2015 ISACA Los Angeles Chapter Spring Conference
Call for Papers
The Los Angeles Chapter of ISACA is issuing a Call for Papers for its 2015 Spring Conference on IT governance, control, security and assurance. The theme of the conference will be “Protecting the Cyber Enterprise”
Call for Papers Due Date: December 31, 2014
Conference Dates:
Pre-conference Workshops: Saturday & Saturday, April 11 – 12, 2015 (one or two days)
Conference: Monday – Wednesday, April 13 – April 15, 2015 (three days)
Location: Hilton Universal City, California, USA
Please submit abstracts by the due date as we are unable to grant extensions.
Objective:
The chapter is committed to providing its members and the IT governance, assurance and security community with affordable high-quality educational and training opportunities and events. This includes fundamental information systems auditing concepts and emerging technology risks, and an opportunity to network with other governance, assurance and security professionals. The program will provide participants the tools, best practices, and information on how to overcome challenges and prepare for future trends,delivered with practical and pragmatic approaches to topics and concepts. The Spring Conference is the leading IT governance, control, security and assurance event for the Southern California area. The 2014 conference attracted over 300 participants.
LEARNING OBJECTIVES AND EDUCATION MISSION
ISACA Los Angeles Chapter is looking for innovative session proposals that not only speak to the technical issues, but provide context. Speakers should offer real-world cases, examples of actual tools and working papers used, including mapping to ISACA frameworks, successes and failures, and insight on emerging issues to help attendees stay ahead of the curve. Sessions should be designed to encourage interactive audience participation by including small group discussions, exercises and other activities to promote dialogue. ISACA LA is not looking for 60 minutes of lectures but rather innovative, energetic and engaging sessions. Proposals from a team or panel are welcome in order to share multiple perspectives on a topic.
We encourage speakers to be familiar with portions of COBIT, Val IT and Risk IT that are relevant to their presentations. Speakers should consider how presentation content supports CISA, CISM, CGEIT and CRISC knowledge objectives. The speaker must provide additional resources such as documents related to the topic, bibliographies, white papers, relevant articles, tools, guides, sample audit programs and other information that extends the learning beyond the session and adds value to the event.
CONFERENCE TRACKS
The 2015 Spring Conference tracks will include:
Pre-Conference Workshops
We will be offering two-day workshops that offer both technical materials and hands-on exercises on topics such as COBIT 5, CRISC review, risk management, and technology risks such as mobile or cloud security etc.
Track #1 – Accelerating Your Fundamentals
Designed for the operational/financial auditor or anyone new to the information technology auditing, security and governance who want to learn the fundamentals to enable or change a new career or refresh knowledge.
This track provides the participants with the concepts, methodologies and techniques to help improve upon their knowledge, expertise and skills. Selected session proposals will provide participants with value–added tools such as audit programs, checklists, white papers and other reference material.
Track #2 – Cybersecurity Nexus
In this track, cutting-edge IT and cybersecurity issues will be discussed along with recommendations and solutions. Topics include issues and risks related to social media, mobile technology risks (BYOD) IAM, cybersecurity governance, cloud computing strategies, threats to privacy as well as internal controls and Sessions are designed to include the latest cybersecurity topics to enhance the skills of audit, cybersecurity, and IT professionals.
Track #3 – Managing Governance, Risk and Compliance
This track explores the concepts and terminology of emerging issues related to IT governance, frameworks and risk management. Included in this track is the ISACA research and tools designed and developed to aid the IT professional in recognizing today’s emerging issues and mitigating impact on the enterprise. Sessions also include governance topics that supports the enterprise’s IT ability to sustain and extend the organization’s strategies and objectives.
Track #4 – Tools and Techniques
Through demonstration and discussion of checklists and programs, this track will help audit and IT professionals identify technological risks to the business and operational environments, and how to use relevant business analysis as well as technology tools and techniques. Sessions include topics that will enable participants to take away ideas and techniques to enhance their professional development and work.