29 Sep 2009 2:00 pm Presenting Lenny Zeltser SANS Technology Institute
Malicious software is an integral and dangerous component of many breaches.
29 Sep 2009 3:00 pm Presenting David Hoelzer; Enclave Forensics, Director of Research
As IT auditors we spend a great deal of time focused on configuration settings.
29 Sep 2009 11:00 am Presenting Shreeraj Shah; Blueinfy Solutions, Founder and Director
Enterprise application source code, independent of languages and platforms, is a major source of vulnerabilities.
29 Sep 2009 12:00 pm Presenting Michael Juergens; Deloitte & Touche LLP, Principal
Compliance requirements and resource constraints have focussed IT Audit procedures on the bare essentials of IT controls.
Presenting: Chris Noell, EVP of Product Management at TruArx
For many organizations, Sarbanes-Oxley compliance is mandatory, but automation of the self-assessment process can make it less painful. There are many advantages to using an IT GRC tool to automate assessments such as speed, efficiency, data integrity, and improved analysis.
30 Sep 2009 2:00 pm Presenting Lily Bi; The Institute of Internal Auditors; Director, Technology Practices
-Explore the relationship between IT and Business
-Define IT audit universe
Presenting Martin Holzke, Director & Author, SoftQualm
Even more businesses get involved in on or other form of auditing, whether its finance(Sarbanes-Oxley, SAS70 etc.) or quality (ISO 9000, Six Sigma etc.)related to mention only those two areas . . .
Presenting: Jason Keogh, CTO and Founder of iQuate
Traditional IT inventory and audit packages are invaluable for analyzing risk across the IT estate. In effect they widen the audit universe . . .