REGISTER

malware

29 Sep 2009 2:00 pm Presenting Lenny Zeltser SANS Technology Institute

Malicious software is an integral and dangerous component of many breaches.

measuring

29 Sep 2009 3:00 pm Presenting David Hoelzer; Enclave Forensics, Director of Research

As IT auditors we spend a great deal of time focused on configuration settings.

application

29 Sep 2009 11:00 am Presenting Shreeraj Shah; Blueinfy Solutions, Founder and Director

Enterprise application source code, independent of languages and platforms, is a major source of vulnerabilities.

deloitte1

29 Sep 2009 12:00 pm Presenting Michael Juergens; Deloitte & Touche LLP, Principal

Compliance requirements and resource constraints have focussed IT Audit procedures on the bare essentials of IT controls.

iia

30 Sep 2009 2:00 pm Presenting Lily Bi; The Institute of Internal Auditors; Director, Technology Practices

-Explore the relationship between IT and Business
-Define IT audit universe

learn

Presenting Martin Holzke, Director & Author, SoftQualm

Even more businesses get involved in on or other form of auditing, whether its finance(Sarbanes-Oxley, SAS70 etc.) or quality (ISO 9000, Six Sigma etc.)related to mention only those two areas . . .

problems

Presenting: Jason Keogh, CTO and Founder of iQuate

Traditional IT inventory and audit packages are invaluable for analyzing risk across the IT estate. In effect they widen the audit universe . . .

audit_and_control

Presenting: Barry Lewis, co-author: Wireless Networks for Dummies; Cerberus ISC

Secure Mobile Computing: Audit and control of memory sticks to Smartphones . . .

Log in

Please Login to download this file

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *

ad-banner3

ad-banner3

Banner

CyberBanner

Banner

MetricStream TPRM

CyberBanner

Go to top