Date |
Presentation |
June 2015 |
“Athem Breach Restrospective" View/Download Presentation
Presented by: Jim Goldsmith, HP
“Leadership Laws" View/Download Presentation
Presented by: Rudy Lopez, International Speaker, Coach, and Trainer |
Sept 2014 |
“Security Modeling, Does it Really Provide the X's and O's? " View/Download Presentation
Presented by: Fred Charlot, Principal, Berkeley Research Group, LLC
“Black Hat/DEFCON 2014 Security Conferences Debrief" View/Download Presentation
Presented by: Richard Peters, Principal, Berkeley Research Group, LLC |
June 2014 |
“Next Generation Security " View/Download Presentation
Presented by: Philip Hurlston, Major Accounts Manager, Infraguard Oil and Gas Sector Chief, Palo Alto Networks |
Jan 2014 |
“ Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements " View/Download Presentation
Presented by: Peter Thomas, CTO Blue Lance |
Nov 2013 |
“2013 Update, COSO Internal Control Integrated Framework" View/Download Presentation
Presented by: David Barton, Principal, UHY Advisors, LLP
“Cloud Computing Update" View/Download Presentation
Presented by: Ken E. Stavinoha, Ph.D, Solutions Architect, Cisco Systems |
Sept 2013 |
“Texas Medical Privacy Law, What You Need to Know" View/Download Presentation
Presented by: Ricky Link, CISA, CISSP, QSA, HITRUST, Coalfire Systems |
May 2013 |
One-Day Gratis Seminar
“Lessons from FedRamp" View/Download Presentation
Presented by: Ken E. Stavinoha, Ph.D
"APTs, (ISACA Research Paper with additional information)" View/Download Presentation ISACA Study
Presented by: Kent Gee
"How to Detect Dishonesty & Deception, A Journey in Professional Interview Techniques" View/Download Presentation
Presented by: John Bovaird
"Creating A Secure Desktop" View/Download Presentation
Presented by: Derek Melber
Michael Farnum - Presentation not provided
Password Hacking - Mario Chiock - Not provided
Samuel Sutton -Not released |
April 2013 |
“Modern Malware, Modern Defenses and Protection" View/Download Presentation
Presented by: Mario Chiock |
February 2013 |
“Continuous Assurance Best Practices:Laying the Roadmap to Success " View/Download Presentation
“The Future of Audit Specific Software" View/Download Presentation
Presented by: Porter Broyles, Harris County Auditor's Office |
January 2013 |
“Survey of DHS Threats " View/Download Presentation
Presented by: Mark Sloan, Harris County Emergency Management Coordinator |
August 2012 |
“The Insider's View to Insider Threats" View/Download Presentation
“The Anatomy and Security of an Anonymous Operation" View/Download Presentation
Presented by: Terry Ray, VP Worldwide Sales Engineering, IMPERVA |
June 2012 |
Presented by: Derek Melber, MVP, MSCE, Braincore.net
These presentations will only be available through the end of August 2012
"Creating a Secure Desktop"
http://www.isacahouston.org/documents/CreatingaSecuredesktop.pdf
"Secrutiy Settings to Audit for Active Directory and How to Correctly Audit Them"
http://www.isacahouston.org/documents/Top_5_Security_Settings_To_Auditfor_Active_Directory_and_How_to_Correctly_audit_them.pdf
|
May 2012
One-Day Seminar |
“Emerging Trends Affecting Cyber Security" View/Download Presentation
Presented by: Dr. Denise Chattam Walker, CSO Chief Emergency Management Officer, Lone Star College System
“Trends in Cyber Security Laws and Software Audits"
http://www.texascomputerlaw.com/presentations/2012_CyberSecurity_Trends.pdf
Presented by: Ronald Chichester, P.C. at www.texascomputerlaw.com
|
April 2012 |
“COBIT5 - an ISACA Framework " View/Download Presentation
Presented by: Ken Vander Wal, CISA, CPA, ISACA International President
Update on Cloud Computing Research by Ken Stavinoha View/Download Presentation |
January 2012 |
Information Privacy and Desktop Security
View/Download Presentation View/Download Workshop Template
Presented by: Ken Stavinoha |
December 2011
One-Day Seminar |
“Managing Strategic Risk "
View/Download Presentation View/Download Handout View/Download Manuscript
Presented by: Paul F. Feifer, Ph. D.
“Overview of SAP Security " View/Download Presentation
Presented by: Karim Momin, CISA, CISM, CGEIT, CRISC, CEH, Horn Solutions, Inc. |
July 2011 |
“Social Media Real Life Experiences "
View/Download Presentation
Presented by: Phillip Schreiber, Holland and Knight ` |
May 2011 |
“Excel at Managing Spreadsheet Risk"
View/Download Presentation
View/Download Reference Material and Tools Mentioned
Presented by: Evan Campbell and Jordan Reed (Protiviti) |
March 2011 |
“Auditing Microsoft Exchange ”
View/Download Presentation
Presented by: Brian Thomas (Weaver), Shohn Trojacek (PivotPoint Solutions) |
February 2011 |
“Cyber Security Threat Landscape – Prepare for the Worst”
View/Download Presentation
“NERC CIP Standards Update – Are You Ready for the $1 Million per day fines"
View/Download Presentation
Both Presented by: Jonathan Pollet (Red Tiger Security, USA)
“Information Systems Development Performance in the 21st Century”
View/Download Presentation
Presented by: Dr. Keith Wright (U of H Downtown) |
January 2011 |
“Information Privacy Primer”
Presented by: Ken Stavinoha, Doctorial Candidate, University of Fairfax
View/Download Presentation
|
November 2010 |
“Beyond Compliance: GRC, Audit & Security”
Presented by: Ulf Mattson, CISA, NSA-IAM,
CTO,
Protegrity
View/Download Presentation
Brief on Cloud Computing Research, by Ken Stavinoha
View/Download Article
|
July 2010 |
"Using ValIT 2.0 to 'Deliver on the Promise'"
View/Download Presentation
(The PowerPoint version of the above is available on the ISACA International website for all members to use and speak from).
"The Impact and Opportunity of Compliance and IT Governance"
View/Download Presentation
Presented by: Robert Stroud, CGEIT
Vice President, ISACA International
|
June 2010 |
"Introduction to Auditing Networks"
Presented by: Harshul Joshi
Director,
CBIZ MHM, LLC
View/Download Presentation
|
April 2010 |
"Branding Yourself"
Presented by: Michelle Malthan, CSP
Lander International LLC
View/Download Presentation
|
January 2010 |
"Application Security Audit"
Presented by: Mark R. Trinidad
ASG - Application Security, Halliburton
View/Download Presentation |
November 2009 |
“Is Your IT Audit Strategy Properly Focused”
Presented by: Matt Clinger
Priceaterhouse Coopers
View/Download Presentation
“That 4th Quarter Security Review”
Presented by: Tom Fluker and Roy Wood
View/Download Presentation
|
February 2009 |
"Anatomy of a Database Attack" and "Grounding Security & Compliance Where The Data Lives"
Presented by: Mark R. Trinidad
Product Manager, Application Security, Inc
View/Download First Presentation
View/Download Second Presentation
|
January 2009 |
"Rootkits 101"
View/Download Presentation
"Combating Rogue Applications from Malware to Unauthorized Applications"
View/Download Presentation
Presented by: Wes Miller
Director of Product Management, CoreTrace Corporation |
August 2008 |
“PCI Compliance Can Make Your Network Stronger and Fitter "
Presented by: Brent Harman
Manager, Systems Consultant Team West, NetPro Computing, Inc.
View/Download Presentation
After Meeting Presentation: "Where Is Your Audit Trail "
Presented by: Terry Kraft
Regional Account Manager, NetPro Computing, Inc.
View/Download Presentation |
June 2008 |
“Website Securty Trends and Statistics"
Presented by: Trey Ford
Director of Solutions Architecture, WhiteHat Security
View/Download Presentation
After Meeting Presentation: "Understandingthe new PCI 6.6 Standards"
View/Download Presentation
|
May 2008 |
“ GRC – What IT Management Needs to Know ”
Presented by: Norman Comstock, CIA, CISA, CISSP
Managing Director of UHY Advisors TX. LLC.
View/Download Both Presentations
After Meeting Presentation: " What's In YOUR GRC?"
Also Presented by: Norman Comstock |
April 2008 |
“What CAE’s should Expect from IT Audit Professionals”
Presented by: Steve Goepfert, CIA, CPA
Staff Vice President Internal Audit (CAE,
Continental Airlines, Inc.
View/Download Presentation
After Meeting Presentation: “Maximizing the Rewards of Fraud Detection"
Also Presented by: Steve Goepfert
|
February 2008 |
"Mitigating the Insider Threatt"
Presented by: Paul Williams,
MCSE, IAM, IEM
Chief Technology Officer, Gray Hat Research Corp.
View/Download Presentation
After Meeting Presentation: "Better Audits Through Improved Data Collection Analysis "
Also Presented by: Paul Williams
View/Download Presentation
|
January 2008 |
"Idenitty and Access Management"
Presented by: Adnan Amjad
Partner, Deloitte and Touche, LLP
View/Download Report |
December 2007 |
"This is Not Your Father's Incident Handling Process"
Presented by:
James Shewmake
Certified SANS Instructor
View Presentation |
November 2007 |
"Regulatory Enforcement: A Shifting Threat Model "
Presented by: Brandon Dunlap, Director of Research and Mark Adams, Senior Researcher
Brightfly, Inc.
After Meeting Presentation: "Risk Management "
Presented by: Brandon Dunlap, Director of Research and Mark Adams, Senior Researcher
Brightfly, Inc.
View/Download Both Presentations |
October 2007 |
"Auditing Networks and Perimeters "
Presented by: Tanya Baccam
SANS Institute Instructor and Courseware Developer
View/Download Report
After Meeting Presentation: "How to Assess Your Business Continuity Plan"
Presented by:Lillibett Machado,
Principal, Fulvence, USA
View/Download Report
|
May 2007 |
"Transaction Monitoring and Auditing "
Presented by:John Harrison
Managing Director,
Protivi, Inc
View/Download Report |
January 2007 |
"Current Trends in IT Risk Management"
Presented by: Chris Vernon, CISSP, CEH, MCSE
Manager,
Security and Privacy Services
Deloitte & Touche LLP
View/Download Report
|
October 2006 |
"You, Your Career, and the Current Job Market"
Presented by: John Barth, Senior Account Manager
JDA Professional Services, Inc.
View/Download Report |
September 2006 |
"What Auditors Can Learn From COSO's Guidance for Smaller Public Companies"
Presented by: Charla Parker-Thompson, Firm Director
Business Process & Controls/Financial Systems Integrity
Sirius Solutions, L.L.L.P
View/Download Report |
August 2006 |
"Continuous Controls Monitoring"
Understand Impact of Continuous Controls Monitoring (CCM) on the Information Systems Audit community
Presented by: Sean Chari
Auxis, Inc.
View/Download Report |
July 2006 |
"COBIT 4.0 Overview"
Presented by: Ric Gass, Director, IT Audit
Beacon Alliance
View/Download Report
View/Download Test Your Knowledge |
June 2006 |
"Service Oriented Architecture – What It Means To IT"
Presented by: John Lindsey,
Vice-President of Business Development
MetaSecure Corporation
|
April 2006 |
"Life as an Auditor in a Post Sarbanes World"
Presented by: Rick Link, CISA, CISSP, CISM
Managing Director Technology Risk Management, Enterprise Governance Practice Horn Murdock Cole
|
March 2006 |
"I'm Not Only An Auditor, I'm Also A Patient"
Presented by: David Finn, CISA, CISM
Vice President and Chief Information Officer of Information Services at Texas Children's Hospital Jana Chvatal, CHPS, CIPP, CISA Coordinator of Privacy Practices at Texas Children's Hospital
|
February 2006 |
"Forensic Investigations"
Presented by: Matt Binder
Director - Corporate Security, First Data Corporation
|
January 2006 |
"Information Security a lesson learned from the
Robert Hanssen FBI Spy Case"
Presented by: Richard T. Garcia
Regional Security Advisor for North America for Shell Oil
|
November 2005 |
Emerging Compliance Regulations affecting US and International enterprises
Raj Mehta, CPA, CITP, CISA, CISSP
Partner, Security, Deloitte & Touche LLP, Houston
Dharminder Dargan CISSP, CISA, CCNP, CBCP, PMP
Consultant Security Services in Deloitte and Touche LLP, Houston
View/Download the Power Point Presentation |
October 2005 |
Top 10 Risks in Your IT Enterprise
Presented by: Michael Kinney, CPA, CIA, CMA
Audit Services Practice Director, Horn Murdock Cole
View/Download the Power Point Presentation
|
September 2005 |
Making a Difference in IT Emerging Issues and Solutions
Presented by: Carolyn J. Newman
President, Audimation Services, Inc.
View/Download the Power Point Presentation |
August 2005 |
A Compliance Culture is not Acceptable—Operational Risk Management is the Next Big Thing for Optimizing Business Performance
Presented by: David Kramer
South-Central Regional Manager, Consul Risk Management
View/Download the Power Point Presentation |
July 2005 |
Achieve Risk Optimization with the IT Governance Maturity Model
Presented by: Lillibett Machado, MBA, CISM, CBCP
VP of Corporate Business Continuity Amegy Bank, N.A.
View/Download the Power Point Presentation |
June 2005 |
Turning Compliance into Opportunity - How to Leverage Regulatory Requirements to Create Other Efficiencies
Presented by: Karen Kronauge, CIA
Director of policyIQ® Resources Global Professionals
View/Download the Power Point Presentation |
May 2005 |
Trends in ERP and SOX Compliance
Presented by: Corwin R. Slack, CPA, CMA
View/Download the Power Point Presentation |
April 2005 |
Voice Over Internet Protocol (VoIP): Changing Tomorrow's Communication
Presented by: Kathleen K. Hanafan, President, Onit Communications, Inc.
View/Download the Power Point Presentation |
March 2005 |
Auditing Cyber Crime Presented by: Paul E. Brown
Founder/CEO, CyberEvidence, Inc.
View/Download the Power Point Presentation |
February 2005 |
Professional Certifications: The CISM, CISSP, and MCSE
Presented by: Bob Janusaitis, CISA, CISM, CBCP
Thomas Moore, Ph.D., EMBA, BCSA, BCSP, CISSP, CISM
Dave Dunn, CISSP, MCSE, MCNE
View/Download the Power Point Presentation |
January 2005 |
Sarbanes Oxley Year 2 IT Controls Compliance
Presented by: John D. Harrison
Director at Protiviti
View/Download the Power Point Presentation |
December 2004 |
Offshore Outsourcing - Dealing with Compliance Issues
Presented by: Ken Nguyen, PMP, CISSP, CISM, MCSE
SVP & CTO, Co-Founder, SourceSentry, Inc.
View/Download the Power Point Presentation |
November 2004 |
SOX Miscellaneous and Question & Answers
Presented by: Raj Mehta, CPA, CITP, CISA, CISSP
Partner, Deloitte & Touche LLP
View/Download the Power Point Presentation |
October 2004 |
Implementing SOX 404: An Advanced Analysis
Presented by: Steve Goepfert, Senior Director Internal Audit, Continental Airlines
View/Download the Power Point Presentation |
September 2004 |
Beyond the IDS - Detecting Anomalous Network Traffic
Presented by: Brendan Hannigan, Q1 Labs, Executive Vice President of Marketing & Product Engineering
View/Download the Power Point Presentation |
August 2004 |
Stories from the Trenches: A Look at Best Practices in Securing Wireless Networks
Presented by: Jay Chaudhry, AirDefense, Executive Chairman & Co-Founder
View/Download the Power Point Presentation |
July 2004 |
Custom Application Security
Presented by: John B. Dickson, CISSP - Partner, Denim Group, Ltd
View/Download the Power Point Presentation |
June 2004 |
Auditing Today's Telecommunications Services, Assets, and Risks
Presented by: Montie Grimes, KPMG Director
View/Download the Power Point Presentation |
May 2004 |
An open Discussion on IT Control Objectives for Sarbanes-Oxley
Presented by: Doug Moore, Jefferson Wells International and Christine Chaney, Continental Airlines
View/Download the Power Point Presentation
View/Download the ITGI Document "IT Control Objectives for Sarbanes-Oxley" |
April 2004 |
Symposium on Sarbanes-Oxley 404 IT Requirements
Presented by: Raj Mehta, Deloitte & Touche, LLP and Marcus Wagner, PricewaterhouseCoopers LLP
1) Raj Mehta - View/Download the Power Point Presentation
2) Marcus Wagner - View/Download the Power Point Presentation |
March 2004 |
Pitfalls of Best Practices IT Auditing
Presented by: Paul Williams, MCSE, NSA IAM of Gray Hat Research Corp. |
February 2004 |
IT Governance and Planning
Presented by: Tom Franklin, Director of Energy Consulting for EnFORM Consulting, L.P. |
January 2004 |
Challenges, Strategies and Case Studies of Data Storage
Presented by: Seth Fagelman, VP CyrusOne |
December 2003 |
The Role of Education in the Future of IT Audit" and "Preparing For the 2004 CISA Exam
Presented by: Dr. William Staples, President, Univ. of Houston-Clear Lake, and Bob Janusaitis, Certified Information Systems Auditor (CISA) Coordinator for the ISACA Houston Chapter |
November 2003 |
Auditor Liability
Presented by: Joe Dryer, Ph.D., J.D., CEO of Breakaway Systems, LLC
View/Download the Power Point Presentation |
October 2003 |
Wireless Hacking Demonstration
Presented by: Jason Wylie, Sentigy, Inc
View/Download the Power Point Presentation |
September 2003 |
Security Risks Associated with the Offshore Outsourcing Explosion.
Presented by: Mary Hall, KPMG, Information Risk Management
View/Download the Power Point Presentation |
August 2003 |
Introduction to Windows 2000 Security
Presented by: Raju Mehta and Denis Tiouttchev, Deloitte & Touche, LLP
View/Download the Power Point Presentation |
July 2003 |
War Stories, Investigative Reporting, and Hassles with Government.
Presented by: Wayne Dolcefino, ABC Channel 13 News |
June 2003 |
Why New Systems Fail
Presented by: Robert Billingsley, County Auditor, Galveston County
View/Download the Power Point Presentation |
May 2003 |
Approaches to Solving IT Issues
Presented by: Conni Lehmann and Cindy Heagy, University of Houston - Clear Lake |
April 2003 |
Section 404 of the Sarbanes-Oxley Act: What is Happening
Presented by: Lisa Anderson, Managing Director, Jefferson Wells Houston Office
View/Download the Power Point Presentation |
March 2003 |
How to Make Known Vulnerabilities Disappear, including the 7 layers of security that Bindview recommends.
Presented by: Tom Duke of Bindview
View/Download the Power Point Presentation |
February 2003 |
Computer Forensics and Computer Systems
Presented by: Ed Crowley, University of Houston
View/Download the Power Point Presentation |
January 2003 |
Untitled Presentation
Presented by: Derek Lamberth, Blue Lance |
December 2002 |
Tips for Finding Jobs in the Houston Area in Our Profession
Presented by: Recruiting Professionals Panel |
November 2002 |
Auditing Your Database Environments
Presented by: Greg Davoll |
October 2002 |
Building an Information Security Program
Presented by: Trey Guerin, Network Security Consulting, LLC |
September 2002 |
Southern District of Texas Anti-Terrorism Taskforce Overview
Presented by: Abe Martinez, Assistant US Attorney; and Gary Cobe, Assistant US Attorney |
August 2002 |
Digital Rights Management (DRM) vs Network Access Control
Presented by: Jim Donatelli, Authentica, Inc. |
July 2002 |
Corporate Governance
Presented by: Andy Willis and Michael Porier, Protiviti
View/Download the Power Point Presentation |
June 2002 |
Web Application Security
Presented by: Steve Petit |
May 2002 |
Oracle Database Security and Audit Approach
Presented by: Raj Mehta, Deloitte & Touche |
April 2002 |
FBI Investigations
Presented by: Geoff Binney |