Conference Home Program Schedule Handouts Sponsorship Student Volunteers Exhibition Fair Hotel Info Committee Contact Us

Spring Conference 2016

Thank you for a successful 2016 conference –  Next year’s conference will be in April 8-12, 2017
Also, the 2 winners on the app evals have been notified & event CPEs sent.



The upcoming 2016 Spring Conference is made possible through the generous support from the following sponsors

2016 ISACA LA Conference Sponsors

 

Hilton Los Angeles/Universal City
Mark April 9th – April 13th, 2016 on your calendar and join us at the 2016 Spring Conference, the leading Information Systems IT governance, control, security and assurance event for the Southern California area. The ISACA Los Angeles Chapter provides affordable quality training on fundamental information systems auditing concepts and emerging technology risks, and an opportunity to network with other auditing and security professionals.The Spring Conference is the leading Information Systems IT governance, control, security and assurance event for the Southern California area. Click on the conference brochure cover icon below to download the 2015 Spring Conference brochure in the PDF format.

Register ButtonMore Info

View Conference Program Schedule

(Posted February 28, 2016)

2016 Conference eBrochure eBrochure
(3.1MB)

Click the play button to view the video above.

2016 Platinum Sponsor Trend Micro


Theme: Creating a Cybersecurity Community

Keynote Speaker: Marc Goodman, Global Security Advisor and Futurist
Topic:
Security in a Connected World

A huge proponent of technology, Marc Goodman knows that the positive aspects of the Internet are manifest. But as one of the world’s leading authorities on global security, he also recognizes that when it comes to technology, the increased scale of influence can be used both for good and for ill. In a global society run by computers, whoever controls the computer code can control the world. Every day we connect more and more devices to the Internet, ranging from laptops and mobile phones, to critical infrastructures including financial systems and electrical grids. We trust what our screens tell us, but all technologies can be hacked to provide a stealth window direct into an unsuspecting user’s home, office, family, or social life. In this eye-opening talk, Goodman provides access to his deep insights about the future of technology and where the next threats will come from, along with the preventative measures we need to take before it’s too late.

Marc_Goodman-163.214 Marc Goodman is a New York Times Best-Selling author, global strategist and consultant focused on the profound change technology is having on security, business and international affairs. He is the founder of the Future Crimes Institute and currently serves as the Chair for Policy, Law and Ethics at Silicon Valley’s Singularity University. Over the past twenty years, he has built his expertise in international cyber crime and terrorism working with organizations such as INTERPOL, the UN Counterterrorism Task Force, NATO and the US Government.
Mr. Goodman frequently advises industry leaders, security executives and global policy makers on transnational cyber risk and intelligence and has operated in more than 70 countries around the world. His professional experiences include working as a street police officer, undercover investigator and counter-terrorism strategist, as well as briefing myriad cabinet ministers and heads of government, including the White House. Mr. Goodman’s current areas of research include the security implications of emerging technologies such as artificial intelligence, big data, robotics, crypto-currencies, synthetic biology, virtual reality and the Internet of Things.Mr. Goodman is the author of Future Crimes: Everything Is Connected, Everyone is Vulnerable and What We Can Do About It, from Random House/Doubleday. More information available at http://www.marcgoodman.com and @FutureCrimes.

 


Keynote Panel: Panel Discussion on Creating a Cybersecurity Community

Cyber attackers have an asymmetric advantage over defenders. All they need to find is one way to infiltrate a system, while the defenders have to try to stop all possible ways. Cybersecurity is a daunting task and cannot be done by an isolated individual or group. This panel will explore how to build a vibrant cybersecurity community that will be up to the task. What are the opportunities for collaboration between the government, law enforcement, industry and audit communities? For example, how could we work together to address an incident? What resources are available or needed to focus on how various communities can work together? How can a cybersecurity community help deal with the tension that sometimes exists between privacy and security or between industry and the government?

PANEL DISCUSSION
Moderator
Panelist
Panelist
Panelist
Panelist
Rob_Clyde-163.214 Ron_Ross-163.214 Gina_Osborn-163.214 Thomas_Grinberg-163.214 Dan_Meacham-163.214
Rob Clyde,
ISACA International Board member & VP
ISACA Logo
Dr. Ron Ross,
National Institute of Standards & Technology
Information Technology Laboratory
Computer Security Division
ISACA Logo
Gina Osborn,

Asst. Special Agent in Charge of the Cyber & Computer Forensics Programs for the Central District of California, FBI
ISACA Logo

Thomas Grimberg,
Enterprise Risk & IT Security Audit Director, Western Digital Corp.
ISACA Logo
Dan Meacham,
CISO,
Legendary Pictures
Legendary Pictures Logo

On Tuesday, we have Dr. Ron Ross, from NIST, on the topic of: “A Multidisciplinary Approach to Building Trustworthy Secure Systems : Protecting the Nation’s Critical Assets in the 21st Century.”

Ron_Ross-163.214
Dr. Ron Ross,
National Institute of Standards and Technology (NIST)
Information Technology Laboratory
Computer Security Division
ISACA Logo

NIST is developing critically important security guidance that addresses the engineering-driven actions necessary to develop more defensible and survivable systems—including the components that compose and the services that depend on those systems. It starts with and builds upon a set of well-established International Standards for systems and software engineering published by the International Organization for Standardization, the International Electrotechnical Commission, and the Institute of Electrical and Electronics Engineers and infuses systems security engineering techniques, methods, and practices into those systems engineering processes. The ultimate objective is to address security issues from a stakeholder requirements and protection needs perspective and to use established organizational processes to ensure that such requirements and needs are addressed at the correct stages throughout the life cycle of the system.

Increasing the trustworthiness of systems is a significant undertaking that requires a substantial investment in the architectural design and development of our applications, systems, components, and networks—and a fundamental cultural change to the current “business as usual” approach. Introducing a disciplined, structured, and standards-based set of systems security engineering processes can provide an important starting point and forcing function to initiate needed change. The ultimate objective is to obtain more trustworthy systems that are fully capable of supporting critical missions and business operations with a level of assurance that is consistent with the risk tolerance of the organization. This presentation provides a status report on the systems security engineering project and its flagship publication NIST Special Publication 800-160.


Pre-Conference Workshops
We have another great conference planned for this year. We start off with 4 pre-conference workshops:

– A 2-Day Introducing the Cybersecurity Fundamentals Workshop (CSX) (Mike Villegas, K3DES LLC)
– A 2-Day Penetration Testing, Techniques, Tools and Exploits Hands-on Workshop (Peter Morin, Forcepoint)
– A 2-Day Conducting Your Risk Assessment to Include Emerging Technologies (Shawna Flanders, Business-Technology Guidance Associates, LLC)
– A 1-Day Workshop: Stopping Attacks Early in the Cyber Kill Chain – Leveraging Internal and External Resources for Effective Security Monitoring (Lou Rabon, SecOps)

Then for the main 3-day conference we have a full set of sessions under the following 4 tracks:

Track #1
Accelerating Your Fundamentals
Track #2
Cybersecurity Nexus
Track #3
Emerging Security Issues, Tools and Techniques
Track #4
Designing and Managing Governance, Risk and Compliance
Designed for the operational/financial auditor or anyone new to the information technology auditing, security and governance who want to learn the fundamentals to enable or change a new career or refresh knowledge.This track provides the participants with the concepts, methodologies and techniques to help improve upon their knowledge, expertise and skills. Selected session proposals will provide participants with value–added tools such as audit programs, checklists, white papers and other reference material. In this track, cutting-edge IT and cybersecurity issues will be discussed along with recommendations and solutions. Topics include issues and risks related to social media, mobile technology risks (BYOD) IAM, cybersecurity governance, cloud computing strategies, threats to privacy as well as internal controls and Sessions are designed to include the latest cybersecurity topics to enhance the skills of audit, cybersecurity, and IT professionals. Through demonstration and discussions of real world issues and applications of solutions, this track will help assurance, security and risk professionals understand emerging security risks to the business and operational environments, as well as relevant security techniques and tools. Sessions include topics that will enable participants to take away security ideas and techniques that will enhance their professional development and work. This track explores the concepts and terminology of emerging issues related to IT governance, frameworks and risk management. Included in this track is the ISACA research and tools designed and developed to aid the IT professional in recognizing today’s emerging issues and mitigating impact on the enterprise. Sessions also include governance topics that supports the enterprise’s IT ability to sustain and extend the organization’s strategies and objectives.

Conference Fees

1 Day

2 Days

3 Days

1 Day

2 Day

Pre-conference Workshop
Pre-Conference Workshops Full Conference
(Mon. – Wed.)
Conference Conference
ISACA/ISSA/IIA Members

$200

$400

$650
($750 after early registration March 27)

$225

$550

Non Members

$250

$500

$750
($850 after early registration March 27)

$300

$650

Full Time Students

$100

$150

$250
($300 after early registration March 27)

$100

$250

No Refunds for cancellations after April 1, 2016.

Not a member of ISACA? Join today!
When you register for the conference as a nonmember, the difference between member and nonmember conference fees can be applied towards ISACA membership. This means you can become a member at the international and chapter level for little to no additional cost; it just depends on your local chapter dues. To take advantage of this great offer, please contact us. For more information about ISACA membership, visit the web site at www.isaca.org/membershipor contact the membership department at membership@isaca.org.
NOTE: This offer expires 30 days after completion of the event. Nonmembers pay the nonmember conference fee when registering.

Permission to be Photographed
By attending this event, the registrant grants permission to be photographed and videotaped during the event. The resultant photographs and videos may be used by ISACA LA for future promotion of ISACA LA’s educational events on ISACA LA’s web site, in social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs and videos will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs or videos now or in the future.

Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.

Review our LEGAL NOTICES for details on downloading information from our site. We welcome your comments. Please visit our Feedback page to help us improve the web site.

W-9 Requests – Please Email our Treasurer