Dinner Meeting

November Dinner Meeting 2014

November Dinner Meeting

Tuesday, November 18th, 2014

5 pm – 5:30 pm: Registration and Networking

5:30 pm – 6:30 pm: Dinner and Networking

6:30 pm – 8:30 pm: Program (2 CPEs)

More Info              Register Button

Dinner Meeting Topic:

Mobile Security and Privacy – Risks and Assessment Considerations

Mobile Applications are quickly becoming an essential channel to gain market presence and strengthen consumer and employee engagement. Mobile is ubiquitous, and is very quickly becoming a business differentiator. It is changing the way users are engaging with companies and companies with employees. Please join us as we discuss the business drivers, impacts and trends related to mobile security and privacy, including impacts on mobile application development, BYOD and others. Learn how Internal Audit and other compliance functions can play an integral role in defining policy, as well as identifying and managing the associated risks.

 

Chad Neale is the Southern California IT Risk, Security and Privacy Director for PwC’s Risk Assurance practice and an Information Security Architect.

Chad has more than 14 years of experience in information security management, IT security engineering and administration, audit and compliance readiness. He has held positions as the information security officer in financial services and as a security engineer / architect for a large defense contractor and online music provider. With his background navigating complex regulatory environments in the financial services and healthcare industries, Chad brings a broad and unique perspective to the topic of security and a passion to helping organizations mitigate their exposure to security risks.

  Sean_Gil-100.150

Evan Eneman is part of PwC’s Data Protection & Privacy (DP&P) practice within the Southern California market.

Evan helps to advise clients on leading information security and data protection and privacy practices. Evan has over twelve years of experience in financial and technical controls, design, implementation and assessment of privacy, information security, information technology business process controls, risk management, and IT project management. He has experience in leading and delivering attestations for regulatory agencies such as the Federal Trade Commission (FTC) and Office of Civil Rights (OCR) as well in leading and managing internal audit projects and SOX assessments across technology, financial services, entertainment and media sectors.

Dinner Meetings are generally the second Tuesday of each month.  The exceptions are joint meetings with other groups and the summer months of July and August when we don’t meet.For Online Reservations, click the “Register” button below:

Register Button

2 CPEs (Dinner Program Only)

Payment Methods:

Credit Card, Cash and Checks
(made payable to ISACA-LA) only.

Rates ISACA, IIA, ISSA Members

Full-Time Students
& Faculty
(Members and Non-Members)

Non-Members
Pre-Meeting
None this month
N/A N/A N/A
Dinner Meeting:
Pre-Paid online by midnight the Friday before the event
$25 $10 $30
Dinner Meeting:
Walk-Ins or Pre-Paid online after midnight the Friday before event
$30 $20 $40

Address/Directions

 

Monterey-Hill-Entrance

3700 West Ramona Boulevard

Monterey Park, CA 91754

(323) 264-8426

 

Disclaimer

ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to ISACA as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.

Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.

 

Permission to be Photographed

By attending this event, the registrant grants permission to be photographed during the event. The resultant photographs may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs now or in the future.