2019 Events

2019 CISM Spring Exam Review Course

2019 Spring Exam Review Course Certified Information Security Manager (CISM)   Program Objectives This program is to assist candidates in preparing for the Certified Information Security Manager (CISM) examination. Candidates for ISACA’s highly respected CISM designation can now take the exam using computer-based testing (CBT). CBT allows for in-person testing on a computer at an…


– 04.03.19 –

She Leads TechSpeakers Stephanie Ginos  EY, Director – Client Technology Platform Operations Stephanie has worked in the Information Technology field, spanning a three-decade career across several Fortune 500 companies.  At EY, Stephanie has been a passionate advocate for diversity in the workplace and was appointed to serve as a Diversity and Inclusiveness champion for EY…

Hiking Social
– 03.23.19 –

ISACA Los Angeles Hiking Social ISACA Los Angeles Chapter is excited to invite you and your family and friends to a morning hike at the Eaton Canyon Trail on Saturday, March 23, 2019. The trail is conveniently located in Pasadena that features a beautiful 40-foot waterfall, and it also provides free parking. In addition, we…

2019 CSX Training Event

2019 CSX|F: Cybersecurity Fundamentals Course
– 02.23.19 & 02.24.19 –

2019 CSX|F: Cybersecurity Fundamentals Course The ISACA LA Chapter offers this workshop to help prepare students for the Cybersecurity Fundamentals Certificate [CSX|F] Examination. After completing ISACA’s two-day CSX|F: Cybersecurity Fundamentals Course attendees will be able to: • Identify key concepts and terminology in cybersecurity. • Define the key concepts, roles and domains of cybersecurity. •…

Dinner Meeting

Session 1: Threat Hunting in Internal Audit Governance
Session 2: Developing and governing the automation of controls, testing, and other repeated processes
– 02.12.19 –

Session 1: Eye on the Target – Threat Hunting in Internal Audit Governance With all the advances in cybersecurity over the past 10 years, why are we still hearing about large breaches being undetected for months or years? One key reason is that detection technology has not kept pace with adaptive adversaries. Learn more about…