Check back often for updates in the knowledge center and for newly added presentations in the archives!
Innovation is defined as the introduction of something new or a new idea, method or device; therefore, introducing something new to a process is innovating.
Ian Cooke, CISA, CGEIT, CRISC, COBIT Assessor and Implementer, CFE, CPTE, DipFM, ITIL Foundation, Six Sigma Green Belt Yesterday | 0 comments
With the robust requirements listed by upcoming regulations, such as GDPR, the importance of a cloud app security solution cannot be ignored.
Aditya K. Sood, Ph.D., and Rehan Jalil Yesterday | 0 comments
Get to know your network.
Sandy Fadale, CRISC, CISM, CGEIT Yesterday | 0 comments
Over the past several years, big data has emerged as one of the top strategic technology priorities for organizations.
Joshua McDermott, CISA, CEH, CISSP, PMP 6 days ago | 0 comments
It is no surprise that many enterprises, ranging from early start-ups to mature global enterprises, have considered or implemented a migration to Amazon Web Services’ (AWS) cloud computing services.
Ray Cheung, CISA, CITP, CPA, Vikas Sharma, CISA and Bhupinder Singh, CISA, CISM, ITIL v3, PMP, QSA 6 days ago | 0 comments
You must log in to view Knowledge Center Topic updates.
March 2018 - Jennifer Mak, Chris Olson, EY
2018 Top Cybersecurity Risks and Areas of Focus
November 2017 - Chris Covell, Absolute Software
Building an Effective Endpoint Risk Program
Cost of Insecure Endpoints
September 2017 - Amie Searly, University of Washington
Malicious Insider Threats and Conduct Risk
May 2017 - Eva Benn & Swarnika Mehta, KPMG LLP
Cyber & GRC Metrics That Tell a Story
2/16/16 ISACA PSC Luncheon
IAM Intelligence Overview
10/18/2016 Luncheon Presentation
Simulated Cybersecurity Incident
9/20/2016 Luncheon Presentation by Vanessa Pegueros
Lessons Learned from Treating Trauma
5/17/2016 Luncheon Presentation by Jody Cedola and Robert Kaler
Identifying Cybersecurity Threats and Evaluating IT Controls
2016 Spring Seminar Presentation by Kevin Tam
2016 Spring Seminar Presentation by Daniel Hansen
Protiviti Breach Kill Chain Model
2016 Spring Seminar Presentation by Jack Jones
Getting Serious About Cyber Security
2016 Spring Seminar Presentation by Sean P. Murphy
Cybersecurity in Healthcare
2016 Spring Seminar Presentation by Michael C. Boyd
3/15/16 ISACA PSC Luncheon: Microsoft Retail
The Security and Privacy Story
IAM Intelligence Overview
9/16/15 ISACA PSC Luncheon
Institutional Considerations for Managing IoT Risk
5/19/15 ISACA PSC Luncheon Migrating Applications to the Cloud
3/23/15 ISACA PSC Seminar Houston We Have Several Problems
3/23/15 ISACA PSC SeminarSensitive Data in the AWS Cloud
3/24/15 ISACA PSC Seminar Privacy and Measurement
3/24/15 ISACA PSC Seminar Why Do We Care
10/20/15 ISACA PSC LuncheonWhy We are Failing