IT Governance, Assurance and Security Conference 18 & 19 June 2013



Similar documents
IT Governance, Assurance and Security Conference

Big Data Analytics Using CAATs

Newsletter ISACA Malaysia Chapter. Issue # 27 October 2013 I N S I D E T H I S I S S U E : President Message 1

Auditing & Securing Enterprise Mobility Management

IT Governance, Assurance and Security Conference

Advanced IT Audit Training

Deloitte TaxMax Growing in strength and sustainability

Century Software (M) Sdn. Bhd. ( U) Century Financials Comprehensive Payments Processing & Reconciliation Training

Project Management Managing successful PCI DSS project

Managing your Project using Microsoft Project 2013

RISK MANAGEMENT CONFERENCE SERIES 2013 RENAISSANCE KUALA LUMPUR

SECURING PAYMENTS IN THE CYBER WORLD

Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi

CERTIFICATE IN OCCUPATIONAL SAFETY AND HEALTH MANAGEMENT

An innovation programme to equip technology professionals with Business Innovation skills...

CERTIFICATE IN HUMAN RESOURCE MANAGEMENT

CERTIFICATE IN HUMAN RESOURCE MANAGEMENT

Michelle Govan & Anand Philip Network & Security Engineering

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

Internal audit and risk management

How To Use Kpi System For Talent Management

COBIT 5 Implementation Certifi cate. Training Course & Exam

Century Financial Comprehensive Payments Processing & Reconciliation

Dealing with Contractors' All Risks Claims A Practical Approach

SPEAKER NAME: Dato Wira Syed Ismail bin Dato Hj Syed Azizan. KEYNOTE ADDRESS: Cyber Crime and Credit Card Fraud: Current Trends and Patterns

STRATEGIC PROCUREMENT & GLOBAL SOURCING CONFERENCE DATE: 22 & 23 JULY 2008 VENUE: HOTEL ISTANA,KUALA LUMPUR

IN-DEPTH OPERATIONAL SECURITY KNOW HOW 5 DAYS TRAINING PROGRAM DELIVERED BY ASIS CERTIFIED PROTECTION PROFESSIONAL (CPP) SUPPORTING PARTNER:

Dear Industry Partners, EXHIBITOR PROSPECTUS THE 11 TH ALLIED HEALTH SCIENTIFIC CONFERENCE MALAYSIA 2016 (11 TH AHSC 2016)

Big 4 Information Security Forum

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September Co-Chair s Summary Report

3 4 SEPTEMBER 2012 TAN SRI ABDUL KADIR YUSOF HALL ATTORNEY GENERAL S CHAMBERS LEVEL 3, NO. 45, LOT 4G7 PERSIARAN PERDANA, PRECINT 4 PUTRAJAYA

Channel Islands Conference June Radisson Blu Waterfront Hotel, Jersey

PROJECT MANAGEMENT PROFESSIONAL PMP EXAM PREPARATION

EFFECTIVE ISLAMIC EVENTS MANAGEMENT

TRAINING COURSE: COMPLIANCE MANAGEMENT & PRACTICE

MICG MEDICAL NEGLIGENCE,MEDIATION AND MEDICAL RECORDS UPKEEPING CONFERENCE 2011

Royal Air Force Club

GRCCS-BCI International Conference & Exhibition 2016

CYBER SECURITY TRAINING SAFE AND SECURE

P R O G R A M M E. MSWG SEMINAR on Investigative Audit & Forensic Accounting. SIDC CPE-Approved : 5 CPE Points

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Business Improvement in Universities

Real Estate Development Enterprise Executive Course


A FRAUD EXAMINATION COURSE: PREPARATION FOR THE INTERNATIONAL CFE EXAMINATION (EQUIVALENT TO THE ADVANCE CERTIFICATE FRAUD EXAMINATION: SAQA NQF

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Strategic Recruitment, Selection & Retention Seminar By BG Consulting Date: August 4-7, 2014 (4 days) Venue: Resort World Sentosa Singapore

RESTRUCTURING SOLICITORS FIRMS IN FINANCIAL DISTRESS

Why CISM? Who Earns CISM Certification? CISA, CISM and CGEIT Program Accreditation Renewed Under ISO/IEC 17024:2003

Athens, 2 December 2011 Hellenic American Union Conference Center

Training Course on Big Data Analytics for Managers and Executives. 6-8 October, 2015 Laguna Redang Island Resort, Terengganu

2010 Critical Thinker Series

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES

REGISTRATION FORM (INTERNATIONAL)

Cyber Risk and Insurance What companies need to know

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

Privacy in the Digital Age of Encryption and Anonymity Online

SIA Event: SIA Fire Safety Seminar 2015: Unprotected Openings, Means of Escape, Fire Forensic Cases

What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization?

True Financial Analysts Know CFA is the One of the Best Investments That Does Not Depreciate.

FINANCIAL CRIME COMPLIANCE PROFESSIONALS CERTIFICATION PROGRAMME

Legislative Council Panel on Information Technology and Broadcasting. Information Security

The Hunt for Fraud. September 25, Seminar / Training. September 26, 2014

Organised by: Company Secretaries Training Programme Essential. Company Secretaries Training Programme Significant

Certification Programs

ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE

EXECUTIVE DIPLOMA IN HUMAN RESOURCE MANAGEMENT & DEVELOPMENT (HRMD)

THE BABSON SYMPOSIUM FOR ENTREPRENEURSHIP EDUCATORS

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

The compliance challenge

Cyber Security and Data Privacy Acumin Specialist Cloud Services

OUTSOURCED CONTACT CENTRE

Managing the performance of public sector organisations

Welcome to the 1 st Annual Executive Seminar & Workshop in Predictive Analytics + Big Data

IT Conference: From Gatekeepers to Strategic Partners Leveraging IT to become CPAs of the Information Age

PROFESSIONAL SERVICES MARKETING. CIM PROFESSIONAL CERTIFICATE CIM PROFESSIONAL DIPLOMA CIM CHARTERED DIPLOMA

The Software Experts. Training Courses and Events

Obstetrics for lawyers

Preparation for the PMP Certification Exam (PM00.99)

Database Security and Auditing

A Strategy for Sustainability: The Challenge & The Response

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Expert Witness Training Course

Embedding ethical values into the corporate culture

Advanced Insolvency: a one day professional meeting from IRRV Scotland

Security Risk Solutions Limited is a privately owned Kenyan company that was established in 2007.

Fraud, Corruption and Money Laundering: Prevention, Detection and Recovery

Use event management software to manage a conventions and incentives industry project

1. Why did MICPA and ACCA enter into this agreement?

Regulatory Issues - Review of the Cullen International Economic System

Certification Programs

ADVANCED INVESTMENT ADVISORY AGREEMENT DRAFTING BE AN EXPERT! CPD 7 hours

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

7CORPORATE GOVERNANCE

UNDERGRADUATE PROGRAMMES FEE SCHEDULE

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards

ASCENDSYS SDN BHD. Company Profile

VL s Warehouse Management & Operations

Mediators Conference October Surfers Paradise Marriott Resort and Spa Gold Coast, Queensland

Towards Business Continuity Management Compliance & Certification 21 July 2011, Thursday Hotel Istana, Kuala Lumpur

Transcription:

ISACA Malaysia & MNCC 12th Annual IT Governance, Assurance and Security Conference 18 & 19 June 2013 ISACA 14 CPE Points IIA Malaysia 8 CPD Points MIA 16 CPE Hours Register Early to Avoid Disappointment Venue Organised by : Supported by : One World Hotel, First Avenue Bandar Utama City Centre, Petaling Jaya

As technology pushes us further into the realm of Big Data, the balance between maintaining personal privacyandmonetizingprivatedatawillremainabigdebateforthenearfuture.onday1,ourpanelof speakers will deliver perspectives on this debate from various angles including legislation and compliance requirements, impact of fast moving technology, data leakages and security outsourcing. Day1Programme -18June2013 08:00 08:50 Arrival and Registration 08:50 09:00 Opening Remarks by the Chairman of the Conference Organising Committee SPEAKERS PROFILE TIME PRESENTATION Dr Sonny Zulhuda writes, speaks and researches on the issues of Internet governance, information security and personal data protection law. In addition to his posting as Assistant Professor at the IIUM Civil Law Department, he is an Oxford Internet Institute summer doctoral scholar and an ICANN fellow. He assisted the Malaysian Government in developing its National Cyber Security Policy(NCSP) and conducts training on Personal Data Protection Law for private companies and government agencies including the PDP Department. 09:00 10:00 KEYNOTE ADDRESS Personal Data Protection Act 2010(PDPA) Beyond Personal, Data and Protection : How the Data Privacy Law Transforms Business Landscape in Malaysia and Beyond. This paper examines the effects of PDPA on a commercial organisation, including the transformationandgovernanceactivitiestocomplywiththerequirementsoftheact. Speaker: Dr Sonny Zulhuda Civil Law Department, Ahmad Ibrahim Kulliyyah of Laws International Islamic University Malaysia(IIUM) Abdul Hamid has over 30 years of public sector auditing experiences. His work includes information security audits for public sector agencies. 10:00 10:45 Singapore s Personal Data Protection Act An Auditor s Perspective Speaker: Mr Abdul Hamid Bin Abdullah CISA, CPA, FIIA Singapore Auditor, Singapore Public Sector Organisation 10:45 11:15 TEA BREAK Murari is a seasoned Information Risk Management professional with over 13 years of experience in various aspects of governance, security and audit. Previously, he was the Global Head of IT Security Services for BAT and delivered a multi- million dollar strategic security outsourcing deal during his tenure. 11:15 12:00 The Big Picture An e2e View on Security Outsourcing Management Speaker: Mr Murari Kalyanaramani CISA, CISM, CISSP, CRISC, CBCP Global Head of Service Architecture& Integration British AmericanTobacco Jason has over 16 years of IS Audit and Security experience with leading global consulting and IT companies. He has led numerous information security projects across various industries and is a widely sought after subject matter expert on IT Security. 12:00 12:45 Demystifying the Advanced PersistentThreat:What you can do about it Speaker: Mr Jason Yuen CISA, CISSP Director, Advisory Services, Ernst& Young 12:45 02:00 LUNCH BREAK Shoaib has been involved in various aspects of security governance and architecture leadership roles across industriesinasiapacificforover13years.inadditionto lecturingattheuniversityofnewsouthwales,hespeaks regularly at local and international security conferences. He has published articles in technology publications including Computerworld. Shoaib has a Bachelor of Computer Science degree, Masters in Information Systems Security, Masters of Information Technology Management and MBA(Computing) from Charles Stuart University. 02:00 02:45 Moving with Times: Understanding How Changes in Technology Impacts your Security Landscape Speaker: Mr Shoaib Yousuf CISA, CISM, CISSP Chief Information Security Officer, Celcom Berhad SACWonghasservedintheMalaysiaRoyalPolicefor 31 years in various positions including Patrol Boat Commander for Marine Police, Officer-in-Charge of Police Districts Pontian and Kuching and as Deputy Officer-in-Charge of Criminal Investigation (CID) KL prior to his current position. 02:45 03:30 Cyber Crime: Royal Malaysia Police Perspective Speaker: SAC Wong Wai Loong Principal Assistant Director(Cyber/Multimedia) Commercial Crime Investigation Department(CCID) Bukit Aman 03:30 04:00 TEA BREAK Panel of Discussion Panel Chairman: Mr Nickson Choo Chair, Membership Growth and Retention Committee,(MGRC) ISACA International 04:00 05:00 MYTH-BUSTING:DataPrivacycanbeachievedintheeraofBigData. Invited Speakers

TheManagementTrackMasterClassesaredesignedtoprovideparticipantswithpracticalmanagementsessionsonInternalAuditing.Thesesessions are ideal for participants with no or minimal IT Audit background, and for those who wish to gain valuable skills to perform certain IT Audit activities suchasdevelopingarisk-baseditauditplanordevelopingtheirunderstandingoffraudmanagementforauditpurposes. Ourmasterclassfacilitators are highly experienced individuals who have specialised in their areas in various organisations. You will be taught by specialists who have done the job,andisnowreadytosharetheirknowledgewithyouinafocusgroupsetting.nopre-requisitesarerequiredtojointhesemasterclasses. Day2Programme -19June2013 MANAGEMENT TRACK 1(MT1) Introducing IT Auditing 09:00 12:30 TEA-BREAK(10:30 11:00) In this master class, you will learn to define critical IT Audit concepts and relate this to corporate governance of enterprise IT. Risk assessment techniques and related auditing concepts will be highlighted and you will be introduced to techniques for identifying operational and control requirements for IT systems, researching control objectives and related controls, evaluating control design and assessing the reliability of IT audit evidence. MANAGEMENT TRACK 2(MT2) Detecting Fraud with CAATTs 01:45 05:15 TEA-BREAK(03:15 03:45) Corporate fraud is not going away anytime soon. The traditional role of an auditor has expanded to assist in fraud detection, investigation and prevention. Auditors need to understand that while audit findings are common,theyarenotnecessaryfraudandduecareisneededinbuilding evidence. This session will include a demo on how computer-assisted audit tools and techniques (CAATTs) are utilised for detecting and preventing fraud. 1. Gain a working understanding of IT Audit concepts and practices. 2. Appreciate the importance of developing a risk-based IT Audit Plan. 3. Clarify the difference and importance of general versus application control audits. 4. Learn how to apply internal control fundamentals to the evaluation of IT system integrity, security and availability. 5. Gain an understanding of the operational and control objectives of the principle areas of general control. 1. Identify when there is a potential fraud. 2. Learnwhatotherelementsareneededtoconsiderwhenafraudis discovered. 3. Develop additional tests to be conducted. 4. Appreciate the steps taken to preserve evidence. 5. Understand the role of CAATTs for fraud management. FACILITATORS PROFILE MrLeeChinHon Senior Manager, A Major Airline Company Director, ISACA Malaysia Chin Hon is currently the Senior Manager of Centre of Excellence for a major airline company in Malaysia. He was previously the Data Management Lead for the company s ERP project implementation. His extensive experience comes from over 15 years working in professional services firms and from the corporate world. He is also a CISA class trainer for ISACA Malaysia Chapter. In addition to CISA, Chin Hon holds the Chartered Accountant qualification from Malaysia and New Zealand. Ms Michelle Lee Senior IT Audit Manager Crowe Horwath Governance Director, ISACA Malaysia Mr Surendran Nair Sankaran Group HeadTraining, Prodigy Group Director, Prodigy Data Solution Sdn. Bhd. Surendran has over 16 years of Information System and Operations Audit gain from his time as Vice-President of Quality Assurance with one of the major banks in Malaysia. His area of expertise includes System Quality Assurance, Project Management and IS Security Analysis, IT and Operations Audit, Anti-Money Laundering and IT Processes, Networking and Banking Operations. He is a veteran ACL user with over 18 years experience using the software. Currently, he is the Group HeadTraining of the Prodigy Group and a Director at Prodigy Data Solution Sdn. Bhd. In this role, he leads Prodigy Group s regional training programme. Surendran holds a Masters Degree in Business Administration. Michelle has 9 years of professional and commercial experience in a number of areas including internal audit, IT audit and business advisory. She has served a wide range of multinational, public-listed companies and private companies operating across various industries. Prior to joining Crowe Horwath, she was a Manager in the Internal Audit Department of an integrated resorts(ir) located in Singapore and led internal audits covering the hotel, theme park, gaming, retail and F&B operations. 12:30 01:45 LUNCH BREAK 05:15 05:30 LUCKY DRAW AND CLOSING REMARKS

TheTechnicalTrack Master Classes are designed to provide participants with practical technical aspects on current technology issues which impacts governance, assurance and risk management. These sessions are ideal for participants with technical background, and those who wish to reinforce their understanding of theoretical security knowledge with actual practical skills that will be shown during these master classes. The facilitators are all involved in various aspects of the security, audit and risk management and are selected based on their real-world, real-life experience. Technical backgroundincludingpreliminaryknowledgeofvirtualisation, CloudComputingandgeneralSecurityskillsarerequiredtojointheseMasterClasses. Day2Programme -19June2013 TECHNICAL TRACK 1(TT1) Attacks on Virtualisation and Cloud Computing 09:00 12:30 TEA-BREAK(10:30 11:00) Session 1: Virtualisation and Cloud Computing In this session, you will understand the key concepts; differences and the types of implementation models for a cloud environment. You will also obtain the answer as to why virtualisation does not equal cloud computing. Session 2: Live hands on demonstration Usingrealcasescenariostowitnesssomeofthesettingscommonlyoverlooked byitdeploymentteamsandoftenissuesfoundbyitauditorsinavirtualised environment. Subsequently, experience live hacking from a penetration tester exploiting such overlooked settings to own the box or bring it down. 1. Obtainbothanorganisation'sandIT'sviewonthedriverstoembrace the cloud, what are the ROI and impact on Security, Governance, Risk and Compliance. 2. Understand the underlying threats commonly faced in a virtualised and cloud environment. 3. ApplyISACA sauditworkprogramaspartofyourarsenaltosecurethe virtualisation and cloud environment. 4. Learn and develop recommendations for mitigation controls from both security and compliance perspective. FACILITATORS PROFILE TECHNICAL TRACK 2(TT2) Blackhats 01:45 05:15 TEA-BREAK(03:15 03:45) In today's IT centric world, almost all businesses are supported by minimal to complex IT infrastructures. With the adoption of technology, there are serious security considerations. Even with the best security solution that money can buy, organisations are still getting attacked and damages follow eitherintheformofmonetaryorreputation.so,whatarewedoingwrong? Thissessionaimstoaddressthisquestion,andtakesalookatcommongaps that usually go unnoticed. After completing this session, you will be able to: 1. Understand the mindset of a malicious attacker. 2. Consider how changing technology affects security practices. 3. Understand both common and uncommon techniques used by blackhats. 4. Identify common and overlooked gaps in security strategies. 5. Obtain ideas on how to improve your security posture. Members of ISACA Malaysia Chapter Special Interest Group on Virtualisation Mr Murari Kalyanaramani Global Head of Service Architecture& Integration British AmericanTobacco Mr Kenneth Ho Senior Manager, Large Financial Institution Mr Anselm Goh Enterprise Architect, Patimas Mr Adrian Foo Senior IT Auditor, Group Audit, Maybank Mr Goh Ser Yoong IT Security Compliance Manager, BAT Mr Amin Hamid Independent Security Researcher ISACA Malaysia Chapter Special Interest Group(SIG) on Virtualisation was established 3 years ago to promote awareness and education to the audit and security community on Virtualisation Technology from a practitioner s perspective. For the past 2 years, the SIG has successfully conducted hands-on technical workshops as part of the ISACA Malaysia Training Programme. Members of the SIG are now being sought after by various professional associations to present their expertise and knowledge on the challenges of implementing Virtualisation technology. Mr Amin Hamid Independent Security Researcher/Hacker Mr Earl Marcus Independent Security Researcher/Hacker Amin and Earl have been involved in IT Security for over 13 years respectively. Collectively, both of them have extensive experience in security penetration testing, digital forensics, incident management, social engineering and security consultancy& advisory services. Amin was the TeamLeaderfortheHackintheBox(HITB)CapturetheFlag(CTF)competitionandEarlwasa corecrewmemberofthectfteam.bothofthemcontinuetobeactiveinvulnerabilityresearch and exploit writing in their free time. 12:30 01:45 LUNCH BREAK 05:15 05:30 LUCKY DRAW AND CLOSING REMARKS

IT Governance, Assurance and Security Conference 2013 18 & 19 June 2013 ORGANISERS www.isaca.org/malaysia www.mncc.com.my WHO SHOULD ATTEND This Conference has been structured with both management and technical professionals in mind and will appeal to: Chief Executive Officers Chief Information/Technology Officers IT Governance Professionals Information Security Professionals Auditors, Compliance and Assurance Professionals IT Auditors IT Consultants and Practitioners Risk Management Professionals Business Managers Organisation Name : Address : Registration Form / Details Contact Name : Designation : Email : Tel : Fax : No. Delegate Name Delegate ISACA/MNCC Supporting Master Classes Designation Membership No. Organisation Selection** 1 (am) MT1 or TT1 2 (am) MT1 or TT1 3 (am) MT1 or TT1 ** Please circle ONE MASTER CLASS each for the (am) and (pm) session respectively. This selection is MANDATORY for each participant to enable the organisers to prepare the required training materials. Payment / Details Please cross Cheque or Bank Draft and make payable to ISACA Conference Account Cheque / Draft Number Bank Amount Conference Fee (Per Person) Your investment for attending this Conference is: Vital Information Confirmation of Booking Send / Fax this entire form (or photocopy) to : IT Governance 2013 Conference Secretariat c/o Malaysian National Computer Confederation, Unit 916, 9th Floor, Block A, Damansara Intan, No 1 Jalan SS 20/27, 47400 Petaling Jaya TELEPHONE : (603) 7118 3040 FAX : (603) 7118 2930 E-MAIL : itgov@mncc.com.my 1 Delegate RM1,780.00 Government Officials RM1,580.00 2 Delegates (same organisation) RM1,580.00 Delegates from supporting organisations RM1,580.00 3 + Delegates (same organisation) RM1,400.00 ISACA & MNCC member RM1,350.00 * Special Package for 5 or more participants from the same organisation. Please contact the organiser at: 603-7118 3040. Substitution / Cancellation A refund minus a service charge of 10% will be levied for cancellations received in WRITING by 11 June 2013. No refund can be made for cancellations received after 11 June 2013. Substitutions are allowed for a registered delegate. All payments must be made prior to event proper. The organisers reserves the right to make any amendments and/or changes to the programme if warranted by circumstances beyond its control. Conference Venue & Accommodation One World Hotel, First Avenue, Bandar Utama City Centre, Petaling Jaya, Selangor Tel : (603) 7712 2286 For reservations, please make your bookings directly with the hotel. To enjoy the special room rates, please quote IT Governance 2013. Hotel bills are to be settled by delegates directly with the hotel. Hotel reservations and travel arrangements are the responsibility of the delegate. IMPORTANT NOTICE: Payment must be paid in advance of the event to guarantee your place. Walk-in delegates, with payment will be admitted based on space availability basis.