November Dinner Meeting
Tuesday, November 12th, 2013
3:30pm-5pm – Pre-Meeting Discussion Forum (1 CPE)
5pm – 5:30pm: Registration and Networking
5:30pm – 6:30pm: Dinner
6:30pm – 8:30pm: Program (2 CPEs)

At this November 12th dinner meeting, we will have Bernie Cowens talk to us about “Stickup: From FedEx to Facebook, Craigslist to Conficker, Wiki Leaks to Wire Fraud, What You Need to Know to Stop the Next Bank Robbery.”
Please plan on joining this great educational experience and taking advantage of the opportunity for networking! Don’t forget to register by November 8, 2013 to get the early registration discount.
|
Dinner Meeting Topic:
Stickup: From FedEx to Facebook, Craigslist to Conficker, Wiki Leaks to Wire Fraud, What You Need to Know to Stop the Next Bank Robber
What do bad grammar, Careerbuilder, and FedEx have to do with bank robbery? Let’s see. Because that’s where the money is. According to FBI statistics, the number of physical bank robberies has been steadily declining. The average dollar loss during a physical bank robbery too has declined and is in the tens of thousands of dollars. Physical bank robbery has given way to electronic versions of the crime, which are on the rise. The crime is the same, the tactics are actually the same, but the tools and techniques are on a whole new level.
Tying the pieces together: The reality of the multitude of security vulnerabilities, threats, lapses, and control gaps that you see almost daily is that they can and do result in tangible losses to organizations big and small. In this session, we’ll review current security threats that alone are obvious problems, but that when connected together, form a chain of events that has led to the loss of significant amounts of money. We’ll explore individual cyber threats and vulnerabilities in the context of a real bank heist. We’ll look at the events that led up to, enabled, and resulted in the theft of huge sums of money.
|
 |
Bernie Cowens, Vice President, CISO at First American
Bernie brings substantive experience in information security, risk management, privacy and compliance expert. He is a security and technology executive with fortune class company experience in the financial services, high technology, banking, retail, and government sectors. He has experience with multiple successful control and compliance projects including PCI DSS compliance; Sarbanes-Oxley / Model Audit Rule controls and compliance; identity management; Gramm-Leach-Bliley; Health Insurance Portability and Accountability Act / HITECH Act controls and compliance.
|
Pre-Meeting Discussion Forum |
- “Vendor Management Changes” – As a discussion forum, we will be examining vendor management changes to address risks as identified by the Consumer Financial Protection Bureau (CFPB) ( Fraud and Reputation Risk) and the Office of the Comptroller of the Currency (OCC) (Operational Risks).
- “Changes to California Breach Law” – The second discussion will be regarding the changes in the California Breach Law and how it aligns to Federal Law.
|
Rich is a consultant and former banking regulator. He is listed as a contributor / reviewer for the SOC 2 User’s Guide. In his past, Rich has been CIO, Managing Director of Consulting and Audit.
Josh Chin is Director of Net Force, a security and risk management firm.
Note: No recording devices permitted–to encourage open participation. There will not be handouts. Please do bring your note pads.
|
|
Dinner Meetings are generally the second Tuesday of each month. The exceptions are joint meetings with other groups and the summer months of July and August when we don’t meet.For Online Reservations, click the “Register” button below:

2 CPEs (Dinner Program Only)
3 CPEs (Pre-meeting and Dinner Program)
Payment Methods:
Credit Card, Cash and Checks
(made payable to ISACA-LA) only.
|
Rates |
ISACA, IIA, ISSA Members |
Non-Members |
Full-Time Students & Faculty Members |
Full-Time Students & Faculty Non-Members |
Pre-Meeting Pre-Paid
(online by midnight the Saturday
before the event) |
Free |
$15 |
Free |
Free |
Pre-Meeting Pay at the Door |
$5 |
$20 |
Free |
Free |
Dinner Meeting Pre-Paid
(online by midnight the Saturday
before the event) |
$25
|
$30
|
$5
|
$5 |
Dinner Meeting Pay at the Door |
$30
|
$40
|
$5
|
$5 |
|
|
|
Address/Directions
 |
[google-map-v3 width=”450″ height=”300″ zoom=”11″ maptype=”roadmap” mapalign=”center” directionhint=”true” language=”default” poweredby=”false” maptypecontrol=”true” pancontrol=”false” zoomcontrol=”true” scalecontrol=”true” streetviewcontrol=”true” scrollwheelcontrol=”false” draggable=”true” tiltfourtyfive=”false” addmarkermashupbubble=”false” addmarkermashupbubble=”false” addmarkerlist=”3700 West Ramona Blvd, 91754{}house.png{}ISACA Meeting @ Monterey Hill Restaurant” bubbleautopan=”true” showbike=”false” showtraffic=”false” showpanoramio=”false”] |
3700 West Ramona Boulevard
Monterey Park, CA 91754
(323) 264-8426
|
Disclaimer
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to ISACA as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
Permission to be Photographed
By attending this event, the registrant grants permission to be photographed during the event. The resultant photographs may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs now or in the future.