Role of Internal Audit in Cyber Security Readiness
Board level awareness of emerging cyber threats and direct involvement in determining the response is critical in today’s evolving technical landscape. How do we move from reacting to anticipating cyber-attacks? How do we put the cyber threats we face into a business context? How do we understand the risk management approach and linkage to enterprise risk? This session will discuss the role of internal audit in cyber security readiness, insights on increasing audit committee requests about cyber security maturity, and how internal audit can respond.
There are no upcoming events to display at this time.
About Our Dinner Meeting Speakers
Dee Dee Owens
Dee Dee is a Partner in KPMG’s Risk Consulting Practice with more than 17 years of experience providing risk management and consulting services. She is a certified public accountant with experience leading large complex system implementations and providing IT and process assessments across a wide range of process areas. Dee Dee started her career in finance and accounting operational roles and transitioned into information technology by leading ERP implementation teams, with a focus on finance and security and controls work streams, including business process redesign. Her experience in operational and technology roles allow her to discuss information technology risks with a focus on business impact.
She focuses on serving clients in the government and healthcare industries across the full spectrum of governance, risk and compliance (GRC), including internal audit (both IT and operational), risk assessments, system development governance and quality assurance, financial statement attestation support, third party reporting and privacy and security. With her experience, Dee Dee is able to help her clients implement processes, systems and controls with a focus on quality and governance.
Paul Torres is a Director in KPMG’s Cyber practice with over 15 years of professional experience. Paul has a strong background in cyber security, IT security assessment, IT risk assessment, business continuity planning, enterprise risk assessment, business impact analysis, compliance review, SSAE 18/SOC reports, IT general controls, and project management.
Paul has substantial experience leading and coordinating cyber engagements for clients ranging from large public to small private companies across several industries as diverse as banking/financial services, manufacturing, retail, technology and communications, computer manufacturing, and state and local government.
5:30 PM – 6:00 PM: Registration and Networking
6:00 PM – 8:30 PM: Dinner and Program
Dinner Choices: Buffet
Attire: Business Casual
Time Details: 2 CPE Credits for the dinner meeting
Register by 2/7/20 to save!
Online registration opens through noon on day of the event.
For Online Reservations, click the “Register” button below:
|Rates||ISACA, IIA, ISSA,
Pre-Paid online by midnight the Friday before the event
Walk-Ins or Pre-Paid online after midnight the Friday before event
Payment: Credit Card
Those who reserve but do not come may be assessed a charge up to $25 if they do not cancel by noon the day before the event.
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation. Subject to the rights granted in all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
*Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
*Permission to be Photographed
By attending this event, the registrant grants permission to be photographed during the event. The resultant photographs may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs now or in the future.