

A FORUM FOR DEBATE, A CATALYST FOR CHANGE

A FORUM FOR DEBATE, A CATALYST FOR CHANGE 7 March 2013 Renaissance Hong Kong Harbour View Hotel Hong Kong A FORUM FOR DEBATE, A CATALYST FOR CHANGE 2013 conference highlights: The impact of the increasing frequency and severity of natural catastrophes

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information