North America CACS 2017 

HIGHLIGHTS VIDEO

See Video Highlights from NA CACS Conference! Watch Now

PHOTO GALLERY

See slideshow of NA CACS

 


Justify Your Attendance!

Linked below is a justification letter template to be used as a turnkey resource you can hand to your employer or HR staff outlining the positive impact your NACACS attendance will have on your role and your organization! For attendees who are not yet members of ISACA, there is a separate note with added details about the benefits of ISACA Membership.

  View Letter

North America CACS 2016 Has Concluded

Attendees connected with the most dynamic minds and practitioners in information systems audit, control and security.

See you next year!

1 – 3 MAY | LAS VEGAS, NEVADA, USA
Mark your calendar to attend North America CACS 2017

 

Who Should Attend?

ISACA Members, and IS Audit, Assurance, Security and Risk Management and Governance Professionals worldwide.

The conference offers an unrivalled opportunity to expand your network and build onto your knowledge and skills.

Check back for information about the expert-led sessions, workshops and learning tracks.

What's In It For You?

Experience customized learning

Choose the sessions that matter most to you and your enterprise.

Interact face-to-face

Gain insights and share ideas with colleagues at this world-class networking event.

Update your knowledge and skills

Earn valuable CPEs.

What's In It For Your Organization?

Exceptional value for training dollars

Receive documentation from every session that can be shared with colleagues.

Access industry experts

Discover tested solutions that work for successful professionals and could work for your organization.

Meet leading suppliers

Visit the Expo Hall. Get answers directly from representatives, and discover products that decrease enterprise expense and increase ROI.

Countdown to
NACACS
5/1/2017

39

CPEHOURS

Earn up to 39 CPE hours by attending this conference.

CONFERENCE VENUE

The Cosmopolitan of Las Vegas


See everything Las Vegas
has to offer
— world-class entertainment, dining, gaming and
SO MUCH MORE!

Stay in the Heart of the
Conference Action at the
The Cosmopolitan of Las Vegas


See the Event Destination tab for more information.

 The Cosmopolitan of Las Vegas

 


Follow @ISACANews and join the North America CACS conversation by using the hashtag #NACACS.
Like ISACA on Facebook to stay informed.
Join the ISACA (Official) LinkedIn group and start a discussion about North America CACS today.


Don't Miss Out!

  • Join your colleagues.
  • Expand your networking opportunities.
  • Build a stronger IT community.
  • Increase your member and vendor contacts.
  • Interact with speakers who provide insight on IT audit and related topics.

Return to the office motivated to contribute to your enterprise's success and immediately apply what you learned.

 

 

Thank You to Our 2016 Premium Sponsors!

Program Information

Have a look below at the 2016 program, and check back often for 2017 updates.

Program Tracks:

Pre-Conference Workshops

2 days, 30 April 2016 – 1 May 2016

Post-Conference Workshops

1 day, 4 – 5 May 2016

*Please Note: Workshops 2, 3 and 6 are currently sold out. Please contact conference@isaca.org to be placed on the waitlist.


2016 Closing Keynote Address

Shift Your Brilliance – Harness the Power of You, Inc.

Simon T. Bailey
Author, Speaker
and Global Influencer

 

One of Speaker magazine’s top twenty-five “hot speakers” shaping the profession, author and CPAE Speaker Hall of Fame inductee Simon T. Bailey teaches influencers how to improve themselves and change the world. As an executive advisor, career mentor, and keynote speaker, he doesn’t take people where they want to go; he provides strategic steps to guide them to where they need to go. Bailey’s business experience spans 28 years with six different companies, including the world-renowned Disney Institute based at Walt Disney World Resort®. In his presentations—to 1,000 organizations and counting, across 6 continents—Bailey connects with audiences on many levels, and goes beyond feel-good content to deliver a relevant message that resonates and produces real-life results.

Start following Simon on Twitter Now @simontbailey

 

2016 Opening Keynote Address

Multiply Your Value, Starting Here and Now

Tim Sanders
Internet Pioneer
Best-Selling Author
Public Consultant

 

Time Magazine calls Tim Sanders a “Public Consultant” because of his extensive pre-keynote research and highly customized advice points for groups. The Internet pioneer and New York Times best-selling author of Love Is The Killer App: How to Win Business & Influence Friends advises Fortune 500 executives on leadership, marketing and new media strategies to grow business.

Tim was an early-stage member of Mark Cuban's broadcast.com. In 1999, broadcast.com was acquired by Yahoo, taking Tim with it, where he rose to the position of Chief Solutions Officer and was named its Leadership Coach. Tim has since consulted with dozens of companies involved in business-to-business, government and consumer industries and his background in economics, psychology and debate give him a rare blend of stories and science to move audiences to action.

In today’s fast changing world, you are only as effective as your knowledge base and network of relationships. The best way to increase your performance is to commit to self-education beyond your core disciplines and adopt the habit of sharing knowledge with your colleagues in every interaction. This builds up trust, which then allows you to share your network to promote success and collaboration in others. In Sanders’ view, this is how you bring the love to work – and produce outstanding results for your enterprise.

Start following Tim on Twitter Now @sanderssays

2016 Conference Dates and Times  

Saturday, 30 April 2016

7:30AM – 12:00PM   Workshop Registration Open
9:00AM – 5:00PM   Pre-Conference Workshops – Part 1

Sunday, 1 May 2016

8:00AM – 12:00PM   Workshop Registration Open
9:00AM – 5:00PM   Pre-Conference Workshops – Part 2
4:30PM – 6:30PM   Conference Registration Open
5:30PM – 6:30PM   Conference Welcome Reception

Monday, 2 May 2016

7:00AM – 5:15PM   Conference Registration Open
8:30AM – 5:15PM   Conference Programing
5:15PM – 7:15PM   Networking Reception in Exhibit Hall

Tuesday, 3 May 2016

7:30AM – 5:00PM   Conference Registration Open
8:30AM – 5:00PM   Conference Programing
6:30PM – 9:00PM   Social Event

Wednesday, 4 May 2016

7:30AM – 2:00PM   Conference/Workshop Registration Open
8:30AM – 11:45AM   Conference Programing
1:00PM – 5:00PM   Post-Conference Workshops – Part 1

Thursday, 5 May 2016

8:00AM – 12:30PM   Workshop Registration Open
9:00AM – 12:30PM   Post-Conference Workshops – Part 2

 


Saturday, 30 April 2016

Time  

9:00AM - 5:00PM

WS1—Creating a Privacy Program using ISACA’s Privacy Principles Part 1
WS2—Database Security & Audit Part 1
WS3—Cybersecurity Fundamentals Part 1


Sunday, 1 May 2016

Time  

9:00AM - 5:00PM

WS1—Creating a Privacy Program using ISACA’s Privacy Principles Part 2
WS2—Database Security & Audit Part 2
WS3—Cybersecurity Fundamentals Part 2

4:30PM - 5:30PM

First-time Attendee Reception

5:30PM - 6:30PM

Welcome Reception

 

Monday, 2 May 2016

Time  

8:30AM - 10:00AM

Opening Keynote Address—Multiply Your Value, Starting Here and Now

10:00AM - 10:30AM

Refreshment Break

10:30AM - 11:45AM

111—Continuous Control Monitoring in Practice
112—Mastering the Human Side of Data Governance
113—2020 Vision for the 2020 CISO
114—PIA: Highway to Hell or Stairway to Heaven?
115—A Real Case Study on Capability Models
116—Bridging the Gap
117—All About Analytics: Turn Data into Weapons

11:45AM - 1:00PM

Lunch

1:00PM - 2:15PM

121—Best Practices in Audit Committee Reporting
122—Auditing Big Data
123—Insider Threat: Building a Security Program for a Multi-Generational Workforce
124—Healthcare Security and Privacy Challenges
125—Enable a Compliance Driven GRC Program
126—Genius Is a Team Sport
127—Automating and Modernizing z/OS Security Auditing and Compliance

2:15PM - 2:30PM

Session Movement Break

2:30PM - 3:45PM

131—The Adaptable IT Auditor
132—Moving Beyond AP & Payroll with Analytics
133—Audit As An Impact Player for Cybersecurity
134—The One-hour Privacy Primer
135—GRC Innovation by Design
136—Attributes of a Highly Effective IS Auditor
137—Managing Increased Regulatory Expectations of Technology Audit

3:45PM - 4:15PM

Refreshment Break

4:15PM - 5:15PM

141—Auditors on Roller Skates?
142—A Pragmatic Approach to Sustaining Data Analytics
143—Payment Data Security
144—Privacy Lessons from the Field
145—Enhanced Business Process Control Monitoring
146—Geek Speak to Business Speak
147—TBD

5:15PM - 7:15PM

Expo Hall Networking Reception

5:30PM - 6:00PM

SS1—Personal Data Use Governance: Mitigate Risk While Unlocking Business Value
SS2—Automated Solution Toolkit to effectively Audit the IBM Systems Z
SS3—TBD

6:15PM - 6:45PM

SS4—Achieving Intelligent, Adaptive, and Scalable Risk Management
SS5—TBD
SS6—TBD

Tuesday, 3 May 2016

Time  

8:30AM - 9:45AM

211—Vendor Controls Assurance - a New Approach
212—Data Analytics: Effectively Integrating Data Analytics into an Internal Audit Program
213—Planning for a Data Breach
214—Hell is Empty and All the Devils are Here
215—Sustainable IT Vendor Risk Management
216—Building your personal brand: Focus on Women
217—Top Ten Audit Issues for 2016

9:45AM - 10:15AM

Refreshment Break

10:15AM - 11:30AM

221—IT Risk Assessment
222—Road Map to Data Analytics Success
223—Security Threat How Can You Lower Your Risk?
224—No Party With Third Parties
225—Shadow IT Risk & Cloud Governance
226—Building your personal brand: Focus on Women
227—Introduction to Blockchain from a Risk Management Perspective

11:30AM - 12:45PM

Lunch

12:45PM - 2:00PM

231—Auditing Agile
232—Leveraging Analytics and Data Visualization
233—Cybersecurity Service Level Agreements
234—Navigating the Data Breach Regulatory Maze
235—Intelligence Panel: What We Learned & How It Influenced Our Project
236—Conflict Management and Negotiation Skills
237—A Global Look at IT Audit Best Practices

2:00PM - 2:15PM

Session Movement Break

2:15PM - 3:30PM

241—How to Audit Customers for Defenses Against Ransomware
242—The Future of Big Data
243—FFIEC Cybersecurity Assessment Tool
244—Data Privacy: The New Frontier
245—Art of Performing Risk Assessments
246—People Centric Skills: Communication
247—The Future of Managing Vendor Risk

3:30PM - 4:00PM

Refreshment Break

4:00PM - 5:00PM

251—Transforming Internal Audit: A Digital Journey
252—Identity Analytics Cuts Realtime Risk
253—Encryption
254—Containers: What YOU Need to Know
255—Enhancing Governance Through IA Activities
256—Become a Chief Information Security Officer
257—How To Become a Successful IT Audit Director for a Fortune 1,000 Company

5:15PM - 5:45PM

SS7—SSH Keys - Security and Compliance of the Hidden Production Access Engine
SS8—Digital Risk Officer: The Next Generation CISO

6:30PM - 9:00PM

The Special Social Event: Flashback to the '40s


Wednesday, 4 May 2016

Time  

8:30AM - 9:45AM

311—Open Debate: Is IA the 3rd Line of Defense?
312—Big Data: Audit and Governance
313—Enterprise Security Governance
314—Is a Legacy System a Data Breach Candidate?
315—Digital Risk in Retail
316—Releasing Leadership Brilliance – How to Empathize, Engage, and Energize Your Culture

9:45AM - 10:15AM

Refreshment Break

10:15AM - 11:45AM

Closing Keynote Address—Shift Your Brilliance – Harness the Power of You, Inc.

1:00PM - 5:00PM

WS4—Measuring What Matters Part 1
WS5—Applied Data Analysis Part 1
WS6—The Power of Strategic Vendor Risk Management – Turning Risks into Results Part 1


Thursday, 5 May 2016

Time  

9:00AM - 12:30PM

WS4—Measuring What Matters Part 2
WS5—Applied Data Analysis Part 2
WS6—The Power of Strategic Vendor Risk Management – Turning Risks into Results Part 2

 

Continuing Professional Education Credits

To maintain ISACA certifications, certification holders are required to earn 120 CPE credit hours over a three-year period in accordance with ISACA’s continuing professional education (CPE) policy. Attendees can earn up to 39 CPE credits; 18 by attending North America CACS, 14 for the pre-conference and an additional 7 CPE credits for attending post-conference events. ISACA conferences are Group Live and do not require any advanced preparation.

ISACA is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site:  www.learningmarket.org.

Please note that the session scanners at the Conference do not track CPE credit hours. You will still need to allocate your CPE hours in “My ISACA” following the conference. Your CPE Certificate of Attendance will be emailed to you four to six weeks following the conference.

Conference Registration Fees

Registration opening soon! Check back for more information.

 

Group Discounts

ISACA offers discounts to organizations sending 4 or more employees to a single conference. Please contact the ISACA Conference department for more details at +1.847.660.5670 or conference@isaca.org.
All fees are quoted in US dollars. The entire registration fee must be received by ISACA before your registration will be considered paid in full.

Government Discounts

ISACA offers a $350 conference registration discount to government employees. The government employee discount will be applied toward the main conference registration and is not applicable toward any pre- or post-conference workshops. Please contact the ISACA Conference department for more details at +1.847.660.5670 or conference@isaca.org.

Academic and Student Discounts

ISACA offers a $350 discount to academic institution employees and students. This discount can be applied to the main conference registration only, and is not applicable toward any pre- or post-conference workshops. Please note that you must be an ISACA Student member in order to receive the student discount; additional membership and qualification details can be found here. For additional registration details, please contact ISACA’s Conference Department at conference@isaca.org, or +1.847.660.5670.

* All discounts apply to the main conference registration rate and can be used in conjunction with any early-bird registration discounts available at the time of registration and payment. Any other registration discount combinations cannot be honored.

Payment Methods

  1. Pay online at www.isaca.org/invoices
  2. Mail your payment to:
    ISACA
    1055 Paysphere Circle
    Chicago, IL 60674 USA
  3. Bank Wires—send electronic payments in US dollars to:
    Bank of America
    135 S. LaSalle St.
    Chicago, IL 60603
    ABA #0260-0959-3
    ISACA Account #22-71578
    S.W.I.F.T. code BOFAUS3N
    * Please include attendees name on the Advice of Transfer.

Disclaimer

ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to ISACA as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.

Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.


Not a member of ISACA? Join today!

When you register for the conference as a nonmember, the difference between member and nonmember conference fees can be applied towards ISACA membership. This means you can become a member at the international and chapter level for little to no additional cost; it just depends on your local chapter dues. To take advantage of this great offer, check the box on the registration form. For more information about ISACA membership, visit the web site at www.isaca.org/membership or contact the membership department at membership@isaca.org.

NOTE: This offer expires 30 days after completion of the event. Nonmembers pay the nonmember conference fee when registering.


Permission to be Photographed

By attending this event, the registrant grants permission to be photographed and videotaped during the event. The resultant photographs and videos may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site, in social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs and videos will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs or videos now or in the future.


Dress

Business casual is appropriate for this and all ISACA conference events.


Arrive Early for the Conference…and enjoy Las Vegas!

Plan ahead and extend your stay in Las Vegas!


The Cosmopolitan of Las Vegas

3708 Las Vegas Boulevard South
Las Vegas,
NV 89109
Phone: 702.698.7000

Reservations Opening Soon!

There will be a limited number of rooms available at ISACA’s Group Room Rate and reservations will be handled on a first come-first served basis. All reservations made after the deadline or after the room block fills, are subject to space and rate availability.

In order to guarantee hotel reservations, guests will be required to provide credit card and will be charged a deposit equal to one night rate plus tax. Cancellations with full refund will be allowed up until 72 hours prior to the arrival date of the reservation.

 

Help Us to Help You!

For the best possible experience, ISACA strongly encourages all conference delegates to stay at the host hotel. It is the most convenient location for attendees to be able to participate in all conference activities at a reasonable price. Also, every reservation made for those attending ISACA events will help us to fulfill our commitment to the hotel, which in turn allows ISACA to continue to keep the cost of the conference fees and membership dues as low as possible.

Thank You to Our 2016 Sponsors!

  Platinum

 

 

  Gold


In the United States, Deloitte LLP and its subsidiaries have 57,000 professionals with a single focus: serving our clients and helping them solve their toughest problems. We work in four key business areas — audit, financial advisory, tax and consulting — but our real strength comes from combining the talents of those groups to address clients’ needs. Fortune and BusinessWeek consistently rank our organization among the best places to work, which is good news for our talent and our clients alike. When the best people tackle the most compelling challenges, everyone wins.

 


Organizations can achieve tangible benefits from emerging technologies such as connected and mobile devices, social media, robotic process automation, 3-D printing or cloud computing. But in doing so, they must recognize the risks that can accompany these disruptive technologies. KPMG’s Emerging Technology Risk practice helps clients recognize and responsibly manage these risks enabling the achievement of benefits. We do this by aligning our partners and professionals with distinct technology skill sets and capabilities with industry-leading methodologies and processes, enabling us to help our clients navigate the challenges from adopting these technologies. www.kpmg.com/us/emergingtechnologies

 


PwC US helps organizations and individuals create the value they're looking for. We're a member of the PwC network of firms in 157 countries with more than 195,000 people. We're committed to delivering quality in assurance, tax and advisory services. Tell us what matters to you and find out more by visiting us at www.pwc.com. Gain customized access to our insights by downloading our thought leadership app, PwC's 365 at the iTunes app store.

 


Protiviti Ranked No. 57 on 2016 Fortune 100 Best Companies to Work For® List Consulting firm moves up significantly in ranking for its culture, collaboration and accessibility of leadership Global consulting firm Protiviti has been named for the second consecutive year as one of the Fortune 100 Best Companies to Work For® a list which recognizes companies with exceptional workplace cultures and talent development.

 

  Silver


Adobe is changing the world through digital experiences. Our creative, marketing and document solutions empower everyone — from emerging artists to global brands — to bring digital creations to life and deliver them to the right person at the right moment for the best results.

 


CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to protect against cyber threats before attacks can escalate and do irreparable business damage.

 


Modulo offers GRC management solutions. Flexible and powerful software architecture allows companies to manage technology risk, compliance, and policy requirements while managing assets and ensuring business continuity.

Modulo’s software solutions greatly simplify GRC by automating processes enterprise-wide and reducing complexity and cost. Organizations in a broad range of sectors - especially those heavily reliant on extensive technology systems, large vendor networks, and electronic transactions - report a high return on investment from Modulo’s content-rich platform.


As the creators of the SSH protocol which is used in nearly every network today, we understand the need to balance access with security. Our platform based approach to address controls and management for Secure Shell access as well as encrypted traffic monitoring provides the only solution on the market that addresses; security, compliance and operational efficiency in today’s complex enterprise environments. Please stop by our booth #31 to learn more!

 

  Bronze


We’re a top-10 bank by deposits, but approach our work like a Silicon Valley start-up. We lead by innovation. Every new business challenge provides an opportunity to change the game, improve customers’ lives, and help them succeed. We take great care of our employees so they can take the best care of our customers.

 


EventTracker delivers business critical solutions that transform high-volume cryptic log data into actionable and prioritized intelligence to optimize IT operations, detect and deter costly security breaches, and comply with multiple regulatory mandates. The EventTracker product suite offers Security Information and Event Management (SIEM), real-time Log Management, and powerful Change and Configuration Management. Our clients include government agencies, commercial enterprises, and the healthcare and financial sectors.

 


 

 


LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s award-winning platform unifies next-generation SIEM, log management, network and endpoint forensics and advanced security analytics.

 


Qualys, Inc. is a pioneer and leading provider of cloud-based security and compliance solutions with over 8,800 customers in more than 100 countries. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand.

 


RSA provides more than 30,000 customers around the world with the essential security capabilities to protect their most valuable assets from cyber threats. With RSA’s award-winning products, organizations effectively detect, investigate, and respond to advanced attacks; confirm and manage identities; and ultimately, reduce IP theft, fraud, and cybercrime. For more information, go to www.rsa.com.

 

Supporting Sponsors

 

 

 

 

 

For Exhibitor and Sponsorship Opportunities

Please contact: 

Sean Stringer
Director of Sponsorship
Phone: +1.847.660.5729
Fax: +1.847.253.1443
sstringer@isaca.org

.

If you are not already signed in, sign in below to register for this Conference.

If the login does not appear below or the form does not function as expected please use this form.

Questions

Contact ISACA's Training & Education Department:
Tel: +1.847.660.5670
Fax: +1.847.253.1443
conference@isaca.org

Media Inquiries

Contact the ISACA Communications Department:
Tel: +1.847.660.5512 or
+1.847.660.5564
news@isaca.org

Please address Sponsorship questions to: sstringer@isaca.org