2005 International Conference - Call for Speakers
Upcoming SlideShare
Loading in...5
×
 

2005 International Conference - Call for Speakers

on

  • 489 views

 

Statistics

Views

Total Views
489
Views on SlideShare
489
Embed Views
0

Actions

Likes
0
Downloads
2
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft Word

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

2005 International Conference - Call for Speakers 2005 International Conference - Call for Speakers Document Transcript

  • Call for Speakers Call for Papers Due Date: 1 September 2004 Conference Dates: Pre-conference Workshops: 19 June 2005 (one day) Conference: 20 – 22 June 2005 (three days) Post-conference Workshops: 23 June 2005 (one day) Location: Radisson SAS Scandinavia Hotel Oslo, Norway Information Systems Audit and Control Association® (ISACA™) is issuing a Call for Speakers for the 2005 International Conference. The Programme Committee is looking for speakers to present the selected topics only. The committee is not looking for additional suggestions. Please only respond if you or someone you know can prepare a presentation on the below listed topics. The session proposal form will serve to document the speaker’s vision of the session and how he or she intends to treat the various issues of the session topic. The Programme Committee will make its speaker selections based on the session proposal documentation. Information About ISACA ISACA is committed to providing its members and the IT assurance, information security management and IT governance community with high-quality educational and training opportunities and events. With more than 35,000 members in over 100 countries representing more than 170 local chapters, ISACA is a recognized global leader in IT governance, control and assurance. ISACA sponsors international conferences, publishes Control Objectives for Information and related Technology (COBIT®), and administers the globally respected Certified Information Systems Auditor™ (CISA®) designation and the new Certified Information Security Manager™ (CISM™) designation. The International Conference is ISACA's flagship conference. It is also the site of the Annual General Meeting of the Membership as well as ISACA Board of Directors' meetings and scheduled Global Leadership Conference for representatives of the local chapters. Held in mid-summer annually, the International Conference attracts over 250 professionals from around the globe. Its educational streams focus on managerial and business issues of IT audit, control, security and assurance.
  • ALL SUBMISSIONS MUST BE IN ELECTRONIC FORMAT VIA E-MAIL Potential presenters must complete an official ISACA session proposal form for each proposed topic. Partially completed forms will be returned for revision and correction. The session proposal form will serve to document the presenter’s vision of the proposed session and how he/she intends to treat the various issues of the topic. The Programme Committee can only make its presenter selections after a comprehensive review of the session proposal documentation and bona fides. It is important to include a full biographical sketch and detailed list of speaking engagements. Please do not convert the session proposal form to a read-only format. You may submit as many proposals as you wish to: Robert M. Bergquist Manager of Conference Development Information Systems Audit and Control Association E-mail: rbergquist@isaca.org Should you have any questions, comments or concerns, please direct them to Mr. Bergquist at: Information Systems Audit and Control Association 3701 Algonquin Road Suite 1010 Rolling Meadows, IL 60008 USA Phone: +1.847.590.7473 Facsimile: +1.847.253.1443 Conference Presenter Expense Reimbursement Guidelines ISACA is a not-for-profit organization serving the IT assurance, information security management and IT governance community. Most presenters and their companies recognize the importance of being part of this high profile educational event and embrace a philanthropic spirit by funding travel and lodgings. North America CACS provides the presenter with the opportunity to demonstrate his/her expertise, knowledge and experience as well as to network with constituents for business development purposes. In appreciation for all the hard work and effort, ISACA offers a full complimentary conference registration (not including workshops) to all presenters. In addition, ISACA recognizes presenters and their companies as “conference supporters” in conference literature distributed to delegates. Travel reimbursement is available upon request to presenters who meet specific criteria including but not limited to presenting for three or more hours at the conference. Please do not hesitate to contact Robert Bergquist at the above listed information should you have any specific questions regarding the ISACA travel reimbursement guidelines.
  • Stream #1 – IT Governance Stream Champions: Sissel Kravdal Gjessing, CISA ISACA Norway Chapter John Mitchell, CISA ISACA London Chapter IT governance consists of the leadership, organisational and measurement structures, and processes that ensure the organisation's information technology sustains and extends its strategies and objectives while managing any associated risk. This stream presents topics designed to provide perspective to information systems and technology issues at the strategic level, enabling managers to make well-informed planning and resource decisions. Participants should be prepared to share their experiences and ideas as well as successes, challenges and observed practices. Presenters have facilitation skills in addition to being subject matter experts in the event the sessions turn into round-table discussions. Target Audience: • Chief information officers and other senior and executive managers • Control and compliance managers • IT assurance managers and professionals • Information security managers and other security professionals • IT professionals Session Topics: • CobiT and IT Governance • Sarbanes-Oxley • Risk Management • Information Security Governance • IT and Business Process Alignment • Measuring IT Value • Enterprise IT Certifications (ISO 9000-series, BS 7799-2, TickIT etc.) • Risk Assessment of Third Party Providers • Bringing Outsourcing back in-house - the Governance issues • Comparing and Contrasting IT Frameworks (ITIL, COBIT, CMM, Balanced Scorecard, etc) • Controlling the Shadow (End User Computing) IT Organization • CobiT Update (CobiT Steering Committee) • Outsourcing & IT Governance • Basel II • Control Self-Assessment
  • Stream #2 – IT Assurance Management Issues Stream Champion: Darren Ramsey CISA ISACA Adelaide Chapter As an IT assurance or Risk Management professional, whether at management level or practitioner, keeping abreast of key issues and the latest best practices is essential. The challenges facing business today are increasingly complex, change at a rapid rate and increasingly coming under the public spotlight. Government agencies and bodies of authority are now demanding higher levels of internal control through legislation. Business executives are increasingly being held accountable for their actions. This stream is designed to provide concepts, tools, techniques and practical examples to help those who attend improve upon their skills, knowledge and levels of expertise. Presented at intermediate and advanced levels, each session combines audit methodology with technical skills and knowledge to assist in mitigating business risk arising from technology. Target Audience: • IT assurance professionals of all levels • Information security professionals • Compliance and risk managers • Information security managers • Senior and executive managers Session Topics: • Computer Assisted Audit Tools and Techniques (CAATTs) for Fraud Detection • Continuous Controls Monitoring • Global Systems Support and Audit Implications • Overview of Emerging Tools and Technologies for Auditors • Risk Management of System Development • Validating Controls using CAATTs • CobiT and Control Self-Assessment • Validating Financial Control Effectiveness and Segregation of Duties • Auditing the Outsourcing Process • Enterprise Information Integrity • Cross-Border Privacy Challenges • CobiT for the IT Audit Plan • Software Licensing Management • Team Building and Group Dynamics • Quality Assurance of the IT Audit Process
  • Stream #3 – IT Security Management Issues Stream Champions: Hendrik Ceulemans, CISA ISACA Belux Chapter Anthony Noble, CISA ISACA New York Chapter The development and increasing use of COBIT®, ISO17799 and other security standards demonstrates the interest in information security management at the international level; reinforced by the strong interest in ISACA’s Certified Information Security Management certification. This stream is designed for information security managers and assurance professionals. It provides a clear understanding of the key elements of effective security management practices within the context of an organisations overall security management program. The sessions will help those interested in attaining the new CISM designation by identifying key competencies required for the certification. Target Audience: • Information security managers • Assurance professionals • IT professionals • Senior and executive managers Session Topics: • Anatomy of a Web Application Attack • Return on Investment for Information Security • Privilege Management • Cyber Security and Terrorism • Outsourcing Information Security Management • Enterprise security monitoring • ISO 17799 Compliance; the next step, experiences with external certification to BS 7799-2 • Freeware Forensic Toolkits • Managing Privacy • Messaging Systems Security Threats (e-mail, instant messaging, SMS, etc…) • Intrusion Detection Systems vs. Intrusion Prevention Systems • Mobile Device Security • Keeping Security Awareness Training Fresh • Developing Effective Information Security Policies • Maturity models and security management • Linking COBIT® and ISO 17799
  • Stream #4 – IT Business Issues Stream Champions: Miranda van der Kruk ISACA Netherlands Chapter Doron Ronen ISACA Israel Chapter Nowadays information technology is no longer the leading issue for business; however, IT is a vital part of the business. To gain the most profit for the business, IT managers and other individuals need to understand the business issues relating to leading edge technology. This stream reflects the fact that IT is a key element of important business processes. It offers topics to help improve the bottom line, gain competitive advantage and sustain growth through information-related technologies. Step back from your computer and look at the big picture. You do not have to be a high-level executive to appreciate your role in the success of your organisation. Target Audience: • CIOs and other senior and executive managers • IT managers • Information security managers and professionals • IT assurance managers and professionals • Mediators between IT and Business • IT (business) consultants Session Topics: • Return on IT Investments • Cost Transparency and Cost Control • Digital Asset Management IT Reaction to Business Change (Best Practices) • Making the IT Systems Resilient • Programme Management • Quality Management in IT • The IT role in the Business process reengineering Business Continuity Management • The Process of Compliance (IT Management) • Control Effectiveness in Integrated Systems • The Business Risks of Outsourcing and Off-shoring • Bringing Outsourcing Back In-house (the business issues) • Open Source Software • Business Applications of RFID Technologies • Managing the Wireless Network
  • Optional Pre- and Post-Conference Workshops Pre- and Post-Conference Workshops are the best way to deliver concentrated technical training as a supplement to conference sessions. Each of the workshops are a full day of training combining lecture, case study, and group participation to enhance the educational experience. ISACA has selected workshops highlighting issues attendees from around the world say are critical to perform their functions. ISACA is in a unique position to produce education derived from research initiatives. Workshop Topics: • CobiT Implementation • Web Applications • CobiT for IT Assurance • Project Management • Penetration Testing • Computer Forensics • Web Services • Application Controls • Incident Response