10/18/2016 Luncheon Presentation

Table Top Exercise - Simulated Cybersecurity Incident: You've Been Breached, Now What Are You Going To Do?




9/20/2016 Luncheon Presentation

Lessons Learned form Treating Trauma

by Vanessa Pegueros



5/17/2016 Luncheon Presentation

 Identifying Cybersecurity Threats and Evaluating IT Controls

by Jody Cedola and Robert Kaler



2016 Spring Seminar Presentations 


Spring Seminar 2016 Cloud Compliance
by Kevin Tam


Spring Seminar 2016 Protiviti Breach Kill Chain Model
by Dan Hansen

Spring Seminar 2016 Getting Serious About Cyber Security
by Jack Jones


Spring Seminar 2016 Cybersecurity in Healthcare
by Sean P. Murphy


Spring Seminar 2016 Threat Intelligence
by Michael C. Boyd




3/15/16 Microsoft Retail: The Security and Privacy Story

3/15/16 ISACA PSC Luncheon

(Link to PDF)



2/16/16 IAM Intelligence Overview

2/16/16 ISACA PSC Luncheon

(Link to PDF)



10/20/15 Luncheon Presentation 


Why We are Failing

10/20/15 ISACA PSC Luncheon

(Link to PDF)



9/16/15 Luncheon Presentation

Institutional Considerations for Managing IoT Risk

9/16/15 ISACA PSC Luncheon

(Link to PDF)




2015 Spring Seminar Presentations


Houston We Have Several Problems - by Vanessa Pegueros
3/23/15 ISACA PSC Seminar
(Link to PDF)


Sensitive Data in the AWS Cloud - by Chad Woolf
3/23/15 ISACA PSC Seminar
(Link to PDF)


Privacy and Measurement - by Jennifer Harkins Garone
3/24/15 ISACA PSC Seminar
(Link to Powerpoint)


Risk: Why Do We Care - by Cris Ewell
3/24/15 ISACA PSC Seminar
(Link to PDF)


More to come!


 Knowledge Center Whats New

Journal Article

Social Media Rewards and Risk

Social media is a powerful tool that gives organizations the ability to expand their brand value; it can also tarnish a brand overnight.


Mohammed J. Khan, CISA, CRISC, CIPM Yesterday | 0 comments

Journal Article

Mobile Workforce Security Considerations and Privacy

Remote working has a lot of advantages, both for the company and the employees. In the past years, it has become increasingly used by companies as a perk.


Guy Ngambeket, CISA, CISM, CGEIT, ITIL v3 , PMP Yesterday | 0 comments

Journal Article

Proposal for the Next Version of the ISO/IEC 27001 Standard

In this article, the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) ISO/IEC 27001:2013 standard is introduced briefly and compared to ISO/IEC 27001:2005.


Tolga Mataracioglu, CISA, CISM, COBIT Foundation, BS 25999 LA, CCNA, CEH, ISO 27001 LA, MCP, MCTS, VCP Yesterday | 0 comments

Journal Article

IoT Needs Better Security

Security needs to be addressed at all stages of the IoT system life cycle, including the design, installation, configuration and operational stages.


Hemant Patel, CISM, ITIL, PMP, TOGAF 7 days ago | 0 comments

Journal Article

Transforming Cybersecurity

Transforming Cybersecurity is a useful handbook for any cyber security practitioner, information security manager (ISM) or IT auditor.


ISACA | Reviewed by Ravi Ayappa, Ph.D., CISA, CRISC, CISM 8 days ago | 0 comments

You must log in to view Knowledge Center Topic updates.