ISACA Houston Menu

Home

Calendar

Training

Bookstore

News

Newsletter

Membership

Board of Directors

Job Postings

Certifications

Chapter By-Laws

ISACA ®

Professional   Resources

IT Governance

Links

Site Policies

About Us

Contact Us

 

Awards

International Award Winner - Outstanding Chapter Website 2007
2007 Seal

International Award Winner - Outstanding Chapter Website 2005

International Award Winner - Outstanding Chapter Website 2004

International Award Winner - Outstanding Chapter Website 2003

Links

ISACA International

ISACA Austin

ISACA Dallas/North Tx

ISACA San Antonio

Other ISACA Chapters

More Useful Links

 

Previous Meetings Presentations

Date Presentation
June 2015

“Athem Breach Restrospective"    View/Download Presentation

Presented by:  Jim Goldsmith, HP

“Leadership Laws"    View/Download Presentation

Presented by:  Rudy Lopez, International Speaker, Coach, and Trainer

Sept 2014

“Security Modeling, Does it Really Provide the X's and O's? "    View/Download Presentation

Presented by:  Fred Charlot, Principal, Berkeley Research Group, LLC

“Black Hat/DEFCON 2014 Security Conferences Debrief"            View/Download Presentation

Presented by:  Richard Peters, Principal, Berkeley Research Group, LLC

June 2014

“Next Generation Security "    View/Download Presentation

Presented by:  Philip Hurlston, Major Accounts Manager,  Infraguard Oil and Gas Sector Chief, Palo Alto Networks

Jan 2014

Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements "    View/Download Presentation

Presented by:  Peter Thomas, CTO Blue Lance

Nov 2013

“2013 Update, COSO Internal Control Integrated Framework"    View/Download Presentation

Presented by:  David Barton, Principal, UHY Advisors, LLP

“Cloud Computing Update"    View/Download Presentation

Presented by:  Ken E. Stavinoha, Ph.D, Solutions Architect, Cisco Systems

Sept 2013

“Texas Medical Privacy Law, What You Need to Know"    View/Download Presentation

Presented by: Ricky Link, CISA, CISSP, QSA, HITRUST, Coalfire Systems

May 2013

One-Day Gratis Seminar

“Lessons from FedRamp"    View/Download Presentation

Presented by:  Ken E. Stavinoha, Ph.D

"APTs, (ISACA Research Paper with additional information)" View/Download  Presentation      ISACA Study
Presented by:  Kent Gee

"How to Detect Dishonesty & Deception, A Journey in Professional Interview Techniques" View/Download Presentation

Presented by: John Bovaird

 

"Creating A Secure Desktop"  View/Download Presentation

Presented by: Derek Melber

Michael Farnum - Presentation not provided

Password Hacking - Mario Chiock - Not provided

Samuel Sutton -Not released

April 2013

“Modern Malware, Modern Defenses and Protection"    View/Download Presentation

Presented by: Mario Chiock

February 2013

“Continuous Assurance Best Practices:Laying the Roadmap to Success "    View/Download Presentation

“The Future of Audit Specific Software"    View/Download Presentation

Presented by: Porter Broyles, Harris County Auditor's Office

January 2013

“Survey of DHS Threats "    View/Download Presentation

Presented by: Mark Sloan, Harris County Emergency Management Coordinator

August 2012

“The Insider's View to Insider Threats"    View/Download Presentation

“The Anatomy and Security of an Anonymous Operation"    View/Download Presentation

 

Presented by: Terry Ray, VP Worldwide Sales Engineering, IMPERVA

June 2012

Presented by: Derek Melber, MVP, MSCE, Braincore.net

These presentations will only be available through the end of August 2012

"Creating a Secure Desktop"

http://www.isacahouston.org/documents/CreatingaSecuredesktop.pdf

"Secrutiy Settings to Audit for Active Directory and How to Correctly Audit Them"

http://www.isacahouston.org/documents/Top_5_Security_Settings_To_Auditfor_Active_Directory_and_How_to_Correctly_audit_them.pdf

May 2012

One-Day  Seminar

“Emerging Trends Affecting Cyber Security"    View/Download Presentation

Presented by:  Dr. Denise Chattam Walker, CSO Chief Emergency Management Officer, Lone Star College System

“Trends in Cyber Security Laws and Software Audits"

http://www.texascomputerlaw.com/presentations/2012_CyberSecurity_Trends.pdf

Presented by:  Ronald Chichester, P.C. at www.texascomputerlaw.com

April 2012

“COBIT5 - an ISACA Framework "   View/Download Presentation   

Presented by:  Ken Vander Wal, CISA, CPA, ISACA International President

Update on Cloud Computing Research  by Ken Stavinoha    View/Download Presentation

January 2012

Information Privacy and Desktop Security

View/Download Presentation    View/Download Workshop Template

Presented by:  Ken Stavinoha

December 2011

One-Day Seminar

“Managing Strategic Risk "

View/Download Presentation    View/Download Handout   View/Download Manuscript

Presented by:  Paul F. Feifer, Ph. D.

“Overview of SAP Security "           View/Download Presentation

Presented by:  Karim Momin, CISA, CISM, CGEIT, CRISC, CEH, Horn Solutions, Inc.

July 2011

“Social Media Real Life Experiences "

View/Download Presentation

Presented by:  Phillip Schreiber, Holland and Knight `

May 2011

“Excel at Managing Spreadsheet Risk"

View/Download Presentation

View/Download Reference Material and Tools Mentioned

Presented by:  Evan Campbell and Jordan Reed (Protiviti)

March 2011

“Auditing Microsoft Exchange ”

View/Download Presentation

Presented by:  Brian Thomas (Weaver), Shohn Trojacek (PivotPoint Solutions)

February 2011

“Cyber Security Threat Landscape – Prepare for the Worst”

View/Download Presentation

“NERC CIP Standards Update – Are You Ready for the $1 Million per day fines"

View/Download Presentation

Both Presented by:  Jonathan Pollet (Red Tiger Security, USA)

 

“Information Systems Development Performance in the 21st Century”

View/Download Presentation

Presented by:  Dr. Keith Wright (U of H Downtown)

January 2011

“Information Privacy Primer”

Presented by:  Ken Stavinoha, Doctorial Candidate, University of Fairfax
View/Download Presentation

November 2010

“Beyond Compliance:  GRC, Audit & Security”

Presented by:  Ulf Mattson, CISA, NSA-IAM, CTO, Protegrity
View/Download Presentation

 

Brief on Cloud Computing Research, by Ken Stavinoha

View/Download Article

July 2010

"Using ValIT  2.0 to 'Deliver on the Promise'"

View/Download Presentation

(The PowerPoint version of the above is available on the ISACA International website for all members to use and speak from).

"The Impact and Opportunity of Compliance and IT Governance"

View/Download Presentation

Presented by:  Robert Stroud, CGEIT

Vice President, ISACA International

 

June 2010

"Introduction to Auditing Networks"

Presented by:  Harshul Joshi

Director, CBIZ MHM, LLC

View/Download Presentation


April 2010

"Branding Yourself"

Presented by:  Michelle Malthan, CSP

Lander International LLC

View/Download Presentation

January 2010

"Application Security Audit"

Presented by:  Mark R. Trinidad

ASG - Application Security, Halliburton

View/Download Presentation

November 2009

“Is Your IT Audit Strategy Properly Focused”

Presented by:  Matt  Clinger

Priceaterhouse Coopers

View/Download Presentation

 

“That 4th Quarter Security Review”

Presented by:  Tom Fluker and Roy Wood

View/Download Presentation

February 2009

"Anatomy of a Database Attack" and "Grounding Security & Compliance Where The Data Lives"

Presented by:  Mark R. Trinidad

Product Manager, Application Security, Inc

View/Download First Presentation

View/Download Second Presentation

January 2009

"Rootkits 101"

View/Download Presentation

"Combating Rogue Applications from Malware to Unauthorized Applications"

View/Download Presentation

Presented by:  Wes Miller

Director of Product Management, CoreTrace Corporation

August 2008

“PCI Compliance Can Make Your Network Stronger and Fitter "

Presented by:  Brent Harman

Manager, Systems Consultant Team West, NetPro Computing, Inc.

View/Download Presentation

After Meeting Presentation:   "Where Is Your Audit Trail "

Presented by:  Terry Kraft

Regional Account Manager, NetPro Computing, Inc.

View/Download Presentation

June 2008

“Website Securty Trends and Statistics"

Presented by: Trey Ford

Director of Solutions Architecture, WhiteHat Security

View/Download Presentation

After Meeting Presentation:   "Understandingthe new PCI 6.6 Standards"

View/Download Presentation

May 2008

“ GRC – What IT Management Needs to Know ”

Presented by: Norman Comstock, CIA, CISA, CISSP

Managing Director of UHY Advisors TX. LLC.

View/Download Both Presentations

After Meeting Presentation:  "  What's In YOUR GRC?"

Also Presented by:   Norman Comstock

April 2008

“What CAE’s should Expect from IT Audit Professionals”

Presented by: Steve Goepfert, CIA, CPA

Staff Vice President Internal Audit (CAE

Continental Airlines, Inc.

View/Download Presentation

After Meeting Presentation:  “Maximizing the Rewards of Fraud Detection"

Also Presented by: Steve Goepfert

February 2008

"Mitigating the Insider Threatt"

Presented by: Paul Williams, MCSE, IAM, IEM

Chief Technology Officer,  Gray Hat Research Corp.

View/Download Presentation

After Meeting Presentation: "Better Audits Through Improved Data Collection Analysis "

Also Presented by: Paul Williams

View/Download Presentation

January 2008

"Idenitty and Access Management"

Presented by: Adnan Amjad

Partner, Deloitte and Touche, LLP
View/Download Report

December 2007

"This is Not Your Father's Incident Handling Process"

Presented by: James Shewmake

Certified SANS Instructor

View Presentation

November 2007

"Regulatory Enforcement:  A Shifting Threat Model "

Presented by: Brandon Dunlap, Director of Research and Mark Adams, Senior Researcher

Brightfly, Inc.

After Meeting Presentation: "Risk Management "

Presented by: Brandon Dunlap, Director of Research and Mark Adams, Senior Researcher

Brightfly, Inc.

View/Download Both Presentations

October 2007

"Auditing Networks and Perimeters "

Presented by: Tanya Baccam

SANS Institute Instructor and Courseware Developer
View/Download Report

After Meeting Presentation: "How to Assess Your Business Continuity Plan"

Presented by:Lillibett Machado,

Principal, Fulvence, USA

View/Download Report

May 2007

"Transaction Monitoring and Auditing "

Presented by:John Harrison
Managing Director,
Protivi, Inc

View/Download Report

January 2007

"Current Trends in IT Risk Management"

Presented by: Chris VernonCISSP, CEH, MCSE
Manager, Security and Privacy Services
Deloitte & Touche LLP

View/Download Report

October 2006

"You,  Your Career, and the Current Job Market"

Presented by: John Barth, Senior Account Manager

JDA Professional Services, Inc.

View/Download Report

September 2006

"What Auditors Can Learn From COSO's Guidance for Smaller Public Companies"

Presented by: Charla Parker-Thompson, Firm Director

Business Process & Controls/Financial Systems Integrity

Sirius Solutions, L.L.L.P

View/Download Report

August 2006

"Continuous Controls Monitoring"

Understand Impact of Continuous Controls Monitoring (CCM) on the Information Systems Audit community

Presented by:  Sean Chari

Auxis, Inc.

View/Download Report

July 2006

"COBIT 4.0 Overview"

Presented by:  Ric Gass, Director, IT Audit

Beacon Alliance

View/Download Report

View/Download Test Your Knowledge

June 2006

"Service Oriented Architecture – What It Means To IT"

Presented by:  John Lindsey, Vice-President of Business Development

MetaSecure Corporation

April 2006

"Life as an Auditor in a Post Sarbanes World"

Presented by:  Rick Link, CISA, CISSP, CISM 

Managing Director Technology Risk Management, Enterprise Governance Practice

Horn Murdock Cole

March 2006

"I'm Not Only An Auditor, I'm Also A Patient"

Presented by:  David Finn, CISA, CISM

Vice President and Chief Information Officer of Information Services at Texas Children's Hospital

Jana Chvatal, CHPS, CIPP, CISA

Coordinator of Privacy Practices at Texas Children's Hospital

February 2006

"Forensic Investigations"

Presented by:  Matt Binder
Director - Corporate Security, First Data Corporation

January 2006  

"Information Security a lesson learned from the
Robert Hanssen FBI Spy Case"


Presented by:  Richard T. Garcia

Regional Security Advisor for North America for Shell Oil

November 2005

Emerging Compliance Regulations affecting US and International enterprises

Raj Mehta, CPA, CITP, CISA, CISSP
Partner, Security, Deloitte & Touche LLP, Houston

Dharminder Dargan CISSP, CISA, CCNP, CBCP, PMP
Consultant Security Services in Deloitte and Touche LLP, Houston

View/Download the Power Point Presentation

October 2005

Top 10 Risks in Your IT Enterprise

Presented by:  Michael Kinney, CPA, CIA, CMA
Audit Services Practice Director, Horn Murdock Cole

View/Download the Power Point Presentation

September 2005

Making a Difference in IT Emerging Issues and Solutions

Presented by:  Carolyn J. Newman
President, Audimation Services, Inc.

View/Download the Power Point Presentation

August 2005

A Compliance Culture is not Acceptable—Operational Risk Management is the Next Big Thing for Optimizing Business Performance

Presented by:  David Kramer
South-Central Regional Manager, Consul Risk Management

View/Download the Power Point Presentation

July 2005

Achieve Risk Optimization with the IT Governance Maturity Model

Presented by:  Lillibett Machado, MBA, CISM, CBCP
VP of Corporate Business Continuity Amegy Bank, N.A.

View/Download the Power Point Presentation

June 2005

Turning Compliance into Opportunity - How to Leverage Regulatory Requirements to Create Other Efficiencies

Presented by:  Karen Kronauge, CIA
Director of policyIQ® Resources Global Professionals

View/Download the Power Point Presentation

May 2005

Trends in ERP and SOX Compliance

Presented by:  Corwin R. Slack, CPA, CMA

View/Download the Power Point Presentation

April 2005

Voice Over Internet Protocol (VoIP): Changing Tomorrow's Communication

Presented by:  Kathleen K. Hanafan, President, Onit Communications, Inc.

View/Download the Power Point Presentation

March 2005

Auditing Cyber Crime

Presented by:  Paul E. Brown
Founder/CEO, CyberEvidence, Inc.

View/Download the Power Point Presentation

February 2005

Professional Certifications: The CISM, CISSP, and MCSE

Presented by:  Bob Janusaitis, CISA, CISM, CBCP
Thomas Moore, Ph.D., EMBA, BCSA, BCSP, CISSP, CISM
Dave Dunn, CISSP, MCSE, MCNE

View/Download the Power Point Presentation

January 2005

Sarbanes Oxley Year 2 IT Controls Compliance

Presented by:  John D. Harrison
Director at Protiviti

View/Download the Power Point Presentation

December 2004

Offshore Outsourcing - Dealing with Compliance Issues

Presented by:  Ken Nguyen, PMP, CISSP, CISM, MCSE
SVP & CTO, Co-Founder, SourceSentry, Inc.

View/Download the Power Point Presentation

November 2004

SOX Miscellaneous and Question & Answers

Presented by:  Raj Mehta, CPA, CITP, CISA, CISSP
Partner, Deloitte & Touche LLP

View/Download the Power Point Presentation

October 2004

Implementing SOX 404: An Advanced Analysis

Presented by: Steve Goepfert, Senior Director Internal Audit, Continental Airlines

View/Download the Power Point Presentation

September 2004

Beyond the IDS - Detecting Anomalous Network Traffic

Presented by: Brendan Hannigan, Q1 Labs, Executive Vice President of Marketing & Product Engineering

View/Download the Power Point Presentation

August 2004

Stories from the Trenches: A Look at Best Practices in Securing  Wireless Networks

Presented by: Jay Chaudhry, AirDefense, Executive Chairman & Co-Founder

View/Download the Power Point Presentation

July 2004

Custom Application Security

Presented by: John B. Dickson, CISSP - Partner, Denim Group, Ltd

View/Download the Power Point Presentation

June 2004

Auditing Today's Telecommunications Services, Assets, and Risks

Presented by: Montie Grimes, KPMG Director

View/Download the Power Point Presentation

May 2004

An open Discussion on IT Control Objectives for Sarbanes-Oxley

Presented by: Doug Moore, Jefferson Wells International and Christine Chaney, Continental Airlines

View/Download the Power Point Presentation

View/Download the ITGI Document "IT Control Objectives for Sarbanes-Oxley"

April 2004

Symposium on Sarbanes-Oxley 404 IT Requirements

Presented by: Raj Mehta, Deloitte & Touche, LLP and Marcus Wagner, PricewaterhouseCoopers LLP

1) Raj Mehta - View/Download the Power Point Presentation

2) Marcus Wagner - View/Download the Power Point Presentation

March 2004

Pitfalls of Best Practices IT Auditing

Presented by: Paul Williams, MCSE, NSA IAM of Gray Hat Research Corp.

February 2004

IT Governance and Planning

Presented by: Tom Franklin, Director of Energy Consulting for EnFORM Consulting, L.P.

January 2004

Challenges, Strategies and Case Studies of Data Storage

Presented by: Seth Fagelman, VP CyrusOne

December 2003

The Role of Education in the Future of IT Audit" and "Preparing For the 2004 CISA Exam

Presented by: Dr. William Staples, President, Univ. of Houston-Clear Lake, and Bob Janusaitis, Certified Information Systems Auditor (CISA) Coordinator for the ISACA Houston Chapter

November 2003

Auditor Liability

Presented by: Joe Dryer, Ph.D., J.D., CEO of Breakaway Systems, LLC

View/Download the Power Point Presentation

October 2003

Wireless Hacking Demonstration

Presented by: Jason Wylie, Sentigy, Inc

View/Download the Power Point Presentation

September 2003

Security Risks Associated with the Offshore Outsourcing Explosion.

Presented by: Mary Hall, KPMG, Information Risk Management

View/Download the Power Point Presentation

August 2003

Introduction to Windows 2000 Security

Presented by: Raju Mehta and Denis Tiouttchev, Deloitte & Touche, LLP

View/Download the Power Point Presentation

July 2003

War Stories, Investigative Reporting, and Hassles with Government.

Presented by: Wayne Dolcefino, ABC Channel 13 News

June 2003

Why New Systems Fail

Presented by: Robert Billingsley, County Auditor, Galveston County

View/Download the Power Point Presentation

May 2003

Approaches to Solving IT Issues

Presented by: Conni Lehmann and Cindy Heagy, University of Houston - Clear Lake

April 2003

Section 404 of the Sarbanes-Oxley Act: What is Happening

Presented by: Lisa Anderson, Managing Director, Jefferson Wells Houston Office

View/Download the Power Point Presentation

March 2003

How to Make Known Vulnerabilities Disappear, including the 7 layers of security that Bindview recommends.

Presented by: Tom Duke of Bindview

View/Download the Power Point Presentation

February 2003

Computer Forensics and Computer Systems

Presented by: Ed Crowley, University of Houston

View/Download the Power Point Presentation

January 2003

Untitled Presentation

Presented by: Derek Lamberth, Blue Lance

December 2002

Tips for Finding Jobs in the Houston Area in Our Profession

Presented by: Recruiting Professionals Panel

November 2002

Auditing Your Database Environments

Presented by: Greg Davoll

October 2002

Building an Information Security Program

Presented by: Trey Guerin, Network Security Consulting, LLC

September 2002

Southern District of Texas Anti-Terrorism Taskforce Overview

Presented by: Abe Martinez, Assistant US Attorney; and Gary Cobe, Assistant US Attorney

August 2002

Digital Rights Management (DRM) vs Network Access Control

Presented by: Jim Donatelli, Authentica, Inc.

July 2002

Corporate Governance

Presented by: Andy Willis and Michael Porier, Protiviti

View/Download the Power Point Presentation

June 2002

Web Application Security

Presented by: Steve Petit

May 2002

Oracle Database Security and Audit Approach

Presented by: Raj Mehta, Deloitte & Touche

April 2002

FBI Investigations

Presented by: Geoff Binney