North America CACS 2014 

KEYNOTE SPEAKER

Keynote Harry Markopolos

Harry Markopolos
Bernie Madoff Whistleblower
See Program tab for details.

HIGHLIGHTS VIDEO

View highlights from last year's conference. Watch Now

PHOTO GALLERY

Who Should Attend?

ISACA Members, and IT Audit, Assurance, Security and Risk Management Professionals worldwide.

The conference offers an unrivalled opportunity to expand your network and build onto your knowledge and skills.

Check out the expert-led sessions, workshops and learning tracks.

Track 1: Assurance | Track 2: Risk | Track 3: Security | Track 4: Governance | Track 5: Compliance | Track 6: Audit Strategies, Tactics and Techniques | Track 7: Forums/Megatrends | Track 8: Forums/Megatrends

What's In It For You?

Experience customized learning

Choose the sessions that matter most to you and your enterprise.

Interact face-to-face

Gain insights and share ideas with colleagues at this world-class networking event.

Update your knowledge and skills

Earn valuable CPEs.

What's In It For Your Organization?

Exceptional value for training dollars

Receive documentation from every session that can be shared with colleagues.

Access industry experts

Discover tested solutions that work for successful professionals and could work for your organization.

Meet leading suppliers

Visit the Expo Hall. Get answers directly from representatives, and discover products that decrease enterprise expense and increase ROI.

Questions

Contact ISACA's Training & Education Department:
Tel: +1.847.660.5585
Fax: +1.847.253.1443
conference@isaca.org

Countdown to
North America CACS
4/28/2014

39

CPEHOURS

Earn up to 39 CPE hours by attending this conference.

Register in Advance and
Save US $200!

CONFERENCE VENUE

Stay in the Heart of the Conference Action

Mandalay Bay

3950 Las Vegas Blvd. South
Las Vegas, Nevada 89119
Phone: +1-877-632-7800
www.mandalaybay.com
See Venue tab for special hotel rates.

 

MEDIA INQUIRIES

Contact the ISACA Communications Department:

Tel: +1.847.660.5512 or
+1.847.660.5564
news@isaca.org


TwitterFollow @ISACANews on Twitter and get the latest updates about ISACA's North America CACS with the hash tag #NACACS.


What to Expect

 Download the 2014 North America CACS comprehensive brochure, or visit the program tab for more details.


Don't Miss Out!

  • Join your colleagues.
  • Expand your networking opportunities.
  • Build a stronger IT community.
  • Increase your member and vendor contacts.
  • Interact with speakers who provide insight on IT audit and related topics.

Return to the office motivated to contribute to your enterprise's success and immediately apply what you learned.

 

QR codeStay connected at this year’s North America CACS Conference with your smart phone or other mobile device!

Scan the QR code to download the North America CACS Mobile App from iTunes or Google Play or visit our smart link.

 

North America CACS Mobile AppWith this FREE new feature you will be able to:

  • Build your own conference schedule
  • Complete conference session surveys
  • Take notes and export them to email
  • View session presentations
  • Interact with conference attendees

New this year, the app hosts a Main Conversation where users can post comments of general interest to an open forum, such as informal dinner gatherings and general questions. Also, use the MatchMaking feature to choose your areas of interest and find others at the conference that have similar professional interests.

Program Information

Check back often as we add more information!

  Download the 2014 North America CACS comprehensive brochure

 

Immerse yourself in 3 days of:

Educational sessions — workshops, keynotes, case studies and panel discussions
Networking events — spotlight educational sessions, attendee receptions, workshops and more

View program tracks and workshops below.


Pre-Conference 2-Day Workshops

Saturday, 26 April; 9:00AM - 5:00PM
Sunday, 27 April; 9:00AM - 5:00PM


Post-Conference 1-Day Workshops

Wednesday, 30 April; 1:00PM - 5:00PM
continuing Thursday, 1 May; 9:00AM - 12:30PM

2014 Conference Dates and Times

Pre-Conference Workshop Registration

Saturday, 26 April; 7:00AM - noon
Sunday, 27 April; 7:00AM - noon

Conference Registration

Sunday, 27 April; 4:00PM - 7:00PM
Monday, 28 April; 7:00AM - 5:00PM
Tuesday, 29 April; 7:30AM - 5:00PM

Post-Conference Workshop Registration

Wednesday, 30 April; 7:30AM - 3:00PM

 

Pre-Conference Workshops

Saturday, 26 April; 9:00AM - 5:00PM
Sunday, 27 April; 9:00AM - 5:00PM

Post-Conference Workshops

Wednesday, 30 April; 1:00PM - 5:00PM
Thursday, 1 May; 9:00AM - 12:30PM

Conference

Monday, 28 April; 8:30AM - 5:00PM
Tuesday, 29 April; 8:30AM - 5:00PM
Wednesday, 30 April; 8:30AM - noon

Opening Keynote Address

How did One Man Lose $65 Billion?
The Signs, the Red Flags and How to Make Sure That It Never Happens Again.

 

Keynote Harry MarkopolosHarry Markopolos
Madoff Whistleblower

Chartered Financial Analyst, Certified Fraud Examiner and author of New York Times bestseller No One Would Listen, Harry Markopolos took just five minutes to realize that Bernard Madoff’s investment strategy was a fraud. But try as he did for the next nine years, he could not convince the Securities and Exchange Commission of the truth. The Madoff investigation was his first fraud case. He has been hooked ever since. From the time the Madoff scandal broke, Markopolos has dedicated himself to becoming the world's most visible and shrewd whistleblower on fraud and conflicts of interest in financial markets. Hear what he has to say about fraud, prevention and maintaining a healthy professional skepticism.

In his opening keynote, Markopolos presents a riveting behind-the-scenes account of his nearly nine-year investigation, and reveals:

  • How his four-person investigative team tracked Madoff and the Madoff Feeder Funds throughout Europe and North America
  • The US SEC’s refusal to believe the detailed reports his team repeatedly submitted
  • The red flags, warning signs and the audit steps you need to know to protect your organization

Visit the ISACA Bookstore online or stop by our booth at NACACs to purchase your copy of:
No One Would Listen:  A True Financial Thriller by Harry Markopolos

  • Exclusive story: This is the story of Harry Markopolos' personal investigation into Bernie Madoff and his firm's $65 billion Ponzi Scheme.
  • News-breaking details of the ongoing Madoff investigation: This includes the SEC's own internal investigation of its enforcement failures.

Meet Harry Markopolos immediately following his keynote address for a book signing!  Expo Hall at the ISACA Bookstore.


Closing Keynote Address

Countdown To Teamwork: How Normalizing Deviancy Can Lead to Disaster

 

Mike Mullane
Author and Former Space Shuttle Astronaut

The sky has never been the limit for former Space Shuttle Astronaut and inductee to the International Space Hall of Fame Colonel Mike Mullane. He believes that for leaders and teams to be the most effective, they need to continually raise the bar. Colonel Mullane’s own bar raising has taken him millions of miles, logging 356 hours in space over the course of three separate Shuttle missions. Now an author and acclaimed professional speaker on the topics of teamwork, leadership and safety, Mullane has educated, entertained, inspired and thrilled tens of thousands of professionals.

In his keynote address, "Countdown To Teamwork," Mullane offers a unique perspective on how the standards set and accepted by leaders and teams at ground level affect the heights enterprises can safely and successfully achieve  View a preview of Colonel Mike Mullane’s presentation.

Visit the ISACA Bookstore online or stop by our booth at NACACs to purchase your copy of:
“Riding Rockets: The Outrageous Tales of a Space Shuttle Astronaut” by Mike Mullane

In 1978, the first group of space shuttle astronauts was introduced to the world — 29 men and six women who would carry NASA through the most tumultuous years of the space shuttle program. Among them was USAF Colonel Mike Mullane, who, in his memoir Riding Rockets, strips the heroic veneer from the astronaut corps and paints them as they are — human.

Meet Ret. Col. Mullane immediately following his keynote address for a book signing!  Expo Hall at the ISACA Bookstore.


Saturday, 26 April 2014

Time Pre-Conference Workshops

9:00AM–5:00PM

WS1—COBIT 5 Foundation Course Day 1
WS2—Applied Data Analysis in IS Audit Day 1
WS3—Prevention, Detection and Recovery from Cyberattacks: A Seminar/Workshop for IT Risk Professionals Day 1


Sunday, 27 April 2014

Time Pre-Conference Workshops

9:00AM–5:00PM

WS1—COBIT 5 Foundation Course Day 2
WS2—Applied Data Analysis in IS Audit Day 2
WS3—Prevention, Detection and Recovery from Cyberattacks: A Seminar/Workshop for IT Risk Professionals Day 2

5:30PM–7:00PM

Welcome Reception


Monday, 28 April 2014

Time 2014 North America CACS Sessions

7:30AM–8:30AM

Continental Breakfast

8:30AM–9:45AM

Opening Session Keynote: How did One Man Lose $65 Billion?

9:45AM–10:15AM

Break

10:15AM–11:30AM

111—Auditing Cyberpreparation
112—Integrating IT Risk Management with ERM
113—Responding to Targeted Cyberattacks
114—Leveraging COBIT 5 to Audit IT Governance
115—NIST Cybersecurity Framework
116—Building a World Class Audit Organization
117—Governance Forum

11:30AM–12:45PM

Lunch

12:45PM–2:00PM

121—Cloud Computing and SOC 2 Reports
122—Beyond IT: Third-Party Risk
123—Assessing and Securing Industrial Control Systems
124—The Updated COSO Framework
125—Implementing GRC Tools - Ready for That App?
126—Writing Effective Audit Reports
127—Solving for Current Challenges Using ISACA Tools

2:00PM–2:30PM

Break

2:30PM–3:45PM

131—COBIT 5 as an Auditor's Tool
132—Managing Risk in a Changing World
133—CyberAttacks: Prepared?
134—Big Data & Privacy by Design
135—PCI Update
136—Career Management
137—COBIT 5: Family of Products

3:45PM–4:00PM

Networking Break

4:00PM–5:00PM

141—Auditing IT Projects
142—A Blueprint for the Perfect Attack: Addressing the Open Doors in your APT Strategy
143—Supply Chain Security
144—IT/OT Convergence
145—The Social Media Era
146—KSA Model for IS Auditors
147—ERM for CISO's: Tips and Tricks

5:00PM–7:00PM

Expo Hall Networking Event

5:15PM–5:45PM

SP1—Building a Security Program that Protects an Organization’s Most Critical Assets
SP2—Transforming Internal Audit Through Data Analytics: A Demonstration of Analytics Tools
SP3—The Dinosaur is Alive and Kicking but Have You Kept up With its Security? No you have not!!!

6:00PM–6:30PM

SP4—Proving Your Confidence sponsored by Infogix, Inc.
SP5—Auditing your Privileged Pathways to lock down an Attackers most Coveted Asset sponsored by CyberArk
SP6—How Data Classification can Boost your Organization’s Data Protection Strategy sponsored by Boldon James


Tuesday, 29 April 2014

Time 2014 North America CACS Sessions

7:30AM–8:30AM

Continental Breakfast

8:30AM–9:45AM

211—Auditing Smart Devices
212—"IT" is No Longer About the Delivery of Magic Behind Closed Doors
213—End to End Security
214—Governance in the Cloud
215—The New ISO 27001:2013
216—An Auditor’s Guide to Ensuring Effective Controls Within IT Projects
217—Risk Forum

9:45AM–10:15AM

Break

10:15AM–11:30AM

221—Embedding Data Analytics in Fraud Auditing
222—Privacy Risk Assessments
223—Cybersecurity Awareness
224—IG, Meet BYOD
225—Forensics & eDiscovery
226—Professional Skepticism Awakened
227—The Evolving Threat Landscape—Microsoft Security Intelligence Report
228—Cover Your Assets

11:30AM–12:45PM

Lunch

12:45PM–2:00PM

231—SOC2 Reporting for Healthcare Cloud
232—Turning Risk into Results
233—Don’t Let Your Apples Fall Far From the Tree – Understanding iOS Deployment Risk
234—Third-Party Risk
235—HIPAA Compliance Roadmap
236—Strategic Alignment of the Enterprise
237—How IT Auditors are Using Analytics to Define and Perform the Audits of the Future
238—Megatrend

2:00PM–2:30PM

Break

2:30PM–3:45PM

241—Continuous Control Monitoring
242—Sustainable Risk Planning
243—2014 Security and Privacy Headlines
244—Enhancing Governance Through Effective IA Activities
245—Multi-Compliance Roadmap for Designing and Implementing an SAP GRC Solution
246—Hiring and Retaining Talent
247—The Confluence of Data Security Challenges 
248—Megatrend

3:45PM–4:00PM

Networking Break

4:00PM–5:00PM

251—Partnering Audit and Governance for Business and the Cloud
252—Securing a Website
253—Securing Big Data
254—Outsourcing and the Need for Vendor Audits
255—The One-to-Many Approach
256—Crucial Communications
257—Privacy Forum
258—Enterprise Mobility-Life Beyond Email, Calendars and Contacts

5:15PM–5:45PM

SP7—Effective GRC Means Proactive GRC
SP8—Managing Risk and Compliance Requirements in Electronic Communications sponsored by CA
SP9—Three Lines of Defense to Protect the Flank sponsored by Vanguard Group

6:30PM–9:30PM

The Special Event Sponsored by Deloitte


Wednesday, 30 April 2014

Time 2014 North America CACS Sessions

7:30AM–8:30AM

Continental Breakfast

8:30AM–10:00AM

311—Using Metrics to Address the Most Common Privacy Audit Findings
312—Big Data Risks and Rewards
313—A Practical Approach to Network Vulnerability Assessment
314—Is IT Relevant as We Know it in this Agile World of Innovation?
315—Compliance Management under the CFPB
316—Writing for Understanding
317—Assurance Forum
318—A Seat at the Table: Women in IS Leadership Forum

10:00AM–10:30AM

Break

10:30AM–12:00PM

Closing Keynote: Countdown To Teamwork: How Normalizing Deviancy Can Lead to Disaster

12:00PM–1:00PM

Lunch

1:00PM–5:00PM

Post-Conference Workshops: Day 1
WS4—COBIT 5 for Assurance Day 1
WS5—Security and Audit Mobile Technologies Day 1
WS6—Using Privacy Principles within Business Day 1


Thursday, 1 May 2014

Time Post-Conference Workshops: Day 2

9:00AM–12:30PM

WS4—COBIT 5 for Assurance Day 2
WS5—Security and Audit Mobile Technologies Day 2
WS6—Using Privacy Principles within Business Day 2

 

Continuing Professional Education Credits

National Registry of CPE SponsorsTo maintain ISACA certifications, certification holders are required to earn 120 CPE credit hours over a three-year period in accordance with ISACA’s continuing professional education (CPE) policy. Attendees can earn up to 39 CPE credits; 18 by attending the North America CACS Conference and an additional 7 CPE credits for attending each day of optional pre- or post conference workshops. ISACA conferences are Group Live and do not require any advanced preparation.

ISACA is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site:  www.learningmarket.org.

Conference Registration Fees

REGULAR REGISTRATION
Register and pay by Thursday, 24 April 2014
Member US $1,595 Non-member US $1,795
 
ONSITE REGISTRATION
Register and pay after Thursday, 24 April 2014
Member US $1,795 Non-member US $1,995

One-day Workshop
Member: US $550 Non-Member: US $750

Two-day Workshop
Member: US $750 Non-Member: US $950


Cancellation Deadline:


31 March 2014


*If registration fees are not paid in full by 12 noon CST (UTC-6) on 24 April 2014, the attendee will receive the onsite conference rate of $1795 member/$1995 non-member. Regular registration pricing can be used in conjunction with group discounts, described below.

Group Discounts

ISACA offers discounts to organizations sending 4 or more employees to a single conference. Please contact the ISACA Conference department for more details at +1.847.660.5585 or conference@isaca.org.
All fees are quoted in US dollars. The entire registration fee must be received by ISACA before your registration will be considered paid in full.

Visa

Obtaining a VISA is solely the responsibility of the registrant. Please contact the local government of the host country for details. Once a paid registration is received, a letter of invitation will be provided by ISACA, on request.

Registration Methods

Choose one of these easy ways to register

  1. Register Online.
  2. Fax your completed registration form to +1.847.253.1443
  3. Mail your completed registration form to:
    ISACA, 1055 Paysphere Circle, Chicago, IL 60674 USA
  4. Bank Wires—send electronic payments in US dollars to:
    Bank of America, 135 S. LaSalle St., Chicago, IL 60603
    ABA #0260-0959-3
    ISACA Account #22-71578
    S.W.I.F.T. code BOFAUS3N
    [Please include attendee’s name and NACACS 2014 on the Advice of Transfer.]
 

Cancellation Policy

If your plans change and you won’t be able to attend the conference contact us by phone, fax or e-mail to cancel your registration. All cancellations must be received by 31 March 2014 to receive a refund of registration fees. A cancellation charge of US $100 will be subtracted from conference refunds, and US $50 from workshop refunds. No refunds can be given after 31 March 2014. Attendee substitution is permitted at any time until the conference. If a nonmember is substituting a member, then there will be additional nonmember fees.

NOTE: Registration is contingent upon full payment of the registration fee. To guarantee registration, conference fees must be received by the published deadline. It may take 10 or more business days for a wire transfer or mailed check to reach ISACA, so please plan accordingly. If, for any reason, ISACA must cancel a course or event, liability is limited solely to the registration fees paid. ISACA is not responsible for other expenses incurred, including travel and accommodation fees. For more information regarding administrative policies, please contact the ISACA conference department.
Phone: +1.847.660.5585
Fax: +1.847.253.1443
E-mail: conference@isaca.org

Disclaimer

ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to ISACA as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.

Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.


Not a member of ISACA? Join today!

When you register for the conference as a nonmember, the difference between member and nonmember conference fees can be applied towards ISACA membership. This means you can become a member at the international and chapter level for little to no additional cost; it just depends on your local chapter dues. To take advantage of this great offer, check the box on the registration form. For more information about ISACA membership, visit the web site at www.isaca.org/membership or contact the membership department at membership@isaca.org.

NOTE: This offer expires 30 days after completion of the event. Nonmembers pay the nonmember conference fee when registering.


Permission to be Photographed

By attending this event, the registrant grants permission to be photographed and videotaped during the event. The resultant photographs and videos may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site, in social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs and videos will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs or videos now or in the future.


Dress

Business casual is appropriate for this and all ISACA conference events.

Venue and Accommodations

Mandalay Bay 

Mandalay Bay Resort & Casino
3950 Las Vegas Blvd. South
Las Vegas, Nevada 89119
Phone (toll free): +1.877.632.7800 (Ask for Reservations Department); +1.702.632.7777
Fax: +702.632.7206

Reserve your guest room on line
(Identify Group as ISACA NACACS 2014)

Web Site: www.mandalaybay.com

Monday-Thursday Guest Room Rate:  $189 per night single/double, plus resort fee of $22 per night, plus tax of 12%. Other nights may be a higher rate.

Guest Room Cut-off Date:  4 April 2014

All guest reservations are guaranteed by payment of first night’s room plus resort fee and tax. Cancellations with full refund will be allowed up until 48 hours prior to reservation date.

Resort fee is inclusive of:  In-room wireless internet, fitness center admission, daily newspaper, local and toll-free number calls, and outgoing faxes and boarding pass printing at hotel business center.

PLEASE NOTE: Guest rooms at the Mandalay Bay are sold out for the evenings of 27-29 April. Overflow rooms are available at a special rate (subject to availability; restrictions apply) at the adjacent Luxor Las Vegas Hotel.

Great Room Suite at Mandalay Bay

 
A Deluxe Room at Mandalay Bay

Special Hotel Information

Special hotel rates are available three days prior to and following the conference, and are subject to availability. To obtain the preferred rate, remember to mention that you are attending ISACA North America CACS Conference. Reservation requests received after the cut-off date will be honored on a space-available basis only. All reservations must be guaranteed with a deposit of one night's room cost.

Individuals are responsible for securing their own deposit at the time reservations are made. ISACA strongly encourages all conference delegates to stay at the host hotel. Staying at the host hotel helps keep the cost of the conference and membership dues down by helping us fulfill our negotiated guest room commitments to the hotel. You will also enjoy the benefits of being onsite for conference activities at a reasonable price.

Discounted Travel

ISACA has arranged for discounted travel for up to ten percent on travel to and from ISACA events held in North America on United Airlines. For North America CACS this offer is valid for travel booked during the event dates of Wednesday, 23 April 2014 – Saturday, 3 May 2014. Reservations can be made online at www.united.com or by emailing groupmeetings@united.com. While booking, enter Agreement Code: 297964 and Z Code: ZRM8 when searching for flights to take advantage of these discounts.

American Airlines is offering a special meeting discount, which can be booked on-line at www.aa.com for American Airlines/American Eagle Airlines flights only. Enter the Promo code 9344DB in the Promotion Code box. The discount is valid April 23, 2014 – May 03, 2014.

Itineraries involving any oneworld or codeshare partner airlines must be booked through our Meeting Services Department at 1-800-433-1790 if calling from the US and Canada. Please note a $25.00 fee will apply for each ticket booked over the phone. International attendees should call their local American Airlines reservations number.

Test

If you are not already signed in, sign in below to register for this Conference.

If the login does not appear below or the form does not function as expected please use this form.

Thank You to Our 2014 Sponsors!

  Gold

CA Technologies


CA Technologies provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organizations of all sizes leverage CA Technologies software and SaaS solutions to accelerate innovation, transform infrastructure and secure data and identities, from the data center to the cloud. CA Technologies offers a practical approach to help customers transition from maintaining IT systems to delivering new, innovative services and value through IT.

 

 

Deloitte


Effective organizations extend their internal audit (IA) oversight and performance to address IT risks as well as broader organization-wide business risks. Deloitte helps connect IT and IA to gain a greater understanding of the risks and opportunities that come with today's systems, applications, and other technologies.

 

KPMG


KPMG LLP's IT Advisory professionals help clients assess, manage, and remediate IT-related risks. We help organizations develop the right approach— turning risk into opportunity—to drive sustainable business value. We accomplish this by helping organizations demonstrate effective IT compliance through governance and controls, data integrity, security and privacy, and supplier management.

Our high-performing professionals use experience and insight to cut through complexity and deliver informed perspectives and clear methodologies that our clients value. Client focus, commitment to excellence, global mind-set, and consistent delivery build trusted relationships - core to our business and reputation

 

Microsoft


Microsoft’s Trustworthy Computing group focuses on creating and delivering secure, private, and reliable computing experiences based on sound business practices. Our goal is a safer, more trusted Internet.

 

Modulo


Modulo is the leading global provider of information & technology GRC solutions, offering flexible and affordable methods for managing risk, compliance, and business continuity across the enterprise and extended enterprise of vendors. 1,000+ customers leverage Modulo to automate workflow; report compliance against regulations, standards, policies; prioritize risk through analytics and business metrics; secure cloud environments; remediate vulnerabilities; and more.

 

Vanguard Integrity Professionals


Vanguard Integrity Professionals, an IBM Business Partner, provides enterprise security software and services that solve complex security and regulatory compliance challenges and deliver a rapid return on investment. With automated solutions for Audit and Compliance, Operational Security and Intrusion Management, Vanguard enables government agencies and corporations around the world to ensure continuous monitoring of System z, safeguard cloud computing secure domains, and protect critical data and applications from cybersecurity threats.

 

  Silver

Infogix Controls Solutions


Many of the world’s largest enterprises depend on Infogix to transform their operations. Through the use of Infogix solutions, customers are able to control, analyze and improve their data integrity and compliance efforts. Since 1982, Infogix has been providing Infogix Controls Solutions to Global 2000 enterprises. Millions of Infogix Controls continuously monitor and assure the integrity of information in hundreds of enterprises each day. For more information, call +1.630.649.6800 (U.S, Canada, and International), or visit www.infogix.com.

 

Vanguard


Vanguard is one of the world’s largest investment management companies and a leading provider of company-sponsored retirement plan services. Our mission is simple. We aim to help our client individuals, institutions, or financial advisors reach their financial goals by being the world's highest-value provider of investment products and services.

 

  Bronze

BEW Global


BEW Global is an internationally recognized leader in critical asset protection, providing information and network security services to help organizations in protecting their most critical assets. BEW Global leverages its portfolio of Consulting, Technical, and Managed Security Services combined with Security Assessments and Training to help organizations accomplish these goals.

 

Boldon James


For almost 30 years, Boldon James has been a leader in data classification and secure messaging solutions, helping organizations of all sizes manage sensitive information securely and in compliance with legislation and standards, in some of the most demanding messaging environments in the world.

 

CyberArk


CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage

 

Qualys


Qualys (www.qualys.com) is a pioneer and leading provider of cloud security and compliance solutions with over 6,700 customers in more than 100 countries. The QualysGuard Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance, delivering critical security intelligence on demand.

 

Supporting Sponsors

Action Software

APMG International

Arbutus

BeyondTrust

Canaudit

CaseWare Analytics

CBIZ

Chan Healthcare

ERP Maestro

Hitachi-ID

MIS Training Institute

NQA USA

Regis

Rsam

SSH

Sunera

TeamMate Solutions

Terra Nova Training

TraceSecurity

Utica College

WhiteCanyon

XBridge Systems

     

 

For Exhibitor and Sponsorship Opportunities


  2014 North America CACS Expo Hall Floor Plan
  2014 North America CACS Sponsorship Brochure

Please contact: 

Sean Stringer
Director of Sponsorships
Phone: +1.847.660.5729
Fax: +1.847.253.1443
sstringer@isaca.org

  Events and Sponsorship Information