2013 EuroCACS / ISRM 

Browse All of Our Events »

View Highlights from 2013

Vernon Poole, chair of EuroCACS/ISRM, kicks off the conference.
Vernon Poole, Chair of EuroCACS/ISRM.

Attendee Olukayode Abdul Adebisi.

Keynote speaker Amar Singh
Opening Keynote Amar Singh.

In the News

EuroCACS / ISRM Recap

ISACA’s EuroCACS/ISRM 2013 in London, England got off to a great start with Vernon Poole, chair of EuroCACS / ISRM, and Allan Boardman, international vice president of ISACA, kicking off the conference and introducing Amar Singh, former CISO of News International Corporation, who delivered a keynote presentation focused on the future of cloud.

The second day added to the momentum of the first, with panel discussions focusing on the future, spotlight sessions and expert presentations on COBIT 5, APTs, IT-audit analytics and travel-document security.

Follow on Twitter using #ISACAEU.

Networking between sessions

Attendees networking between sessions.

Allan Boardman, international vice president of ISACA

Allan Boardman, International Vice President of ISACA.

Yves LeRoux (l-r), Rolf von Roessing, Ramses Gallego and David Lacey participated in a cybersecurity panel at EuroCACS.

Yves LeRoux (l-r), Ramses Gallego, Rolf von Roessing and David Lacey participated in a cybersecurity panel at EuroCACS.

Why Attend EuroCACS / ISRM?

Unique learning experience

Create a customized learning experience across more than 40 sessions focused on security, risk and assurance.

Fresh content in a multitude of formats

2013 EuroCACS / ISRM features a variety of delivery styles including interactive discussion, hands-on participation and thoughtfully selected case studies from a number of industries.

Engaging networking opportunities

EuroCACS / ISRM attendees have the opportunity to expand their professional network by exchanging with like-minded audit, risk and security professionals.

Sharpen your skills

Gain expertise and earn valuable CPEs. This highly interactive event provides attendees the opportunity to interact with speakers and gain insights from peers on today’s leading IT-related topics. 

Networking at EuroCACS 2013 

39 Hours
Earn up to 39 CPE Hours!

 Thanks To Our Sponsors!

SSH Communications Security

Courion Corporation


SureCloud Limited

Boldon James


Application Security, Inc.

To view all sponsors and exhibitors,
click the Sponsors tab

 Follow @ISACANews on Twitter and get the latest updates about EuroCACS / ISRM with the hash tag #ISACAEU.

What to Expect

Download the 2013 EuroCACS web brochure, or visit the program tab for more details.

Program Information

Please check back often as we add more details.

  2013 EuroCACS web brochure

View program tracks and workshops below.

Immerse yourself in 3 days of:

Educational sessions — workshops, keynotes, case studies and panel discussions
Networking events — spotlight educational sessions, attendee receptions, workshops and more

Track 1—Assurance
Track 2—Risk
Track 3—Security
Track 4—Governance
Track 5—Forums (Roundtable conversations)


Pre-Conference Workshops
2-Day Workshops, Saturday, 14 September, and Sunday, 15 September, 9.00 - 17.00 

1-Day Workshop, Sunday, 15 September, 9.00 - 17.00  

Post-Conference Workshops
1-Day Workshops, Wednesday, 18 September, 13.00 - 17.00, continuing Thursday, 19 September, 7.30 - 12:00 (2 half-day sessions)

Opening Keynote

Is it Cloudy or is it Foggy?

Amar SinghAmar Singh, CRISC
News International Corporation


View Singh’s video interview with the Financial Times

Singh is a C-level executive leading the Global Information Security landscape with his benchmark-setting approach to securing and protecting organisations. A thought leader who also delivers quick and on-budget results, Singh brings a unique fusion of pragmatism and practicality, with a healthy dose of proportionate paranoia, to his work and is commanding the information security and assurance space with his approach to information security, governance, risk and compliance.

Several companies seek Singh's industry-leading views and comments on all things information security. Publications include: Forrester, Computer Weekly, The Register, TechWeek Europe, Computer Fraud & Security, Quocirca, CIR, TechWorld Computing, SC Magazine, CEO, ICAEW, V3, IT Security Pro, Computer Fraud & Security, and Tech Boson.

Apart from his engaging presentational approach, Singh is also well known for his ability to bridge deeply technical, managerial and leadership skills. His passion on all things information security, risk and compliance has made Singh a sought-after speaker. His opening keynote will cover the most up-to-date concerns pertaining to the world of cloud computing.

Closing Keynote

The Cybersecurity Shift: What Works, What Doesn't - and the Hidden Silver Linings in the "Cloud" of "Cyber"!

John MeakinJohn Meakin, Ph.D
CISO, Head of Security & Technology
Risk Markets & International Banking

RBS (Royal Bank of Scotland)

John will highlight the key challenges of the evolving cyber-security threat, emphasising the fundamental changes in approaches to enterprise security that it demands. He will blend his own experience with that of other experts at the conference and beyond to illustrate some of the pitfalls and effective strategies that the new threat environment is teaching us. He will also pick out the positives and for more effective security opportunities that the same experience is slowly revealing. There may be a beam of sunlight out there in the cloud!

Conference Dates and Times

Pre-Conference Workshop Registration

Saturday, 14 September 2013; 7.30 - 12.00
Sunday, 15 September 2013; 7.30 - 12.00

Conference Registration

Sunday, 15 September 2013; 15.00 - 19.00
Monday, 16 September 2013; 7.00 - 17.00
Tuesday, 17 September 2013; 7.30 - 17.00

Post-Conference Workshop Registration

Wednesday, 18 September 2013; 8.00- 13.00


Pre-Conference Workshops

Saturday, 14 September 2013; 9.00 - 17.00
Sunday, 15 September 2013; 9.00 - 17.00

Post-Conference Workshop

Wednesday, 18 September 2013; 13.00 - 17.00
Thursday, 19 September; 9.00 - 12:30


Monday, 16 September 2013; 8.30 - 17.00
Tuesday, 17 September 2013; 8.30 - 17.00
Wednesday, 18 September 2013; 8.30 - 12.00


Program Sessions and Workshops

Saturday, 14 September 2013

Time Pre-Conference Workshops

WS2—Effective Management of IT-related Business Risk
WS3—COBIT 5 Foundation

Sunday, 15 September 2013

Time Pre-Conference Workshops


Coffee and tea service


WS1—Cloud, Social Networking and BYOD Collide: Pragmatic Risk Management for Today’s Business
WS2—Effective Management of IT-related Business Risk (cont.)
WS3—COBIT 5 Foundation (cont.)


Welcome Reception

Monday, 16 September 2013

Time Tracks


Coffee and tea service


Opening Keynote—Is it Cloudy or is it Foggy?




111—Continuously Audit Transactions in Retail Banks
112—CRISM Return on Experience
113—Technical Mobile Security
114—Current Challenges in Data Privacy and IT Law
115—Assurance Forum




121—How IA Can Help with Big Data
122—Hot Topic – Lessons Learned from the UK’s Information Commissioner Office’s Casework and Data Protection Audits
123—Social Engineering
124—ISO 27001/2 Revision & its Alignment with COBIT 5
125—Megatrend 1: Intelligence Driven IAM – The Next Generation of Identity and Access Governance (Sponsored by Courion)




131—An Assurance Perspective of Innovation Technology 
132—Consumerization - Respond to the Evolving Threats
133—Cloud Based Business Continuity
134—Cloud Assurance - Trust but Verify
135—Solving for Current Challenges Using ISACA Tools




141—Mobile Security - What Auditors Ought To Know
142—BYOD: Invitation or Rebellion?
143—The “Top 10” Web Application Security Risks
144—Compliance and Profitability: COBIT in Banking
145—Megatrend 2: Complexity and Risk: SSH User Key Mismanagement in Today’s Large Enterprises (Sponsored by SSH Communications Security)


Solution Centre Expo Hall Reception


Spotlight 1: Taking a Risk-Driven Approach to IAM (Sponsored by Courion Corporation)
Spotlight 2: GRC Information Security Management for Data Privacy, Cloud and Enterprise (Sponsored by AdaptiveGRC)
Spotlight 3: Supplier Assurance: Advancing from Assessment to Risk Management (Sponsored by SureCloud Limited)


Spotlight 4: How Data Classification can harness the value of Big Data (Sponsored by Boldon James)
Spotlight 5: How to Prevent Data Loss and Monitor Your Encrypted Networks (Sponsored by SSH Communications Security)

Tuesday, 17 September 2013

Time Tracks


Coffee and tea service


Panel Discussion—Look into the Future for Information Security & Trends, Technologies & Threats




211—Data Analysis Audit – A Multi Risk Process
212—Securing the Chain: A Pragmatic Approach to Supplier Risk Management
214—COBIT 5 Implementation. Explained
215—Facing the Skills Gap in Cyber Security


Lunch & Learn - Complexity and Risk: SSH User Key Mismanagement in Today’s Large Enterprises and How To Resolve the Problems


221—Vendor Management Assurance
222—Formal ISO 27001 Certification - Gains vs. Losses
223—How to Manage the Risks from APTs
224—Beyond Identity Management: Welcome the World of Access Governance
225—Security Forum: Data Confidentiality in the Cloud—A myth?




231—Obtaining Assurance by Using IT Audit Analytics
232—Operational Risk Management
233—From Data Leak Prevention to Information Stewardship
234—Channeling the Chameleon
235—Vendor Audit Assurance Forum




241—5+ Million Compliance Scans, Lessons Learned
242—Practical Approach to Risk Monitoring
243—Leveraging Travel Document Security Controls
244—COBIT 5 Case Studies
245—PCI Forum: The Future of PCI: Securing Payments in a Changing World


Spotlight 7: Assurance for Governance, Risk & Cybersecurity – the new GRC? (Sponsored by Wynyard Group)
Spotlight 8: The Top Ten Database Vulnerabilities And How To Stop Them (Sponsored by Application Security)


Networking Reception

Wednesday, 18 September 2013

Time Tracks


Coffee and tea service


312—COBIT 5 for Risk
313—Supporting the Back Stage Crew
314—Complying to Privacy Requirements in a Worldwide Context: Present and Future
315—Risk Forum: How Smart Buildings Impact Security




Closing Keynote—The Cybersecurity Shift: What Works, What Doesn't - and the Hidden Silver Linings in the "Cloud" of "Cyber"!




WS4—Everything you Wanted to Know About Technology, Security, Cloud Computing and the Law but were too Afraid to Ask
WS5—Cloud Computing Audit, Risk and Control Frameworks

Thursday, 19 September 2013

Time Post-Conference Workshops


WS4—Everything you Wanted to Know About Technology, Security, Cloud Computing and the Law but were too Afraid to Ask (cont.)
WS5—Cloud Computing Audit, Risk and Control Frameworks (cont.)


Continuing Professional Education Credits

To maintain ISACA certifications, certification holders are required to earn 120 CPE credit hours over a 3-year period in accordance with ISACA’s continuing professional education (CPE) policy. Attendees can earn up to 41 CPE credits; 20 by attending the Conference and an additional 7 CPE credits for attending each day of optional pre or post conference workshops. ISACA conferences are Group Live and do not require any advanced preparation.

Conference Registration Fees


Member: US $1750 + VAT $350= $2100
Non-member: US $1950 + VAT $390= $2340

One-Day Workshop

Member: US $550 + VAT $110= $660
Non-member: US $750 + VAT $150 = $900

Two-Day Workshop

Member: US $850 + VAT $170= $1020
Non-member: US $1050 + VAT $210= $1260

Cancellation Deadline: 19 August 2013

All fees are quoted in US dollars. The entire registration fee must be received by ISACA before your registration will be considered paid in full.

Group Discounts

ISACA offers discounts to organizations sending 4 or more employees to a single conference. Please contact the ISACA Conference department for more details at +1.847.660.5585 or conference@isaca.org.


Registration fees for the event are subject to VAT. A VAT rate of 20% will be applied to all registration fees. VAT charges may not be deducted from the registration fees to be remitted. For your registration to be considered paid in full, the entire registration fees including VAT must be received by ISACA.


Registration Methods

Choose one of these easy ways to register

  1. Fax your completed registration form to +1.847.253.1443
  2. Mail your completed registration form to:
    ISACA, 1055 Paysphere Circle, Chicago, IL 60674 USA
  3. Bank Wires—send electronic payments in US dollars to:
    Bank of America, 135 S. LaSalle St., Chicago, IL 60603
    ABA #0260-0959-3
    ISACA Account #22-71578
    S.W.I.F.T. code BOFAUS3N
    [Please include attendee’s name and EuroCACS/ISRM 2013 on the Advice of Transfer.]

Cancellation Policy

If your plans change and you won’t be able to attend the conference and/or workshop, contact us by phone, fax or e-mail to cancel your registration. All cancellations must be received by 19 August 2013 to receive a refund of registration fees. A cancellation charge of US $100 will be subtracted from conference refunds, and US $50 from workshop refunds. No refunds can be given after 19 August 2013. Attendee substitution is permitted at any time until the conference. If a nonmember is substituting a member, then there will be additional nonmember fees.

NOTE: Registration is contingent upon full payment of the registration fee. To guarantee registration, conference and/or workshop fees must be received by the published deadline. It may take 10 or more business days for a wire transfer or mailed check to reach ISACA, so please plan accordingly. If, for any reason, ISACA must cancel a course or event, liability is limited solely to the registration fees paid. ISACA is not responsible for other expenses incurred, including travel and accommodation fees. Conference materials are not guaranteed to those who register onsite or fail to submit payment prior to the event. For more information regarding administrative policies, please contact the ISACA conference department.
Phone: +1.847.660.5585
Fax: +1.847.253.1443
E-mail: conference@isaca.org


ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to ISACA as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.

Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.

Not a member of ISACA? Join today!

When you register for the conference as a nonmember, the difference between member and nonmember conference fees can be applied towards ISACA membership. This means you can become a member at the international and chapter level for little to no additional cost; it just depends on your local chapter dues. To take advantage of this great offer, check the box on the registration form. For more information about ISACA membership, visit the web site at www.isaca.org/membership or contact the membership department at membership@isaca.org.

NOTE: This offer expires 30 days after completion of the event. Nonmembers pay the nonmember conference fee when registering.

Permission to be Photographed

By attending this event, the registrant grants permission to be photographed and videotaped during the event. The resultant photographs and videos may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site, in social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs and videos will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs or videos now or in the future.


Business casual is appropriate for this and all ISACA conference events.

Venue and Accommodations

Hilton London Metropole
225 Edgware Road,
London W2 1JU, UK
Phone: +44 (0)20 7402 4141
Reservation Link

Please Note: Guest Room Rate Cut-Off Date: 18 July 2013

Guest Room Rate: 179 GBP Single (179 + 20% VAT = 214.80 GBP) / 199 GBP Double (199 + 20% VAT = 238.80 GBP).
Guest rooms are inclusive of breakfast.
Guest Room Rate Cut-Off Date: 18 July 2013



 Superior room, London Hilton Metropole



Special Hotel Information

Special hotel rates are available three days prior to and following the conference, and are subject to availability. To obtain the preferred rate, remember to mention that you are attending ISACA CACS / Information Security and Risk Management Conference. Reservation requests received after the cut-off date will be honored on a space-available basis only. All reservations must be guaranteed with a deposit of one night's room cost. Please Note: Guest Room Rate Cut-Off Date: 18 July 2013

Individuals are responsible for securing their own deposit at the time reservations are made. ISACA strongly encourages all conference delegates to stay at the host hotel. Staying at the host hotel helps keep the cost of the conference and membership dues down by helping us fulfill our negotiated guest room commitments to the hotel. You will also enjoy the benefits of being onsite for conference activities at a reasonable price.

Thank you to our sponsors!



SSH Communications Security

Founded in 1995, SSH Communications Security is the company that invented the SSH protocol - the gold standard protocol for data-in-transit security solutions. Today, over 3,000 customers across the globe - including seven of the Fortune 10 - trust our Information Assurance Platform to secure the path to their information assets. We enable and enhance business for thousands of customers in multiple industries in the private and public sectors around the world. A fast-growing company, SSH Communications Security operates in the Americas, Europe, and APAC regions, with headquarters located in Helsinki, Finland. The company shares (SSH1V) are quoted on the NASDAQ OMX Helsinki.

For more information on SSH Communications Security please visit www.ssh.com.

  SES5—How to Prevent Data Loss and Monitor Your Encrypted Networks
  Lunch & Learn—Complexity and Risk: SSH User Key Mismanagement in Today’s Large Enterprises and How To Resolve the Problems
  Megatrend 2—Complexity and Risk: SSH User Key Mismanagement in Today’s Large Enterprises


Courion Corporation




SureCloud Limited

Boldon James

Application Security, Inc.


Event Exhibitors

For Exhibitor and Sponsorship Opportunities

  2013 EuroCACS / ISRM Expo Hall Floor Plan

Please contact: 

Sean Stringer
Director of Sponsorships
Phone: +1.847.660.5729
Fax: +1.847.253.1443

  2014 EuroCACS / ISRM Sponsorship Brochure
  2014 EuroCACS / ISRM Sponsor License Agreement
  Exhibitor and Sponsorship Information


Contact ISACA's Education/Conference Department:
Tel: +1.847.660.5585
Fax: +1.847.253.1443

Media Inquiries

Contact the ISACA Communications Department:
Tel: +1.847.660.5512 or

Please address Sponsorship questions to: sstringer@isaca.org