what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ISACA Ireland Call For Papers

ISACA Ireland Call For Papers
Posted Jul 22, 2014

ISACA Ireland is seeking innovated session proposals that will engage an audience of information security, assurance. The conference will be held October 3rd, 2014 in Dublin, Ireland.

tags | paper, conference
SHA-256 | ee75a9e55d9dcd131b308134c15a846db73cd0d008d2f2a2e2a2ed7f0a2c6ced

ISACA Ireland Call For Papers

Change Mirror Download
ISACA Ireland is seeking innovated session proposals that will engage an audience of information security, assurance. audit, privacy, governance, risk and compliance professionals. Speakers should offer real-world examples, “war stories”, case studies, successes and failures, examples of actual tools and working papers used, and insights on emerging issues.  As a guideline the following is a list of suggested topics which is not intended to be complete or restrictive, but rather is intended to stimulate ideas and describe topics that might be addressed in session proposals:

Assurance
- Auditing in the Cloud
- Auditing IT, Social Media Policies, Projects, etc.
- Auditing Your Privacy Program
- Big Data: Audit and Governance
- Effective Audit Sampling Procedures
- Metrics for Privacy Audits
- Privacy Audit (tools, techniques or case studies)
- Software Assurance: Threats, Vulnerabilities, & Controls
- The Benefits of Continuous Monitoring

Risk
- Big Data Risk to business value (measurements/metrics, processes, case studies)
- Identifying IT Risk Management (tools, processes, case studies)
- Mitigating Hacker exposure and risk
- Mitigating Social Media Risks
- Privacy Risk Assessments
- Results-oriented risk management (tools, processes, case studies)
- Risk process management (i.e. at speed of business, uncertain times, etc.)
- Sustainability in Risk Management
- Third-party Risk Management / Risk Assessments of Outsourced Service Providers

Security
- Using Continuous Monitoring Controls to Defend Against APTs
- Building a Successful Privacy Program
- Cyberattack Preparedness
- Cybercrime
- Effective Defense Strategies for Cyber Security Threats
- Forensics and eDiscovery
- Identifying cyberattacks
- Insider Threats
- Cybersecurity in supply chains
- Cybersecurity Metrics
- Creating a successful SOC
- Red teaming

Governance
- Cybersecurity framework
- GRC tool implementation (techniques, case studies)
- Implementing A Governance Framework for Cloud Computing
- Increase Value, Maximize Vendor Relationships
- Reducing Cost and maximizing ROI of IT Spending
- The 21st Century COSO Framework

Compliance
- Simplifying PCI Compliance
- Data Classification and Privacy Compliance
- Adapting the Compliance Function for Modern Technology Risks
- Prevent and Respond to Incidents and Gaps in IT Controls
- Governance, Risk, and Compliance (GRC) Framework - A Comprehensive Approach to Compliance
- EU Privacy Regulations


************************************************

To Submit a Proposal please email conference@isaca.ie including:
- Session title
- Session abstract (50 - 250 words)
- Duration (25, 40 or 55 minutes)
- Speaker contact details (name, email, phone, twitter, linkedin etc)
- Speaker biography (100 words max)
- Estimate of any costs if international travel / overnight accommodation etc is required


************************************************
The deadline for submissions is Friday 15th August 2014.
Successful applicants will be advised prior to the end of August 2014.
This invitation to submit proposals regrettably does not guarantee selection.
Sales content is strictly prohibited.
************************************************


Feel free to pass on this Call for Speakers to any other interested party should you feel that they could make a suitable contribution to the conference or have an interest in attending and / or sponsoring it. Further details about conference including speakers and session topics will be posted on the booking pages when confirmed: http://isacaireland.eventbrite.com
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close