SlideShare a Scribd company logo
Risk IT - Special One Day Workshop
-by Brian Barnier of ValueBridge Advisors

Date: April 15, 2010 (8:00 AM – 4:30 PM) light breakfast, lunch, snacks & beverages included
Location: Deloitte, 2800 Floor – 1055 Dunsmuir Street, Vancouver
Cost: $299 for ISACA members or $349 for others. GST will be added.

Invited Audience:
CIOs, CxOs, Senior Management, IT Governance, IT Management, Business Continuity, Information
Security Management, Risk Management, and IT Assurance professionals.

Overview:
Effective management of business risk has become an essential component of IT governance. Leading the
drive to help enterprises mitigate risks, ISACA has developed
        The Risk IT Framework: Based on COBIT (free download for members)
        The Risk IT Practitioner Guide: Based on COBIT (free download for members)

The purpose of this intermediate level workshop is to help those responsible for risk management or
assurance:
      Understand how the Risk IT Framework can help them manage IT risk; and
      Explore how practical guidance and techniques in the Practitioner Guide can help them implement IT
      risk management.

Seating is limited to 25 to ensure maximum class interaction and personal attention so register early.

Facilities, food and beverage - courtesy of Deloitte.
Printed workshop material will be provided – courtesy of KPMG

Prerequisites:
Participants should be familiar with the risk assessment and management process.

Workshop Outline:
This one day work shop
       Explores the elements of IT risk management - the principles, who is responsible for IT risk, how to
       build awareness, and how to communicate risk scenarios, the business impact and key risk
       indicators;
       Introduces the Risk IT framework and the process model that includes risk governance, risk
       evaluation and risk response;
       Explains how the framework relates to COBIT and how it can help to achieve best practices in IT risk
       management;
       Examines the implementation and operational issues of the framework;
       Explores how to integrate IT risk management into an enterprise wide risk management program,
       establish and maintain a common risk view and make risk-aware business decisions; and
       Elaborates on how to maintain an operational risk profile, assess and respond to risk, as well as how
       to collect event data, monitor risk and report exposures and opportunities.

Workshop Objectives:
Participants will understand and learn:
        The nature of IT risk and apply it to their own organization;
        The key principles of IT risk management;
        How the Risk IT process model can help to manage IT risk;
How to implement IT risk management using the practical guidance and techniques in the Risk IT
        Practitioners Guide; and
        How to apply risk management principles through practical case studies.

Instructor Biography:
Brian Barnier brings a unique perspective to business-IT management. With a split career between “the
business” and IT, he works to bridge two sets of needs to get greater business benefits from IT. He also
has a unique vantage point because of his experience in practical projects, best practices committees,
research and teaching professional education across industries and countries. His research on “what works”
in risk management with a co-author at MIT Sloan CISR has been published in several publications, most
recently the ISACA Journal. In 2009, he presented to over 1000 people in live events and nearly as many
in webinars. In addition to writing widely in various business and IT management publications, he serves
on the editorial board for EDPACS. He is currently with ValueBridge Advisors and previously was with IBM,
Lucent and AT&T.

Brian is a member of the ISACA’s IT Enterprise Risk Management Task Force that created the Risk IT
Framework. He chairs the ISACA IT-GRC Conference Program Committee; writes for the ISACA Journal,
COBIT Focus, and chapter newsletters; and serves on ISACA’s CACS Task Force, IT Governance Forum Core
Faculty and Professional Influence and Advocacy Committee.

Registration:
To register for this event, please have your contact information and membership number ready before
calling the ICABC Professional Development Department at 604-681-3264 or email pdreg@ica.bc.ca. Please
note that the course fee must be paid in full at the time of registration by VISA, MC, or AMEX.

We will accept cancellations up to 14 days before the session. A $25 administration fee will apply. No
refund after April 1st.

About ISACA:
Founded in 1867, ISACA has more than 86,000 members in more than 160 countries. ISACA (www.isaca.org)
is a pace-setting global organization for information governance, control, security and audit professionals. Its
IS auditing and IS control standards are followed by practitioners worldwide. Its research pinpoints
professional issues challenging its constituents. Its Certified Information Systems Auditor (CISA) certification
is recognized globally and has been earned by more than 70,000 professionals since inception. The Certified
Information Security Manager (CISM) certification uniquely targets the information security management
audience and has been earned by more than 12,500 professionals. The Certified in the Governance of
Enterprise IT (CGEIT) designation promotes the advancement of professionals who wish to be recognized for
their IT governance-related experience and knowledge and has been earned by more than 4,000
professionals. The new Certified in Risk and Information Systems Control (CRISC) designation is for IT
professionals who identify and manage risks through the development, implementation and maintenance of
information systems controls. ISACA also publishes a leading technical journal in the information control
field, the ISACA Journal. It hosts a series of international conferences focusing on both technical and
managerial topics pertinent to the IS assurance, control, security and IT governance professions. Together,
ISACA and its affiliated IT Governance Institute (ITGI) lead the information technology control community
and serve its practitioners by providing the elements needed by IT professionals in an ever-changing
worldwide environment.

Please visit our chapter web-site: www.isaca-vancouver.org

More Related Content

What's hot

Think Cyber Think Resilience | William Barker | March 2016
Think Cyber Think Resilience | William Barker  | March 2016Think Cyber Think Resilience | William Barker  | March 2016
Think Cyber Think Resilience | William Barker | March 2016
Anna Fenston
 
ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019
Amy Lauder
 
Best cybersecurity services for organizations
Best cybersecurity services for organizationsBest cybersecurity services for organizations
Best cybersecurity services for organizations
wilsonconsulting1
 
Rick nelson executive bio 2010 ppt
Rick nelson executive bio 2010 pptRick nelson executive bio 2010 ppt
Rick nelson executive bio 2010 ppt
Rnelson881_2
 
The Rise of Ransomware As a Service
The Rise of Ransomware As a ServiceThe Rise of Ransomware As a Service
The Rise of Ransomware As a Service
Veriato
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
Brad Deflin
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilience
Andrew Bycroft
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
Dawn Yankeelov
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
ITSM Academy, Inc.
 
Simple Safe Steps to Cyber Security
Simple Safe Steps to Cyber SecuritySimple Safe Steps to Cyber Security
Simple Safe Steps to Cyber Security
Hudson Valley Public Relations
 
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
i2Coalition
 
Cybersecurity Service Provider
Cybersecurity Service ProviderCybersecurity Service Provider
Cybersecurity Service Provider
Vishvendra Saini
 
Cyber security infotech profile
Cyber security infotech profileCyber security infotech profile
Cyber security infotech profile
Cyber Security Infotech Pvt. Ltd.
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
Craig McGill
 
The July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeThe July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk Landscape
Craig McGill
 
CISO Case Study 2011 V2
CISO Case Study  2011 V2CISO Case Study  2011 V2
CISO Case Study 2011 V2
candy_alexander
 
Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting FirmGlobal Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firm
wilsonconsulting1
 

What's hot (17)

Think Cyber Think Resilience | William Barker | March 2016
Think Cyber Think Resilience | William Barker  | March 2016Think Cyber Think Resilience | William Barker  | March 2016
Think Cyber Think Resilience | William Barker | March 2016
 
ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019
 
Best cybersecurity services for organizations
Best cybersecurity services for organizationsBest cybersecurity services for organizations
Best cybersecurity services for organizations
 
Rick nelson executive bio 2010 ppt
Rick nelson executive bio 2010 pptRick nelson executive bio 2010 ppt
Rick nelson executive bio 2010 ppt
 
The Rise of Ransomware As a Service
The Rise of Ransomware As a ServiceThe Rise of Ransomware As a Service
The Rise of Ransomware As a Service
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilience
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
 
Simple Safe Steps to Cyber Security
Simple Safe Steps to Cyber SecuritySimple Safe Steps to Cyber Security
Simple Safe Steps to Cyber Security
 
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
 
Cybersecurity Service Provider
Cybersecurity Service ProviderCybersecurity Service Provider
Cybersecurity Service Provider
 
Cyber security infotech profile
Cyber security infotech profileCyber security infotech profile
Cyber security infotech profile
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
 
The July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeThe July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk Landscape
 
CISO Case Study 2011 V2
CISO Case Study  2011 V2CISO Case Study  2011 V2
CISO Case Study 2011 V2
 
Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting FirmGlobal Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firm
 

Viewers also liked

Ciai2012 industry automation technology & equipment exhibition
Ciai2012 industry automation technology & equipment exhibitionCiai2012 industry automation technology & equipment exhibition
Ciai2012 industry automation technology & equipment exhibitionsantolucia
 
Slime Argentina - Presentación
Slime Argentina - PresentaciónSlime Argentina - Presentación
Slime Argentina - Presentación
Slime Argentina
 
Peak freens
Peak freensPeak freens
Peak freens
Hamid Hussain
 
Smx echo ontología
Smx echo   ontologíaSmx echo   ontología
Smx echo ontología
abruzzonismx
 
Tril social media prez
Tril social media prezTril social media prez
Tril social media prez
Trilby Goouch
 
Développement et expérimentation d’un modèle de gestion collaborative des pra...
Développement et expérimentation d’un modèle de gestion collaborative des pra...Développement et expérimentation d’un modèle de gestion collaborative des pra...
Développement et expérimentation d’un modèle de gestion collaborative des pra...
Luxembourg Institute of Science and Technology
 
Social_Task Network_images
Social_Task Network_imagesSocial_Task Network_images
Social_Task Network_images
Karla Phlypo
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002
pgpmikey
 
ISACA Vancouver Co-Host Overview for the 2013 Vancouver CISO Executive Summit
ISACA Vancouver Co-Host Overview for the 2013 Vancouver CISO Executive SummitISACA Vancouver Co-Host Overview for the 2013 Vancouver CISO Executive Summit
ISACA Vancouver Co-Host Overview for the 2013 Vancouver CISO Executive Summit
pgpmikey
 
ISACA Vancouver AGM & Education Session - June 23, 2010
ISACA Vancouver AGM & Education Session - June 23, 2010ISACA Vancouver AGM & Education Session - June 23, 2010
ISACA Vancouver AGM & Education Session - June 23, 2010
pgpmikey
 
2015-05-07 Integrating Your AMS with Other Applications
2015-05-07 Integrating Your AMS with Other Applications2015-05-07 Integrating Your AMS with Other Applications
2015-05-07 Integrating Your AMS with Other Applications
Raffa Learning Community
 
Sink or Swim? Supporting the Transition to New Manager | Webinar 08.11.15
Sink or Swim? Supporting the Transition to New Manager | Webinar 08.11.15Sink or Swim? Supporting the Transition to New Manager | Webinar 08.11.15
Sink or Swim? Supporting the Transition to New Manager | Webinar 08.11.15
BizLibrary
 
10 Commandments of Virtual Teams
10 Commandments of Virtual Teams10 Commandments of Virtual Teams
10 Commandments of Virtual Teams
PGi
 
12 Brand Logos With Hidden and Interesting Messages
12 Brand Logos With Hidden and Interesting Messages12 Brand Logos With Hidden and Interesting Messages
12 Brand Logos With Hidden and Interesting Messages
Pawan Kumar
 
My personal Growth Hacking Challenge
My personal Growth Hacking ChallengeMy personal Growth Hacking Challenge
My personal Growth Hacking Challenge
HENDRIKLENNARZ.COM
 

Viewers also liked (16)

Ciai2012 industry automation technology & equipment exhibition
Ciai2012 industry automation technology & equipment exhibitionCiai2012 industry automation technology & equipment exhibition
Ciai2012 industry automation technology & equipment exhibition
 
Slime Argentina - Presentación
Slime Argentina - PresentaciónSlime Argentina - Presentación
Slime Argentina - Presentación
 
Peak freens
Peak freensPeak freens
Peak freens
 
Smx echo ontología
Smx echo   ontologíaSmx echo   ontología
Smx echo ontología
 
12 6579
12 657912 6579
12 6579
 
Tril social media prez
Tril social media prezTril social media prez
Tril social media prez
 
Développement et expérimentation d’un modèle de gestion collaborative des pra...
Développement et expérimentation d’un modèle de gestion collaborative des pra...Développement et expérimentation d’un modèle de gestion collaborative des pra...
Développement et expérimentation d’un modèle de gestion collaborative des pra...
 
Social_Task Network_images
Social_Task Network_imagesSocial_Task Network_images
Social_Task Network_images
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002
 
ISACA Vancouver Co-Host Overview for the 2013 Vancouver CISO Executive Summit
ISACA Vancouver Co-Host Overview for the 2013 Vancouver CISO Executive SummitISACA Vancouver Co-Host Overview for the 2013 Vancouver CISO Executive Summit
ISACA Vancouver Co-Host Overview for the 2013 Vancouver CISO Executive Summit
 
ISACA Vancouver AGM & Education Session - June 23, 2010
ISACA Vancouver AGM & Education Session - June 23, 2010ISACA Vancouver AGM & Education Session - June 23, 2010
ISACA Vancouver AGM & Education Session - June 23, 2010
 
2015-05-07 Integrating Your AMS with Other Applications
2015-05-07 Integrating Your AMS with Other Applications2015-05-07 Integrating Your AMS with Other Applications
2015-05-07 Integrating Your AMS with Other Applications
 
Sink or Swim? Supporting the Transition to New Manager | Webinar 08.11.15
Sink or Swim? Supporting the Transition to New Manager | Webinar 08.11.15Sink or Swim? Supporting the Transition to New Manager | Webinar 08.11.15
Sink or Swim? Supporting the Transition to New Manager | Webinar 08.11.15
 
10 Commandments of Virtual Teams
10 Commandments of Virtual Teams10 Commandments of Virtual Teams
10 Commandments of Virtual Teams
 
12 Brand Logos With Hidden and Interesting Messages
12 Brand Logos With Hidden and Interesting Messages12 Brand Logos With Hidden and Interesting Messages
12 Brand Logos With Hidden and Interesting Messages
 
My personal Growth Hacking Challenge
My personal Growth Hacking ChallengeMy personal Growth Hacking Challenge
My personal Growth Hacking Challenge
 

Similar to ISACA Vancouver Risk IT Workshop - April 15 2010

IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
360 BSI
 
5548 isaca for-students
5548 isaca for-students5548 isaca for-students
5548 isaca for-students
Universitas Bina Darma Palembang
 
ISACA March Education Session - Special Executive Breakfast and Workshop
ISACA March Education Session - Special Executive Breakfast and WorkshopISACA March Education Session - Special Executive Breakfast and Workshop
ISACA March Education Session - Special Executive Breakfast and Workshop
pgpmikey
 
CRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & descriptionCRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & description
Infosec train
 
CRISC_certification_training_course_content
CRISC_certification_training_course_contentCRISC_certification_training_course_content
CRISC_certification_training_course_content
priyanshamadhwal2
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
Chinatu Uzuegbu
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
Daren Dunkel
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
Priyanka Aash
 
New COBIT 5 Framework: Master the skills to review Implementation - By Compli...
New COBIT 5 Framework: Master the skills to review Implementation - By Compli...New COBIT 5 Framework: Master the skills to review Implementation - By Compli...
New COBIT 5 Framework: Master the skills to review Implementation - By Compli...
Compliance Global Inc
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
Aronson LLC
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
savassociates1
 
Mandelaris_SecureWorld_2016_FINAL
Mandelaris_SecureWorld_2016_FINALMandelaris_SecureWorld_2016_FINAL
Mandelaris_SecureWorld_2016_FINAL
Christopher Mandelaris
 
ISACA Certification Brochure General
ISACA Certification Brochure GeneralISACA Certification Brochure General
ISACA Certification Brochure General
Caroline Bombart
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
Murray Security Services
 
What are the Job Prospects After Doing CISA.pptx
What are the Job Prospects After Doing CISA.pptxWhat are the Job Prospects After Doing CISA.pptx
What are the Job Prospects After Doing CISA.pptx
infosec train
 
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
jamiejohngianna
 
CISM sertifikacija
CISM sertifikacijaCISM sertifikacija
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
360 BSI
 
ACFN vISO eBook
ACFN vISO eBookACFN vISO eBook
ACFN vISO eBook
Patrick Whelan, CISA
 

Similar to ISACA Vancouver Risk IT Workshop - April 15 2010 (20)

IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
5548 isaca for-students
5548 isaca for-students5548 isaca for-students
5548 isaca for-students
 
ISACA March Education Session - Special Executive Breakfast and Workshop
ISACA March Education Session - Special Executive Breakfast and WorkshopISACA March Education Session - Special Executive Breakfast and Workshop
ISACA March Education Session - Special Executive Breakfast and Workshop
 
CRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & descriptionCRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & description
 
CRISC_certification_training_course_content
CRISC_certification_training_course_contentCRISC_certification_training_course_content
CRISC_certification_training_course_content
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
 
New COBIT 5 Framework: Master the skills to review Implementation - By Compli...
New COBIT 5 Framework: Master the skills to review Implementation - By Compli...New COBIT 5 Framework: Master the skills to review Implementation - By Compli...
New COBIT 5 Framework: Master the skills to review Implementation - By Compli...
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Mandelaris_SecureWorld_2016_FINAL
Mandelaris_SecureWorld_2016_FINALMandelaris_SecureWorld_2016_FINAL
Mandelaris_SecureWorld_2016_FINAL
 
ISACA Certification Brochure General
ISACA Certification Brochure GeneralISACA Certification Brochure General
ISACA Certification Brochure General
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
What are the Job Prospects After Doing CISA.pptx
What are the Job Prospects After Doing CISA.pptxWhat are the Job Prospects After Doing CISA.pptx
What are the Job Prospects After Doing CISA.pptx
 
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
 
CISM sertifikacija
CISM sertifikacijaCISM sertifikacija
CISM sertifikacija
 
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
 
ACFN vISO eBook
ACFN vISO eBookACFN vISO eBook
ACFN vISO eBook
 

Recently uploaded

PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 

Recently uploaded (20)

PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 

ISACA Vancouver Risk IT Workshop - April 15 2010

  • 1. Risk IT - Special One Day Workshop -by Brian Barnier of ValueBridge Advisors Date: April 15, 2010 (8:00 AM – 4:30 PM) light breakfast, lunch, snacks & beverages included Location: Deloitte, 2800 Floor – 1055 Dunsmuir Street, Vancouver Cost: $299 for ISACA members or $349 for others. GST will be added. Invited Audience: CIOs, CxOs, Senior Management, IT Governance, IT Management, Business Continuity, Information Security Management, Risk Management, and IT Assurance professionals. Overview: Effective management of business risk has become an essential component of IT governance. Leading the drive to help enterprises mitigate risks, ISACA has developed The Risk IT Framework: Based on COBIT (free download for members) The Risk IT Practitioner Guide: Based on COBIT (free download for members) The purpose of this intermediate level workshop is to help those responsible for risk management or assurance: Understand how the Risk IT Framework can help them manage IT risk; and Explore how practical guidance and techniques in the Practitioner Guide can help them implement IT risk management. Seating is limited to 25 to ensure maximum class interaction and personal attention so register early. Facilities, food and beverage - courtesy of Deloitte. Printed workshop material will be provided – courtesy of KPMG Prerequisites: Participants should be familiar with the risk assessment and management process. Workshop Outline: This one day work shop Explores the elements of IT risk management - the principles, who is responsible for IT risk, how to build awareness, and how to communicate risk scenarios, the business impact and key risk indicators; Introduces the Risk IT framework and the process model that includes risk governance, risk evaluation and risk response; Explains how the framework relates to COBIT and how it can help to achieve best practices in IT risk management; Examines the implementation and operational issues of the framework; Explores how to integrate IT risk management into an enterprise wide risk management program, establish and maintain a common risk view and make risk-aware business decisions; and Elaborates on how to maintain an operational risk profile, assess and respond to risk, as well as how to collect event data, monitor risk and report exposures and opportunities. Workshop Objectives: Participants will understand and learn: The nature of IT risk and apply it to their own organization; The key principles of IT risk management; How the Risk IT process model can help to manage IT risk;
  • 2. How to implement IT risk management using the practical guidance and techniques in the Risk IT Practitioners Guide; and How to apply risk management principles through practical case studies. Instructor Biography: Brian Barnier brings a unique perspective to business-IT management. With a split career between “the business” and IT, he works to bridge two sets of needs to get greater business benefits from IT. He also has a unique vantage point because of his experience in practical projects, best practices committees, research and teaching professional education across industries and countries. His research on “what works” in risk management with a co-author at MIT Sloan CISR has been published in several publications, most recently the ISACA Journal. In 2009, he presented to over 1000 people in live events and nearly as many in webinars. In addition to writing widely in various business and IT management publications, he serves on the editorial board for EDPACS. He is currently with ValueBridge Advisors and previously was with IBM, Lucent and AT&T. Brian is a member of the ISACA’s IT Enterprise Risk Management Task Force that created the Risk IT Framework. He chairs the ISACA IT-GRC Conference Program Committee; writes for the ISACA Journal, COBIT Focus, and chapter newsletters; and serves on ISACA’s CACS Task Force, IT Governance Forum Core Faculty and Professional Influence and Advocacy Committee. Registration: To register for this event, please have your contact information and membership number ready before calling the ICABC Professional Development Department at 604-681-3264 or email pdreg@ica.bc.ca. Please note that the course fee must be paid in full at the time of registration by VISA, MC, or AMEX. We will accept cancellations up to 14 days before the session. A $25 administration fee will apply. No refund after April 1st. About ISACA: Founded in 1867, ISACA has more than 86,000 members in more than 160 countries. ISACA (www.isaca.org) is a pace-setting global organization for information governance, control, security and audit professionals. Its IS auditing and IS control standards are followed by practitioners worldwide. Its research pinpoints professional issues challenging its constituents. Its Certified Information Systems Auditor (CISA) certification is recognized globally and has been earned by more than 70,000 professionals since inception. The Certified Information Security Manager (CISM) certification uniquely targets the information security management audience and has been earned by more than 12,500 professionals. The Certified in the Governance of Enterprise IT (CGEIT) designation promotes the advancement of professionals who wish to be recognized for their IT governance-related experience and knowledge and has been earned by more than 4,000 professionals. The new Certified in Risk and Information Systems Control (CRISC) designation is for IT professionals who identify and manage risks through the development, implementation and maintenance of information systems controls. ISACA also publishes a leading technical journal in the information control field, the ISACA Journal. It hosts a series of international conferences focusing on both technical and managerial topics pertinent to the IS assurance, control, security and IT governance professions. Together, ISACA and its affiliated IT Governance Institute (ITGI) lead the information technology control community and serve its practitioners by providing the elements needed by IT professionals in an ever-changing worldwide environment. Please visit our chapter web-site: www.isaca-vancouver.org