IT Governance, Assurance and Security Conference
|
|
|
- Claribel Hall
- 10 years ago
- Views:
Transcription
1 ISACA Malaysia & MNCC Proudly Presents the11 th Annual IT Governance, Assurance and Security Conference 10 & 11 July 2012 Organised By : Supported By : Register Early to Avoid Disappointment Venue - One World Hotel, First Avenue, Bandar Utama City Centre, Petaling Jaya, Selangor
2 IT Governance marks the 11th year of our highly successful ISACA/MNCC IT Governance Conference. For this year's conference, we continue with the 2011 Conference format, where on Day 1, our panel of speakers will deliver presentations on topics related to core issues on IT Governance, Assurance and Security and on Day 2, master classes will be conducted on practical issues with hands-on delivery sessions. As we hit the midway mark for 2012, we continue to see how major trends in technology, such as the push for cloud services, consumerisation of IT and adoption of mobile computing in our daily activities change the way we think, work and play. Organisations now not only have to battle with the ever changing internal and external IT landscape that will impact IT Governance, Assurance and Security practices in their organisation but are also challenged to comply with latest governance and security related laws. This is especially so with the Malaysian Personal Data Protection Act 2010 (PDPA), which we first presented in our 2010 conference. In January 2012, the Information, Communication and Culture Ministry has established the Personal Data Protection Department (Jabatan Perlindungan Data Peribadi Malaysia) under the PDPA legislation and this is the strongest signal as to date for organisations who are affected by this Act to start preparing for compliance. On Day 1, our panel of speakers will deliver presentations on topics related to emerging trends such as Cloud Computing Governance issues, Security for Mobile Computing, System Forensics, Investigation and Response and Lessons to the IT Auditors from an SAP Implementation Project. Our speakers will then gather for a Panel Discussion which provides our participants with a platform to interact with the speakers on the topic presented. On Day 2, there will be 4 master classes conducted. The aim of these master classes is to provide a practical session to the participants on emerging trends in IT Governance, Assurance and Security. These 4 master classes are: 1. Auditing Security Risks in Virtual IT Systems 2. Fundamentals of Penetration Testing 3. The Essentials of COBIT Time to Act : Complying with the Malaysian Personal Data Protection Act 2010 Our distinguished panel of speakers and master class presenters are selected based on their vast experience and expertise in each topic. Be prepared to connect, discuss and challenge yourself in our conference. Most importantly, participate and take home valuable knowledge and skills that will provide: Management with up-to-date trends and issues on IT Governance, Assurance and Security An understanding that in challenging economic times, there will be increased demands on IT to deliver and support business goals Practical approaches to improve assurance practices and skills in key areas of the IT environment Insights on balancing risks and controls to maximise opportunities in line with emerging regulations Who Should Attend This Conference has been structured with both management and technical professionals in mind and will appeal to: Chief Executive Officers Chief Information/Technology Officers IT Auditors IT Governance Professionals Information Security Professionals Auditors, Compliance and Assurance Professionals IT Consultants and Practitioners Risk Management Professionals Business Managers Day One 10 July :00-08:50 Arrival and Registration Opening Remarks by the Chairperson of the Conference Organising Committee 09:00-10:00 KEYNOTE ADDRESS CyberSecurity 2012: What did the Dragon bring you and will it continue to breathe fire on your security practice? The Water Dragon has not dampened security and privacy news in As early as the first quarter of 2012, we have already seen major companies such as Verisign and Symantec disclosing security breaches to their network. From the other side of the ocean, USA have introduced the Stop Online Privacy Act (SOPA) while Google and Facebook continue to lead users into unchartered territories with their privacy guidelines. This paper examines what lies in store as we cross the half-way mark into the Year of the Dragon from the perspective of a practitioner. Speaker: Mr. Pelle Aardewerk IT Audit Manager - ITS and Asia Pacific Shell 10:00-10:45 Vendor Lock-in Issues in Cloud Computing : Strategies for Overcoming Them Speaker: Mr. Abu Mansor bin A. Manaf Principal Consultant, Government & Education Sectors Red Hat Malaysia 10:45-11:15 MORNING TEA BREAK 11:15-12:00 Cloud Computing Governance : Is your Security policy ready for the sky? Speaker: Mr. Abdul Hamid Abdullah Audit Director Singapore Auditor-General s Office 12:00-12:45 Security Issues for Mobile Computing : Making your Smart-phones safer Speaker: Mr. Jason Yuen Director, Advisory Services Ernst & Young Advisory Services Sdn Bhd 12:45-02:00 LUNCH 02:00-02:45 System Forensics, Investigation and Response : Technically Speaking Speaker: Mr. Mohd. Zabri Adil Talib Head of Digital Forensics Department CyberSecurity Malaysia 02:45-03:30 Implementing SAP : Translating Lessons learned to Audit Considerations Speaker: Mr. Lee Chin Hon Director and Secretary ISACA Malaysia Chapter 03:30-04:00 AFTERNOON TEA BREAK 04:00-05:00 PANEL OF DISCUSSION Is Technology Driving the Need for Data Privacy or Vice-versa? Chairperson: Mr. Arthur Leong Panel: Invited Speakers
3 Day Two 11 July 2012 MANAGEMENT TRACK: MASTER CLASSES (MT1) TECHNICAL TRACK: MASTER CLASSES (TT1) 09:00-10:30 The Essentials of COBIT Describe the COBIT 5 Principles 2. Understand the structure and components of the COBIT 5 Framework 3. Apply the Process Reference Guide 4. Plan for transitioning from COBIT 4.1 to COBIT 5 5. Apply ISACA COBIT 5 Resources for future activities Server Virtualization : Understanding security breaches and what auditors need to look out for 1. Understand the basics of virtualization technology 2. Describe the advantages and disadvantages of virtualization 3. Comprehend virtualization risks and issues 4. Have an overview on how to secure virtualization planning and deployment 5. Plan how to audit the virtualized environment 10:30-11:00 MORNING TEA BREAK 11:00-12:30 COBIT 5 is a major strategic improvement providing the next generation of ISACA guidance on the governance and management of enterprise information and technology (IT) assets. Building on more than 15 years of practical application, ISACA designed COBIT 5 to meet the needs of stakeholders, and to align with current thinking on enterprise governance and management techniques as they relate to IT. Speaker: Ms Foo Mei Ling Professional Services Manager APAC, Methodaware Ltd President, ISACA Malaysia Chapter Organizations have widely adopted virtualization products and services driven primarily by operational efficiency. With efficiency comes serious security considerations. Virtualization technology is the focus of many new potential threats and exploits that must be managed. Virtualization adds layers of technology, which can increase the need to understand new security protocols and security controls. While IT Security manages these, IT Auditors must understand the impact of new potential risks and provide assurance that these risks are managed properly. Speakers: Mr. Arthur Leong, Business Development Manager CCH TeamMate Mr. S. Retnendran, Associate Audit Director AmBank Group Mr. Adrian Foo, Senior IT Auditor Maybank Members of ISACA Malaysia Chapter Special Interest Group on Virtualisaion 12:30-01:30 LUNCH MANAGEMENT TRACK: MASTER CLASSES (MT2) TECHNICAL TRACK: MASTER CLASSES (TT2) 01:30-03:00 Time to Act : Complying with the Malaysian Personal Data Protection Act (PDPA) Have a general overview of the PDP Act Understanding the function of the Personal Data Protection Department of Malaysia 3. Appreciate Organisational Issues in relation to the Act 4. Understand specific IT Issues in relation to the Act 5. Outline a Roadmap for Compliance Fundamentals of Penetration Testing 1. Understand network and system vulnerabilities and threats and general IT Security fundamentals 2. Plan the activities required to conduct a Penetration Testing 3. Appreciate the legal and reporting issues 4. Describe how to perform a penetration testing based on best practices 5. Understand what to look out for from a completed test 03:00-03:30 AFTERNOON TEA BREAK 03:30-05:00 This master class is designed to take you through the initial stages of implementing a programme to comply with the PDP Act It is based on applying tools and techniques that will take the participant from knowing 'what-to-do', to 'how-to-do' stage. Best practices from various sources will be used and discussed. This workshop will benefit anyone who is tasked to start or strengthen Data Loss Prevention/Privacy in his/her organisation. Speaker: Professor Abu Bakar Munir Law Faculty University of Malaya A penetration test, sometimes called a pen test, is a method of evaluating the security of a computer system or network by simulating an attack from an unauthorised user. The process involves an active analysis of the system for any potential vulnerabilities that could result from poor or improper system configuration, both known and unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures. This analysis is carried out from the position of a potential attacker and can involve active exploitation of security vulnerabilities. Speaker: Mr. Meiling Mudin Independent Security Consultant 05:00-05:30 LUCKY DRAW / CLOSING CEREMONY
4 Speakers Profile KEYNOTE SPEAKER Pelle Aardewerk, CISA, CISM IT Audit Manager ITS and Asia Pacific, Shell International BV Pelle manages Shell s global IT audits that include managing international teams on audits, perform Independent Reviews of other audits, being responsible for the Annual Audit plan and stakeholder management within ITS, IT Asia-Pacific, PCD Security and Corporate Security. He is a Certified Information Systems Auditor (CISA) and Certified Information Security Manager (CISM); and possesses certifications on PMP, ITIL and Business Continuity. Professor Abu Bakar Munir Professor of Law and former Dean at the Faculty of Law, University of Malaya He served as the Advisor to the Government of Malaysia on Data Protection and was instrumental in the development of the Personal Data Protection Act He is also the recipient of the prestigious Minister s Award 2010 at the National Cyber Security Awards, and speaks extensively around the world including at Oxford, Cambridge and MIT. His research interests are Air and Space Law, Information and Communications Technology (ICT) Law and Nanotechnology Law and Policy. Ms Foo Mei Ling, CGEIT Professional Services Manager, APAC, Methodware Ltd. President, ISACA Malaysia Chapter Mei Ling has over 11 years of Enterprise Risk Management and IT Governance implementation experience, including implementing Methodware's premier risk management and internal audit systems for clients in the APAC region. Retnendran Sivasupramaniam, CISA Associate Audit Director of the AmBank Group Retnendran has more than 16 years working experience in IT Audit, Controls and Security. His work includes performing and managing teams in performing IT audit and security. Arthur Leong, CISA Business Development Manager, CCH TeamMate A Certified Information Systems Auditor (CISA) and a Microsoft Certified Professional, Arthur has extensive experience in IT auditing, consulting and implementation of audit management systems. Abdul Hamid Bin Abdullah, CISA, CPA, FIIA Singapore Audit Director, Singapore Auditor-General s Office Abdul Hamid has 32 years of public sector auditing experiences. His work includes information security audits of government agencies. He was Director of IT Audit in the Auditor-General s Office, Singapore and is now Audit Director in charge of audit of four ministries and related statutory boards. Mohd Zabri Adil Talib, GCFA, EnCE Specialist/Head of Digital Forensics Department of Cyber Security Malaysia He has vast experiences in handling computer crimes and computer-related crimes forensics examination for various law enforcement agencies in Malaysia. He has testified in the Intellectual Property Court, Magistrate Court, Session Court, High Court and Royal Commission of Inquiry including in the high-profile Altantuya murder case, the Lingam Tape case and the Anwar s Sodomy 2 trial. Jason Yuen Chee Mun, CISA, CISSP Director, Advisory Services, Ernst & Young Advisory Services Sdn. Bhd. Jason has over 15 years of IT Security, Audit and Assurance experiences. He has performed and led many IT audit and security assignments. Adrian Foo, CISA Senior IT Auditor, Malayan Banking Berhad He performs IT assurance activities across all the business entities within the Maybank Group, which include the insurance, investment banking arm. He has over 15 years of IT auditing experience in the financial services industry covering areas such as IT Governance, IT General Controls, Post Implementation Review, Network and Infrastructure Security, Application Controls, Disaster Recovery and Business Continuity. Adrian is currently a Certified Information Systems Auditor (CISA). Lee Chin Hon, CPA (Malaysia, N. Zealand), CISA Chin Hon was the Data Management Lead for an SAP Implementation project for a major airline company based in Malaysia. In addition to his experiences in IT and Financial Operations, he has over 10 years working experiences as an IT Auditor in both professional services and corporate organisations. Chin Hon is an ISACA Malaysia Chapter trainer for the CISA Certification Review classes. Meling Mudin Independent Security Consultant Meling has over 10 years of technical experience in computer security. He currently works for a MNC, where he performs technical security assessments including web application reviews, network and hosts assessments for the company's global IT infrastructure. He is also a respected member of the local security community, and has designed and organized hacking competitions. He is the founder of Hackerspace Kuala Lumpur. Abu Mansur bin A Manaf Principal Consultant, Government & Education Sectors, Red Hat Malaysia Abu Mansur was formerly the CTO at Sun Microsystems Malaysia. He has almost 28 years experience in technology sales and marketing beginning with Rank Xerox Malaysia in Currently, one of his responsibilities is to create the awareness on the strategic value of Open Standards and Open Source Software as a means of achieving competitive edge for Malaysia. About Us ISACA has become a pace-setting global organization for information governance, control, security and audit professionals. Today, ISACA s membership-more than 95,000 strong worldwide-is characterized by its diversity. Members live and work in more than 160 countries and cover a variety of professional IT-related positions. Through its comprehensive guidance and services, ISACA defines the roles of information systems governance, security, audit and assurance professionals worldwide. ISACA Certifications i.e. the Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in the Governance of Enterprise IT (CGEIT) and Certified in Risk and Information Systems Control (CRISC) designations defines the roles of information systems governance, security, audit and assurance professionals worldwide. ISACA Malaysia Chapter is the local chapter affiliate of ISACA. ISACA Malaysia was established in 1984, with current membership exceeding over 600 members and more than 350 professionals holding various ISACA certifications. Malaysian National Computer Confederation (MNCC) MNCC is a confederation dedicated to the development of IT Professionals and the creation of an Information Rich Society. First established in 1967, MNCC is recognized as the IT professional body in Malaysia and its mission is to achieve global competitive advantage through IT Professional excellence. MNCC is a member of the International Federation of Information Processing and the South East Asia Regional Computer Confederation (SEARCC).
5 IT Governance, Assurance and Security Conference 2012 Organisation Name : Address : Registration Form / Details Contact Name : Designation : Tel : Fax : No. Delegate Name Delegate ISACA/MNCC Supporting Master Classes Designation Membership No. Organisation Selection** 1 (am) MT1 or TT1 2 (am) MT1 or TT1 3 (am) MT1 or TT1 ** Please circle ONE MASTER CLASS each for the (am) and (pm) session respectively. This selection is MANDATORY for each participant to enable the organisers to prepare the required training materials. Payment / Details Please cross Cheque or Bank Draft and make payable to ISACA Conference Account Cheque / Draft Number Bank Amount Confirmation of Booking Send / Fax this entire form (or photocopy) to : IT Governance 2012 Conference Secretariat c/o Malaysian National Computer Confederation, Unit 916, 9th Floor, Block A, Damansara Intan, No 1 Jalan SS 20/27, Petaling Jaya TELEPHONE : (603) FAX : (603) [email protected] Conference Fee (Per Person) Your investment for attending this Conference is: Vital Information 1 Delegate RM1, Government Officials RM1, Delegates (same organisation) RM1, Delegates from supporting organisations RM1, Delegates (same organisation) RM1, ISACA & MNCC member RM1, * Special Package for 5 or more participants from the same organisation. Please contact the organiser at: Substitution / Cancellation A refund minus a service charge of 10% will be levied for cancellations received in WRITING by 03 July No refund can be made for cancellations received after 03 July Substitutions are allowed for a registered delegate. All payments must be made prior to event proper. The organisers reserves the right to make any amendments and/or changes to the programme if warranted by circumstances beyond its control. Conference Venue & Accommodation Info One World Hotel, First Avenue, Bandar Utama City Centre, Petaling Jaya, Selangor Tel : (603) For reservations, please make your bookings directly with the hotel. To enjoy the special room rates, please quote IT Governance Hotel bills are to be settled by delegates directly with the hotel. Hotel reservations and travel arrangements are the responsibility of the delegate. IMPORTANT NOTICE: Payment must be paid in advance of the event to guarantee your place. Walk-in delegates, with payment will be admitted based on space availability basis.
IT Governance, Assurance and Security Conference 18 & 19 June 2013
ISACA Malaysia & MNCC 12th Annual IT Governance, Assurance and Security Conference 18 & 19 June 2013 ISACA 14 CPE Points IIA Malaysia 8 CPD Points MIA 16 CPE Hours Register Early to Avoid Disappointment
Advanced IT Audit Training
Advanced IT Audit Training Date: 28 th 30 th October 2014 Time: 8.30 am to 5.30 pm Venue: Iverson Associates, Center Point, Bandar Utama, Kuala Lumpur Advanced IT Audit Training Workshop Overview ISACA
Auditing & Securing Enterprise Mobility Management
Auditing & Securing Enterprise Mobility Management Date: 30 th September and 1 st October 2014 Time: 9.00am to 5.00pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur Auditing & Securing
Big Data Analytics Using CAATs
Big Data Analytics Using CAATs Date: 28 th 29 th January 2015 Time: 9.00am to 5.00pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur Big Data Analytics Using CAATs Big Data Analytics
IT Governance, Assurance and Security Conference
IT Governance, Assurance and Security Conference ISACA Malaysia & MNCC 14th Annual 16 &17 June 2015 Register Early to Avoid Disappointment FREE Tablet for each delegate ISACA 14 CPE Points IIA Malaysia
Project Management Managing successful PCI DSS project
Project Management Managing successful PCI DSS project INTRODUCTION PCI-DSS is Payment Card Industry Data Security Standard, one of the fastest growing compliance currently affecting banks, payment service
Newsletter ISACA@MY. ISACA Malaysia Chapter. Issue # 27 October 2013 I N S I D E T H I S I S S U E : President Message 1
ISACA Malaysia Chapter Newsletter ISACA@MY I N S I D E T H I S I S S U E : President Message 1 Events Calendar, Oct-Dec 2013 2 Trainings Calendar, 2014 2 Annual General Meeting 3 BOD 2013/14 4 Previous
Deloitte TaxMax Growing in strength and sustainability
Deloitte TaxMax Growing in strength and sustainability Friday, 13 November 2015 8:00 a.m. to 5:30 p.m. Weil Hotel, Ipoh Perak An event by Deloitte Tax Academy Overview Key takeaways TaxMax, brought to
Database Security and Auditing
Database Security and Auditing COURSE DESCRIPTION: This seminar aims to provide the Database Administrators, System Administrators, Auditors and IT Security Officers an overview on how to secure and audit
Training Course on Big Data Analytics for Managers and Executives. 6-8 October, 2015 Laguna Redang Island Resort, Terengganu
Training Course on Big Data Analytics for Managers and Executives 6-8 October, 2015 Laguna Redang Island Resort, Terengganu Course Background Big Data Analytics is currently a hot topic being discussed
Managing your Project using Microsoft Project 2013
Applied Technology Group Sdn Bhd (1012178-W) W-5-3, Subang Square Business Centre, Jalan SS15/4G, 47500 Subang Jaya, Selangor, Malaysia. Tel: (+603) 5634 7905 Fax: (+603) 5637 9945 Email: [email protected]
IN-DEPTH OPERATIONAL SECURITY KNOW HOW 5 DAYS TRAINING PROGRAM DELIVERED BY ASIS CERTIFIED PROTECTION PROFESSIONAL (CPP) SUPPORTING PARTNER:
IN-DEPTH OPERATIONAL SECURITY KNOW HOW 5 DAYS TRAINING PROGRAM DELIVERED BY ASIS CERTIFIED PROTECTION PROFESSIONAL (CPP) SUPPORTING PARTNER: In- Depth Operational Security Know How 5 Day Course Location:
SECURING PAYMENTS IN THE CYBER WORLD
The Central Bank of Kuwait Presents An Information Security Forum on SECURING PAYMENTS IN THE CYBER WORLD 16th NOVEMBER 2014 JUMEIRAH MESSILAH BEACH HOTEL, KUWAIT WELCOME In the last few years, the usages
Dear Industry Partners, EXHIBITOR PROSPECTUS THE 11 TH ALLIED HEALTH SCIENTIFIC CONFERENCE MALAYSIA 2016 (11 TH AHSC 2016)
Dear Industry Partners, EXHIBITOR PROSPECTUS THE 11 TH ALLIED HEALTH SCIENTIFIC CONFERENCE MALAYSIA 2016 (11 TH AHSC 2016) It gives me great pleasure to announce that the Association of Allied Health Sciences
PROJECT MANAGEMENT PROFESSIONAL PMP EXAM PREPARATION
HRDF CLAIMABLE MY PROCERT PROGRAM PROJECT MANAGEMENT PROFESSIONAL PMP EXAM PREPARATION Course Dates:- Session 1: 13 th - 14 th Sept & 20 th - 21 st Sept 2014 Session 2: 11 th - 12 th Octr & 18 th - 19
Century Software (M) Sdn. Bhd. (445590-U) Century Financials Comprehensive Payments Processing & Reconciliation Training
Your Caring Credible Committed Training Partner Century Financials Comprehensive Payments Processing & Reconciliation Training 8 th - 10 th March 2016 Langkawi, Kedah In Collaboration with Lembaga Pembangunan
How To Use Kpi System For Talent Management
KPI Based Performance Management System for Productivity Improvement & Talent Management Complimentary - KPI System formats in Ms Excel, templates and 5 ebooks on KPI! Free KPI & Performance Management
STRATEGIC PROCUREMENT & GLOBAL SOURCING CONFERENCE DATE: 22 & 23 JULY 2008 VENUE: HOTEL ISTANA,KUALA LUMPUR
z STRATEGIC PROCUREMENT & GLOBAL SOURCING CONFERENCE DATE: 22 & 23 JULY 2008 VENUE: HOTEL ISTANA,KUALA LUMPUR CHAIRPERSONS Ms Maria Luisa V. Alvendia Assistant Vice President, Procurement Center PLDT Philippines
RISK MANAGEMENT CONFERENCE SERIES 2013 RENAISSANCE KUALA LUMPUR
RISK MANAGEMENT CONFERENCE SERIES 2013 RENAISSANCE KUALA LUMPUR ENTERPRISE RISK MANAGEMENT & DISASTER RECOVERY CONFERENCE 26 & 27 November 2013 REPUTATIONAL RISK & CRISIS MANAGEMENT CONFERENCE 3 & 4 December
P R O G R A M M E. MSWG SEMINAR on Investigative Audit & Forensic Accounting. SIDC CPE-Approved : 5 CPE Points
MSWG SEMINAR on Investigative Audit & Forensic Accounting Today s complex corporate and financial market, with its use of blinding new technologies, has made accounting fraud more difficult to detect than
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25
Why CISM? Who Earns CISM Certification? CISA, CISM and CGEIT Program Accreditation Renewed Under ISO/IEC 17024:2003
The Certified Information Security Manager (CISM) certification is a unique management-focused certification that has been earned by more than 16,000 professionals since its introduction in 2003. Unlike
3 4 SEPTEMBER 2012 TAN SRI ABDUL KADIR YUSOF HALL ATTORNEY GENERAL S CHAMBERS LEVEL 3, NO. 45, LOT 4G7 PERSIARAN PERDANA, PRECINT 4 PUTRAJAYA
Providing the participants with the legal knowledge and information necessary to develop and implement programmes that will effectively prevent catastrophic losses brought on by recalls and product liability
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
GRCCS-BCI International Conference & Exhibition 2016
GRCCS-BCI International Conference & Exhibition 2016 Transforming Business Continuity Management Through Organisational Resilience and Readiness 23 24 May 2016 Putrajaya International Convention Centre
Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity ( Framework )
10 October 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Re: Experience with the Framework for Improving Critical Infrastructure
Internal audit and risk management
Strengthening governance worldwide Internal and risk management Adding value BRITISH ACCREDITATION COUNCIL ACCREDITED SHORT COURSE PROVIDER ACCREDITED SHORT COURSE PROVIDER One-week workshop 7 to 11 March
C L A R I D E N 18 19 June 2014
C L A R I D E N 18 19 June 2014 Knowledge for the world business leaders Shangri-La Hotel Kuala Lumpur, Malaysia Handling Employment Disputes, Termination and Dismissal in Malaysia Faculty Director Trevor
Certification Programs
Registration Questions? Please contact us directly. 507 S. Grand Ave., Lansing, MI 48933 [email protected] (517) 342-9057 Certification Programs 2015 Following the lecture on day 2, students have the
EFFECTIVE ISLAMIC EVENTS MANAGEMENT
ISLAMIC EVENTS PRO PRO WORKSHOP Series 2 DAYS WORKSHOP 26-27 Jan 2015 DePalma Hotel, Ampang Kuala Lumpur EFFECTIVE ISLAMIC EVENTS MANAGEMENT Bahasa Melayu English PANEL OF TRAINERS FADZULI WAHAB Operation
THE BABSON SYMPOSIUM FOR ENTREPRENEURSHIP EDUCATORS
UNIRAZAK and Babson College proudly present THE BABSON SYMPOSIUM FOR ENTREPRENEURSHIP EDUCATORS Venue : UNIRAZAK, CapSquare, Kuala Lumpur Date : 11 to 14 July 2011 Hosted by Babson College is ranked the
INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook
INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING forebrook Forebrook offers a range of information security, governance, IT systems and infrastructure related
1. Why did MICPA and ACCA enter into this agreement?
ACCA to MICPA FAQs 1. Why did MICPA and ACCA enter into this agreement? This Mutual Recognition Agreement (MRA) strengthens the already excellent relationship between the two bodies. It provides a route
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
CYBERSECURITY: ISSUES AND ISACA S RESPONSE
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services
2010 Critical Thinker Series
Malaysian Organisation of Pharmaceutical Industries (MOPI) & PharmEng Technology Presents cgmp Case Studies a T rra ini ing i P rrog rram ffo rr cgmp P rro ffe ss ss ionai l ss 2010 Critical Thinker Series
Towards Business Continuity Management Compliance & Certification 21 July 2011, Thursday Hotel Istana, Kuala Lumpur
Towards Business Continuity Management Compliance & Certification 21 July 2011, Thursday Hotel Istana, Kuala Lumpur Introduction As earthquake, tsunami and other disasters of nature threaten and disrupt
COBIT 5 Implementation Certifi cate. Training Course & Exam
COBIT 5 Implementation Certifi cate Training Course & Exam Introduction The COBIT 5 Implementation Certifi cate is a Practitioner Level Training Course that focuses on how to apply COBIT 5 (The Framework
ISACA Tools Help Develop Cybersecurity Expertise
Volume 21, 8 October 2014 ISACA Tools Help Develop Cybersecurity Expertise Nominate Qualified Candidates for the ISACA Board of Directors Tips for Solving Data Classification Challenges Earn CPE at Professional
An innovation programme to equip technology professionals with Business Innovation skills...
An innovation programme to equip technology professionals with Business Innovation skills... PIKOM Training Centre, Empire Damansara** The National ICT Association of Malaysia (PIKOM) in collaboration
PROJECT MANAGEMENT FOR EXECUTIVE ASSISTANTS AND PERSONAL ASSISTANTS
PROJECT MANAGEMENT FOR EXECUTIVE ASSISTANTS AND PERSONAL ASSISTANTS 2 Separately Bookable Seminars, 1 Mega Professional Development Forum for EAs and Pas 25 th & 26 th August, Marque Hotel, Brisbane Including
IT Conference: From Gatekeepers to Strategic Partners Leveraging IT to become CPAs of the Information Age
IT Conference: From Gatekeepers to Strategic Partners Leveraging IT to become CPAs of the Information Age Date Saturday, 22 November 2008 Time Venue 9:00 am 1:00 pm Ballroom, The Mira Hong Kong Hotel,
CERTIFICATE IN OCCUPATIONAL SAFETY AND HEALTH MANAGEMENT
SBL Scheme CERTIFICATE IN OCCUPATIONAL SAFETY AND HEALTH MANAGEMENT The MEF Academy Certificate Program in Occupational Safety and Health (OSH) Management is designed to provide practical knowledge and
Service Offering. Company Profile. 2005 Allied Consulting Services Pte Ltd. All rights reserved
Service Offering Company Profile & Service Offering 2005 Allied Consulting Services Pte Ltd. All rights reserved Our Mission and Vision We want to be your partner of success creating lasting values in
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013 AGENDA IT s Changing Landscape ISACA s Response Vision and Mission COBIT 5
CCSK Prep Course 2015
CCSK Prep Course 2015 25 May 2015 Early registration 27 April 2015 Final registration 11 May 2015 Offered by ISACA Athens Chapter has been awarded four times as Best Large Chapter in Europe/Africa (2009,
KEY TRENDS AND DRIVERS OF SECURITY
CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures
M&A clients and markets event
M&A clients and markets event Date: 13 August 2015 Time: 9.00 a.m. - 12.00 p.m. (registration starts at 8.30 a.m.) Venue: Deloitte (Kuala Lumpur office) Meetpoint 1 & 2 Level 15 Menara LGB 1 Jalan Wan
Strategic Recruitment, Selection & Retention Seminar By BG Consulting Date: August 4-7, 2014 (4 days) Venue: Resort World Sentosa Singapore
Jfam Synergy Pte Ltd Strategic Recruitment, Selection & Retention Seminar By BG Consulting Date: August 4-7, 2014 (4 days) Venue: Resort World Sentosa Singapore A must attend intensive and practical seminar
fast track digital marketing training
fast track digital marketing training UK s Most Popular Digital Marketing Course is Now in Malaysia! A 2 day digital university. We ll introduce you to the essentials of a wide range of digital marketing
Athens, 2 December 2011 Hellenic American Union Conference Center
Athens, 2 December 2011 Hellenic American Union Conference Center ISACA Athens Chapter and the Hellenic American Union are organizing the 1 st ISACA Athens Chapter Conference on December 2 nd, 2011. The
C L A R I D E N 29 September - 1 October 2014
C L A R I D E N 29 September - 1 October 2014 Knowledge for the world business leaders Shangri-La Hotel, Singapore Preparation Course for Project Management Masterclass Leading to PMP Certification Aligned
Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning
Val-EdTM Valiant Technologies Education & Training Services 2-day Workshop on Business Continuity & Disaster Recovery Planning All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies.
Certification Programs
Certification Programs 2014 The SBS Institute serves community banks by providing educational programs that will certify a banker has the knowledge and skills to protect against todays information security
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
SUBSCRIPTION AGREEMENT FOR SELF MONITORING SERVICES
Manual Registration Version SUBSCRIPTION AGREEMENT FOR SELF MONITORING SERVICES SME Credit Bureau (M) Sdn Bhd (820050-T) Level 5, Bangunan CGC, Kelana Business Centre 97, Jalan SS7/2, 47301 Petaling Jaya
To be a well recognised body representing, promoting and advancing the management science/operations research.
MANAGEMENT SCIENCE/OPERATIONS RESEARCH SOCIETY OF MALAYSIA (MSORSM) The Professional Association for the Advancement of the Management Sciences [Reg. 3935/86 (Selangor)] (Incorporated under Socie=es Act
Information Security Management Systems
Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector
INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA
INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA By THAIB MUSTAFA, CHAIRMAN TECHNICAL COMMITTEE FOR INFORMATION SECURITY (TC/G/5) INDUSTRY STANDARDS COMMITTEE FOR INFORMATION TECHNOLOGY, COMMUNICATION
Managerial Decision Making and leadership
Managerial Decision Making and leadership Lead your team to make quality decisions for long-term success 5-6 Sep 2016 (Mon-Tue) Hong Kong Managerial Decision Making and Leadership by HKUST Business School
Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
CERTIFICATE IN HUMAN RESOURCE MANAGEMENT
Claimable under SBL Scheme CERTIFICATE IN HUMAN RESOURCE MANAGEMENT The MEF Academy Certificate Program in Human Resources Management is approved by the Pembangunan Sumber Manusia Berhad (Human Resource
Cyber Risk and Insurance What companies need to know
Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the
Asia Pacific the Future of Cloud Computing
Asia Pacific the Future of Cloud Computing Presented by the CSA and CEPREI 1-3 December 2015 Guangzhou, China The 1-3 December 2015 Guangzhou, China Contents Backgroud Why Join the CSA APAC Congress Why
MICG MEDICAL NEGLIGENCE,MEDIATION AND MEDICAL RECORDS UPKEEPING CONFERENCE 2011
MICG MEDICAL NEGLIGENCE,MEDIATION AND MEDICAL RECORDS UPKEEPING CONFERENCE 2011 UPDATES IN CURRENT MEDICO - LEGAL ISSUES TO SAFEGUARD AGAINST CLAIMS AND LITIGATION The increasing number of medical negligence
University Leadership Development Workshops
SEAMEO RIHED - AGB Spring 2014 University Leadership Development Workshops Preliminary Programme Malaysia Thailand 2 3 June 5 6 June Day 1 Preliminary Programme Who Should Attend The University Leadership
Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.
Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.com DA! (by Global knowledge & TechRepublic) Top certifications by salary:
G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING
IS AUDITING GUIDELINE G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply
JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile
JOINT EVENT WITH IIBA-LA Trends & Best Practices in Cybersecurity for networks, cloud computing and mobile April 23 rd, 2015 Hands-on Experts Share Current Strategies to Manage Cybersecurity Today s enterprise
CERTIFICATE IN HUMAN RESOURCE MANAGEMENT
SBL Scheme CERTIFICATE IN HUMAN RESOURCE MANAGEMENT The MEF Academy Certificate Program in Human Resources Management is designed to provide practical knowledge and skills for individuals currently employed
SIA Event: SIA Fire Safety Seminar 2015: Unprotected Openings, Means of Escape, Fire Forensic Cases
EVENT DETAILS Programme: 1.30pm 2.00pm 2.45pm 3.15pm 4.00pm 4.30pm Registration Presentation by Mdm Eng Yew Hoon Unprotected Openings Part 1: Interpretation & Application of Clause 3.5 Presentation by
Governance and Management of Information Security
Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information
The Influence of Software Vulnerabilities on Business Risks 1
The Influence of Software Vulnerabilities on Business Risks 1 Four sources of risk relevant for evaluating the influence of software vulnerabilities on business risks Authors Hilbrand Kramer, MSc (Royal
IT Governance Implementation Workshop
IT Governance Implementation Workshop 3 Full day power packed workshop facilitated by Mr. Gary Allan Banister and Mr. Sreechith Radhakrishnan About the Programme Information is created, used, retained,
Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
3rd Annual Cust Contact Asia Pacific Summit A Frost & Sullivan Executive MindXchange Crown Prince Galleria, Manila, Philippines 26-27 June 2008 Processes and Technologies That Deliver Cust Satisfaction
Chayuth Singtongthumrongkul
IT is complicated. IT Governance doesn t have to be. Chayuth Singtongthumrongkul CISSP, CISA, ITIL Intermediate, PMP, IRCA ISMS (ISO/IEC 27001) Director of International Academic Alliance, ACIS Professional
Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications
Thomas K. Lee, Executive Director/CIO Human Resources Department (518) 447-2906 Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) The New York State
Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA
Quality and security in application development Round Table Meeting/Discussion Group Wednesday 23rd May 2007 Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA 1 The International
Big 4 Information Security Forum
San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL
Grow your own talent. Agribusiness Management Development Program. Prepare your next generation of leaders and win the war for talent
Grow your own talent Agribusiness Management Development Program Prepare your next generation of leaders and win the war for talent Welcome. Your journey starts now. We are excited to bring you the inaugural
G-Cloud Service Definition. Atos Information Security Wireless Scanning Service
G-Cloud Service Definition Atos Information Security Wireless Scanning Service Keeping your wireless networks secure Atos Information Security Wireless Scanning Service The Atos Wireless Scanning Service
C015 Certification Report
C015 Certification Report NexCode National Security Suite Release 3 File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path
LAWTECH NZ 3 rd Annual New Zealand Law & Technology Conference
LAWTECH NZ 3 rd Annual New Zealand Law & Technology Conference 18 March, 2015 Pullman, Auckland EY s ediscovery Services offer rapidly deployable litigation support and professional Gold sponsor Proudly
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some
A FORUM FOR DEBATE, A CATALYST FOR CHANGE
7 March 2013 Renaissance Hong Kong Harbour View Hotel Hong Kong A FORUM FOR DEBATE, A CATALYST FOR CHANGE 2013 conference highlights: The impact of the increasing frequency and severity of natural catastrophes
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
