February Dinner Meeting
Tuesday, February 12th, 2013
5pm – 8:30pm: Dinner Meeting (2 CPEs)
Dear ISACA Member:On February 12, 2013, Todd Barnum, at Tatum LLC, will be presenting the topic on “IT Security and Cloud Computing“. Todd is the former Director at KPMG LLP and Vice President of Information Security and Enterprise Architecture at Warner Brothers. Please plan on joining this great educational experience and to take advantage of the opportunity for networking! Don’t forget to register by February 8, 2013 to get the early registration discount. |
Dinner Topic:IT Security and Cloud Computing
|
|
Todd BarnumTatum LLC |
Todd Barnum is the Technology Practice Leader for Tatum’s Western Region. As the leader his is responsible for all technology market development activities west of Denver. Prior to Tatum, Todd led KPMG’s IT Security practice in the Pacific Southwest. In this capacity he was responsible for all IT Security projects and market development activities for Arizona, Nevada, SoCal and Hawaii. Prior to KPMG Todd was the Vice President of Information Security and Enterprise Architecture at Warner Bros Entertainment Inc. in Burbank California. As the leader of Information Security he was responsible for all aspects of information security. His Enterprise Architecture duties included oversight and management of architectural practices relating to system design, strategies and roadmaps, and architecture reference models. Prior to Warner Bros, Todd spent eight years with Amgen w here he was responsible for Information Security and Office of the CIO. Todd started his career as a Naval Officer and held a variety of Communications and Information Technology positions. Todd has taught Computer Science and MBA courses at California Lutheran University since 2001. He earned a Master of Science degree in Telecommunications and Computer Systems from the Naval Postgraduate School in Monterey California. |
Topic Abstract:Cloud computing brings unique challenges to IT Security and Compliance. This talk will focus on some of the many issues which must be considered, such as:
Given these implications, where should IT Security and Compliance be focused to ensure the use of Cloud Computing aligns with the company’s IT Security policies? |
Dinner Meetings are generally the second Tuesday of each month. The exceptions are joint meetings with other groups and the summer months of July and August when we don’t meet.For Online Reservations, click the “Register” button below:
(2 CPEs) Payment Methods: Credit Card, Cash and Checks |
|
Address/Directions
Disclaimer
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to ISACA as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
Permission to be Photographed
By attending this event, the registrant grants permission to be photographed during the event. The resultant photographs may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs now or in the future.