Dinner Meeting

ISACA LA Dinner Meeting

Note: No meeting in April due to April conference. See you May 9th!

Tuesday, March 14th, 2017

3:30 pm to 5:00 pm – Optional Pre-Meeting
5:00 pm to 5:30 pm – Registration & Networking
5:30 pm to 6:30 pm – Dinner & Networking
6:30 pm to 8:30 pm – Program

More Info Register Button

Dinner Meeting Topic:

 Real-World eDiscovery: Litigation & Regulatory Response

 

 

When responding to a litigation event, complying with a regulatory request by the DOJ, SEC or independent compliance monitor under tight deadlines, your team needs to quickly, efficiently and effectively preserve, collect, process, host and review electronically stored information (ESI). Even if your organization has mature eDiscovery policies and procedures in place, without properly trained staff that follow the right processes and procedures, and know how to use technology to sift through vast amounts of data to separate the wheat from the chaff, it can be difficult for your organization to respond adequately. However, by implementing top down change, maturing your processes holistically, and providing the right guidance for your employees, it is possible to leverage people, process and technology to increase efficiencies and reduce risk. During this presentation, we will examine the common threads between Litigation and Regulatory Response through real-world examples as well as methods that can be used to increase the accuracy and productivity of your team while mitigating risk for the organization as a whole.

After completing this session participants will be able to:

  • Understand the process commonalities between Litigation and Regulatory Response and their dependence on the ability to efficiently and effectively preserve, collect, process, host and review electronically stored information.
  • Understand the ability to collect and use data, both structured and unstructured.
  • Understand how an organization’s ability to control the information in its possession is critical to its overall success.
  • Understand a standardized universal framework for governing and discovering information, whether the discovery is for retiring data with no business value or in support of litigation and regulatory requests.

 


Matthew_Miller-v2-150.150

Matthew Miller, Senior Manager, E&Y LLP

 

Matthew L. Miller is a Senior Manager in the Forensic Technology & Discovery Services (FTDS) group within the Fraud Investigation & Dispute Services (FIDS) practice at Ernst & Young LLP, primarily assisting organizations with electronically stored information challenges related to Cyber Security, eDiscovery, Forensics and Information Governance. Priot to E&Y, Matthew was the Product Marketing Manager for EnCase eDiscovery and Legal Hold at Guidance Software. He also ran Forsythe Technology’s Information Governance & eDiscovery practice implementing both processes and technology solutions across the US for more than twenty fortune 500 clients.

At EY, Matthew was the senior most project manager for the EMEIA work stream of the largest corporate hacking and incident breach of a global media & entertainment company. He led a multi-country team providing cyber breach remediation services including: forensic collection, scanning, cleansing and advanced forensic data recovery related to 44TBs of custodian data. Additionally, he has worked on complex regulatory and business related issues of corruption and bribery, including Foreign Corrupt Practices Act (FCPA) investigations and commercial corruption matters such as financial statement fraud and securities related fraud investigations, such as In re: Credit Default Swaps Antitrust Litigation. Matthew holds a Bachelor of Science in Management from Syracuse University and a Juris Doctor from Hofstra University School of Law.

.


3:30-5:00 Pre-Meeting — Discussion on CyberSecurity Standards and Risk Assessments


The pre-meeting will focus on a discussion about cybersecurity standards, risk assessments and how they may be applicable to your organization. The discussion will be facilitated by Josh Chin and Richard Chew. Financial institutions, government and their vendors are being required to demonstrate compliance. There is no one right answer because the tools are subjective.


A reference for discussion: http://www.ffiec.gov/press/PDF/FFIEC_IT_Handbook_Information_Security_Booklet.pdf


Josh Chin is Director of Net Force, a security and risk management firm. He is also the Past President of the Southern California (SoCal) Chapter of HTCIA.


Richard Chew, CISM, CISSP, CISA, CGEIT, is an enterprise risk management consultant with over 40 years experience in IT, which includes bank regulation, shop management, software development, security, risk management and continuity of operations. Rich participated in ISACA International’s development of the initial CISM Review Manual and test questions. He is also active with ISSA, ISACA, HTCIA and InfraGard.


Note: To promote free discussion, no recording devices are allowed! Those who violate this understanding will be asked to leave. Bring plenty of paper. No handouts.

 


 

Dinner Meetings are generally the second Tuesday of each month. The exceptions are joint meetings with other groups and the summer months of July and August when we don’t meet.For Online Reservations, click the “Register” button below:

Register Button

(Registration Link will be available soon)

2 CPEs for Dinner Program
1 CPE for Optional Pre-Meeting

Payment Methods:

Credit Card, Cash and Checks
(made payable to ISACA-LA).

Rates ISACA, IIA,
ISSA, OWASP
Members
Full-Time Students
& Faculty
(Members and Non-Members)
Non-Members
Pre-Meeting N/A N/A N/A
Dinner Meeting:

Pre-Paid online by midnight the Friday before the event

$25 $10 $30
Dinner Meeting:

Walk-Ins or Pre-Paid online after midnight the Friday before event

$30 $20 $40

Address/Directions

 

Luminarias

3500 Ramona Boulevard

Monterey Park, CA 91754

(323) 268-4177

Disclaimer

ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to ISACA as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.

Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.

 

Permission to be Photographed

By attending this event, the registrant grants permission to be photographed during the event. The resultant photographs may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs now or in the future.