Mobile Security and Privacy – Risks and Assessment Considerations
Mobile Applications are quickly becoming an essential channel to gain market presence and strengthen consumer and employee engagement. Mobile is ubiquitous, and is very quickly becoming a business differentiator. It is changing the way users are engaging with companies and companies with employees. Please join us as we discuss the business drivers, impacts and trends related to mobile security and privacy, including impacts on mobile application development, BYOD and others. Learn how Internal Audit and other compliance functions can play an integral role in defining policy, as well as identifying and managing the associated risks.
Chad Neale is the Southern California IT Risk, Security and Privacy Director for PwC’s Risk Assurance practice and an Information Security Architect.
Chad has more than 14 years of experience in information security management, IT security engineering and administration, audit and compliance readiness. He has held positions as the information security officer in financial services and as a security engineer / architect for a large defense contractor and online music provider. With his background navigating complex regulatory environments in the financial services and healthcare industries, Chad brings a broad and unique perspective to the topic of security and a passion to helping organizations mitigate their exposure to security risks.
Evan Eneman is part of PwC’s Data Protection & Privacy (DP&P) practice within the Southern California market.
Evan helps to advise clients on leading information security and data protection and privacy practices. Evan has over twelve years of experience in financial and technical controls, design, implementation and assessment of privacy, information security, information technology business process controls, risk management, and IT project management. He has experience in leading and delivering attestations for regulatory agencies such as the Federal Trade Commission (FTC) and Office of Civil Rights (OCR) as well in leading and managing internal audit projects and SOX assessments across technology, financial services, entertainment and media sectors.
Dinner Meetings are generally the second Tuesday of each month. The exceptions are joint meetings with other groups and the summer months of July and August when we don’t meet.For Online Reservations, click the “Register” button below:
2 CPEs (Dinner Program Only)
Credit Card, Cash and Checks
(made payable to ISACA-LA) only.
ISACA, IIA, ISSA Members
(Members and Non-Members)
None this month
Pre-Paid online by midnight the Friday before the event
Walk-Ins or Pre-Paid online after midnight the Friday before event
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to ISACA as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
Permission to be Photographed
By attending this event, the registrant grants permission to be photographed during the event. The resultant photographs may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs now or in the future.