News And Announcements 


Student Application

Are you considering an Information Technology (IT) related career? Joining ISACA will open the door to opportunities in a wide range of fields like security, audit, assurance, risk, privacy, compliance and many more!

Student application


ISACA - Charlotte Chapter - Cyber Security Conference (8 CPE)11/15/2017 12:04 PM

Cyber Security Conference

Presented by ISACA Charlotte Chapter on Tuesday, December 5, 2017

Location:  The Great Wolf Lodge, 10175 Weddington Road, Concord, NC 28027

8:00 – Registration / Breakfast / Networking

8:25 – Welcome & Announcements

8:30 – First Presenter Starts

  • “You Are a Cyber Target” & “Biometric Cyber Exposure”

    Mike Muscatell

    What’s one of the most powerful and secure methods of identity access control? Your own DNA, of course. But what happens if someone steals this information? Imagine someone using your stolen fingerprints to access your bank accounts – or worse, your organization’s treasure trove of data? After all, recovering a stolen fingerprint is substantially tougher than a password. In this session, Mike Muscatell shows through a series of live demonstrations just how easy it is to steal this information. He then shares how to calculate your personal and business bio-metric risk and, more importantly, how to reduce it.  Question to be asked is “What are my Bio-metric Cyber Exposures @home and @work?”

- Understanding personal and business bio-metric risk

- Reduce cyber exposure factors

- Establishing a heightened sense of Cyber Situational Awareness

  • Building an Effective Cyber Security Strategy

  Brian Wrozek, Managing Executive Director, Executive Advisory, Office of the CISO, Optiv

  This presentation provides leading practices to articulate to executives the case for action and appropriate practical approaches to crafting an effective cyber-security strategic program.


  • Bringing Order into Chaos – A Structured Framework for Cloud Workload Security –

    Rafel Los, Managing Director of Research and Development, Optiv

    This conversation presents a peer-reviewed model Optiv uses to help drive business value, adoption, and consistency in cloud security programs in the enterprise.


  • Have Your Cake and Eat It Too…Running a Cloud-Powered Business With Greater Security –

    John Turner, Senior Director, Cloud Security

    While cloud is now the dominant mode of delivery for new applications, few organizations are able to migrate all their apps. The reality is that most companies aren’t starting from scratch, they must support legacy on-premises and colocation models as well as public and private cloud.


  • NYS DFS Cybersecurity Requirements

    Stephen W. Head – Experis Finance

    Participants will gain an understanding of the key requirements that comprise the NYS DFS Cybersecurity Regulation (23 NYCRR Part 500).

    We will also review current best practices for becoming compliant and preparing to certify compliance for the first time.

  • Vaco – Panel 

 Explore the 5 current trends of cyberattacks in 2017 and their impact by :

  1.  Analyzing recent cyberattacks and identify theft schemes

  2. Discussing effective strategic defenses for mitigation risks

 Explore the legal and financial risks of a cyberattack/breach

  1. Legal considerations

  2. Financial liability 

  3. Technology considerations

 4:30 – Event Adjourns

For more information, please click on the following URL:

Job Opening - BlueCross BlueShield South Carolina, Columbia, SC11/7/2017 4:51 PM

BlueCross BlueShield South Carolina, Columbia, SC

Information Systems Auditor II – Full Time Position

Currently recruiting for an experienced Information Systems Auditor to perform independent, objective, information systems audits and consulting services.  This position provides management at all levels with objective evaluations, appraisals, and recommendations concerning the areas reviewed.

Responsibilities of Job:

o   Conduct timely information systems audits and draft written reports upon completion of each audit assignment.

o   Monitor and evaluate information system projects from a risk and control perspective. Make recommendations to mitigate risks and improve internal controls.

o   Review disaster recovery plans for all computing environments to ensure they are up to date and functional. Monitor and test the completeness and accuracy of the plans.

o   Assist external auditors in completing their audit tasks as a means of maximizing audit efficiency.

Minimum Requirements:

o   Education: Bachelor’s Degree in Accounting, Computer Science or related field – or one or more of the following certifications:

Certified Information Systems Auditor (CISA)

Certified Information Security Manager (CISM)

Certified in Risk and Information Systems Control (CRISC)

Certified Information Systems Security Professional (CISSP)

o   Work Experience: 3 Years Information Systems auditing experience. 1 Year Programming and/or system analysis may substitute for 1 year auditing experience.

o   Skills and Abilities: Knowledge of information system auditing standards and generally accepted accounting principles. Ability to identify risks and evaluate internal controls in an information systems environment. Knowledge of disaster recovery planning objectives, methods, and concepts. Ability to communicate effectively both verbally and in written form. Strong interpersonal skills and the ability to work professionally with persons at all levels. Ability to handle sensitive matters on a confidential basis. Ability to persuade, negotiate or influence. Excellent analytical or critical thinking and problem solving capabilities.

o   Software and Other Tools: Microsoft Windows, Word, Excel, mainframe systems, and standard office equipment.

Preferred Requirements:

o   Education: Master’s Degree - any related field

o   Work Experience: 5 Years Information Systems auditing experience.

o   Software and Other Tools: Knowledge of Microsoft Access. Knowledge of other database software such as ACL and automated working paper systems.

o   Licenses and Certificates: Certified Internal Auditor (CIA)

Work Environment:  Typical office environment. Frequent travel required.

If interested, please contact Brian Harris (

ISACA Charlotte Chapter - 2018 & 2019 Schedule9/21/2017 10:46 AM

Please note the ISACA Charlotte Program Dates schedule for 2018-2019.



Quarter 1 Program Day - 03.13.2018

Quarter 2 Program Day - 06.05.2018

Quarter 3 Program Day - 09.11.2018

Annual ISACA/IIA Joint Meeting – 10.16.2018

Quarter 4 Program Day - 12.04.2018



Quarter 1 Program Day - 03.12.2019

Quarter 2 Program Day - 06.04.2019

Quarter 3 Program Day - 09.10.2019

Annual ISACA/IIA Joint Meeting – 10.15.2019

Quarter 4 Program Day - 12.03.2019


2017 ISACA Charlotte Chapter CPE Events 3/23/2016 3:23 PM



03.14.17 - Joint ISACA Charlotte/Raleigh + IIA Charlotte Event in Greensboro, NC Area - 8 CPEs

04.19.2017 - Expanding Your IT Audit Horizon

06.06.17 - Annual General Meeting and June Full Day Event - 8 CPEs

09.12.17 - Topic(s) TBD - 8 CPEs

10.17.17 - ISACA/IIA Joint Meeting

12.05.17 - 5th Annual Cyber Security Conference - 8 CPEs