2017 ISACA Los Angeles Chapter Spring Conference
Call for Papers
The Los Angeles Chapter of ISACA is issuing a Call for Papers for its 2017 Spring Conference on IT governance, control, security and assurance. The theme of the conference will be “Cyber in Action”
Call for Papers Due Date: January 15, 2017
Pre-conference Workshops: Saturday & Saturday, April 8 – 9, 2017 (one or two days)
Conference: Monday – Wednesday, April 10 – April 12, 2017 (three days)
Location: Hilton Universal City, California, USA
Please submit abstracts by the due date as we are unable to grant extensions.
The chapter is committed to providing its members and the IT governance, assurance and security community with affordable high-quality educational and training opportunities and events. This includes fundamental information systems auditing concepts and emerging technology risks, and an opportunity to network with other governance, assurance and security professionals. The program will provide participants the tools, best practices, and information on how to overcome challenges and prepare for future trends,delivered with practical and pragmatic approaches to topics and concepts. The Spring Conference is the leading IT governance, control, security and assurance event for the Southern California area. The 2015 conference attracted over 400 participants.
LEARNING OBJECTIVES AND EDUCATION MISSION
ISACA Los Angeles Chapter is looking for innovative session proposals that not only speak to the technical issues, but provide context. Speakers should offer real-world cases, examples of actual tools and working papers used, including mapping to ISACA frameworks, successes and failures, and insight on emerging issues to help attendees stay ahead of the curve. Sessions should be designed to encourage interactive audience participation by including small group discussions, exercises and other activities to promote dialogue. ISACA LA is not looking for 60 minutes of lectures but rather innovative, energetic and engaging sessions. Proposals from a team or panel are welcome in order to share multiple perspectives on a topic.
We encourage speakers to be familiar with portions of COBIT, Val IT and Risk IT that are relevant to their presentations. Speakers should consider how presentation content supports CISA, CISM, CGEIT and CRISC knowledge objectives. The speaker must provide additional resources such as documents related to the topic, bibliographies, white papers, relevant articles, tools, guides, sample audit programs and other information that extends the learning beyond the session and adds value to the event.
The 2017 Spring Conference tracks will include:
We will be offering two-day workshops that offer both technical materials and hands-on exercises on topics such as COBIT 5, CRISC review, risk management, and technology risks such as mobile or cloud security etc.
Track #1 – Accelerating Your Fundamentals
Designed for the operational/financial auditor or anyone new to the information technology auditing, security and governance who want to learn the fundamentals to enable or change a new career or refresh knowledge.
This track provides the participants with the concepts, methodologies and techniques to help improve upon their knowledge, expertise and skills. Selected session proposals will provide participants with value–added tools such as audit programs, checklists, white papers and other reference material.
Track #2 – Cybersecurity Nexus
In this track, cutting-edge IT and cybersecurity issues will be discussed along with recommendations and solutions. Topics include issues and risks related to social media, mobile technology risks (BYOD) IAM, cybersecurity governance, cloud computing strategies, threats to privacy as well as internal controls and Sessions are designed to include the latest cybersecurity topics to enhance the skills of audit, cybersecurity, and IT professionals.
Track #3 – Emerging Security Issues, Tools and Techniques
Through demonstration and discussions of real world issues and applications of solutions, this track will help assurance, security and risk professionals understand emerging security risks to the business and operational environments, as well as relevant security techniques and tools. Sessions include topics that will enable participants to take away security ideas and techniques that will enhance their professional development and work.
Track #4 – Designing and Managing Governance, Risk and Compliance
This track explores the concepts and terminology of emerging issues related to IT governance, frameworks and risk management. Included in this track is the ISACA research and tools designed and developed to aid the IT professional in recognizing today’s emerging issues and mitigating impact on the enterprise. Sessions also include governance topics that supports the enterprise’s IT ability to sustain and extend the organization’s strategies and objectives.
Track #5 – Women in Technology
Learn, get inspired and network from women leaders in technology. This track is open for all as we discuss about techniques and methods to be a successful leader. Topics included enhancing executive presence, techniques to develop and build personal branding, and establishing trust in the ever challenging environment.
HOW SPEAKERS ARE CHOSEN
Proposals are reviewed by the Conference Committee comprised of member-volunteers who demonstrate subject matter expertise and competencies in education program development. Proposals are due by December 31 2016 and will be selected by the end of January or early February 2017. L.A. ISACA expects the speaker to honor his or her commitment to present the proposed session at the conference.
The proposals are evaluated in whole or in part on the following criteria:
- Subject matter relevance and timeliness
- Clearly stated learning objectives and purpose
- Practical application of material
- Technical accuracy
- Context of the issues including real-world case studies, examples, and stories
- Potential for audience interactive participation
- Speaker presentation skills and experience
- Speaker subject matter knowledge and expertise
- Speaker industry leadership
- Education focus devoid of overt and covert commercialism
- Overall quality of the written proposal
SPEAKER EXPENSE REIMBURSEMENT
L.A. ISACA is a not-for-profit organization serving the IT assurance, information security management, IT risk management and governance communities. Most speakers and their companies recognize the importance of being part of ISACA’s education events and embrace a philanthropic spirit by funding travel and lodgings. ISACA education events provide speakers the opportunity to demonstrate their expertise, knowledge and experience, as well as to network with constituents for business development purposes. In appreciation for all the hard work and effort, ISACA offers a full complimentary conference registration (workshops on availability basis) to all speakers. In addition, ISACA recognizes speakers and their companies as “conference supporters” in communications at the conference.