10/18/2016 Luncheon Presentation

Table Top Exercise - Simulated Cybersecurity Incident: You've Been Breached, Now What Are You Going To Do?




9/20/2016 Luncheon Presentation

Lessons Learned form Treating Trauma

by Vanessa Pegueros



5/17/2016 Luncheon Presentation

 Identifying Cybersecurity Threats and Evaluating IT Controls

by Jody Cedola and Robert Kaler



2016 Spring Seminar Presentations 


Spring Seminar 2016 Cloud Compliance
by Kevin Tam


Spring Seminar 2016 Protiviti Breach Kill Chain Model
by Dan Hansen

Spring Seminar 2016 Getting Serious About Cyber Security
by Jack Jones


Spring Seminar 2016 Cybersecurity in Healthcare
by Sean P. Murphy


Spring Seminar 2016 Threat Intelligence
by Michael C. Boyd




3/15/16 Microsoft Retail: The Security and Privacy Story

3/15/16 ISACA PSC Luncheon

(Link to PDF)



2/16/16 IAM Intelligence Overview

2/16/16 ISACA PSC Luncheon

(Link to PDF)



10/20/15 Luncheon Presentation 


Why We are Failing

10/20/15 ISACA PSC Luncheon

(Link to PDF)



9/16/15 Luncheon Presentation

Institutional Considerations for Managing IoT Risk

9/16/15 ISACA PSC Luncheon

(Link to PDF)




2015 Spring Seminar Presentations


Houston We Have Several Problems - by Vanessa Pegueros
3/23/15 ISACA PSC Seminar
(Link to PDF)


Sensitive Data in the AWS Cloud - by Chad Woolf
3/23/15 ISACA PSC Seminar
(Link to PDF)


Privacy and Measurement - by Jennifer Harkins Garone
3/24/15 ISACA PSC Seminar
(Link to Powerpoint)


Risk: Why Do We Care - by Cris Ewell
3/24/15 ISACA PSC Seminar
(Link to PDF)


More to come!


 Knowledge Center Whats New

Journal Article

Instilling a Culture of Security Starts With Information Governance

Certain steps can be taken to build a strong respect for and practice of security into the cultural fabric of any organization, across all departments and areas of the business.


T. Sean Kelly 5 days ago | 0 comments

Journal Article

Key Competencies of the Effective Governance Professional

It is extremely important that organizations invest in their leadership capabilities because leaders play an integral role in motivating, inspiring and influencing talent management.


Noman Sultan, Ph.D., CISM, CGEIT, CITP 5 days ago | 0 comments

Journal Article

Design With the End in Mind

Transforming business frontiers have created an expanding digital universe and explosive data growth, making organizations reservoirs and refineries of data.


Sudhakar Sathiyamurthy, CISA, CRISC, CGEIT, CIPP, ITIL Expert 12 days ago | 0 comments

Journal Article

Factors to Consider to Minimize Identity Theft in Mobile Banking

Using mobile devices to complete commercial transactions is a newer scientific advancement in the information and communication technology (ICT) sphere.


Adeniyi Akanni, Ph. D., CISA, CRISC, ISO 27001 LA, ITIL 12 days ago | 0 comments

You must log in to view Knowledge Center Topic updates.