exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ISACA Ireland Call For Papers

ISACA Ireland Call For Papers
Posted Jul 22, 2014

ISACA Ireland is seeking innovated session proposals that will engage an audience of information security, assurance. The conference will be held October 3rd, 2014 in Dublin, Ireland.

tags | paper, conference
SHA-256 | ee75a9e55d9dcd131b308134c15a846db73cd0d008d2f2a2e2a2ed7f0a2c6ced

ISACA Ireland Call For Papers

Change Mirror Download
ISACA Ireland is seeking innovated session proposals that will engage an audience of information security, assurance. audit, privacy, governance, risk and compliance professionals. Speakers should offer real-world examples, “war stories”, case studies, successes and failures, examples of actual tools and working papers used, and insights on emerging issues.  As a guideline the following is a list of suggested topics which is not intended to be complete or restrictive, but rather is intended to stimulate ideas and describe topics that might be addressed in session proposals:

Assurance
- Auditing in the Cloud
- Auditing IT, Social Media Policies, Projects, etc.
- Auditing Your Privacy Program
- Big Data: Audit and Governance
- Effective Audit Sampling Procedures
- Metrics for Privacy Audits
- Privacy Audit (tools, techniques or case studies)
- Software Assurance: Threats, Vulnerabilities, & Controls
- The Benefits of Continuous Monitoring

Risk
- Big Data Risk to business value (measurements/metrics, processes, case studies)
- Identifying IT Risk Management (tools, processes, case studies)
- Mitigating Hacker exposure and risk
- Mitigating Social Media Risks
- Privacy Risk Assessments
- Results-oriented risk management (tools, processes, case studies)
- Risk process management (i.e. at speed of business, uncertain times, etc.)
- Sustainability in Risk Management
- Third-party Risk Management / Risk Assessments of Outsourced Service Providers

Security
- Using Continuous Monitoring Controls to Defend Against APTs
- Building a Successful Privacy Program
- Cyberattack Preparedness
- Cybercrime
- Effective Defense Strategies for Cyber Security Threats
- Forensics and eDiscovery
- Identifying cyberattacks
- Insider Threats
- Cybersecurity in supply chains
- Cybersecurity Metrics
- Creating a successful SOC
- Red teaming

Governance
- Cybersecurity framework
- GRC tool implementation (techniques, case studies)
- Implementing A Governance Framework for Cloud Computing
- Increase Value, Maximize Vendor Relationships
- Reducing Cost and maximizing ROI of IT Spending
- The 21st Century COSO Framework

Compliance
- Simplifying PCI Compliance
- Data Classification and Privacy Compliance
- Adapting the Compliance Function for Modern Technology Risks
- Prevent and Respond to Incidents and Gaps in IT Controls
- Governance, Risk, and Compliance (GRC) Framework - A Comprehensive Approach to Compliance
- EU Privacy Regulations


************************************************

To Submit a Proposal please email conference@isaca.ie including:
- Session title
- Session abstract (50 - 250 words)
- Duration (25, 40 or 55 minutes)
- Speaker contact details (name, email, phone, twitter, linkedin etc)
- Speaker biography (100 words max)
- Estimate of any costs if international travel / overnight accommodation etc is required


************************************************
The deadline for submissions is Friday 15th August 2014.
Successful applicants will be advised prior to the end of August 2014.
This invitation to submit proposals regrettably does not guarantee selection.
Sales content is strictly prohibited.
************************************************


Feel free to pass on this Call for Speakers to any other interested party should you feel that they could make a suitable contribution to the conference or have an interest in attending and / or sponsoring it. Further details about conference including speakers and session topics will be posted on the booking pages when confirmed: http://isacaireland.eventbrite.com
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close