Newsletter. Membership Survey Announcement



Similar documents
Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors

THE UNIVERSITY OF TEXAS AT AUSTIN ACC 380K.12 Computer Audit & Systems Security (71243) Course Syllabus SUMMER 2012

Application Kit. A Guide to the AICPA Certified Information Technology Professional Credential

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile

OPERATIONAL PROCEDURES

Welcome to the 1 st Annual Executive Seminar & Workshop in Predictive Analytics + Big Data

Advanced IT Audit Training

!!!!!!!!!!!! Accounting!Club! University!of!Hawaii!at!Manoa! Hawaii!IMA!Student!Chapter!! Clark!Johnson!Achievement!Award! IMA! 2014D2015!!!!!

Database Security and Auditing

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP

ISACA Tools Help Develop Cybersecurity Expertise

Experienced professionals may apply for the Certified Risk Management Professional (CRMP) certification under the grandfathering provision.

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

Information Systems Security Certificate Program

Big 4 Information Security Forum

The Basics of Internal Auditing Tallahassee Chapter The Institute of Internal Auditors

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP

ACN e newsletter. Association of California Neurologists A PERSONAL APPEAL. In Memoriam. ACN Membership application ACN 2009 Board Roster

SECURING PAYMENTS IN THE CYBER WORLD

Proposed ISACA Board for 2012/2013

Athens, 2 December 2011 Hellenic American Union Conference Center

THE INTERNAL AUDITING EDUCATIONAL PARTNERSHIP: A NICHE STRATEGY FOR ACCOUNTING PROGRAMS

THE UNIVERSITY OF TEXAS AT AUSTIN ACC 380K.12 Computer Audit & Systems Security (03100) Course Syllabus FALL 2015

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

SOX COMPLIANCE BOOT CAMP SOX 404 & NI September 11, 12, 13, 2015 Leading to Sox Compliance Certification (SCC)

Lehigh Valley IIA Newsletter

PROVING YOUR GRC KNOWLEDGE WITH CERTIFICATIONS

Association of Government Accountants Phoenix Chapter Annual Report for AGA Program Year

MSc Cyber Security UKPASS P Course 1 Year Full-Time, 2-3 Years Part-Time

DoD Financial Management Certification Program. Ms. Glenda Scheiner

Kevin L. James, PhD, CPA 1601 East Market Street 224 Merrick Hall Greensboro, NC

Accountants and Auditors

Why CISM? Who Earns CISM Certification? CISA, CISM and CGEIT Program Accreditation Renewed Under ISO/IEC 17024:2003

The Importance of IT Controls to Sarbanes-Oxley Compliance

PRINCE2 Project Management Certification

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

Why a Professional Certification

Table of Contents EXECUTIVE SUMMARY ACKNOWLEDGEMENT AND DISCLAIMERS ENGAGEMENT SCOPE AND OBJECTIVES EXECUTIVE SUMMARY OF ASSESSMENT RESULTS

Appendix D: Register of Federal & State Government Unit Addresses [FRBP 5003(e)]

Security Transcends Technology

THOMAS WELCH, CISSP, CPP, CISA, CISM, CFI, CHS-III SUMMARY

CSCMP Roundtable Marketing Guidebook

How To Pass An Assurance Course

Return of the Newsletter

Jed Greene, CPA, CFF, CMA

Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA

Chris Van Hook, Attorney at Law CB# PO Box 1394 Crescent City, Ca (707)

ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE

Rob Darrow, Ed. D. Wiki: robdarrow.wikispaces.com Blog: robdarrow.wordpress.com

Info-Tech Research Group. Media Kit

CERTIFIED IN FINANCIAL PLANNING AND ANALYSIS JEDDAH, KSA APRIL 17-21

Master of ACCOUNTANCY SAM M. WALTON COLLEGE OF BUSINESS AT THE UNIVERSITY OF ARK ANSAS

Certification and Training

ERIC M. WRIGHT, cpa, citp

Strategic IT audit. Develop an IT Strategic IT Assurance Plan

The Kansas City Courier

ISSA SOUTH TEXAS CHAPTER

Board of Directors Manual Executive Representatives Leadership Directors Committee Chairs

ISACA Singapore Chapter

CPA Financial Planning Thought Leadership: Outlook for the CPA Financial Planning Profession

WILLIAM OETTINGER PHONE (702)

STATEMENT OF OBJECTIVES

ASSESSMENT REPORT Federal PKI Compliance Report September 6, 2013

The following chart indicates the Career Academy courses eligible for transfer credit by challenge exam.

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)

Achieving Governance, Risk and Compliance Requirements with HISP Certification Course

ROWLING AND ASSOCIATES ACCOUNTANCY CORPORATION DBA ROWLING & ASSOCIATES

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA

Presentation on COBIT Education

Domain 5 Information Security Governance and Risk Management

PMI-DVC Board of Directors Roles and Responsibilities

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Transcription:

October 2007 Newsletter Membership Survey Announcement...1 President s Message, New Committee Members...2 Membership Meeting Details...3 2007/2008 Chapter Calendar...4 ISACA Sacramento Fall & Winter Seminars...5-7 Chapter Committee Membership...7 Published Board Member...7 Job Opportunities, Exam Announcements, New Credential...8 ISACA International: Conference/Training Week Update...9 Chapter Board of Directors...10 Membership Survey Announcement Thank you to our chapter members for participating in the recent membership survey! Your participation and feedback is appreciated. Congratulations to Teresa Byrne, CISA, CIA, the winner of the ipod Nano contest, for completing the survey. 1

Greetings, President s Message Our newsletter committee has done it again they have put out an informative and attractive document that I m sure you all will enjoy reading. Please, take a few minutes and see what s here. Your board has been working hard to bring you some exciting opportunities. In fact, next month, we have three events for you to choose from: 1. Our free membership meeting on November 14 th includes a complimentary lunch and one CPE of training. See all the details on page 3. 2. Two-day COBIT Prep Course with Cert. Exam on November 8-9. See page 5 for details. 3. CISA Review Course on November 16 & 17. See our website for more details-- http://www.isaca-sacramento.org/ Then in January, we have Canaudit presenting a two-day network security seminar entitled, Penetration Testing: Preemptive Network Security. Members who register and pay by November 14 th will only pay $249. See p. 6 for more details. We have also launched a secure method for you to pay for your events online no more having to mail your check to us. Finally, I want to thank all those who are stepping up to participate on our committees to support our growing chapter. If any more of you are interested in joining our leadership team, feel free to contact any of the board members (see back page). In your surveys, many of you mentioned that you hope to benefit from professional networking opportunities within the chapter. If that is your goal, I strongly suggest you consider participating in one or more of our committees. It s a great way to develop relationships with others in our profession and community. With a time commitment of 2 to 5 hours per month, you will realize tremendous benefits. Please enjoy your newsletter and thanks again for your commitment to ISACA. Leonard Van Ryn, CISA, CIA New Committee Members Your ISACA Sacramento Chapter is pleased to welcome the following people who have volunteered to assist in the ISACA Sacramento Chapter Committees: Davies Ononiwu John Mellas Justin Yi Lu O C Ninan Jack Orlove Current committee members include Jennifer Patrick (Newsletter), Joseph Galan (Website), Cori Hoover (Academic) and Soula Moua (Academic). To all volunteers, on behalf of the ISACA Sacramento Chapter, we thank you for offering your time and we look forward to working with you in the future. 2

Membership Meeting Mark your calendars for November 14, 2007, 11:30 am - 1:00 pm! Please join us at the November lunch meeting where Suzanne Wiggins will briefly educate us on the application process for the Computer Security Auditor from the Electronic Recording Delivery System Program and Tim Bryan will present Computer Forensics & Electronic Data Recovery. Suzanne Wiggins Electronic Recording Delivery System Program 10 minutes; Suzanne.Wiggins@doj.ca.gov The Attorney General has established the Electronic Recording Delivery System (ERDS) Program within the Department of Justice (DOJ), which is responsible for implementing the requirements of the Electronic Recording Delivery Act of 2004. This act authorizes a County Recorder to establish an ERDS for the delivery and recording of specified digitized electronic records or digital electronic records that are an instrument of real estate transactions. However, a county s ERDS can not become operational until the system has been audited by a Computer Security Auditor who has received prior approval from the ERDS Program to perform independent security audit services on an ERDS. The Computer Security Auditor approval is granted based on an individual s experience and having no disqualifying offense(s). An individual wanting to apply for approval as a Computer Security Auditor from the ERDS Program, may obtain form # ERDS 0002, by downloading it from the ERDS web page at http://ag.ca.gov/erds1. Suzanne s Bio: "I have been employed by the Department of Justice for 19 years (1988) and have worked with various programs. I was hired as a Field Representative for the Applicant Agency Compliance and Training Section within the Field Operations Program in 2003. In 2004 the program was assigned the task of implementing Assembly Bill 578, enacting the requirements of the Electronic Recording Delivery Act of 2004. As a result, the Electronic Recording Delivery System (ERDS) Program was developed and resides in the Field Operations Program as well. At that time I was appointed to the ERDS Program and have maintained my title as a Field Representative. For the past three years the program has worked with various entities related to the real estate industry and the California County Recorders to establish regulations governing electronic recording in the State of California. On August 31, 2007 the regulations were adopted into the California Code of Regulations, Title 11, Division 1, Chapter 18, Articles 1 through 9. As a Field Representative for the ERDS Program I act as the liaison between the Department of Justice and outside entities related to the program." Tim Bryan Computer Forensics & Electronic Data Recovery 60 minutes; timb@perry-smith.com The session will include defining Computer Forensics & Electronic Data Recovery and the evolving standards and tools used in the trade. An outline of the procedures and protocols that should be used in a computer forensics case will be provided and will highlight the governing standards. The session will be wrapped up by identifying the scenarios in which Computer Forensics can be used and will include a live demonstration of the EnCase forensic tool. Tim s Bio: Tim Bryan is a Senior Vice President with Perry-Smith LLP s Consulting Services Group. Tim is a Certified Public Accountant, a Certified Information Systems Auditor, and holds the Certified Information Technology Professional designation from the American Institute of Certified Public Accountants. Tim is a member of the American Institute of Certified Public Accountants and the California Society of Certified Public Accountants. Tim received an undergraduate degree from the University of Pacific, concentrating in accounting and information systems. Tim directs the Firm s IT Services practice which focuses on Computer Forensics, Data Analytics, Information Technology Auditing services, SAS 70 Service Bureau examinations and Fraud Investigations. Tim directs the Firm s IT Services practice which focuses on Computer Forensics, Data Analytics, Information Technology Auditing services, SAS 70 Service Bureau examinations and Fraud Investigations. In order to plan accordingly for the complementary catered lunch, please email Adrian Bogdan at: Adrian.Bogdan@isaca-sacramento.org if you plan to attend. 3

2007/2008 Chapter Calendar Date Type of Meeting Time Location July 11, 2007 Board Meeting 11:30 am 1:00 pm Deloitte August 8, 2007 Board Meeting 11:30 am 1:00 pm Deloitte August 22, 2007 Publish Newsletter September 12, 2007 Membership Meeting 11:30 am 1:00 pm CalSTRS, Truckee River Training Room, Midway Building, 7801 Folsom Blvd, Sacramento, CA October 10, 2007 Board Meeting 11:30 am 1:00 pm Deloitte October 24, 2007 Publish Newsletter November 8-9, 2007 COBIT Seminar 8:00 am 5:00 pm November 14, 2007 Membership Meeting 11:30 am 1:00 pm Courtyard Marriott, Meeting Room: 10683 White Rock Road, Rancho Cordova, CA CalSTRS, Truckee River Training Room, Midway Building, 2781 Folsom Blvd, Sacramento, CA November 16-17, 2007 CISA Review Course 8:30 am 4:30 pm TBD January 10-11, 2008 Winter Seminar: - Canaudit presents: Penetration Testing: Preemptive Network Security 8:30 am 5:00 pm Franklin Templeton Investments, 1st floor auditorium, 3355 Data Drive, Rancho Cordova, CA 95670 February 13, 2008 Board Meeting 11:30 am 1:00 pm Deloitte February 27, 2008 Publish Newsletter March 12, 2008 Membership Meeting 11:30 am 1:00 pm CalSTRS, Truckee River Training Room, Midway Building, 7801 Folsom Blvd, Sacramento, CA April 9, 2008 Board Meeting 11:30 am 1:00 pm Deloitte April 23, 2008 Publish Newsletter May 14, 2008 Membership Meeting 11:30 am 1:00 pm CalSTRS, Truckee River Training Room, Midway Building, 7801 Folsom Blvd, Sacramento, CA June 11, 2008 Board Meeting 11:30 am 1:00 pm Deloitte 4

ISACA Sacramento Fall Seminar CoBIT Foundation Exam Prep Course with Certification Exam: November 8-9, 2007 This two-day seminar is designed to provide professionals with the information they need to effectively manage businesses processes and information systems. The seminar helps you to understand Enterprise and IT governance and the major frameworks and standards. You will learn about how COSO, SOX, CoBIT, ITIL, and ISO27002 work together. You will learn about IT governance issues that are affecting organizations globally and how COBIT (Control Objectives for Information and Related Technology) addresses this need with a globally accepted IT control and governance framework. You will learn about the major components of an IT governance and management framework. You will learn how to identify the most important actions for management in achieving control over the IT processes; to define target levels of performance; and to measure whether an IT control process is meeting its objective. The objective of this session is to learn a methodology, using COBIT, for implementing and improving IT governance. This course addresses the need for an IT control framework and explains how this is addressed by COBIT. The course prepares you for the official COBIT Foundation Exam organized under the umbrella of ISACA. The Foundation Exam is offered as part of this course. Location - Courtyard Marriott, Meeting Room, 10683 White Rock Road, Rancho Cordova, CA 95670, (916) 638-3800 Who Should Attend - CFO; CIO; IT Managers; IT Auditors; Information Security Managers and Analysts; and Systems Administrators; and Information Technology professionals. Course Materials - Students will receive a course book, but they should download the following additional reference materials from the ISACA website: Management Guidelines, COBIT Framework 4.1 and COBIT Executive Summary Who Will Present - Peter Davis (CISA, CISSP, CSP, CMA, ISP, CNA, CMC, CCNA, CWNA, CISM, COBIT Foundation Certificate, ITIL Foundation Certificate, Accredited COBIT Implementation Trainer, PMP, Accredited ITIL Foundation Trainer and Accredited CISSP Trainer) is the Principal of Peter Davis+Associates (http://www.pdaconsulting.com), a management consulting firm specializing in the security, audit and control of information. Prior to founding PDA, Mr. Davis' private sector experience included stints with two large Canadian banks and a manufacturing company. He was formerly a principal in the Information Systems Audit practice of Ernst & Young. In the public sector, Mr. Davis was Director of Information Systems Audit in the Office of the Provincial Auditor (Ontario). A 26- year information systems audit and security veteran, Mr. Davis' career includes positions as security administrator, security planner, consultant, and information systems auditor. Mr. Davis also is the past President and founder of the Toronto ISSA chapter, past Recording Secretary of the ISSA s International Board and past Computer Security Institute Advisory Committee member. In addition, he was a member of the international committee formed to develop Generally Accepted System Security Principles (GSSP). Mr. Davis has written or co-written 11 books including Hacking Wireless Networks for Dummies, Wireless Networks for Dummies, Computer Security for Dummies, Securing Client/Server Computer Networks, Teach Yourself Windows 2000 Server in 21 Days, and Securing and Controlling Cisco Routers. Peter is listed in the International Who s Who of Professionals. He is a past Editor of EDPACS, a monthly publication for security and audit professionals. Registration: Please email Jack.Leidecker@isaca-sacramento.org to register or for more information. ISACA, IIA, and ISSA members are eligible for discounted registration rates. Cost $499 ISACA, IIA and ISSA members, $599 for non-members. 5

ISACA Sacramento Winter Seminar Penetration Testing: Preemptive Network Security January 10 11, 2008 Provided by Canaudit, Inc. CPE HOURS: 16 LEVEL: Intermediate PREREQUISITES: None This two-day seminar is designed for audit and security professionals. It teaches the necessary skills required for effective penetration testing. Participants will gain valuable insight into the most significant and common vulnerabilities and exploits that threaten their systems. The instructor will demonstrate the use of software tools and specialized techniques by conducting penetration tests on live sites and by analyzing past data. As corporate networks are linked together, preemptive security testing is a necessary protective mechanism. The Internet enables hackers to readily share new tools and exploits that threaten corporate security. Therefore it is essential that auditors and security professionals discover the network exposures before the hackers do. This seminar will provide the participants with a step-by-step approach that they can use to identify their vulnerabilities. See complete course outline at http://www.canaudit.com/outlines/penetrationtest.pdf. Who Should Attend This course is targeted towards auditors, system administrators, Information Technology personnel, and all others interested in the security of their company networks. This class is designed to increase the knowledge and awareness of participants of all levels. Canaudit s Instructor Chris Schroeder, CISM Chris Schroeder is the Senior Manager of Technical Audits at Canaudit and a team leader of the Canaudit Penetration Team. Chris has been with Canaudit for over seven years. Chris is a published author on many security-related topics including network security. He has an impressive track record in his chosen specialties of network penetration and vulnerability assessment, operating systems audits, network audits and forensic investigations. Since joining Canaudit, Chris has developed new audit and security techniques that have enabled Canaudit to become one of the preeminent audit consulting and security firms in the United States. His pioneering work in wireless LAN security has set the standard for others to follow. As a former United States Marine, Chris has a unique insight when performing physical security audits. In fact, Chris, along with Canaudit President, Gordon Smith, has written a physical security guide, which is available at the Canaudit website www.canaudit.com. As an experienced seminar leader and conference speaker, Chris draws on his vast experience with network security, penetration audits, and electronic commerce to easily translate complex technical issues into language readily understood by participants at all levels. He enjoys the security field, particularly the rapidly changing environment and the challenges it poses. He is constantly adapting and testing new security exploits in his efforts to further the audit and security professional body of knowledge. 6

Location Franklin Templeton Investments 1st floor auditorium 3355 Data Drive Rancho Cordova, CA 95670 Registration Registration fee is only $249 for members and $349 for non-members if you register by November 14 th. After November 14 th the fee will go to $299 for members and $399 for non-members. For more information and to register, please visit our chapter website at: http://www.isaca-sacramento.org/events/20080110-canaudit.aspx Seeking Chapter Committee Members Are you interested in getting more involved with your local chapter? We are seeking interested members to serve as Academic Liaisons to local area colleges: California State University, Chico California State University, Stanislaus University of California, Davis California State University, Sacramento Los Rios Community Colleges University of the Pacific If you re interested in participating, please contact Nancy Gonzales at Nancy.A.Gonzales@isaca-sacramento.org. Published Board Member Our very own Sacramento Chapter Board Member, Francis Bueb, wrote an article for Internal Auditor magazine to be staged for the December 2007 issue. Francis article will cover topics such as: Amendments to the Federal Rules of Civil Procedure (in this case, specifically addressing recent laws enacted around electronic discovery), Why the rules may be important for an internal auditor, Similar laws enacted in other countries, The effect on data retention and related controls, Legal requirements and attributes, Challenges for the organization and the internal auditor, and The potential results of non-compliance. For questions around the upcoming article, please contact Francis Bueb at Francis.Bueb@isaca-sacramento.org. 7

Job Opportunities The California State Board of Equalization has an opening for a Business Taxes Specialist II position. Job details may be viewed at the following link: http://www.spb.ca.gov/employment/more_info.cfm?recno=329 843. The McClatchy Company, the third-largest newspaper publisher in the country, seeks an IT Audit Supervisor to join its corporate audit team. Responsibilities include supervision of IT audit staff as well as performing reviews of computer systems in the areas of general controls, application controls, and system security. This individual will also work cooperatively with the internal audit department by acting as a consultant and by assisting in the completion of audit assignments which involve IT systems. Qualified applicants will have either a degree in Accounting, Computer Science, Business or related field and 5 years of combined audit and IT experience or equivalent education and experience. Professional certification such as CPA, CIA or CISA is preferred. High ethical standards, excellent verbal/written communication skills and customer service skills are required. Proficient computer skills are a must. This position requires 30% travel. All offers of employment are contingent upon successful completion of post-offer physical and drug screen. EOE We offer a competitive benefits/compensation package. Please send resume with salary history to hr@mcclatchy.com. New Credential Announced ISACA is proud to announce its newest certification, which is supported by the IT Governance Institute (ITGI ) and is built on its intellectual property. The new credential is intended for a wide range of professionals who wish to be recognized for their knowledge and application of IT governance principles and practices. It will also: Support the growing business demands related to IT governance Increase the awareness and importance of IT governance good practices and issues Define the roles and responsibilities of the professionals performing IT governance work The initial exam for the new credential is expected to be administered in December 2008. A grandfathering program will be announced shortly, through which highly experienced IT governance professionals may apply for certification without taking the exam. For more information about the CGEIT certification, visit www.isaca.org/cgeit. News about the CEGIT program is also available at www.isaca.org/news Exam Announcements Program Evaluator and Associate Program Evaluator exams for the California Public employees Retirement System (CalPERS) are open for Sacramento County. Program Evaluator - http://www.isaca- sacramento.org/documents/information/20071115- ProgramEvaluator7PA16.pdf Associate Program Evaluator - http://www.isaca- sacramento.org/documents/information/20071115- AssociateProgramEvaluator7PA17.pdf Applications must be submitted in person or by mail and post marked (U.S. mail) no later than the final filing date, November 15, 2007. Interested applicants should find details on the Sacramento Chapter website. 8

ISACA International: Conference/Training Week ISACA Training Week 5-9 November 2007 - San Antonio, Texas, USA 3-7 December 2007 - Scottsdale, Arizona, USA Training Week provides a unique educational experience. The courses use a combination of lecture, case study, class discussion and group exercises to explore all of the topics covered. The IT Audit Practices course has been aligned with the CISA job practice areas. Presented at the intermediate level, the course builds upon the information and case studies presented in the fundamentals course to explore in greater depth the concepts, principles and practices of IT auditing. The Information Security Management course is aligned with the CISM job practice areas. The course provides a strong base for building a successful career in information security management and focuses on the development and implementation of best security practices that protect enterprise information management systems. CISMs and those preparing to attain the CISM certification will benefit from this course. For more information on additional events and to register, please visit www.isaca.org/trainingweek. Additional 2007 ISACA Conference Schedule 12-14 November 2007 Information Security Management Conference, Frankfurt, Germany 12-14 November 2007 Network Security Conference, Frankfurt, Germany 14-16 November 2007 IT Governance and Compliance Conference, Boston, Massachusetts, USA 10-11 December 2007 IT Audit Management Forum, Scottsdale, Arizona, USA 10-11 December 2007 Information Security Management Forum, Scottsdale, Arizona, USA 21-22 January 2008 Asia-Pacific CACS, Muscat, Sultanate of Oman 28-29 January 2008 Information Security Conference, Panama City, Panama 9-12 March 2008 EuroCACS, Stockholm, Sweden 27 April May 1 2008 North America CACS, Las Vegas, Nevada, USA 9

Chapter Board of Directors President Leonard Van Ryn Franklin Templeton Investments Leonard.Van.Ryn@isaca-sacramento.org Vice President, CISA/CISM Coordinator Mark Schmidt Systematics Technology Group Mark.Schmidt@isaca-sacramento.org Secretary Lynette Jones Deloitte & Touche LLP Lynn.Jones@isaca-sacramento.org Treasurer Barbara Owens Department of Child Support Services Barbara.Owens@isaca-sacramento.org Program Chair Adrian Bogdan Intel Adrian.Bogdan@isaca-sacramento.org Immediate Past President Michael Stanford IntelliQuote Michael.Stanford@isaca-sacramento.org Membership Directors Vivienne Nicol Interplan Health Group Vivienne Nicol@isaca-sacramento.org Loretta Hall Franklin Templeton Investments Loretta.Hall@isaca-sacramento.org Academic Relations Coordinator Nancy Gonzales Health Net, Inc. Nancy.A.Gonzales@isaca-sacramento.org Auditor Francis Bueb Ueltzen & Company LLP Francis.Bueb@isaca-sacramento.org Newsletter Editor Hilary Schuler Deloitte & Touche LLP hilary.schuler@isaca-sacramento.org Webmaster David J. Blackburn Health Net, Inc. David.J.Blackburn@isaca-sacramento.org Seminar Chair Jack Leidecker Security Asylum Jack.Leidecker@isaca-sacramento.org PO Box 2025 Rancho Cordova, CA 95741 www.isaca-sacramento.org 10