2012 EuroCACS / ISRM 

Browse All of Our Events »

Two Premier Conferences in One Great City!

Now co-located, ISACA’s CACS and ISRM conferences offer audit, risk and security professionals the opportunity to build a custom schedule across a spectrum of topics including:

  • IT risk-based audit programmes and tools
  • Privacy and data protection issues
  • Top IT audit and security issues
  • IT risk and exposure management

Experts from diverse sectors and geographies present case studies and lessons that you can apply to your enterprise. Network with colleagues, share experiences and gain insights on today’s security, risk and assurance challenges.

Registration for the 2012 EuroCACS / ISRM Conference is Open. Please register on site at the Hilton Munich Park Hotel. If you have any questions, please contact ISACA's Conference Department or +1.847.660.5585.

Why Attend EuroCACS / ISRM?

Unique learning experience

Create a customised learning experience across more than 40 sessions focused on security, risk and assurance.

Fresh content in a multitude of formats

2012 EuroCACS / ISRM features a variety of delivery styles including interactive discussion, hands-on participation and thoughtfully selected case studies from a number of industries.

Engaging networking opportunities

EuroCACS / ISRM attendees have the opportunity to expand their professional network by exchanging with like-minded audit, risk and security professionals.

Sharpen your skills

Gain expertise and earn valuable CPEs. This highly interactive event provides attendees the opportunity to interact with speakers and gain insights from peers on today’s leading IT-related topics.



Stay in the heart of the conference action at a hotel specially discounted for ISACA attendees.

Hilton Munich Park Hotel
Am Tucherpark 7
80538 Munich
Phone: +49.(0)89.38450
Reservation Link: www.hilton.com

Guest Room Rate: 159 Euros (inclusive of VAT)
Room rates based on availability
Guest Room Rate Cut-Off Date: 6 August 2012

Queen room, Hilton Munich Park Hotel

41 Hours
Earn up to 41 CPE Hours!

 Thank You To Our Sponsors!

Courion Corporation
Cyber-Ark Software
Glenfis AG

To view all sponsors and exhibitors,
click the Sponsors tab

 Follow @ISACANews on Twitter and get the latest updates about EuroCACS / ISRM with the hash tag #ISACAEU.


Download the EuroCACS /  ISRM brochure!

  Brochure (429K)

Registration for the 2012 EuroCACS / ISRM Conference is Open. Please register on site at the Hilton Munich Park Hotel. If you have any questions, please contact ISACA's Conference Department or +1.847.660.5585.


Play  Speaker blogs the conference

Play  Speaker examines How to stay focused in a world of (in)security

  View News Release

Program Information


Immerse yourself in 3 days of:

Educational sessions — workshops, keynotes, case studies and panel discussions
Networking events — spotlight educational sessions, attendee receptions, workshops and more

2012 Brochure (429K)

EuroCACS/ISRM Track Descriptions

Track 1 – Thwarting Cyberthreats
Track 2 – Improving Audit Performance
Track 3 – Audit Practices That Make an Impact
Track 4 – Solving IT and Business Issues
Track 5 – IT Risk and Exposure Management

See full session listing by track


Pre-Conference Workshops

Saturday, 8 September 2012 9:00AM-5:00PM

Sunday, 9 September 2012 9:00AM-5:00PM

Post-Conference Workshops

Thursday, 13 September 2012 9:00AM-5:00PM

Opening Keynote Address

What Makes the IT Security Industry Tick?

Play Invitation from the Euro CACS/ISRM Keynote speaker

Richard Stiennon


In an electronic data-driven world, information is the currency of the 21st century enterprise. Information supported by technology drives success but also raises complex and challenging security concerns.

In this engaging keynote presentation, learn about Europe’s most daunting IT security threats and how to most effectively mitigate these risks internally and assist your clients. Attendees will leave with an understanding of what can be learned from current cyberthreats.

Richard Stiennon is the founder of IT-Harvest, an independent analyst firm that researches the 1,200 IT security vendors, and was previously Chief Marketing Officer for Fortinet Inc. Stiennon is the author of the thought-provoking book Surviving Cyber War, and a past ISACA keynote speaker.

Closing Keynote Address

The Future of IT

Roman Weishäupl

President and CIO
Officer of Life of Two Inc.

Close out your conference experience with a thoughtprovoking keynote addressing the future of IT. You will leave this session with ideas about the direction that IT is heading and how innovation shapes the world. This high-energy closing keynote presentation is the opportunity to reflect on how the information you gained at the conference will help you stay ahead of the curve.

Roman Weishäupl, Formerly a global innovation advisor at TrendONE, Weishäupl is one of today’s trend spotters. He is also the Founder and Chief Information Officer of Life of Two Inc. a start-up catering to relationships of two.


Program Sessions and Workshops

Saturday, 8 September 2012

Time Workshop


WS1 IT Risk
WS2 Future Risks in Cybercrime and Cyberwar: Long-term Trends and Consequences
WS3 Cloud Computing Security and Risk—Latest Best Practice Guidance

Sunday, 9 September 2012

Time Workshop


WS1 IT Risk (Cont.)
WS4 Introduction to COBIT 5
WS5 A Pragmatic Approach to Information Security and Risk Management


Welcome Reception

Monday, 10 September 2012

Time Session


Keynote:  What makes the IT Security Industry Tick?


T1 111 PCI DSS v2.0 Security Strategies for Virtualised Environments
T2 112 Auditing Virtual Environment (Vmware Audit Programme)
T3 113 Migrating to COBIT 5 for Auditors
T4 114 Every Step You Take: Geo Apps vs. Privacy
T5 115 Risk and Agility Antonio


T1 121 Using COBIT 5 to Manage Information Security
T2 122 Automating IT Data Collection for GRCM Controls
T3 123 Case Study: Developing and Implementing an IT Risk Management Audit Programme
T4 124 Can We Trust The Cloud? About Security,Privacy, Audit and the Cloud
T5 125 Implementing an IT Compliance Management System


T1 131 Mobile Security: Where Are We Today and Where Will We Be Tomorrow?
T2 132 Tips to Speed Up Your Auditing Process
T3 133 Grimhildas Mirror: Information Security in the Business World
T4 134 Why a Comprehensive Information Security Strategy is Essential for Effective GRC
T5 135 Gaming:  Security Control Standards


T1 141 From Identity and Access Solutions to Access Governance
T2 142 Preparing for the EU Directive
T3 143 IT Audits of Cloud and SaaS
T4 144 Keeping Patients’ Data Safe–Identity Management for Healthcare
T5 145 Speaker Forum


Solution Centre Reception

Tuesday, 11 September 2012

Time Session


T1 211 Managing the Risk of Identity and Access
T2 212 KISS Principle for Information Security, Compliance and Risk Management in Complex Environments
T3 213 IT Audit 3.0 Future Technological Challenges and Their Impact on Our Audit Work
T4 214 Mobile Security—A Technical Look
T5 215 Privacy–Current Tasks and Challenges


T1 221 Radical Changes in Technology: How They Affect Business and the Role of IT Risk, Security and Assurance Practitioners
T2 222 Practical Auditing of Wireless Communications
T3 223 SSAE-16 Audit with Assurance—A Case Study of Assessment of Large Business Process Outsourcing (BPO) Firm
T4 224 The Information Security Tug of War
T5 225 Ensuring Business Continuity and Avoiding Lock-in in the Cloud


T1 231 Business Continuity Management: Reducing Corporate Risk and Exposure through Effective Processes and Controls Implementations
T2 232 On the Road to Continuous Monitoring–Manage Risks in the Most Efficient and Effective Way
T3 233 Security and Audit Issues in a Virtualised Environment
T4 234 Just Between Us: The Current State of Electronic Eavesdropping Technology
T5 235 An Update:  IT Security Management Standardisation


T1 231 Business Continuity Management: Reducing Corporate Risk and Exposure through Effective Processes and Controls Implementations (Cont.)
T2 242 Fraud:  Minimising Risk
T3 243 Gaming Audit: What You Need to Know
T4 244 Controlled Service Environment (CSE) for Balanced Compliance and Performance
T5 245 Enable the Truth: Risk Management Techniques that Support Honest Response


T1 231 Business Continuity Management: Reducing Corporate Risk and Exposure through Effective Processes and Controls Implementations (Cont.)
T2 252 Aligning COBIT-Based Strategic IT Assurance
T3 253 Designing and Audit Programme for a Virtual Environment
T4 254 Speaker Forum
T5 255 How to Improve your Risk Management Capability through the Adoption of COBIT for Risk


Networking Reception

Wednesday, 12 September 2012

Time Session


T1 311 IT Governance Insights Germany – Sustainable Competitive Advantage Through IT Governance
T2 312 Scoping an Assessment: Which Approach is Right
T3 313 Strategic IT Assurance Based IT Assurance Framework
T4 314 EU Privacy Directive Compliance—A Practical Approach
T5 315 Moving Forward with Technology
10.15–11.45 T2 322 Process Assessment Model (PAM) Exercise based on COBIT
T3 323 COBIT 5 for Security: Coverage and Assurance
T4 324 The Key Steps to Securing Buy-in to a Risk Management Programme
T5 325 Big Data: Why it's Important to Security Programme


T1 331 Information Security within a Global Risk Perspective
T2 332 Making the Move from COBIT 4.1 to COBIT 5
T3 333 Privileged Account Management: Who's Touching my Data?
T4 334 EU Directives/Legal Considerations
T5 335 Cloud Computing Security


T1 341 Speaker Forum
T2 342 Speaker Forum
T3 343 IT Audit and Security:  Friends or Foe?
T4 344 COBIT 5 for Information Security: Practical Guidance for Product and Service Delivery
T5 345 Green IT and Sustainability


Closing Keynote Address: The Future of IT

Thursday, 13 September 2012

Time Session / Workshop


WS6 Introduction to COBIT 5
WS7 Securing Today’s Mobile Computing Devices


Continuing Professional Education Credits

To maintain ISACA certifications, certification holders are required to earn 120 CPE credit hours over a 3-year period in accordance with ISACA’s continuing professional education (CPE) policy. Attendees can earn up to 41 CPE credits; 20 by attending the Conference and an additional 7 CPE credits for attending each day of optional pre- or postconference workshops. ISACA conferences are Group Live and do not require any advanced preparation.

Conference Dates and Times

Pre-Conference Workshop Registration

Saturday, 8 September 2012; 7.30 - 12.00
Sunday, 9 September 2012; 7.30 - 12.00

Conference Registration

Sunday, 9 September 2012; 15.00 - 19.00
Monday, 10 September 2012; 7.00 - 17.00
Tuesday, 11 September 2012; 7.30 - 17.00
Wednesday, 12 September 2012; 8.00 - 17.00


Pre-Conference Workshops

Saturday, 8 September 2012; 9.00 - 17.00
Sunday, 9 September 2012; 9.00 - 17.00

Post-Conference Workshop

Thursday, 13 September 2012; 7.30 - 12.00


Monday, 10 September 2012; 8.30 - 17.00
Tuesday, 11 September 2012; 8.30 - 17.00
Wednesday, 12 September 2012; 8.30 - 17.00

Conference Registration Fees


Member: US $1995 + VAT $379.05 = $2,374.05
Non-member: US $2195 + VAT $417.05 = $2,612.05

One-Day Workshop

Member: US $550 + VAT $95= $645
Non-member: US $750 + VAT $142.50 = $892.50

Two-Day Workshop

Member: US $750 + VAT $142.50 = $892.50
Non-member: US $950 + VAT $180.50 = $1130.50

Cancellation Deadline: 13 August 2012 

All fees are quoted in US dollars. The entire registration fee must be received by ISACA before your registration will be considered paid in full.


Registration fees for the event are subject to German VAT. A VAT rate of 19% will be applied to all registration fees. VAT charges may not be deducted from the registration fees to be remitted. For your registration to be considered paid in full, the entire registration fee including VAT must be received by ISACA. ISACA is in the process of registering for German VAT. Upon issuance of a VAT number, ISACA will provide a VAT invoice to registrants for VAT reclaim.

Registration Methods

Registration for the 2012 EuroCACS / ISRM Conference is Open. Please register on site at the Hilton Munich Park Hotel. If you have any questions, please contact ISACA's Conference Department or +1.847.660.5585.

Cancellation Policy

If your plans change and you won’t be able to attend the conference and/or workshop, contact us by phone, fax or e-mail to cancel your registration. All cancellations must be received by 13 August 2012 to receive a refund of registration fees. A cancellation charge of US $100 will be subtracted from conference refunds, and US $50 from workshop refunds. No refunds can be given after 13 August 2012. Attendee substitution is permitted at any time until the conference. If a nonmember is substituting a member, then there will be additional nonmember fees.

NOTE: Registration is contingent upon full payment of the registration fee. To guarantee registration, conference and/or workshop fees must be received by the published deadline. It may take 10 or more business days for a wire transfer or mailed check to reach ISACA, so please plan accordingly. If, for any reason, ISACA must cancel a course or event, liability is limited solely to the registration fees paid. ISACA is not responsible for other expenses incurred, including travel and accommodation fees. Conference materials are not guaranteed to those who register onsite or fail to submit payment prior to the event. For more information regarding administrative policies, please contact the ISACA conference department.
Phone: +1.847.660.5585
Fax: +1.847.253.1443
E-mail: conference@isaca.org


ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to ISACA as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.

Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.

Not a member of ISACA? Join today!

When you register for the conference as a nonmember, the difference between member and nonmember conference fees can be applied towards ISACA membership. This means you can become a member at the international and chapter level for little to no additional cost; it just depends on your local chapter dues. To take advantage of this great offer, check the box on the registration form. For more information about ISACA membership, visit the web site at www.isaca.org/membership or contact the membership department at membership@isaca.org.

NOTE: This offer expires 30 days after completion of the event. Nonmembers pay the nonmember conference fee when registering.

Permission to be Photographed

By attending this event, the registrant grants permission to be photographed and videotaped during the event. The resultant photographs and videos may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site, in social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs and videos will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs or videos now or in the future.


Business casual is appropriate for this and all ISACA conference events.

Venue and Accommodations

Hilton Munich Park Hotel
Am Tucherpark 7
80538 Munich
Phone: +49.(0)89.38450
Reservation Link: www.hilton.com

Guest Room Rate: 159 Euros (inclusive of VAT)
Room rates based on availability
Guest Room Rate Cut-Off Date: 6 August 2012


 Twin deluxe room, Hilton Munich Park Hotel



Special Hotel Information

Special hotel rates are available three days prior to and following the conference, and are subject to availability. To obtain the preferred rate, remember to mention that you are attending ISACA CACS / Information Security and Risk Management Conference. Reservation requests received after the cut-off date will be honored on a space-available basis only. All reservations must be guaranteed with a deposit of one night's room cost.

Individuals are responsible for securing their own deposit at the time reservations are made. ISACA strongly encourages all conference delegates to stay at the host hotel. Staying at the host hotel helps keep the cost of the conference and membership dues down by helping us fulfill our negotiated guest room commitments to the hotel. You will also enjoy the benefits of being onsite for conference activities at a reasonable price.

About Munich

View this exciting video to see the sights of beautiful Munich.




 View Presentation


View Presentation

Qualys, Inc.


Cyber-Ark Software

Glenfis AG


Event Exhibitors

For Exhibitor and Sponsorship Opportunities

Please contact: 

Sean Stringer
Director of Sponsorships
Phone: +1.847.660.5729
Fax: +1.847.253.1443

  Exhibitor and Sponsorship Information


Contact ISACA's Education/Conference Department:
Tel: +1.847.660.5585
Fax: +1.847.253.1443

Media Inquiries

Contact the ISACA Communications Department:
Tel: +1.847.660.5512 or

Please address Sponsorship questions to: sstringer@isaca.org