November 2014 Volume 7, Issue 4 2014 - 2015 Officers: November Meeting Details President Dan Sterba Third Party Risks Vice President Steve Kerns Secretary Avanti Sulakhe Date: Time: Location: November 13, 2014 Registration 11:30 AM | Lunch 12:00—1:00 PM | Presentation 1:00 - 3:00 PM Lidia’s Italy | 101 West 22nd Street | Kansas City | MO | 64108 CPE: 2 Credits NOTE: Actual CPE hours granted are dependent upon duration of the speaker’s presentation and may differ from the advertised number of CPE hours. Treasurer Anthony Canning Director Ted Combs Brian Howell BJ Smith 2 CPEs Price: $35 members | $50 guests | $5 students Menu: Insalata Caesar alla Lidia | The Pasta Trio | Tiramisu | Coffee, Tea Please denote any dietary restrictions when registering and accommodations will be made. Registration: www.isaca-kc.org by 5:00 p.m. on Monday, November 10th. Presentation Overview: What should organizations consider when evaluating third-party providers for services? With organizations evaluating resources and capabilities internally and out-sourcing services to third parties, it is important to evaluate the possible impacts to data, security, personnel, and service levels. The presentation will cover topics for consideration when using out-sourced services and third-party providers and possible risks. In This Issue: November Meeting 1 Details Chapter News 2 December Meeting 3 Details and Events Calendar KC Fall Training Update 4 Career Opportunities 5 Speaker: Greg Schu Greg Schu is a partner with McGladrey's technology risk advisory services practice. He provides organizations with IT risk management, compliance and risk advisory services and solutions, assists them with business process analysis and evaluates business and systems controls. Greg brings his experience as a consultant for financial audit and compliance requirements for Sarbanes-Oxley (SOX), Payment Card Industry (PCI), Service Organization Controls (SOC), and Health Insurance Portability and Accountability Act (HIPAA) standards. Greg is a CPA and CISA, based in the Minneapolis office. The information presented and included in accompanying materials (if any) is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although the speaker and content authors endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act upon such information without appropriate professional advice after a thorough examination of the particular situation. News from ISACA 6 1 Membership Renewal and CPE Submission Deadlines Coming Up It’s that time of year again and the deadlines are coming up fast. Here are the deadlines that you need to be aware of: December 31, 2014: Deadline for certificate holders to submit CPEs for the 2014 reporting year January 15, 2015: Deadline for membership renewals Still need CPEs? Don’t worry! You still have lots of ways to earn them before the deadline. Attending the November and December monthly chapter meetings will net you 4 more CPEs. And, in addition to the “Upcoming Events” list on page 3, there are over 30 CPEs available for viewing webinars in ISACA’s webinar archive. Not an ISACA member yet? If you purchase a 2015 membership now, you’ll receive the remainder of 2014 for FREE as well as discounts on local meetings and training events, ISACA publications and national conferences. You can find more information about the great benefits of an ISACA membership and apply online at www.isaca.org/Membership/JoinISACA. We’d love to have you be a part of the Kansas City chapter! Congratulations, Exam Passers Welcome to Our Newest Members! The Chapter would like to congratulate Shogo Cottrell on successfully passing the CISM Certification Exam in September. Great job! We’re growing! The Chapter would like to welcome its newest members, Mansoor Haq and Justin Lin. If you run into them at an upcoming Chapter event, please introduce yourself and give them a warm welcome. Meet Steve Kerns, ISACA-KC Vice President Steve Kerns is our chapter’s Vice President and leads the Program Committee in the development and delivery of our chapter meetings and educational programs. Steve is the Director Enterprise Risk Management at YRC Worldwide where he works closely with management in the identification and mitigation of top risks facing the Corporation. Steve is also the interim Director IT Audit. Steve is a seasoned risk management, audit, technical and financial professional with over 30 years of experience (e.g., enterprise risk management, auditing, financial systems, and accounting). Steve maintains multiple certifications, including CISA, CRMA, CIA and CFE. His interests and hobbies include his family, bowling, reading, home brew and wine making, bicycling, and nature. 2 Upcoming Events Calendar Other Events Mark Your Calendar! Joint Meeting with ISSA in December November 6, 2014 Webinar on Securing Servers in a Hybrid Data Center (1 CPE) DATE CHANGE: Please note that the December meeting will be held on the 1st Thursday of the month. November 11, 2014 Webinar on Data Breaches: A Risk-Based Approach to Identification, Impact Estimation, and Effective Remediation (1 CPE) November 12, 2014 Webinar on Cyber Assurance—What Should the IT Auditor Focus On (1 CPE) November 19, 2014 Innotech Kansas City Business and Technology Innovation Conference & Expo (Use discount code ISACA4C for free admission!) November 20, 2014 Webinar on Collaborating, Communicating and Making Friends (1 CPE) December 4, 2014 Webinar Want to Avoid Security Breaches? Leveraging the NIST Framework for Improved CyberSecurity (1 CPE) December 9, 2014 Virtual Conference Evolving Security for a Maturing Cloud (5 CPEs) December 13, 2014 CISA, CISM, CRISC and CGEIT Exams 2015 Security and Privacy Headlines 2 CPEs (joint meeting with ISSA) Date: Time: Location: December 4, 2014 Registration 11:30 AM | Lunch 12:00—1:00 PM | Presentation 1:00 - 3:00 PM Hereford House | 5001 Town Center Drive | Leawood | KS | 66211 CPE: 2 Credits NOTE: Actual CPE hours granted are dependent upon duration of the speaker’s presentation and may differ from the advertised number of CPE hours. Price: $35 members | $50 guests | $5 students Menu: Kansas City Classic BBQ Buffet—Grilled Boneless Chicken Breast, Sliced Brisket and Pork Ribs | Coleslaw | Cheddar Ranch Potatoes | Sauteed Green Beans | Chef’s Dessert Selection | Coffee, Tea Registration: Will be available on www.isaca-kc.org starting on November 11th. Presentation Overview: Latest trends/threats in the industry in regards to Security and Privacy; how are companies dealing with these threats Issues that companies are facing in regards to Security and Privacy; companies approach to dealing with Security and Privacy issues Future topics of interests for Security and Privacy Speaker Bio: Chris Crevits is a Senior Manager in the Infor mation Secur ity Advisor y Ser vices pr actice of Ernst & Young LLP. Chris has more than ten years of experience at EY in IT auditing and information security and four years in IT operations prior to joining the firm. Chris specializes in cyber threat management, security program management including transformation strategies and data protection. Chris is the leader of EY Advanced Security Center SOC / CSIRT services including managed and co-source Security Monitoring services and the Lead Subject Matter Resource (SMR) on several SOC / CSIRT program assessments, strategy and road map engagements. Chris is a Contributing author to ISACA publication, “Responding to Targeted Cyber Attacks” (May 2013) and Presenter at ISACA 2013 North America CACS on developing an effective cyber security plan. Tori Tripp is a Senior in the Advisor y Ser vices pr actice at EY. She has exper ience wor king with clients in privacy, information security, auditing, and business and IT processes. Tori is responsible for reviewing and assessing privacy programs for compliance with the EU-US Safe Harbor framework, EU Data Protection Directive, Health Insurance Portability and Accountability Act (HIPAA), and assessing privacy programs for alignment with the Generally Accepted Privacy Principles (GAPP). Tori has also assisted in multiple SOC 2 for privacy pre-assessments and audits for her clients. Tori has experience in a variety of industries including consumer products, biotechnology, specialty and agriculture chemicals, healthcare, telecommunications, software, and consumer electronics. 3 Fall Training Registration Now Closed Registration for ISACA-KC’s 2-day fall seminar is now closed. We have received an overwhelming response to attend the seminar and all available spots are now taken. If you would like to be added to the wait list, please email [email protected]. Evaluating IT Security Management 16 Date & Time: November 11, 2014 and November 12, 2014 (8:30 am to 4:30 pm) Location: Sprint Nextel World Headquarters – Overland Park, KS CPE’s: 16 CPEs Price: ISACA Regular Members: $480 (from November 1st through November 7th) Non-Members: $640 (through November 7th) Registration: Registration fees include course materials, lunch and morning\afternoon drink service. Fees must be paid promptly following registration to secure your seat and course materials if you are paying by check. Credit Card payment must be made at the time of registration. CPEs Course Description: A good percentage of internal and external IT auditors’ scope relates to information security. The assurance function must either place reliance on the management of the information function or perform extensive substantive procedures to satisfy compliance requirements. Where reliance is placed, the auditor must depend on their assertions and records of the information management function. A mature information security function will translate into reduced fieldwork. The internal auditor also is responsible for evaluating the effectiveness and efficiency of the information security function as part of their audit universe. ISO 31000 is the new standard (2009) for managing and assessing risk. But what is the risk associated with IT security management itself? An inadequate level of skill or competence in IT security management can lead to serious negative consequences for the enterprise, including: Inability to comply with statutes and regulations, such as Sarbanes Oxley, HIPAA, FISMA, PCI DSS, GLBA, Basel II, and governmental entities Lack of preparedness for security incidents and/or inability to execute a timely recovery Higher audit and insurance costs During this course, we will discuss organizational security, best-in-class security management, objectives and scope of an IT security management assessment, evaluation approaches, metrics for measuring risk associated with IT security management’s performance, and reporting approaches for maximum impact with senior management and stakeholders. For the speaker bio and more information on the course, please view the training flyer. 4 IT, Finance & Compliance Auditor - BlueCross BlueShield of Kansas Job Summary: Information Systems, Compliance and Financial Auditing requires a combination of knowledge and skills that include information systems auditing, financial auditing and the determination of compliance with relevant policies, procedures, regulations and laws. This progressive and challenging approach to auditing requires broad and unique business and technical knowledge, business and auditing experience, auditing skills and extensive training and education in order to successfully perform. Apply online at www.bcbsks.com/careers. Updated 9/29/2014. Internal Auditor - American Century Investments Job Summary: The primary responsibility of an internal auditor is to review operational and systems aspects of the company and assess the adequacy and effectiveness of internal controls. Read more and apply online. Updated 10/20/2014. Sr. IT Security Analyst - Capitol Federal Job Summary: The Sr. IT Security Analyst is responsible for assessing information risk and facilitates remediation of identified vulnerabilities for IT security and IT risk across the enterprise. Assesses information risk and facilitates remediation of identified vulnerabilities with the Bank network, systems and applications. Reports on findings and recommendations for corrective action. Performs vulnerability assessments as assigned utilizing IT security tools and methodologies. Performs assessments of the IT security/ risk posture within the IT network, systems and software applications, in addition to assessments within the Vendor Management Program. Identifies opportunities to reduce risk and documents remediation options regarding acceptance or mitigation of risk scenarios. Facilitates and monitors performance of risk remediation tasks, changes related to risk mitigation & reports on findings. Maintains oversight of IT and vendors regarding the security maintenance of their systems and applications. Provides weekly project status reports, including outstanding issues. The IT Security Analyst assists in all IT audits, IT risk assessments and regulatory compliance. View the full description and apply online. Updated 10/24/2014. IT Audit Manager - H&R Block Job Summary: The IT Audit Manager will play a key role in the development and execution of the IT audit strategy and should possess a strong understanding of information technology, finance, operational and compliance related risks and controls. This individual will interact on a regular basis with all levels of management and will be responsible for developing a strong strategic partnership with the Information Technology function. In addition, this position will directly supervise two direct reports and will be responsible for coaching and developing associates in preparation for new roles and additional responsibilities. More information and applications accepted at the H&R Block website. Updated 10/27/2014 5 Are you looking for the next step in your career? Social media can be a valuable tool in your search. It’s a great place to ... rub elbows with peers ... research employers ... and find new job opportunities. Join the discussion with ISACA-KC at: www.linkedin.com/ groups?gid=2863242 News from ISACA 2014-2015 Board Members 2015-2016 ISACA Volunteers Sought President Dan Sterba [email protected] Vice President Steve Kerns [email protected] Secretary Avanti Sulakhe [email protected] Treasurer Anthony Canning [email protected] Directors Ted Combs Brian Howell BJ Smith [email protected] Programs Committee Shaun Miller Molly Coplen Dennis Keglovits [email protected] Membership Director TBD [email protected] Research Director Chester Smidt [email protected] Webmaster Chester Smidt [email protected] Newsletter Editor Sherry Callahan [email protected] Volunteers who are willing to share their time and talent are critical to the success of ISACA. Apply to become an ISACA volunteer—contribute to your profession and earn free continuing professional education (CPE) hours. ISACA’s annual volunteer application period is now open. Members interested in volunteering with ISACA at the international level can find information on available opportunities and the process for submitting an application for consideration on the 2015-16 Invitation to Participate page of the ISACA web site. In addition to the invitation to participate brochure, members can learn more about the boards, committees and subcommittees that support the association. Interested members should review the information contained in the brochure and online, identify those volunteer opportunities that are of most interest, and complete the online application. Volunteer applications for the 2015-16 administrative term are due by 12 February 2015. In addition to the annual volunteer appointments, there are a number of volunteer opportunities available throughout the year. For more information, visit the Additional Volunteer Opportunities page of the ISACA web site. Two Months Remain in Member-Get-A-Member Program There are only 2 months remaining in the 2014 Member Get a Member program. Follow up with your colleagues to ensure they join ISACA before 31 December 2014. Remember, newly recruited members need to register with your member ID number and be paid in full by 31 December 2014 for you to receive credit under the campaign. With every member you recruit, you move closer to earning rewards. There is still time to earn a checkpoint-friendly computer backpack by recruiting 3-4 new members. You have the opportunity to earn a personal wireless activity and sleep tracker by recruiting 5-6 new members, a portable mini-Bluetooth® speaker by recruiting 7-9 new members or noise-canceling headphones by recruiting 10 or more new members. Learn more on the Member Get a Member page of the ISACA web site. Changed jobs or email addresses? Be sure to update your profile on ISACA’s website so that you can continue to receive the monthly newsletter, notices of upcoming training and seminars, and other chapter information. As a reminder, the Kansas City chapter considers email addresses to be private and confidential. Your email address will not be shared with or sold to third parties. 6
© Copyright 2024