Tuesday, May 9, 2017
3:30 pm to 5:00 pm – Optional Pre-Meeting
5:00 pm to 5:30 pm – Registration & Networking
5:30 pm to 6:30 pm – Dinner & Networking
6:30 pm to 8:30 pm – Program
Dinner Meeting Topic:
2 Speed IT Controls and Audit
Link to Presentation
|
As businesses become increasingly complex, the technology structures that support them must also evolve. So in turn, today’s business users and consumers have high expectations for technology and for the companies that deliver and support these services. Therefore, these technology companies must respond to consumer demand with more IT capabilities, faster deployment rates, greater use of third-party vendors, and the use of emerging technologies – such as in the cloud. These business needs have transformed the IT landscape and exposes it to new risks. In this presentation, risk professionals can find a starting point for tackling these new challenges and risks facing the rapidly changing technology industry. As companies’ IT divisions have evolved from cost centers to opportunities for growth and competitive advantage, their structures have become more fluid and adaptive. Therefore, the approach to managing their risks must also be dynamic and progressive from the risk assessment to successful risk mitigation.
Raymond Cheung
Risk Executive
Crowe Horwath LLP
|
|
Ray is Risk Executive and Managing Director of Crowe Horwath LLP. In addition to his experience in consulting on Risk, he also has published articles on the subject.
Ray also has been Corporate Vice President and Chief Information Officer of P O Shipping (USA), Inc., Managing Director at BDO LLP, and Director at KPMG LLP. He currently is Chairman of the Executive Advisory Board of the University of San Francisco Center for Asian Pacific Studies. |
3:30-5:00 Pre-Meeting — Discussion on General Data Protection Regulation (GDPR) & Privacy Principles
The pre-meeting will focus on a discussion about GDPR and its impact on firms doing global business with EU countries and its citizens, impact to audit, security and privacy. We will also discuss the ISACA publication where Richard acted as SME for the ISACA PRIVACY PRINCIPLES AND PROGRAM MANAGEMENT GUIDE. We will also discuss problems and tools to consider.
Josh Chin is Director of Net Force, a security and risk management firm. He is also the Past President of the Southern California (SoCal) Chapter of HTCIA.
Richard Chew, CISM, CISSP, CISA, CGEIT, is an enterprise risk management consultant with over 40 years experience in IT, which includes bank regulation, shop management, software development, security, risk management and continuity of operations. Rich participated in ISACA International’s development of the initial CISM Review Manual and test questions. He is also active with ISSA, ISACA, HTCIA and InfraGard.
Note: Any attempt at marketing product or services during the pre-meeting will be met with immediate ejection. To promote free discussion, no recording devices are allowed! Those who violate this understanding will be asked to leave. Bring plenty of paper. No handouts.
|
|
Dinner Meetings are generally the second Tuesday of each month. The exceptions are joint meetings with other groups and the summer months of July and August when we don’t meet.For Online Reservations, click the “Register” button below:
(Registration Link will be available soon)
2 CPEs for Dinner Program
1 CPE for Optional Pre-Meeting
Payment Methods:
Credit Card, Cash and Checks
(made payable to ISACA-LA).
|
Rates |
ISACA, IIA,
ISSA, OWASP
Members |
Full-Time Students
& Faculty
(Members and Non-Members)
|
Non-Members |
Pre-Meeting |
N/A |
N/A |
N/A |
Dinner Meeting:
Pre-Paid online by midnight the Friday before the event |
$25 |
$10 |
$30 |
Dinner Meeting:
Walk-Ins or Pre-Paid online after midnight the Friday before event |
$30 |
$20 |
$40 |
|
|
|
Address/Directions
|
|
3500 Ramona Boulevard
Monterey Park, CA 91754
(323) 268-4177
|
[google_map_easy id=”1″]
Disclaimer
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to ISACA as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
Permission to be Photographed
By attending this event, the registrant grants permission to be photographed during the event. The resultant photographs may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs now or in the future.