July 17, 2014 | Secrets, Conspiracies and Hidden Patterns BKD CPAs and Advisors Meeting Flyer |
May 8, 2014 | 2014 Data Breach Investigations Report Verizon Meeting Flyer |
April 10, 2014 | Ethical Hacking Deloitte & Touche LLP Meeting Flyer |
March 13, 2014 | Current Security Threat Landscape 10-D Security Meeting Flyer |
February 13, 2014 | Mobile Device Security Fishnet Meeting Flyer |
January 16, 2014 | Information Security and Data Privacy - Managing Risks in a Complex World PwC Meeting Information |
December 12, 2013 | Information Security Risk Analysis Joint Meeting with ISSA Meeting Information |
November 7, 2013 | Focus on Internal Control – Is Your Company Ready for the New COSO? Joint Meeting with IIA Meeting Information |
October 3, 2013 | Setting Your Journey from Data Analysis to Continuous Auditing Joint Meeting with IIA Meeting Information |
September 12, 2013 | Business Continuity Overview and Evolution Bryan McGowan - KPMG Reggie Hair - Sprint Presentation Slides and Meeting Information |
July 18, 2013 | Delivering Innovation whilst Managing the Bottom Line Effectively CA Technologies Meeting Information |
May 9, 2013 | 2013 Data Breach Investigations Report Annual Business Meeting Verizon Business Meeting Information |
March 21, 2013 | How to Get the Most Out of Your IT Audit Function Gordon Braun - Protiviti Presentation Slides and Meeting Information |
February 7, 2013 | Enterprise Risk Management: Achieving and Sustaining Success Joint meeting with IIA Paul Sobel & Kurt Reding Presentation Slides and Meeting Information |
January 10, 2013 | IMeasuring the Maturity of your Information Security Program. Impossible? Mark Carney - VP, Strategic Services - Fishnet Security Presentation Slides and Meeting Information |
December 13, 2012 | Inside the Mind of a White Collar Criminal Joint meeting with ISSA Jeff Lanza - Retired FBI Meeting Information |
November 8, 2012 | Vulnerability Assessments Ryan Bachman - Director, Security Services - PwC Meeting Information |
October 11, 2012 | Risk Management & Cloud Security: Setting & Enforcing Policy Rod Walsh - Director, IT Risk Services - BKD Presentation Slides and Meeting Information |
September 13, 2012 | Professional Ethics Chris Bauer - Bauer Ethics Seminars Meeting Information; No presentation slides |
July 12, 2012 | Bring Your Own Device to Work John Hollyoak - Protiviti Presentation Slides and Meeting Information |
May 10, 2012 | Annual Business Meeting 2012 Data Breach Investigations Report Neil Maguire* - Senior Security Consultant, Verizon Investigative Response Presentation Slides, 2012 Data Breach Investigations Report, and Meeting Information* *Neal Maquire replaced Michael Rosen as the speaker. |
April 12, 2012 | Service Organization Control Reports Rod Walsh - BKD, Director of IT Risk Services Presentation Slides and Meeting Information |
March 8, 2012 | COBIT 5 Peter Tessin* - ISACA, Technical Research Manager Presentation Slides, 'Where Have All the Control Objectives Gone?' article, and Meeting Information* *Peter Tessin replaced Rob Stroud as the speaker. |
February 2, 2012 | Auditing Social Media Mike Jacka & Pete Scott Presentation Slides and Meeting Information |
January 12, 2012 | Adding Strategic Value with Project Assurance Vicki Wagoner Presentation Slides and Meeting Information |
December 8, 2011 | Email Archiving for GRC, eDiscovery, and FRCP Don Whitney Presentation Slides and Meeting Information |
November 10, 2011 | Application Security Development Mark Carney - FishNet Security Meeting Information - No Meeting Slides... Meeting Cancelled |
October 13, 2011 | Fraud, A Data Analysis Approach Michael Hoesing - University of Nebraska, Omaha Presentation Slides and Meeting Information |
September 8, 2011 | Governance, Risk, & Compliance (GRC) KPMG Presentation Slides coming soon and Meeting Information |
May 12, 2011 | Continuous Auditing & Data Analysis Brent Papciak & Jay McKey - PwC Presentation Slides and Meeting Information |
April 14, 2011 | eDiscovery BJ Stephan - Fishnet Security Presentation Slides and Meeting Information |
March 10, 2011 | Enterprise Risk Assessments Suzanne Williams, VP of Internal Audit - Sprint Meeting Information |
February 10, 2011 | PCI DSS 2.0 Kelly Hughes & Greg Schu - McGladrey Presentation Slides and Meeting Information |
January 13, 2011 | The Changing SAS 70 Landscape Dan Hirstein & Rebecca Goodpasture - Deloitte Presentation Slides and Meeting Information |
December 9, 2010 | Cloud Computing: An Auditor's Perspective Sailesh Gadia - KPMG Presentation Slides and Meeting Information |
November 11, 2010 | System Security, It's Not About Compliance Anymore Brian Findley - Honeywell Federal Manufacturing & Technologies, LLC Presentation Slides and Meeting Information |
October 14, 2010 | Database Activity Monitoring, Auditing, and Real-Time Protection Kim Nevins - IBM Guardium Presentation Slides and Meeting Information |
September 9, 2010 | Network Penetration Testing and Ethical Hacking Daryl Fallin - DST Systems Presentation Slides and Meeting Information Presenter's Web site: http://www.liberterra.com |
July 15, 2010 | Gathering and Summarizing Data for Auditors Tim McClelland & Chin Modha - KPMG Presentation Slides and Meeting Information |
May 13, 2010 | Top IT Infrastructure Security Threats Dan Hirstein - Deloitte Annual Business Meeting Kevan Brewer - Chapter President Presentation Slides and Meeting Information |
April 8, 2010 | Practical Implementation of Automated Assessment Tools for the IT Auditor John Otte - Fishnet Security Presentation Slides and Meeting Information |
March 11, 2010 | Current Trends in Forensic Audit and Data Mining John Mallery - BKD Presentation Slides and Meeting Information |
February 11, 2010 | Networking & Building Strong Professional Relationships David Stroop - MHC Trucking Presentation Slides and Meeting Information |
January 14, 2010 | Virtualization Security Michael T. Hoesing - University of Nebraska - Omaha Presentation Slides and Meeting Information |
December 10, 2009 | IT Vendor Audits Bill McSpadden & Howard Haile - CHAN, LLC Presentation Slides and Meeting Information |
November 12, 2009 | Hoodlums to Hackers Jeff Lanza - Retired FBI Special Agent Identity Theft Handouts: Business & Personal and Meeting Information |
October 8th, 2009 | PCI and Privacy Gleb Reznik - Protiviti Presentation Slides and Meeting Information |
September 10th, 2009 | Securing Administrative Passwords Dave Adamczyk - Cyber-Ark Software Presentation Slides and Meeting Information |
February 12th, 2009 | Internal Audit and IT's Role In A Down Economy Devin Amato and Heidi Zenger - Deloitte Presentation Slides |
Jan. 8, 2009 | Joint Meeting with the IIA "Get It Right Today, Not Tomorrow" Mercedes Ramirez Johnson - Motivational Speaker |
Dec. 11, 2008 | Credit Card Compromise John Mallery - BKD Presentation Slides |
Nov. 13, 2008 | IT Governance Bill McSpadden - Protiviti Presentation Slides |
Oct. 10, 2008 | Introduction to COBIT Mark Thomas and David Upsdell Presentation Slides |
Sept. 11, 2008 | Data Analysis Steven Haenchen - Haenchen Valuation Services Presentation Slides |
May 8, 2008 | Multiple Topics Presentation Slides: How Secure Are YOU? Killing With Keyboards TTN October '06 Without A Trace |
April 10, 2008 | Security & Audit Considerations in a Telecommuting Environment Presentation Slides |
March 13, 2008 | Data Extraction and Analysis Presentation Slides |
March 4 & 5, 2008 | Securing
and Auditing Active Directory MIS Training Institute |
Februrary 14, 2008 | Capturing Air: Tools and Methods to Make Wireless Assessments a Breeze |
January 10th, 2008 | Joint Meeting with KC IIA Three Rings of Privacy Panel Discussion |