Education 

 

 

10/18/2016 Luncheon Presentation

Table Top Exercise - Simulated Cybersecurity Incident: You've Been Breached, Now What Are You Going To Do?

PDF: http://www.isaca.org/chapters1/puget-sound/education/Documents/10-18-2016-ISACA%20Tabletop%20Exercise%20FINAL.pdf

 

 

9/20/2016 Luncheon Presentation

Lessons Learned form Treating Trauma

by Vanessa Pegueros

http://www.isaca.org/chapters1/puget-sound/education/Documents/ISACATalk9-20-16_Final.pdf

 

 

5/17/2016 Luncheon Presentation

 Identifying Cybersecurity Threats and Evaluating IT Controls

by Jody Cedola and Robert Kaler

http://www.isaca.org/chapters1/puget-sound/education/Documents/051716-Identifying%20Cybersecurity%20Threats%20and%20Evaluating%20IT%20Controls.pdf

 

 

2016 Spring Seminar Presentations 

 

Spring Seminar 2016 Cloud Compliance
by Kevin Tam

http://www.isaca.org/chapters1/puget-sound/education/Documents/SpringSeminar2016-Cloud%20Compliance%20-%20Seattle%20ISACA%20-%202016%20April.pdf

 

Spring Seminar 2016 Protiviti Breach Kill Chain Model
by Dan Hansen

http://www.isaca.org/chapters1/puget-sound/education/Documents/SpringSeminar2016-Dan%20Hansen_Protiviti_Breach%20Kill%20Chain%20Model%20presentation%20April%202016.pdf


Spring Seminar 2016 Getting Serious About Cyber Security
by Jack Jones

http://www.isaca.org/chapters1/puget-sound/education/Documents/SpringSeminar2016-GettingSeriousAboutCyberSecurity.pdf

 

Spring Seminar 2016 Cybersecurity in Healthcare
by Sean P. Murphy

http://www.isaca.org/chapters1/puget-sound/education/Documents/SpringSeminar2016-ISSA%20OCT%202015.pdf

 

Spring Seminar 2016 Threat Intelligence
by Michael C. Boyd

http://www.isaca.org/chapters1/puget-sound/education/Documents/SpringSeminar2016-Threat%20Intelligence.pdf

 

 

 

3/15/16 Microsoft Retail: The Security and Privacy Story

3/15/16 ISACA PSC Luncheon

(Link to PDF)

 

 

2/16/16 IAM Intelligence Overview

2/16/16 ISACA PSC Luncheon

(Link to PDF)

 

 

10/20/15 Luncheon Presentation 

 

Why We are Failing

10/20/15 ISACA PSC Luncheon

(Link to PDF)

 

 

9/16/15 Luncheon Presentation

Institutional Considerations for Managing IoT Risk

9/16/15 ISACA PSC Luncheon

(Link to PDF)

 

 

 

2015 Spring Seminar Presentations

 

Houston We Have Several Problems - by Vanessa Pegueros
3/23/15 ISACA PSC Seminar
(Link to PDF)

 

Sensitive Data in the AWS Cloud - by Chad Woolf
3/23/15 ISACA PSC Seminar
(Link to PDF)

 

Privacy and Measurement - by Jennifer Harkins Garone
3/24/15 ISACA PSC Seminar
(Link to Powerpoint)

 

Risk: Why Do We Care - by Cris Ewell
3/24/15 ISACA PSC Seminar
(Link to PDF)

 

More to come!

 

 Knowledge Center Whats New

Journal Article

Social Media Rewards and Risk

Social media is a powerful tool that gives organizations the ability to expand their brand value; it can also tarnish a brand overnight.

Download

Mohammed J. Khan, CISA, CRISC, CIPM Yesterday | 0 comments

Journal Article

Mobile Workforce Security Considerations and Privacy

Remote working has a lot of advantages, both for the company and the employees. In the past years, it has become increasingly used by companies as a perk.

Download

Guy Ngambeket, CISA, CISM, CGEIT, ITIL v3 , PMP Yesterday | 0 comments

Journal Article

Proposal for the Next Version of the ISO/IEC 27001 Standard

In this article, the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) ISO/IEC 27001:2013 standard is introduced briefly and compared to ISO/IEC 27001:2005.

Download

Tolga Mataracioglu, CISA, CISM, COBIT Foundation, BS 25999 LA, CCNA, CEH, ISO 27001 LA, MCP, MCTS, VCP Yesterday | 0 comments

Journal Article

IoT Needs Better Security

Security needs to be addressed at all stages of the IoT system life cycle, including the design, installation, configuration and operational stages.

Download

Hemant Patel, CISM, ITIL, PMP, TOGAF 7 days ago | 0 comments

Journal Article

Transforming Cybersecurity

Transforming Cybersecurity is a useful handbook for any cyber security practitioner, information security manager (ISM) or IT auditor.

Download

ISACA | Reviewed by Ravi Ayappa, Ph.D., CISA, CRISC, CISM 8 days ago | 0 comments

You must log in to view Knowledge Center Topic updates.

LogIn