Note: Next year’s conference is April 11-13, 2016, with April 9 & 10 for Pre-conference Workshops.
Theme: Creating a Cybersecurity Community

[sponsormarquee2015]
Hilton Los Angeles/Universal City Mark April 11th – April 15th, 2015 on your calendar and join us at the 2015 Spring Conference, the leading Information Systems IT governance, control, security and assurance event for the Southern California area. The ISACA Los Angeles Chapter provides affordable quality training on fundamental information systems auditing concepts and emerging technology risks, and an opportunity to network with other auditing and security professionals.The Spring Conference is the leading Information Systems IT governance, control, security and assurance event for the Southern California area. Click on the conference brochure cover icon below to download the 2015 Spring Conference brochure in the PDF format. |
[confvideo2015] Click the play button to view the video above. |
Online registration is now available. We are no longer accepting topic submissisons for the conference but you’re welcome to submit to speak at our dinner program by emailing [email protected]
|
![]() |
![]() |
Theme: Protecting the Cyber Enterprise
Keynote Speaker: Michele Robinson, California State CISO
California is home to more than 38 million people and considered one of the largest economies in the world. We are a very diverse population consisting of tech innovators in the Silicon Valley and across the state, aerospace projects at more than 3 NASA centers located in California, the entertainment industry capital, the leader in small business development, venture capitalists, and with over half of the fruit production in the US.
Every one of those businesses and consumers need technology to be competitive while operating in a secure environment. Investments in the secure use of technology is paramount to sustained growth in our state. Join Michele as she discusses the cyber threat, enterprise risk management strategy and how the California Cybersecurity Task Force is chartered with advancing California’s cyber security posture.
![]() |
Michele Robinson was appointed Director of the California Office of Information Security (OIS) and State Chief Information Security Officer (CISO) by Gov. Jerry Brown in May 2013. Robinson joined OIS in 2007 and assumed the position of Acting Director in February 2013, where she served as the liaison to federal, State and local government on cyber security policies and issues. From 2010 to 2013, she served as Deputy CISO and was responsible for managing the day-to-day operations of OIS and the statewide information security program, including enterprise policy development, disaster recovery planning, incident management, and compliance. From 2007 to 2010, Robinson served as Assistant CISO managing the statewide enterprise incident management program and effecting several significant policies. Prior to joining OIS, Robinson served as the CISO and Privacy Officer for the California Unemployment Insurance Appeals Board (CUIAB) for nearly 5 years. Prior to her appointment with CUIAB she worked for the Department of Consumer Affairs (DCA) for 8 years, serving on policy development, new program implementation, business process reengineering and system design and integration committees, and representing DCA and its constituent board and bureau programs at task force meetings, board meetings and special meetings with control agencies and members of the Legislature. Robinson has 10 years of experience in the finance and credit industry where she has held manager, supervisor, and fraud investigator positions. She holds a Bachelor of Science in information systems from the University of San Francisco, and CISSP, CISM, CIPP/US, and CIPP/IT certifications. |
Keynote Panel: California Cybersecurity Task Force Panel Discussion
As the first coordinated step toward securing California’s cyber infrastructure, California Governor Edmund “Jerry” Brown commissioned the California Cybersecurity Task Force, a cybersecurity advisory committee comprised of representatives from the public and private sectors, academia, and law enforcement. Michele has said that because of the interconnectedness of government and private-sector IT assets, collaboration has become crucial. And the ultimate goal, she said is to collaborate and work together to improve cybersecurity for the state.
The California Cybersecurity Task Force is working to improve the state’s ability to adapt and respond to emerging cyber threats. The coalition includes public, private and educational partners and is led by the Governor’s Office of Emergency Services and the Department of Technology. The Task Force has been developing a statewide cybersecurity strategy and is organized into the following 7 subcommittees (Legislation and funding, workforce and education development, economic and business development, information sharing, risk mitigation, emergency preparedness, and high-tech and digital forensics).
PANEL DISCUSSION |
||||||||||
Moderator |
Panelist |
Panelist |
Panelist |
Panelist |
||||||
![]() |
![]() |
![]() |
![]() |
![]() |
||||||
Robert Stroud, ISACA International President |
Michele Robinson, California State CISO |
Stan Stahl, Ph.D., Citadel Information Group & ISSA LA President |
William “Bill” Britton, Visiting Director of Cybersecurity Center at Cal Poly San Luis Obispo |
Oliver Rosenbloom, Assoc. Governmental Program Analyst |
On Tuesday, we have Dr. Ron Ross, from NIST, on the topic of “The National Conversation No One Wants to Have: A New Paradigm for Cyber Resiliency”
The increasing complexity of the IT infrastructure supporting our public and private sector organizations is becoming the number one threat to the economic and national security interests of the United States. Developing effective cybersecurity and risk management strategies that promote trustworthy and resilient information systems and networks is the key to future mission and business success.
Dr. Ron Ross
National Institute of Standards and Technology
Information Technology Laboratory
Computer Security Division
Pre-Conference Workshops
![]() |
Introducing the COBIT 5 Foundation Course and Exam (Two-day Course) COBIT 5 is the only business framework for the governance and management of enterprise IT. Learn the importance of an effective framework to enable business value. Delve into the elements of ISACA’s evolutionary framework to understand how COBIT 5 covers the business end-to-end and helps you effectively govern and manage enterprise IT. Developed for anyone interested in obtaining foundation-level knowledge of COBIT, the course explains the COBIT framework and supporting materials in a logical and example-driven approach. This is a course that is typically offered at $1500 or higher, the chapter is pleased to offer it to our membership at a substantial discount. |
![]() |
Introducing the CRISC™ Certification Review Course (Two-Day Course) The Certified in Risk and Information Systems Control™ (CRISC™) is the most exciting new certification in the Information Systems’ world and has already set records for people registering to be recognized as CRISC professionals. ISACA’s Certified in Risk and Information Systems Control (CRISC) has been listed on CIO.com as a hot IT certificate for 2014: http://www.cio.com/slideshow/detail/130807/18-Hot-IT-Certifications-for-2014#slide2 |
|
Introducing the Cybersecurity Fundamentals (CSX) workshop (Two-Day Course) Why become a cybersecurity professional? The protection of information is a critical function for all enterprises. Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of Information Technologies (IT). The CSX Fundamentals workshop is designed for this purpose, as well as to provide insight into the importance of cybersecurity, and the integral role of cybersecurity professionals. This workshop will also prepare learners for the CSX Fundamentals Exam.Find more information about this certificate here: http://www.isaca.org/cyber/Pages/Cybersecurity-Fundamentals-Certificate.aspx |
Mobile Device Security and Mobile Application Dissection | Mobile Device Security and Mobile Application Dissection(One-day Course)Mobile devices are prevalent in the workspace and personal lives of all of us. With those devices comes a new set of security risks and challenges. This workshop will involve a series of lectures and hands-on exercises to help you understand mobile devices and their impact in the workplace, how they are secured, and how you can obtain a better understanding of their inner workings and the risks you are accepting.Syllabus:
You will need a laptop that you have administrative rights to as well as being able to run a virtual machine for the class exercises. Excellent Value: $200 (members) |
Track #1 Accelerating Your Fundamentals |
Track #2 Cybersecurity Nexus |
Track #3 Emerging Security Issues, Tools and Techniques |
Track #4 Designing and Managing Governance, Risk and Compliance |
Designed for the operational/financial auditor or anyone new to the information technology auditing, security and governance who want to learn the fundamentals to enable or change a new career or refresh knowledge.This track provides the participants with the concepts, methodologies and techniques to help improve upon their knowledge, expertise and skills. Selected session proposals will provide participants with value–added tools such as audit programs, checklists, white papers and other reference material. | In this track, cutting-edge IT and cybersecurity issues will be discussed along with recommendations and solutions. Topics include issues and risks related to social media, mobile technology risks (BYOD) IAM, cybersecurity governance, cloud computing strategies, threats to privacy as well as internal controls and Sessions are designed to include the latest cybersecurity topics to enhance the skills of audit, cybersecurity, and IT professionals. | Through demonstration and discussions of real world issues and applications of solutions, this track will help assurance, security and risk professionals understand emerging security risks to the business and operational environments, as well as relevant security techniques and tools. Sessions include topics that will enable participants to take away security ideas and techniques that will enhance their professional development and work. | This track explores the concepts and terminology of emerging issues related to IT governance, frameworks and risk management. Included in this track is the ISACA research and tools designed and developed to aid the IT professional in recognizing today’s emerging issues and mitigating impact on the enterprise. Sessions also include governance topics that supports the enterprise’s IT ability to sustain and extend the organization’s strategies and objectives. |
CONFERENCE REGISTRATION DISCOUNT: A $50.00 discount per three-day registration is available to companies with three or more paid three-day registrants. If you are registering using the paper form and if there are three or more people registering for the conference from your company, simply subtract $50 from the total cost. To request a discount code, click the button below:
Conference Fees
1 Day |
2 Days |
3 Days |
1 Day |
2 Day |
|
Pre-conference Workshop |
CRISC Boot camp or COBIT5 Foundations or Cybersecurity Fundamentals Workshops |
Full Conference (Mon. – Wed.) |
Conference | Conference | |
ISACA/ISSA Members |
$200 |
$400
|
$650
|
$225 |
$550 |
Non Members |
$250 |
$500
|
$750
|
$300 |
$650
|
Full Time Students |
$100 |
$150
|
$250
|
$100 |
$250 |
Not a member of ISACA? Join today!
When you register for the conference as a nonmember, the difference between member and nonmember conference fees can be applied towards ISACA membership. This means you can become a member at the international and chapter level for little to no additional cost; it just depends on your local chapter dues. To take advantage of this great offer, please contact us. For more information about ISACA membership, visit the web site at www.isaca.org/membershipor contact the membership department at [email protected].
NOTE: This offer expires 30 days after completion of the event. Nonmembers pay the nonmember conference fee when registering.
Permission to be Photographed
By attending this event, the registrant grants permission to be photographed and videotaped during the event. The resultant photographs and videos may be used by ISACA LA for future promotion of ISACA LA’s educational events on ISACA LA’s web site, in social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs and videos will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs or videos now or in the future.
Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
Review our LEGAL NOTICES for details on downloading information from our site. We welcome your comments. Please visit our Feedback page to help us improve the web site. |