Event Presentations 

 

 

March 12, 2019 - March CPE Event 

Hack Yourself - Going dark on the internet

Oracle Audit

SQL Server Security Audit

SQL Server Slide Notes

SQL Server Scripts

 

December 4, 2018 - December CPE Event 

2018 Cybersecurity Event - Agenda Items and Bios

Performing a Cyber Risk Assessment (Head - Experis Finance)

InTech Presentation

 

October 16, 2018 - October CPE Event 

Innovation in the Audit Function (WFAS)

Data Analytics and Automation (RSM)

Robotics Process Automation (PwC)

 

September 11, 2018 - September CPE Event 

Managing the Blind Side (Mann)

Women in Data Science

 

June 5, 2018 - June CPE Event 

RPA Big Data (Patel)

Self Service BI (Stratifyd)

Auditing Big Data Systems (Johnson)

Data Analytics and Visual Reporting Basics (Visual Risk IQ) Part1  Part2

 

March 13, 2018 - March CPE Event 

Robotic Process Automation (PWC)

Artificial General Intelligence (Bank of America)

Machine Learning with Google Cloud Platform (Google)

Artificial Intelligence (Syntelli)

For Raven’s presentation please send an email to the programs at charlotteisaca dot org.

 

December 5, 2017 - October CPE Event 

Cyber Security Panel (Vaco)

NYS DFS Cybersecurity Requirements (Experis)

Cyber Kill Chain Methodology (Wrozek)

Cyber Security Strategy (Wrozek)

 

October 17, 2017 - October CPE Event (Joint IIA/ISACA)

IT Audit Update - Hot Topics (Head)

Future of Internal Audit (E&Y)

Millennial Workforce (Lietz)

 

June 06, 2017 - June CPE Event 

Cybersecurity and Financial Statement Audit (Bastow)

Blockchain Presentation (Kemp)

Robotic Process Automation (Tata)

 

April 19, 2017 - Aprll CPE Event 

Crisis and Change Management

ERM Audit

Social Networking

Outsourcing and the Need for Supplier Audits

 

December 6, 2016 - December CPE Event 

Cyber-in-Security and Org Misbehavior - Popovich

Auditing Encryption - Baccam

Cybersecurity Risk Outside the Firewall - Spivey

Awareness - Barton

 

June 7, 2016 - June CPE Event 

Critical Data Points to Assess True Risk of Data Breach - Ali Alwan (Part 1)

Critical Data Points to Assess True Risk of Data Breach - Ali Alwan (Part 2)

IT General Controls - John Gatto (Part 1)

IT General Controls - John Gatto (Part 2)

IT General Controls - John Gatto (Part 3)

IT Risk Assessment - John Gatto 

 

March 22, 2016 - March CPE Event 

3.22.16 ISACA Agenda (with abstracts and bios - final)

Keynote Focus on the Future - Matt Loeb (Part 1)

Keynote Focus on the Future - Matt Loeb (Part 2)

Staying Ahead of the Game - Chris Strand

Bring your own Device (BYOD) - John Gatto

Auditor's Role in System Development - John Gatto 

Payment Card Industry (PCI) Assessment - John Gatto 

 

December 1, 2015 - December CPE Event 

Cybersecurity State of Union - Experis (Part 1)

Cybersecurity State of Union - Experis (Part 2)

Determined Human Adversaries - Mitigations - Microsoft

After the Cyber Attack - Microsoft 

Understanding the FFIEC Cybersecurity Assessment Tool - Bit9 + Carbon Black 

The Privileged Pathway - CyberArk 

ZScaler - Kevin Peterson 

You Are the Weakest Link - SecureState 

Engineering for Security - SecureState 

When the Storm Hits - Ramaley Group

NISTCybersecurity Framework - Dixon Hughes

 

October 29, 2015 - October CPE Event (Joint IIA/ISACA Event)

Managing Third Party Risk - Experis

Quality Assurance and Improvement Program - PWC

IT Governance & Risk Considerations during Internal Audit Transformation - Experis 

 

September 15, 2015 - September CPE Event 

ISACA Intro Slides

Patricia Rowlett - Project Management Considerations for Data Analytics

Brian Karp - Our Data Analytics Journey, Methodology, and More

James Kidwell - Auditing Application User Account Security and Identity Management with Data Analytics

Joe Oringel - Big Data, Analytics and More

Joe Oringel - Visual Reporting Slides

Paresh Patel - Big Data Presentation

Tom Valiquette - Using Data Analytics to Evaluate Account Administration

 

June 2, 2015 - June CPE Event 

Jose Rodas - Security Analysis with ACS and Operational Insights 

Jose Rodas - Monitoring your Data Center with SCOM

Jennifer Allen & Chris Strand - Continuous Compliance

Ken Ramaley - Ensuring Continuous Monitoring Relevance

Raven Catlin - Advanced Critical Thinking

Netskope - Risk and Compliance in a Cloudy World:  Part 1      Part 2 

 

March 24, 2015 - March CPE Event 

 Jason Smith - Cloud Compliance Considerations 

Eric Lovell - Evaluating Cybersecurity Coverage

HP - New Style of IT Security

HP - Executive Breach Reponse Tool

HP's Cyber Risk Report for 2015 

Amy Black - Effective Vendor Management

Steve Rindelberg (VANGUARD) - Multi Factor Authentication for Z

Steve Rindelberg (VANGUARD) - The Overlooked Enterprise Platform

Chad Froomkin (CyberArk) - The New Cyber Battleground

 

February 24, 2015 - February CPE Event 

 Matt Hillman - Securing SharePoint

 

December 2, 2014 - December CPE Event 

Debra Banning - Effective Risk-Based Information Security Program

Tom Tollerton - Basic Digital Privacy

National Cybersecurity Workforce Framework

NCF & NICE Overview

 

October 2014 - IIA/ISACA Joint Meeting Event 

Presentation  

 

September 8, 2014 - September CPE Event 

Slide #1    Slide #2    Slide #3    Slide #4    Slide #5    Slide #6

Slide #7    Slide #8    Slide #9    Slide #10

Linda Yates - SAP Basics for Auditing Change Management & Security

 

June 2014 - Network Auditing CPE Event 

Slide #1    Slide #2    Slide #3    Slide #4    Slide #5    Slide #6

Slide #7    Slide #8    Slide #9    Slide #10

Mark Krawczyk - Router Running Config Example

Mark Krawczyk - Cisco Device Hardening Review

Steve Schlarman - Risk Intelligence: Harness and Exploit Risk for Competitive Advantage 

Thomas Wood - After the Attack: The Transformation of RSA Security Operations:             Part 1      Part 2 

Dave Rivard - Securing the Cloud from z/OS Perspective:    Part 1    Part 2

Jonathan Lewis - What IT Auditors Need to Know About Secure Shell   

 

March 2014 - Oracle CPE Event 

Slide #1    Slide #2    Slide #3    Slide #4    Slide #5    Slide #6

Slide #7    Slide #8    Slide #9    Slide #10

 

December 3, 2013 - December CPE Event 

Paresh Patel - Data Analysis, An Integrated Approach  

Tom Lennon and Chad Gasaway - Intelligence-Driven Security 

Tom Valiquette - Using Data Analytics to Evaluate Account Administration

Gary Gardner - InfraGard Overview 

Mag Francois - Automated Business Controls

 

October 2, 2013 - South Piedmont Community College Public Event

Mark Pollitt - Why Cybersecurity Matters  

 

September 17, 2013 - September CPE Event

Garrett Droege - Cyber Liability

Shawn Swartout - Risk-Assessment Acceptance Exception

  

June 25, 2013 - Annual General Meeting

Aubrey Turner - The Prequel - Hybrid Enterprise Identity and GRC

Aubrey Turner - The Sequel - Seeing Shapes in the Cloud - Identity and Security

Josh McDermott - Ben Schmidt - IT Audit Emerging Topics

Eric Gerena - Top 10 Database Threats & Anatomy of a SQL Injection Attack