Upcoming Chapter Meetings Additional CPE Opportunities

Past ISACA KC Events

DISCLAIMER: The information available here is of a general nature and is not intended to address the circumstances of any particular individual or entity.
Although the content authors endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of
the date it is received or that it will continue to be accurate in the future. No one should act upon such information without appropriate
professional advice after a thorough examination of the particular situation. All materials are copyright of the respective authors.
Please refer to the individual publications for further copyright and disclaimer information.
Date
Topic and Speaker
July 17, 2014 Secrets, Conspiracies and Hidden Patterns

BKD CPAs and Advisors

Meeting Flyer
May 8, 2014 2014 Data Breach Investigations Report

Verizon

Meeting Flyer
April 10, 2014 Ethical Hacking

Deloitte & Touche LLP

Meeting Flyer
March 13, 2014 Current Security Threat Landscape

10-D Security

Meeting Flyer
February 13, 2014 Mobile Device Security

Fishnet

Meeting Flyer
January 16, 2014 Information Security and Data Privacy - Managing Risks in a Complex World

PwC

Meeting Information
December 12, 2013 Information Security Risk Analysis

Joint Meeting with ISSA

Meeting Information
November 7, 2013 Focus on Internal Control – Is Your Company Ready for the New COSO?

Joint Meeting with IIA

Meeting Information
October 3, 2013 Setting Your Journey from Data Analysis to Continuous Auditing

Joint Meeting with IIA

Meeting Information
September 12, 2013 Business Continuity Overview and Evolution

Bryan McGowan - KPMG
Reggie Hair - Sprint

Presentation Slides and Meeting Information
July 18, 2013 Delivering Innovation whilst
Managing the Bottom Line Effectively


CA Technologies

Meeting Information
May 9, 2013 2013 Data Breach Investigations Report
Annual Business Meeting


Verizon Business

Meeting Information
March 21, 2013 How to Get the Most Out of Your IT Audit Function

Gordon Braun - Protiviti

Presentation Slides and Meeting Information
February 7, 2013 Enterprise Risk Management: Achieving and Sustaining Success
Joint meeting with IIA
Paul Sobel & Kurt Reding

Presentation Slides and Meeting Information
January 10, 2013 IMeasuring the Maturity of your Information Security Program. Impossible?
Mark Carney - VP, Strategic Services - Fishnet Security

Presentation Slides and Meeting Information
December 13, 2012 Inside the Mind of a White Collar Criminal
Joint meeting with ISSA
Jeff Lanza - Retired FBI

Meeting Information
November 8, 2012 Vulnerability Assessments
Ryan Bachman - Director, Security Services - PwC

Meeting Information
October 11, 2012 Risk Management & Cloud Security: Setting & Enforcing Policy
Rod Walsh - Director, IT Risk Services - BKD

Presentation Slides and Meeting Information
September 13, 2012 Professional Ethics
Chris Bauer - Bauer Ethics Seminars

Meeting Information; No presentation slides
July 12, 2012 Bring Your Own Device to Work
John Hollyoak - Protiviti

Presentation Slides and Meeting Information
May 10, 2012 Annual Business Meeting
2012 Data Breach Investigations Report

Neil Maguire* - Senior Security Consultant, Verizon Investigative Response

Presentation Slides, 2012 Data Breach Investigations Report, and Meeting Information*
*Neal Maquire replaced Michael Rosen as the speaker.
April 12, 2012 Service Organization Control Reports
Rod Walsh - BKD, Director of IT Risk Services

Presentation Slides and Meeting Information
March 8, 2012 COBIT 5
Peter Tessin* - ISACA, Technical Research Manager

Presentation Slides, 'Where Have All the Control Objectives Gone?' article, and Meeting Information*
*Peter Tessin replaced Rob Stroud as the speaker.
February 2, 2012 Auditing Social Media
Mike Jacka & Pete Scott

Presentation Slides and Meeting Information
January 12, 2012 Adding Strategic Value with Project Assurance
Vicki Wagoner

Presentation Slides and Meeting Information
December 8, 2011 Email Archiving for GRC, eDiscovery, and FRCP
Don Whitney

Presentation Slides and Meeting Information
November 10, 2011 Application Security Development
Mark Carney - FishNet Security

Meeting Information - No Meeting Slides... Meeting Cancelled
October 13, 2011 Fraud, A Data Analysis Approach
Michael Hoesing - University of Nebraska, Omaha

Presentation Slides and Meeting Information
September 8, 2011 Governance, Risk, & Compliance (GRC)
KPMG

Presentation Slides coming soon and Meeting Information
May 12, 2011 Continuous Auditing & Data Analysis
Brent Papciak & Jay McKey - PwC

Presentation Slides and Meeting Information
April 14, 2011 eDiscovery
BJ Stephan - Fishnet Security

Presentation Slides and Meeting Information
March 10, 2011 Enterprise Risk Assessments
Suzanne Williams, VP of Internal Audit - Sprint

Meeting Information
February 10, 2011 PCI DSS 2.0
Kelly Hughes & Greg Schu - McGladrey

Presentation Slides and Meeting Information
January 13, 2011 The Changing SAS 70 Landscape
Dan Hirstein & Rebecca Goodpasture - Deloitte

Presentation Slides and Meeting Information
December 9, 2010 Cloud Computing: An Auditor's Perspective
Sailesh Gadia - KPMG

Presentation Slides and Meeting Information
November 11, 2010 System Security, It's Not About Compliance Anymore
Brian Findley - Honeywell Federal Manufacturing & Technologies, LLC

Presentation Slides and Meeting Information
October 14, 2010 Database Activity Monitoring, Auditing, and Real-Time Protection
Kim Nevins - IBM Guardium

Presentation Slides and Meeting Information
September 9, 2010 Network Penetration Testing and Ethical Hacking
Daryl Fallin - DST Systems

Presentation Slides and Meeting Information
Presenter's Web site: http://www.liberterra.com
July 15, 2010 Gathering and Summarizing Data for Auditors
Tim McClelland & Chin Modha - KPMG

Presentation Slides and Meeting Information
May 13, 2010 Top IT Infrastructure Security Threats
Dan Hirstein - Deloitte
Annual Business Meeting
Kevan Brewer - Chapter President

Presentation Slides and Meeting Information
April 8, 2010 Practical Implementation of Automated Assessment Tools for the IT Auditor
John Otte - Fishnet Security

Presentation Slides and Meeting Information
March 11, 2010 Current Trends in Forensic Audit and Data Mining
John Mallery - BKD

Presentation Slides and Meeting Information
February 11, 2010 Networking & Building Strong Professional Relationships
David Stroop - MHC Trucking

Presentation Slides and Meeting Information
January 14, 2010 Virtualization Security
Michael T. Hoesing - University of Nebraska - Omaha

Presentation Slides and Meeting Information
December 10, 2009 IT Vendor Audits
Bill McSpadden & Howard Haile - CHAN, LLC

Presentation Slides and Meeting Information
November 12, 2009 Hoodlums to Hackers
Jeff Lanza - Retired FBI Special Agent

Identity Theft Handouts: Business & Personal and Meeting Information
October 8th, 2009 PCI and Privacy
Gleb Reznik - Protiviti

Presentation Slides and Meeting Information
September 10th, 2009 Securing Administrative Passwords
Dave Adamczyk - Cyber-Ark Software

Presentation Slides and Meeting Information
February 12th, 2009 Internal Audit and IT's Role In A Down Economy
Devin Amato and Heidi Zenger - Deloitte

Presentation Slides
Jan. 8, 2009 Joint Meeting with the IIA
"Get It Right Today, Not Tomorrow"
Mercedes Ramirez Johnson - Motivational Speaker
Dec. 11, 2008 Credit Card Compromise
John Mallery - BKD

Presentation Slides
Nov. 13, 2008 IT Governance
Bill McSpadden - Protiviti

Presentation Slides
Oct. 10, 2008 Introduction to COBIT
Mark Thomas and David Upsdell

Presentation Slides
Sept. 11, 2008 Data Analysis
Steven Haenchen - Haenchen Valuation Services

Presentation Slides
May 8, 2008 Multiple Topics

Presentation Slides:
How Secure Are YOU?
Killing With Keyboards
TTN October '06
Without A Trace
April 10, 2008 Security & Audit Considerations in a Telecommuting Environment

Presentation Slides
March 13, 2008 Data Extraction and Analysis

Presentation Slides
March 4 & 5, 2008 Securing and Auditing Active Directory
MIS Training Institute
Februrary 14, 2008 Capturing Air: Tools and Methods to Make Wireless Assessments a Breeze

January 10th, 2008 Joint Meeting with KC IIA
Three Rings of Privacy
Panel Discussion

Untitled Document
Home | Events | About Us | Newsletters | Jobs | Membership | Certification | Resources | Feedback | Contacts