Education 

 

 

10/18/2016 Luncheon Presentation

Table Top Exercise - Simulated Cybersecurity Incident: You've Been Breached, Now What Are You Going To Do?

PDF: http://www.isaca.org/chapters1/puget-sound/education/Documents/10-18-2016-ISACA%20Tabletop%20Exercise%20FINAL.pdf

 

 

9/20/2016 Luncheon Presentation

Lessons Learned form Treating Trauma

by Vanessa Pegueros

http://www.isaca.org/chapters1/puget-sound/education/Documents/ISACATalk9-20-16_Final.pdf

 

 

5/17/2016 Luncheon Presentation

 Identifying Cybersecurity Threats and Evaluating IT Controls

by Jody Cedola and Robert Kaler

http://www.isaca.org/chapters1/puget-sound/education/Documents/051716-Identifying%20Cybersecurity%20Threats%20and%20Evaluating%20IT%20Controls.pdf

 

 

2016 Spring Seminar Presentations 

 

Spring Seminar 2016 Cloud Compliance
by Kevin Tam

http://www.isaca.org/chapters1/puget-sound/education/Documents/SpringSeminar2016-Cloud%20Compliance%20-%20Seattle%20ISACA%20-%202016%20April.pdf

 

Spring Seminar 2016 Protiviti Breach Kill Chain Model
by Dan Hansen

http://www.isaca.org/chapters1/puget-sound/education/Documents/SpringSeminar2016-Dan%20Hansen_Protiviti_Breach%20Kill%20Chain%20Model%20presentation%20April%202016.pdf


Spring Seminar 2016 Getting Serious About Cyber Security
by Jack Jones

http://www.isaca.org/chapters1/puget-sound/education/Documents/SpringSeminar2016-GettingSeriousAboutCyberSecurity.pdf

 

Spring Seminar 2016 Cybersecurity in Healthcare
by Sean P. Murphy

http://www.isaca.org/chapters1/puget-sound/education/Documents/SpringSeminar2016-ISSA%20OCT%202015.pdf

 

Spring Seminar 2016 Threat Intelligence
by Michael C. Boyd

http://www.isaca.org/chapters1/puget-sound/education/Documents/SpringSeminar2016-Threat%20Intelligence.pdf

 

 

 

3/15/16 Microsoft Retail: The Security and Privacy Story

3/15/16 ISACA PSC Luncheon

(Link to PDF)

 

 

2/16/16 IAM Intelligence Overview

2/16/16 ISACA PSC Luncheon

(Link to PDF)

 

 

10/20/15 Luncheon Presentation 

 

Why We are Failing

10/20/15 ISACA PSC Luncheon

(Link to PDF)

 

 

9/16/15 Luncheon Presentation

Institutional Considerations for Managing IoT Risk

9/16/15 ISACA PSC Luncheon

(Link to PDF)

 

 

 

2015 Spring Seminar Presentations

 

Houston We Have Several Problems - by Vanessa Pegueros
3/23/15 ISACA PSC Seminar
(Link to PDF)

 

Sensitive Data in the AWS Cloud - by Chad Woolf
3/23/15 ISACA PSC Seminar
(Link to PDF)

 

Privacy and Measurement - by Jennifer Harkins Garone
3/24/15 ISACA PSC Seminar
(Link to Powerpoint)

 

Risk: Why Do We Care - by Cris Ewell
3/24/15 ISACA PSC Seminar
(Link to PDF)

 

More to come!

 

 Knowledge Center Whats New

Journal Article

The Value of Certification

A certification is a credential for an accomplishment that has been validated by a testing process and typically cannot be earned without verification of the appropriate level of experience or education.

Download

Thomas Johnson, CISA, CRISC, CISM, CISSP Yesterday | 0 comments

Journal Article

Configuration Management: Using COBIT 5

This book covers all aspects related to configuration management and can be used effectively in conjunction with ITIL resources.

Download

ISACA | Reviewed by Diana M. Hamono, CISA, CGEIT, COBIT 5 Foundation Yesterday | 0 comments

Journal Article

Data Science as a Tool for Cloud Security: Cloud Generation Visibility, Detection and Protection

There is no doubt that data science can be used as a core technology to secure and strengthen cloud applications by implementing algorithms that can detect threats through large-scale data mining.

Download

Aditya K. Sood, Ph.D., and Michael Rinehart, Ph.D. 3 days ago | 0 comments

Journal Article

Big Data—Hot Air or Hot Topic?

There are many different definitions of the term ‘big data’, and concerns about whether it will necessitate significant changes in business operations in the short term.

Download

Angel Serrano, CISA, CISM, CRISC 3 days ago | 0 comments

Journal Article

Information Ethics: Is Information Technology Responsible for Corporate Crises?

Despite all that technology brings to improve lives and the living environment, it just cannot seem to shield itself from creative deployment for the wrong ends.

Download

Vasant Raval, DBA, CISA, ACMA 3 days ago | 0 comments

You must log in to view Knowledge Center Topic updates.

LogIn