SlideShare a Scribd company logo
1 of 2
Download to read offline
Risk IT - Special One Day Workshop
-by Brian Barnier of ValueBridge Advisors

Date: April 15, 2010 (8:00 AM – 4:30 PM) light breakfast, lunch, snacks & beverages included
Location: Deloitte, 2800 Floor – 1055 Dunsmuir Street, Vancouver
Cost: $299 for ISACA members or $349 for others. GST will be added.

Invited Audience:
CIOs, CxOs, Senior Management, IT Governance, IT Management, Business Continuity, Information
Security Management, Risk Management, and IT Assurance professionals.

Overview:
Effective management of business risk has become an essential component of IT governance. Leading the
drive to help enterprises mitigate risks, ISACA has developed
        The Risk IT Framework: Based on COBIT (free download for members)
        The Risk IT Practitioner Guide: Based on COBIT (free download for members)

The purpose of this intermediate level workshop is to help those responsible for risk management or
assurance:
      Understand how the Risk IT Framework can help them manage IT risk; and
      Explore how practical guidance and techniques in the Practitioner Guide can help them implement IT
      risk management.

Seating is limited to 25 to ensure maximum class interaction and personal attention so register early.

Facilities, food and beverage - courtesy of Deloitte.
Printed workshop material will be provided – courtesy of KPMG

Prerequisites:
Participants should be familiar with the risk assessment and management process.

Workshop Outline:
This one day work shop
       Explores the elements of IT risk management - the principles, who is responsible for IT risk, how to
       build awareness, and how to communicate risk scenarios, the business impact and key risk
       indicators;
       Introduces the Risk IT framework and the process model that includes risk governance, risk
       evaluation and risk response;
       Explains how the framework relates to COBIT and how it can help to achieve best practices in IT risk
       management;
       Examines the implementation and operational issues of the framework;
       Explores how to integrate IT risk management into an enterprise wide risk management program,
       establish and maintain a common risk view and make risk-aware business decisions; and
       Elaborates on how to maintain an operational risk profile, assess and respond to risk, as well as how
       to collect event data, monitor risk and report exposures and opportunities.

Workshop Objectives:
Participants will understand and learn:
        The nature of IT risk and apply it to their own organization;
        The key principles of IT risk management;
        How the Risk IT process model can help to manage IT risk;
How to implement IT risk management using the practical guidance and techniques in the Risk IT
        Practitioners Guide; and
        How to apply risk management principles through practical case studies.

Instructor Biography:
Brian Barnier brings a unique perspective to business-IT management. With a split career between “the
business” and IT, he works to bridge two sets of needs to get greater business benefits from IT. He also
has a unique vantage point because of his experience in practical projects, best practices committees,
research and teaching professional education across industries and countries. His research on “what works”
in risk management with a co-author at MIT Sloan CISR has been published in several publications, most
recently the ISACA Journal. In 2009, he presented to over 1000 people in live events and nearly as many
in webinars. In addition to writing widely in various business and IT management publications, he serves
on the editorial board for EDPACS. He is currently with ValueBridge Advisors and previously was with IBM,
Lucent and AT&T.

Brian is a member of the ISACA’s IT Enterprise Risk Management Task Force that created the Risk IT
Framework. He chairs the ISACA IT-GRC Conference Program Committee; writes for the ISACA Journal,
COBIT Focus, and chapter newsletters; and serves on ISACA’s CACS Task Force, IT Governance Forum Core
Faculty and Professional Influence and Advocacy Committee.

Registration:
To register for this event, please have your contact information and membership number ready before
calling the ICABC Professional Development Department at 604-681-3264 or email pdreg@ica.bc.ca. Please
note that the course fee must be paid in full at the time of registration by VISA, MC, or AMEX.

We will accept cancellations up to 14 days before the session. A $25 administration fee will apply. No
refund after April 1st.

About ISACA:
Founded in 1867, ISACA has more than 86,000 members in more than 160 countries. ISACA (www.isaca.org)
is a pace-setting global organization for information governance, control, security and audit professionals. Its
IS auditing and IS control standards are followed by practitioners worldwide. Its research pinpoints
professional issues challenging its constituents. Its Certified Information Systems Auditor (CISA) certification
is recognized globally and has been earned by more than 70,000 professionals since inception. The Certified
Information Security Manager (CISM) certification uniquely targets the information security management
audience and has been earned by more than 12,500 professionals. The Certified in the Governance of
Enterprise IT (CGEIT) designation promotes the advancement of professionals who wish to be recognized for
their IT governance-related experience and knowledge and has been earned by more than 4,000
professionals. The new Certified in Risk and Information Systems Control (CRISC) designation is for IT
professionals who identify and manage risks through the development, implementation and maintenance of
information systems controls. ISACA also publishes a leading technical journal in the information control
field, the ISACA Journal. It hosts a series of international conferences focusing on both technical and
managerial topics pertinent to the IS assurance, control, security and IT governance professions. Together,
ISACA and its affiliated IT Governance Institute (ITGI) lead the information technology control community
and serve its practitioners by providing the elements needed by IT professionals in an ever-changing
worldwide environment.

Please visit our chapter web-site: www.isaca-vancouver.org

More Related Content

What's hot

Think Cyber Think Resilience | William Barker | March 2016
Think Cyber Think Resilience | William Barker  | March 2016Think Cyber Think Resilience | William Barker  | March 2016
Think Cyber Think Resilience | William Barker | March 2016Anna Fenston
 
ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019Amy Lauder
 
Best cybersecurity services for organizations
Best cybersecurity services for organizationsBest cybersecurity services for organizations
Best cybersecurity services for organizationswilsonconsulting1
 
Rick nelson executive bio 2010 ppt
Rick nelson executive bio 2010 pptRick nelson executive bio 2010 ppt
Rick nelson executive bio 2010 pptRnelson881_2
 
The Rise of Ransomware As a Service
The Rise of Ransomware As a ServiceThe Rise of Ransomware As a Service
The Rise of Ransomware As a ServiceVeriato
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Brad Deflin
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilienceAndrew Bycroft
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate PerspectiveDawn Yankeelov
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015ITSM Academy, Inc.
 
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...i2Coalition
 
Cybersecurity Service Provider
Cybersecurity Service ProviderCybersecurity Service Provider
Cybersecurity Service ProviderVishvendra Saini
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureCraig McGill
 
The July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeThe July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeCraig McGill
 
Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting FirmGlobal Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firmwilsonconsulting1
 

What's hot (17)

Think Cyber Think Resilience | William Barker | March 2016
Think Cyber Think Resilience | William Barker  | March 2016Think Cyber Think Resilience | William Barker  | March 2016
Think Cyber Think Resilience | William Barker | March 2016
 
ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019
 
Best cybersecurity services for organizations
Best cybersecurity services for organizationsBest cybersecurity services for organizations
Best cybersecurity services for organizations
 
Rick nelson executive bio 2010 ppt
Rick nelson executive bio 2010 pptRick nelson executive bio 2010 ppt
Rick nelson executive bio 2010 ppt
 
The Rise of Ransomware As a Service
The Rise of Ransomware As a ServiceThe Rise of Ransomware As a Service
The Rise of Ransomware As a Service
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilience
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
 
Simple Safe Steps to Cyber Security
Simple Safe Steps to Cyber SecuritySimple Safe Steps to Cyber Security
Simple Safe Steps to Cyber Security
 
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
 
Cybersecurity Service Provider
Cybersecurity Service ProviderCybersecurity Service Provider
Cybersecurity Service Provider
 
Cyber security infotech profile
Cyber security infotech profileCyber security infotech profile
Cyber security infotech profile
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
 
The July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeThe July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk Landscape
 
CISO Case Study 2011 V2
CISO Case Study  2011 V2CISO Case Study  2011 V2
CISO Case Study 2011 V2
 
Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting FirmGlobal Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firm
 

Viewers also liked

Ciai2012 industry automation technology & equipment exhibition
Ciai2012 industry automation technology & equipment exhibitionCiai2012 industry automation technology & equipment exhibition
Ciai2012 industry automation technology & equipment exhibitionsantolucia
 
Slime Argentina - Presentación
Slime Argentina - PresentaciónSlime Argentina - Presentación
Slime Argentina - PresentaciónSlime Argentina
 
Smx echo ontología
Smx echo   ontologíaSmx echo   ontología
Smx echo ontologíaabruzzonismx
 
Tril social media prez
Tril social media prezTril social media prez
Tril social media prezTrilby Goouch
 
Social_Task Network_images
Social_Task Network_imagesSocial_Task Network_images
Social_Task Network_imagesKarla Phlypo
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002pgpmikey
 
ISACA Vancouver Co-Host Overview for the 2013 Vancouver CISO Executive Summit
ISACA Vancouver Co-Host Overview for the 2013 Vancouver CISO Executive SummitISACA Vancouver Co-Host Overview for the 2013 Vancouver CISO Executive Summit
ISACA Vancouver Co-Host Overview for the 2013 Vancouver CISO Executive Summitpgpmikey
 
ISACA Vancouver AGM & Education Session - June 23, 2010
ISACA Vancouver AGM & Education Session - June 23, 2010ISACA Vancouver AGM & Education Session - June 23, 2010
ISACA Vancouver AGM & Education Session - June 23, 2010pgpmikey
 
2015-05-07 Integrating Your AMS with Other Applications
2015-05-07 Integrating Your AMS with Other Applications2015-05-07 Integrating Your AMS with Other Applications
2015-05-07 Integrating Your AMS with Other ApplicationsRaffa Learning Community
 
Sink or Swim? Supporting the Transition to New Manager | Webinar 08.11.15
Sink or Swim? Supporting the Transition to New Manager | Webinar 08.11.15Sink or Swim? Supporting the Transition to New Manager | Webinar 08.11.15
Sink or Swim? Supporting the Transition to New Manager | Webinar 08.11.15BizLibrary
 
10 Commandments of Virtual Teams
10 Commandments of Virtual Teams10 Commandments of Virtual Teams
10 Commandments of Virtual TeamsPGi
 
12 Brand Logos With Hidden and Interesting Messages
12 Brand Logos With Hidden and Interesting Messages12 Brand Logos With Hidden and Interesting Messages
12 Brand Logos With Hidden and Interesting MessagesPawan Kumar
 
My personal Growth Hacking Challenge
My personal Growth Hacking ChallengeMy personal Growth Hacking Challenge
My personal Growth Hacking ChallengeHENDRIKLENNARZ.COM
 

Viewers also liked (16)

Ciai2012 industry automation technology & equipment exhibition
Ciai2012 industry automation technology & equipment exhibitionCiai2012 industry automation technology & equipment exhibition
Ciai2012 industry automation technology & equipment exhibition
 
Slime Argentina - Presentación
Slime Argentina - PresentaciónSlime Argentina - Presentación
Slime Argentina - Presentación
 
Peak freens
Peak freensPeak freens
Peak freens
 
Smx echo ontología
Smx echo   ontologíaSmx echo   ontología
Smx echo ontología
 
12 6579
12 657912 6579
12 6579
 
Tril social media prez
Tril social media prezTril social media prez
Tril social media prez
 
Développement et expérimentation d’un modèle de gestion collaborative des pra...
Développement et expérimentation d’un modèle de gestion collaborative des pra...Développement et expérimentation d’un modèle de gestion collaborative des pra...
Développement et expérimentation d’un modèle de gestion collaborative des pra...
 
Social_Task Network_images
Social_Task Network_imagesSocial_Task Network_images
Social_Task Network_images
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002
 
ISACA Vancouver Co-Host Overview for the 2013 Vancouver CISO Executive Summit
ISACA Vancouver Co-Host Overview for the 2013 Vancouver CISO Executive SummitISACA Vancouver Co-Host Overview for the 2013 Vancouver CISO Executive Summit
ISACA Vancouver Co-Host Overview for the 2013 Vancouver CISO Executive Summit
 
ISACA Vancouver AGM & Education Session - June 23, 2010
ISACA Vancouver AGM & Education Session - June 23, 2010ISACA Vancouver AGM & Education Session - June 23, 2010
ISACA Vancouver AGM & Education Session - June 23, 2010
 
2015-05-07 Integrating Your AMS with Other Applications
2015-05-07 Integrating Your AMS with Other Applications2015-05-07 Integrating Your AMS with Other Applications
2015-05-07 Integrating Your AMS with Other Applications
 
Sink or Swim? Supporting the Transition to New Manager | Webinar 08.11.15
Sink or Swim? Supporting the Transition to New Manager | Webinar 08.11.15Sink or Swim? Supporting the Transition to New Manager | Webinar 08.11.15
Sink or Swim? Supporting the Transition to New Manager | Webinar 08.11.15
 
10 Commandments of Virtual Teams
10 Commandments of Virtual Teams10 Commandments of Virtual Teams
10 Commandments of Virtual Teams
 
12 Brand Logos With Hidden and Interesting Messages
12 Brand Logos With Hidden and Interesting Messages12 Brand Logos With Hidden and Interesting Messages
12 Brand Logos With Hidden and Interesting Messages
 
My personal Growth Hacking Challenge
My personal Growth Hacking ChallengeMy personal Growth Hacking Challenge
My personal Growth Hacking Challenge
 

Similar to ISACA Vancouver Risk IT Workshop - April 15 2010

IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
 
ISACA March Education Session - Special Executive Breakfast and Workshop
ISACA March Education Session - Special Executive Breakfast and WorkshopISACA March Education Session - Special Executive Breakfast and Workshop
ISACA March Education Session - Special Executive Breakfast and Workshoppgpmikey
 
CRISC_certification_training_course_content
CRISC_certification_training_course_contentCRISC_certification_training_course_content
CRISC_certification_training_course_contentpriyanshamadhwal2
 
CRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & descriptionCRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & descriptionInfosec train
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfChinatu Uzuegbu
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROPriyanka Aash
 
New COBIT 5 Framework: Master the skills to review Implementation - By Compli...
New COBIT 5 Framework: Master the skills to review Implementation - By Compli...New COBIT 5 Framework: Master the skills to review Implementation - By Compli...
New COBIT 5 Framework: Master the skills to review Implementation - By Compli...Compliance Global Inc
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksAronson LLC
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadsavassociates1
 
ISACA Certification Brochure General
ISACA Certification Brochure GeneralISACA Certification Brochure General
ISACA Certification Brochure GeneralCaroline Bombart
 
What are the Job Prospects After Doing CISA.pptx
What are the Job Prospects After Doing CISA.pptxWhat are the Job Prospects After Doing CISA.pptx
What are the Job Prospects After Doing CISA.pptxinfosec train
 
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptxjamiejohngianna
 
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...360 BSI
 

Similar to ISACA Vancouver Risk IT Workshop - April 15 2010 (20)

IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
5548 isaca for-students
5548 isaca for-students5548 isaca for-students
5548 isaca for-students
 
ISACA March Education Session - Special Executive Breakfast and Workshop
ISACA March Education Session - Special Executive Breakfast and WorkshopISACA March Education Session - Special Executive Breakfast and Workshop
ISACA March Education Session - Special Executive Breakfast and Workshop
 
CRISC_certification_training_course_content
CRISC_certification_training_course_contentCRISC_certification_training_course_content
CRISC_certification_training_course_content
 
CRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & descriptionCRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & description
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
 
New COBIT 5 Framework: Master the skills to review Implementation - By Compli...
New COBIT 5 Framework: Master the skills to review Implementation - By Compli...New COBIT 5 Framework: Master the skills to review Implementation - By Compli...
New COBIT 5 Framework: Master the skills to review Implementation - By Compli...
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Mandelaris_SecureWorld_2016_FINAL
Mandelaris_SecureWorld_2016_FINALMandelaris_SecureWorld_2016_FINAL
Mandelaris_SecureWorld_2016_FINAL
 
ISACA Certification Brochure General
ISACA Certification Brochure GeneralISACA Certification Brochure General
ISACA Certification Brochure General
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
What are the Job Prospects After Doing CISA.pptx
What are the Job Prospects After Doing CISA.pptxWhat are the Job Prospects After Doing CISA.pptx
What are the Job Prospects After Doing CISA.pptx
 
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
 
CISM sertifikacija
CISM sertifikacijaCISM sertifikacija
CISM sertifikacija
 
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
 
ACFN vISO eBook
ACFN vISO eBookACFN vISO eBook
ACFN vISO eBook
 

Recently uploaded

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

ISACA Vancouver Risk IT Workshop - April 15 2010

  • 1. Risk IT - Special One Day Workshop -by Brian Barnier of ValueBridge Advisors Date: April 15, 2010 (8:00 AM – 4:30 PM) light breakfast, lunch, snacks & beverages included Location: Deloitte, 2800 Floor – 1055 Dunsmuir Street, Vancouver Cost: $299 for ISACA members or $349 for others. GST will be added. Invited Audience: CIOs, CxOs, Senior Management, IT Governance, IT Management, Business Continuity, Information Security Management, Risk Management, and IT Assurance professionals. Overview: Effective management of business risk has become an essential component of IT governance. Leading the drive to help enterprises mitigate risks, ISACA has developed The Risk IT Framework: Based on COBIT (free download for members) The Risk IT Practitioner Guide: Based on COBIT (free download for members) The purpose of this intermediate level workshop is to help those responsible for risk management or assurance: Understand how the Risk IT Framework can help them manage IT risk; and Explore how practical guidance and techniques in the Practitioner Guide can help them implement IT risk management. Seating is limited to 25 to ensure maximum class interaction and personal attention so register early. Facilities, food and beverage - courtesy of Deloitte. Printed workshop material will be provided – courtesy of KPMG Prerequisites: Participants should be familiar with the risk assessment and management process. Workshop Outline: This one day work shop Explores the elements of IT risk management - the principles, who is responsible for IT risk, how to build awareness, and how to communicate risk scenarios, the business impact and key risk indicators; Introduces the Risk IT framework and the process model that includes risk governance, risk evaluation and risk response; Explains how the framework relates to COBIT and how it can help to achieve best practices in IT risk management; Examines the implementation and operational issues of the framework; Explores how to integrate IT risk management into an enterprise wide risk management program, establish and maintain a common risk view and make risk-aware business decisions; and Elaborates on how to maintain an operational risk profile, assess and respond to risk, as well as how to collect event data, monitor risk and report exposures and opportunities. Workshop Objectives: Participants will understand and learn: The nature of IT risk and apply it to their own organization; The key principles of IT risk management; How the Risk IT process model can help to manage IT risk;
  • 2. How to implement IT risk management using the practical guidance and techniques in the Risk IT Practitioners Guide; and How to apply risk management principles through practical case studies. Instructor Biography: Brian Barnier brings a unique perspective to business-IT management. With a split career between “the business” and IT, he works to bridge two sets of needs to get greater business benefits from IT. He also has a unique vantage point because of his experience in practical projects, best practices committees, research and teaching professional education across industries and countries. His research on “what works” in risk management with a co-author at MIT Sloan CISR has been published in several publications, most recently the ISACA Journal. In 2009, he presented to over 1000 people in live events and nearly as many in webinars. In addition to writing widely in various business and IT management publications, he serves on the editorial board for EDPACS. He is currently with ValueBridge Advisors and previously was with IBM, Lucent and AT&T. Brian is a member of the ISACA’s IT Enterprise Risk Management Task Force that created the Risk IT Framework. He chairs the ISACA IT-GRC Conference Program Committee; writes for the ISACA Journal, COBIT Focus, and chapter newsletters; and serves on ISACA’s CACS Task Force, IT Governance Forum Core Faculty and Professional Influence and Advocacy Committee. Registration: To register for this event, please have your contact information and membership number ready before calling the ICABC Professional Development Department at 604-681-3264 or email pdreg@ica.bc.ca. Please note that the course fee must be paid in full at the time of registration by VISA, MC, or AMEX. We will accept cancellations up to 14 days before the session. A $25 administration fee will apply. No refund after April 1st. About ISACA: Founded in 1867, ISACA has more than 86,000 members in more than 160 countries. ISACA (www.isaca.org) is a pace-setting global organization for information governance, control, security and audit professionals. Its IS auditing and IS control standards are followed by practitioners worldwide. Its research pinpoints professional issues challenging its constituents. Its Certified Information Systems Auditor (CISA) certification is recognized globally and has been earned by more than 70,000 professionals since inception. The Certified Information Security Manager (CISM) certification uniquely targets the information security management audience and has been earned by more than 12,500 professionals. The Certified in the Governance of Enterprise IT (CGEIT) designation promotes the advancement of professionals who wish to be recognized for their IT governance-related experience and knowledge and has been earned by more than 4,000 professionals. The new Certified in Risk and Information Systems Control (CRISC) designation is for IT professionals who identify and manage risks through the development, implementation and maintenance of information systems controls. ISACA also publishes a leading technical journal in the information control field, the ISACA Journal. It hosts a series of international conferences focusing on both technical and managerial topics pertinent to the IS assurance, control, security and IT governance professions. Together, ISACA and its affiliated IT Governance Institute (ITGI) lead the information technology control community and serve its practitioners by providing the elements needed by IT professionals in an ever-changing worldwide environment. Please visit our chapter web-site: www.isaca-vancouver.org