EuroCACSISRM 2012 Sept. 10, 2012 to Sept. 12, 2012, Munich,Germany

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
111PCI DSS v 2.0 Security Strategies for Virtualised Environments Jason Creech After completing this session, you will be able to: Implement practical recommendations for prevention, remediation ... Security
121Using COBIT 5 to Improve the Management of Information Security Rolf von Roessing , Derek Oliver , Christos Dimitriadis After completing this session, you will be able to: Gain an understanding of COBIT 5 ...
131Mobile Security: Where Are We today and Where Will We Be Tomorrow? Steven Ackx After completing this session, you will be able to: Understand mobile securitys growing market and ... Security
141From Identity and Access Solutions to Access Governance Michael Small After completing this session, you will be able to: Relate controls and measurements to COBIT ... Security
211Big Data: Why it's Important to Your Security Programme Todd f. Smyth , David Cowart After attending this session you will be able to: Describe what Big Data is Understand ...
221Radical Changes in Technology: How They Affect Business and the Role of IT Risk, Security and Assurance Practitioners Norman Marks After completing this session, you will be able to: Appreciate the amazing pace of technology ... Security
231Business Continuity Management: Reducing Corporate Risk and Exposure Through Effective Processes and Controls Implementations Marlin Ness , Dan Stavola After completing this session, you will be able to: Audit the business continuity management process ...
321New Auditing Challenges in Cyberspace Marc Sel After completing this session, you will be able to: Identify and recognise the main threats ...
331Information Security Within a Global Risk Perspective Marcus Alldrick After completing this session, you will be able to: Identify corporate risk priorities and attitudes ... Security
112Auditing Virtual Environments (Vmware Audit Programme) David Ramirez After completing this session, you will be able to: Understand the key risks related to ...
122Automating IT Data Collection and Compliance for GRCM Controls Jason Creech After completing this session, you will be able to: Leverage complementary solutions to maximise your ... Security
132Tips to Speed up Your Auditing Process Mike Gentile After completing this session, you will be able to: Learn how to apply IT audit ... Security
142Preparing for the EU Directive Demosthenes Ikonomou After completing this session, you will be able to: Learn what actions are required for ... Security
212KISS Principle for Information Security, Compliance and Risk Management in Complex Environments Biljana Cerin After completing this session, you will be able to: Avoid unnecessary complexity in information security ...
222Practical Auditing of Wireless Communications Rikard Bodforss After completing this session, you will be able to: Understand that wireless risks do not ...
232On the Road to Continuous MonitoringManage Risks in the Most Efficient and Effective Way Dan French , Jan Hurda After completing this session, you will be able to: Manage compensating controls in the most ...
242Fraud: Minimising Risk John Horan After completing this session, you will be able to: Recognise the fraud techniques used that ... Security
252Aligning COBIT-Based Strategic IT Assurance Gary Bannister After completing this session, you will be able to: Understand how to use COBIT to ...
312Scoping an Assessment: Which Approach is right Greet Volders After completing this session, you will be able to: Estimate the scope and resources of ...
322Process Assessment Model (PAM) Exercise Based on COBIT Greet Volders After completing this session, you will be able to: Understand the enterprise need and value ... Security
332Making the Move from COBIT 4.1 to COBIT 5 Gary Bannister After completing this session, you will be able to: Distinguish between governance and management Understand ...
113Migrating to COBIT 5 for Auditors Derek Oliver After completing this session, you will be able to: Understand the COBIT 5 content equivalent ...
123Case Study: Developing and Implementing an IT Risk Management Audit Programme Urs Fischer After completing this session, you will be able to: Establish the Risk Universe (Banks, Funds, ...
133Grimhildas Mirror: Information Security in the Business World Wendy Goucher After completing this session, you will be able to: Understand the concepts of intrinsic and ... Security
143IT Audits of Cloud and SaaS Yves le Roux After completing this session, you will be able to: Recognise various business process models Determine ...
213IT Audit 3.0 Future Technological Challenges and Their Impact on Our Audit Work Klaus Fochler After completing this session, you will be able to: Discuss the evolution of IT auditing ... Security
223SSAE-16 Audit and AssuranceA Case Study of Assessment of a Large Business Process Outsourcing (BPO) Firm Ashit Dalal After completing this session, you will be able to: Acquire and apply necessary knowledge gained ...
233Security and Audit Issues in a Virtualised Environment Nikolaos Zacharopoulos After completing this session, you will be able to: Understand the risks in moving into ... Security
243Gaming Audit: What you need to know Gunnar Ewald After completing this session, you will be able to: Understand the importance of audit issues ... Security
313Strategic IT Assurance Based on IT Assurance Framework on COBIT Hans henrik Berthing After completing this session, you will be able to: Develop an IT strategic assurance plan ...
323How COBIT 5 for Information Security Provides More Comprehensive Coverage and Assurance Rolf von Roessing , Vernon Poole After completing this session, you will be able to: Understand how to implement the practical ...
333Privileged Account Management: Who's Really Touching My Data? Ramss Gallego After completing this session, you will be able to: Identify who is a privileged user ...
114Every Step You Take: Geo Apps vs. Privacy Richard Hollis After completing this session, you will be able to: Identify the necessity for securing personal ...
124Can We Trust the Cloud? About Security, Privacy, Audit and the Cloud Yves le Roux After completing this session, you will be able to: Explain the various benefits and challenges ...
134Why a Comprehensive Information Security Strategy is Essential for Effective GRC Marcus Alldrick After completing this session, you will be able to: Identify reasons why GRC (Governance, Risk ... Security
144Keeping Patients Data SafeIdentity Management for Healthcare Andrea Craig , Andrew Wintermuth After completing this session, you will be able to: Use frameworks and leading practices for ...
224The Information Security Tug of War Wendy Goucher After completing this session, you will be able to: Better understand the importance of a ... Security
234Just Between Us: The Current State of Electronic Eavesdropping Technology Richard Hollis After completing this session, you will be able to: Understand the wide variety of technologies ...
314EU Privacy Directive ComplianceA Practical Approach Christos Dimitriadis After completing this session, you will be able to: Determine the jurisdiction that will bind ...
324The Key Steps to Securing Buy in to a Risk Management Programme Steven Babb After completing this session, you will be able to: Understand the principles and practices of ...
334EU Directive/Legal ConsiderationsENISA Demosthenes Ikonomou After completing this session, you will be able to: Understand who is responsible and associated ... Security
115Risk and Agility Antonio ramos Garcia After completing this session, you will be able to: Understand scenarios according to Cynefin model ...
125Implementing an IT Compliance Management System Markus Gaulke After completing this session, you will be able to: Identify an exemplary Implementation Build an ...
135Gaming: Security Control Standard Gunnar Ewald After completing this session, you will be able to: Understand the importance of security issues ...
215PrivacyCurrent Tasks and Challenges Markus Bittner After completing this session, you will be able to: Recognise how cyber criminals are becoming ...
225Ensuring Business Continuity and Avoiding Lock-in in the Cloud Michael Small After completing this session, you will be able to: Identify the key business continuity challenges ... Security
235An update: IT Security Management Standardisation Rainer Rumpel After completing this session, you will be able to: Identify the essentials of the new ... Security
245Enable the Truth: Risk Management Techniques that Support Honest Response Mike Gentile After completing this session, you will be able to: Identify the impact of non-compliance has ... Security
325Managing the Risk of Identity and Access Kurt Johnson After completing this session, you will be able to: Understand the business risk and compliance ... Security
335Cloud Computing Security Christos Dimitriadis After completing this session, you will be able to: Recognise security issues faced by cloud ...
345Green IT and Sustainability Jason Emmons After completing this session, you will be able to: Identify solutions that organisations can implement ...
WS1IT Risk Urs Fischer This workshop presents the principles and application of information risk management as it relates to ...
WS2Future Risks in Cybercrime and Cyberwar: Long-term Trends and Consequences Rolf von Roessing Get an in-depth analysis of the many types of security, cybercrime and cyberwar surveys and ...
WS3Cloud Computing Security and RiskLatest Best practice Guidance Michael Small , Vernon Poole Looking for practical advice and guidance on security and risk in the cloud? This full ...
WS4Introduction to COBIT 5 Rolf von Roessing , Vernon Poole In this introductory workshop, learn how to effectively transition to or implement COBIT 5 in ...
WS5A Pragmatic Approach to Information Security and Risk Management John p. Pironti Information security and risk management programmes and capabilities do not have to be difficult or ...
WS6Introduction to COBIT 5 Rolf von Roessing , Vernon Poole In this introductory workshop, learn how to effectively transition to or implement COBIT 5 in ...