Name of presentation Company name
|
|
|
- Byron Gilmore
- 10 years ago
- Views:
Transcription
1 Name of presentation Company name
2 Thank you for your consideration
3 CyberSecurity Awareness Month Cybercrime and Copyright Infringement Amber Chris Burgess Marcus Rogers
4 Amber Purdue student sued by RIAA PSA
5
6
7
8 From CSOonline.com How to Stop Industrial Espionage By Christopher Burgess & Richard Power Awareness and education: Provide ongoing education to your workforce on the threats of economic espionage, intellectual property theft, counterfeiting and piracy. Help them understand your expectation that they will protect the enterprise's intellectual property, and by extension, their own livelihood. Provide general education for the entire workforce, and specialized education for executives, managers, technical personnel and so on.
9 Chris Burgess Christopher Burgess is a Senior Security Advisor to the Chief Security Officer of Cisco Systems, where he focuses on intellectual property strategies. Prior to joining Cisco, Christopher served as a senior national security executive for more than 30 years. He lived and worked in South Asia, Southeast Asia, Middle East, Central Europe and Latin America, where he acquired a deep understanding of the people, cultures and business practices. He is co-author of, "Secrets Stolen, Fortunes Lost," a study of the global threat to intellectual property, which was published by CSO Magazine in June In addition, he has been an invited speaker addressing various corporate Intellectual Property strategy teams and industry organizations on the many threats to intellectual property. Christopher serves as a member of the advisory board of Vadium Technology, Inc, a cryptographic solution company. Christopher Burgess also worked for the CIA for 30 years. He also serves as an advisor to Azimyth LLC a firm which develops and uses transformational technologies to power & deliver the next generation of services for broad classes of information delivery solutions across many communication media.
10 Resources Teaching, Research, and Outreach Policy on Intellectual Property ml Manager of Intellectual Property Biotechnology, Gene Flow, and Intellectual Property Intellectual Property Protection l
11 Dr. Marcus Rogers Dr. Rogers is a professor specializing in the area of Cyber Forensics. He is also a faculty member with the Center for Education and Research in Information Assurance and Security (CERIAS). Dr. Rogers is a Certified Information Systems Security Professional (CISSP), a former Senior Lead Instructor for (ISC)2, a member of the QA team for the SSCP and CISSP certifications and the co-author of the Law Investigation and Ethics section of the CISSP CBK Review Course. He is also a former police detective with a background in computer crime investigations. His area of interests include Applied Computer Forensics, Cybercrime Scene Analysis, and Cyber-terrorism. He has authored several book chapters, and articles in the area of computer forensics and forensic psychology. Dr. Rogers is the Editor-in Chief of the Journal of Digital forensic Practice and sits on the editorial board for several international journals. He is a frequent speaker at international and national information assurance and security conferences, and guest lectures at various universities throughout the world. Educational Background PhD (Forensic Psychology), University of Manitoba MB, MA (Psychology), University of Manitoba MB, BA (Psychology/Criminology), University of Manitoba MB, 1986.
12 Questions?? As always, be careful out there.
13 Credits: Thanks to Mindy Jasmund & Jennifer Kapp Ty and Alex Kingman for marketing materials Thanks to Joel Rasmus for speakers ITNS staff who support and encourage each other Exponent, Inside Purdue, Journal & Courier Purdue Facebook
INNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf
EDUCATION RESEARCH INNOVATION Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf Email: [email protected] Phone: 303.315.5850 Fax: 303.832.0483 JEFF M. SMITH, m.s.
Executive Cyber Security Training. One Day Training Course
Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand
Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative [email protected] (302) 831 1580
Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative [email protected] (302) 831 1580 The Cybersecurity Initiative was established at the University of Delaware in 2014 as an integrated learning
Information Security in a Downturn
Information Security in a Downturn Prof. Howard A. Schmidt, CISSP, CSSLP President and CEO Information Security Forum Ltd. Vice-Chair and Security Strategist (ISC)2 Board of Directors Agenda 1. The Information
Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7
1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)
University of Maryland University College. American Military University. Henley-Putnam University
A P R I L 2 0 1 1 Table of Contents 2-3 UMUC: Training Tomorrow s Cybersecurity Leaders Today University of Maryland University College 4-5 Preparing Those Who Protect the Public American Military University
Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com
Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can
SECURITY & RISK MANAGEMENT CONSULTANTS COURSE (SRMC)
SECURITY & RISK MANAGEMENT CONSULTANTS COURSE (SRMC) Protesters enter the Parliament in Ouagadougou, the capital of Burkina Faso Source: Issouf Sanogo, Getty Images Course Overview PGI s Security Risk
Certification for Information System Security Professional (CISSP)
Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by
2012 CyberSecurity Watch Survey
2012 CyberSecurity Watch Survey Unknown How 24 % Bad is the Insider Threat? 51% 2007-2013 Carnegie Mellon University 2012 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY
Cyber Security Awareness Day
1010100101010101010100101010101010010101010 1001010101010101010010100101010010010111010 1010101010100111100111011101111101010100000 010101010010101001010010101010100101010101 0010100101101001010100101001010010101000101
NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo
2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,
JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile
JOINT EVENT WITH IIBA-LA Trends & Best Practices in Cybersecurity for networks, cloud computing and mobile April 23 rd, 2015 Hands-on Experts Share Current Strategies to Manage Cybersecurity Today s enterprise
Security Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP [email protected]
PREPARE YOUR INCIDENT RESPONSE TEAM
PREPARE YOUR INCIDENT RESPONSE TEAM JUNE 2015 Michael Harrington, Fidelis Cybersecurity It s a big problem... The ongoing cyber-thefts from The scale of international theft the In networks 2013, the of
Douglas M. DePeppe Cyberlaw Attorney
Douglas M. DePeppe Cyberlaw Attorney [email protected] Cyber Risk Services Cyber Space Cyber Law International Cyber Frameworks IP Litigation George Washington University Law School, LL.M. The Judge Advocate
Information Systems Security Certificate Program
Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate
2014 Montana Government IT Conference. Securing Data Networks and People
Presenter: Matt Bennett, Genetec Leveraging the Cloud for Hybrid Video Surveillance Matt is based in Seattle, WA and is the Western North America pre-sales engineer for Genetec (the world s leader in unified
USF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/
SECTION 23 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 23 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate
Jibran Ilyas DIRECTOR
PROFESSIONAL EXPERIENCE STROZ FRIEDBERG, LLC Director, Incident Response, July 2015 to Present Assistant Director, Incident Response, August 2014 to July 2015 Assist in development of incident response
CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015
BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting
CyberSkills Management Support Initiative
CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced
Certification and Training
Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel
Department of Homeland Security
Department of Homeland Security Cybersecurity Awareness for Colleges and Universities EDUCAUSE Live! July 24, 2014 Overview Dramatic increase in cyber intrusions, data breaches, and attacks at institutions
Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)
Page 1 of 5 Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Conveys an in-depth
Information Security Principles and Practices
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,
Wednesday, March 11, 2015 8:00am to 4:30pm. Seats are filling fast, sign up today!
EVENT NOTICE Making the Business Case for Cybersecurity & Public-Private Sector Cooperation Wednesday, March 11, 2015 8:00am to 4:30pm Presented by: ISACA - Greater Hartford Chapter Guest Speaker: Judith
DHS. CMSI Webinar Series
DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
Info-Tech Research Group. Media Kit
Info-Tech Research Group Media Kit Media Support How can our analysts help you? Info-Tech Research Group is a full-service, IT research and advisory company providing tactical and practical advice to IT
Network Engineering Technology
Network Engineering Technology Network Engineering Technology with Specializations in: Cisco Routing and Switching Microsoft Systems Administration Cyber Security and Digital Forensics Associate in Science
North Texas ISSA CISO Roundtable
North Texas ISSA CISO Roundtable Roundtable Topic Threat Against Our Well Being The Most Effective Methods in Combating and Responding to the Cyber Attack Event Sponsor Moderator and Panelists David Stanton
Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS
PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS BEFORE THE COMMITTEE ON HOUSE SMALL BUSINESS SUBCOMMITTEE
Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley
Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley Firstly, an apology + + = What shall we discuss What is Cyber Crime? What are the current threats? What is the capability of local and
Speaker Information. United States Patent and Trademark Office
Speaker Information Manny W. Schecter Manny W. Schecter is Chief Patent Counsel, Associate General Counsel, and Managing IP Attorney at IBM. Mr. Schecter leads IBM s worldwide intellectual property law
Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI
Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and
IT Security Management 100 Success Secrets
IT Security Management 100 Success Secrets 100 Most Asked Questions: The Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide Lance Batten IT Security Management
OUTLINE FOR AN INTERDISCPLINARY CERTIFICATE PROGRAM
OUTLINE FOR AN INTERDISCPLINARY CERTIFICATE PROGRAM I. Basic Information 1. Institution: University of Georgia Date: September 28, 2015 2. School/College: Franklin College of Arts and Sciences 3. Department/Division:
Australia s proposed accession to the Council of Europe Convention on Cybercrime
Assistant Secretary Telecommunications and Surveillance Law Branch National Security Law and Policy Division Attorney-General's Department 3-5 National Circuit Barton ACT 2600 Email: [email protected] Australia
WCA WEBINAR SERIES: The Case for Cyber Security Training
WCA WEBINAR SERIES: The Case for Cyber Security Training PLEASE NOTE: IN ORDER TO HEAR THE AUDIO FOR THIS WEBCAST YOU WILL NEED TO USE YOUR TELEPHONE TO DIAL INTO THE FOLLOWING CONFERENCE LINE: Conference
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and
Introducing... FedVTE and FedCTE
Introducing... FedVTE and FedCTE Sponsored by: Cybersecurity Education and Workforce Development Program (CEWD) DHS National Cyber Security Division October, 2010 Agenda FedVTE and FedCTE overview & how
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Johnson Graduate School of Management, Cornell University NBA 548. INTERNATIONAL POLITICAL RISK MANAGEMENT
Johnson Graduate School of Management, Cornell University NBA 548. INTERNATIONAL POLITICAL RISK MANAGEMENT Spring 2007 (January 22 March 7) 1.5 credits MW 2:55-4:10 pm, 134 Sage Hall Instructor: Elena
Nicole N. Hanson, M.A. [email protected] http://opencuny.org/nnhanson
Nicole N. Hanson, M.A. [email protected] http://opencuny.org/nnhanson EDUCATION CUNY Graduate School and University Center via, New York, NY Ph.D., Criminal Justice (Doctoral Candidate; degree expected
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
Anthony Reyes. Curriculum Vitae
Anthony Reyes Curriculum Vitae 44 Wall Street 12th Floor Telephone/Message: New York, N.Y. 10005 212-461-2160 Profile Internationally recognized practitioner, trainer, and lecturer in the area of computer
RETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
(ISC)² Foundation Announces 2014 Information Security Scholarship Recipients
NEWS FOR IMMEDIATE RELEASE Media Contact: Alex Lyons Merritt Group, Inc. 703-390-1527 [email protected] (ISC)² Foundation Announces 2014 Information Security Scholarship Recipients 33 recipients of
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path
Technology Crime Services
Technology Crime Services Presentation Summary Cyber Safety for the Corporate world Challenges to Police how you can assist Making your company crime resistant Reporting Online crime Traditional Policing
JOEL M. ROSENTHAL, C.P.A., CVA
JOEL M. ROSENTHAL, C.P.A., CVA JOEL M. ROSENTHAL, CPA, CVA As director of Schneider Downs Business Advisors, Joel is responsible for the strategic direction and development of the firm s specialized business
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
University of the State of New York; New York State Licensed Psychologist Since 1983; #7640.
CHRISTOPHER JACOB REISS, B.A., M.A., PH.D. Offices 1440 York Avenue, New York, NY 10021 (212) 517-7755 Last Resort Farm, Scottsville, VA 24590 (434) 286-9000 Sea Oaks Club, Vero Beach, FL 32963 (561) 234-6323
Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation
Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie Developments in Security Regulation Agenda Introduction PM & C Cybersecurity Review Mandatory Data Retention Legislation Overview
Who s Looking At Your Mobile Device? Data Security, Personal Privacy, and Information Governance in the Wireless World
Who s Looking At Your Mobile Device? Data Security, Personal Privacy, and Information Governance in the Wireless World Our Speakers Michael Arnold is a Solutions Program Manager with UnitedLex, a legal
USF Graduate Catalog 2015 2016 SECTION 18. http://www.grad.usf.edu/
SECTION 18 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 18 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate
Shon Harris s Newly Updated CISSP Materials
Shon Harris s Newly Updated CISSP Materials WHY PURSUE A CISSP? Many companies are beginning to regard a CISSP certification as a requirement for their technical, mid-management, and senior IT management
Stanford University Bulletin. Series 12 No. 1 May 13, 1959. Courses and Degrees 1959-60
Stanford University Bulletin Series 12 No. 1 May 13, 1959 Courses and Degrees 1959-60 159 COMMUNICATION and JOURNALISM Executive Head: Chilton R. Bush Professors: Chilton R. Bush, Wilbur Schramm (on leave
Lessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
WILLIAM M. MICHAELSON, C.P.A., C.F.E., M.A.E., D.A.B.F.A., C.F.F. CURRICULUM VITAE
CURRICULUM VITAE EDUCATION Bachelor of Business Administration, Accounting Major, January 1967 Selected for Beta Alpha Psi, National Accounting Honor Society University of Miami CERTIFICATIONS Certified
Cybersecurity AAS Program
Cybersecurity AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of
Introduction to Cyber Security
Introduction to Cyber Security Hossein Sarrafzadeh HoD Computing Director Cyber Security Centre CS4HS Workshop You are sitting in New Zealand s first joint research centre for cyber security Centre of
Master of Science in Cyber Security and Management
Master of Science in Cyber Security and Management Introduction Realizing the importance of protecting her critical national information infrastructure, Malaysia has introduced the National Cyber Security
BACHELOR OF CRIMINOLOGY AND SECURITY MANAGEMENT(BCSM
About the programme Crime and security related matters have become a major concern in modern society. In view of this development, it has become increasingly necessary to enhance the capacity of institutions
KIMBERLY A. BENDER Curriculum Vitae
KIMBERLY A. BENDER Curriculum Vitae Michigan State University School of Criminal Justice 655 Auditorium Road, Room 560 East Lansing, MI 48824 Phone: (740) 317-3887 Fax: (517) 432-1787 [email protected]
SECTION 10: FACULTY OF CRIMINOLOGY, JUSTICE AND POLICY STUDIES
SECTION 10: FACULTY OF CRIMINOLOGY, JUSTICE AND POLICY STUDIES Dean: Nawal Ammar, BSc (Hons), MSc, PhD Professors: Shahid Alvi, BA, MA, PhD Brian Campbell, BA, MPhil, PhD Walter DeKeseredy, BA, MA, PhD
2 ND CYCLE PROGRAM IN LEGAL STUDIES
2 ND CYCLE PROGRAM IN LEGAL STUDIES The Faculty Legal Studies of will offer 2 nd Cycle Degree Programs leading to a Masters of Science in Legal Studies. 2 nd cycle studies in the faculty will be divided
Identity Fraud: Presented by: MOHD ZABRI ADIL TALIB Head, Digital Forensics CyberSecurity Malaysia [email protected]
Identity Fraud: Platform for Cybercrime Presented by: MOHD ZABRI ADIL TALIB Head, Digital Forensics CyberSecurity Malaysia [email protected] Introduction of Digital Forensics Department, CyberSecurity
Cool Careers in Cybersecurity for Girls Workshop
Cool Careers in Cybersecurity for Girls Workshop May 29, 2014 10 a.m. to 1:30 p.m. Careers Program Building at Hagerstown Community College - Hagerstown, MD Educational Technology Policy, Research and
62 Children s Court psychological assessments
62 Children s Court psychological assessments by Patricia F Brown BA (Hons), MA (Clin Psychol), PhD Susan K Fealy M Psych (Clin), PMCPTP 62-1 Update: 57 EXPERT EVIDENCE Patricia F Brown Senior Technical
Pacific Islands Telecommunications Association
Pacific Islands Telecommunications Association 8 th Fl, Dominion Hse PHONE : (679) 331 1638 PO BOX 2027, Govt Bldg FAX : (679) 330 8750 SUVA, FIJI Islands E-mail: [email protected] www.pita.org.fj INVITATION
Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor
IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there
The National Skills Academy for IT. Cyber Security
The National Skills Academy for IT Cyber Security 1 WELCOME The Rt. Hon. David Blunkett welcomes employers and stakeholders from the Cyber Security Industry NATIONAL SKILLS ACADEMY for IT PLANS FOR TRAINING
