+ All Categories
Home > Documents > 2015 CONFERENCE ON IT AUDIT, THE ONLy EvENT ... - castore.ca · The rise of the chief data officer...

2015 CONFERENCE ON IT AUDIT, THE ONLy EvENT ... - castore.ca · The rise of the chief data officer...

Date post: 28-Jul-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
12
TWO annual programs uniquely designed for IT professionals 2015 CONFERENCE ON IT AUDIT, GOVERNANCE AND SECURITY March 25-26, 2015 OPTIONAL POST-CONFERENCE WORKSHOP MARCH 27 Hyatt Regency Toronto TORONTO, ON THE ONLY EVENT OF ITS KIND! New for 2015. Expanded agenda with new insights, best practices and industry- leading speakers on a North American basis. FUNDAMENTALS OF IT AUDIT – A THREE-DAY WORKSHOP March 25-27, 2015 (RUNNING CONCURRENTLY WITH THE CONFERENCE) Hyatt Regency Toronto TORONTO, ON In this practical, hands-on workshop you will get the core skills necessary to complete or supervise a wide range of IT audit assignments in today’s complex environments. KEYNOTE SPEAKERS Claudiu Popa Technology expert specializing in security and privacy President and CEO, Informatica Corporation Desiree (Desi) Matel-Anderson “Chief Wrangler”, Field Innovation Team (FIT) CEO, Global Disaster Innovation Group, LLC Co-presented by: CONFERENCE EXHIBITORS TO DATE Program information is correct at time of print. For the most current information visit cpacanada.ca/ITAudit
Transcript
Page 1: 2015 CONFERENCE ON IT AUDIT, THE ONLy EvENT ... - castore.ca · The rise of the chief data officer (CdO) in the C-suite is due, in part, to the recognition that data is a valuable

TWO annual programs uniquely designed for IT professionals

2015 CONFERENCE ON IT AUDIT, GOVERNANCE AND SECURITYMarch 25-26, 2015 OPTIONAL POST-CONFERENCE WORKSHOP MARCH 27

Hyatt Regency Toronto TORONTO, ON

THE ONLy EvENT OF ITS

KINd!

New for 2015. Expanded

agenda with new insights,

best practices and industry-

leading speakers on a

North American basis.

FUNDAMENTALS OF IT AUDIT – A THREE-DAY WORKSHOPMarch 25-27, 2015(RUNNING CONCURRENTLy WITH THE CONFERENCE)

Hyatt Regency TorontoTORONTO, ON

In this practical, hands-on

workshop you will get

the core skills necessary

to complete or supervise

a wide range of IT audit

assignments in today’s

complex environments.

KEyNOTE SPEAKERS

Claudiu PopaTechnology expert

specializing in security

and privacy

President and CEO,

Informatica Corporation

Desiree (Desi) Matel-Anderson“Chief Wrangler”, Field

Innovation Team (FIT)

CEO, Global disaster

Innovation Group, LLC

Co-presented by:

CONFERENCE EXHIBITORS TO dATE

Program information is correct at time of print. For the most current information visit cpacanada.ca/ITAudit

Page 2: 2015 CONFERENCE ON IT AUDIT, THE ONLy EvENT ... - castore.ca · The rise of the chief data officer (CdO) in the C-suite is due, in part, to the recognition that data is a valuable

2015 CONFERENCE ON IT AUDIT, GOVERNANCE AND SECURITY AND FUNDAMENTALS OF IT AUDIT – A THREE-DAY WORKSHOP

For more details and registration, visit: cpacanada.ca/ITAudit2

ARE yOU NEW TO THE WORLd OF IT AUdIT? GET THE ESSENTIALS yOU NEEd By ATTENdING THE HIGHLy-ACCLAIMEd:

FUNDAMENTALS OF IT AUDIT – A THREE-DAY WORKSHOP• ObtainthecoreskillsneededtocompleteawiderangeofITauditassignmentsintoday’scomplex

multi-layered computing environments.

• Gainanunderstandingofkeyauditandcontrolprinciples.

• GetasolidfoundationtocontinuetobuildyourITauditexperience.

• Discoverpracticaltechniquesthatyoucanimmediatelyputtouse.

• LearnfromCraigMcGuffin,anindustryleaderwithover25yearsofexperienceinthefieldof

network controls and security.

• Earnupto21hoursofCPDcredits.

For more information, see page 9

WHO SHOULd ATTENd THE 2015 CONFERENCE ON IT AUdIT, GOvERNANCE ANd SECURITy

This conference is a must for anyone working, or providing professional

services, in the areas of IT audit, governance and security, including:

• chiefinformationofficers

• chieffinancialofficersandotherseniorfinancialexecutiveswith

IT responsibility

• ITsecurityofficers

• directorsandmanagersof:IT,ITaudit,internalaudit,risk,governance

and security

• auditors:external,internalandIT

• professionaladvisors

WHy yOU SHOULd ATTENd

• Customizeyourlearningexperiencewithacontent-richagenda–

three tracks and over 20 sessions covering a wide range of topics.

• Gainpracticalnewinsightsandbestpracticesthroughreal-world

examples you can put to use immediately.

• NetworkwithpeersandleadingexpertsfromacrossNorthAmericato

expand your knowledge.

• Earnupto21hoursofCPDinoneplace,PLUScontinuetolearn

afterwards with your free streaming media content.

CONFERENCE AdvISORy COMMITTEE

Bennet Chan,

IC1 Solutions Consulting Inc.

Nina Chow,

KPMG LLP

Ron Foster,

Internal Audit and Risk Management

Consultant

Adam Haverson,

Pall Corporation

Maria Pollieri,

Oracle Canada

Mohammad Sharifullah,

ISACA Toronto Chapter

Johanna Sun,

PwC

Page 3: 2015 CONFERENCE ON IT AUDIT, THE ONLy EvENT ... - castore.ca · The rise of the chief data officer (CdO) in the C-suite is due, in part, to the recognition that data is a valuable

2015 CONFERENCE ON IT AUDIT, GOVERNANCE AND SECURITY MARCh 25-26, 2015 OPTIONAL POST-CONFERENCE WORKSHOP MARCH 27 • Hyatt Regency tOROntO TORONTO, ON

3For more details and registration, visit: cpacanada.ca/ITAudit

AGENdA DAY 1 — WeDNeSDAY, MARCH 25, 2015

7:30 – 8:30 ReGISTRATION AND CONTINeNTAL BReAKFAST

8:30 – 9:30 Opening Keynote Address: emerging Risk Metrics Define Modern Information Security and Privacy Governance

9:30 – 9:35 SeSSION CHANGe BReAK

9:35 – 10:30 IT Risk Governance and Three/Six Lines of Defence

Modern Cloud Operations: The Basics You Need to Know

Communicating with the Audit Committee about Known and Unknown IT Risks

10:30 – 11:00 COFFee BReAK – eXHIBITS OPeN

11:00 – 12:00 Key Trends and Issues of Information Security

Top Five “Hot Spots” in International IT Audit

The Rise of the Chief Data Officer in the C-Suite

12:00 – 1:15 NeTWORKING LUNCH

1:15 – 2:15 Making Change Stick Mobile Banking … What’s NOT in Your Wallet?

Refresh Your eRM Process

2:15 – 2:20 SeSSION CHANGe BReAK

2:20 – 3:20 Managing Your Significant Others COBIT 5 – All-in-One Solution to Govern and Manage IT

The New Art and Science of Decision Making

3:20 – 3:35 COFFee BReAK – eXHIBITS OPeN

3:35 – 4:30 Risk Assessment and Management: Continuity of Business Operations – A Tabletop exercise

4:30 – 6:00 NeTWORKING ReCePTION

AGENdA DAY 2 — THURSDAY, MARCH 26, 2015

7:30 – 8:30 ReGISTRATION AND CONTINeNTAL BReAKFAST

8:30 – 9:30 Keynote Address: Let’s Innovate – The Importance of Collaboration in Disaster Response

9:30 – 9:35 SeSSION CHANGe BReAK

9:35 – 10:30 Shellshock and Heartbleed … It Was a Rough Year!

Game Theory and the IT Audit: How to Detect and Deter Fraud by Thinking Like A Beautiful Mind

Sleep Better at Night: SOC 2 Brings HIPPA Third-Party Assurance within Reach

10:30 – 11:00 COFFee BReAK – eXHIBITS OPeN

11:00 – 12:15 Using Data Mining in Procurement Audits

Leveraging Legislative Compliance Overview

Avoid Titanic IT Risks by Seeing the Whole Iceberg

12:15 – 1:30 NeTWORKING LUNCH

1:30 – 2:45 Project Management and Audit Risks with Agile Software Development Methodology

Privacy – Shooting at a Moving Target?

PCI DSS 3.0 – Think Security NOT Compliance

2:45 – 3:00 COFFee BReAK – eXHIBITS OPeN

3:00 – 4:00 Closing Session: emerging Technologies – Looking Forward

AGENdA DAY 3 — FRIDAY, MARCH 27, 2015 OPTIONAL POST-CONFERENCE WORKSHOP

7:30 – 8:30 ReGISTRATION AND CONTINeNTAL BReAKFAST

8:30 – 4:00 Data Visualization – Seeing Things Differently

Note: Agenda information is correct at time of printing. For the most up-to-date information, visit: cpacanada.ca/ITAudit

Page 4: 2015 CONFERENCE ON IT AUDIT, THE ONLy EvENT ... - castore.ca · The rise of the chief data officer (CdO) in the C-suite is due, in part, to the recognition that data is a valuable

2015 CONFERENCE ON IT AUDIT, GOVERNANCE AND SECURITY MARCh 25-26, 2015 OPTIONAL POST-CONFERENCE WORKSHOP MARCH 27 • Hyatt Regency toRonto TORONTO, ON

For more details and registration, visit: cpacanada.ca/ITAudit4

DAY ONE – WEDNESDAY, MARCH 25, 2015

7:30 – 8:30 ReGISTRATION AND CONTINeNTAL BReAKFAST

8:30 – 9:30 WeLCOMING ReMARKS AND OPeNING KeYNOTe ADDReSS emerging Risk Metrics Define Modern Information Security and Privacy Governance

Claudiu Popa believes that corporate governance is fundamentally dependent on stakeholder awareness and accountability. Managers and executives who understand information risk have a vastly improved chance to make decisions that benefit the organization and its investors while protecting customers and reputations.

Through research, he concludes that the overall risk maturity of every organization is a key metric that predicts the severity of the damage resulting from a data breach. Compliance aside, the impact on reputation, productivity and the organization’s financial posture can now be derived from a set of risk management best practices that are ultimately distilled into the elusive substance we call trust.

Claudiu Popa will share rich insights into what it means to manage information assets and protect intangibles–rolesthatarenolongerlimitedtoITgroups and specialized consultants. He paints a vivid picture of the compliance and data protection trends that have been shaping the business world and will continue to drive the world economy in the coming decade. As part of this evolutionary change, information technology is no longer just an enabler, but it is the set of systems that quantitatively produce the world’s most valuable currency (trust). One of the new fundamental measures of efficiency will be described by the ratio of trust produced per unit of effort. When that happens, corporate management and IT will no longer be fragmented disciplines at the mercy of the unpredictable crosswinds of risk but will be efficient, fully aligned business systems working toward a single, shared objective.

Keynote Speaker: Claudiu Popa, Technology expert, specializing in security and privacy; President and CEO Informatica Corporation

9:30 – 9:35 SeSSION CHANGe BReAK

9:35 – 10:30 CONCURReNT SeSSIONS – CHOOSe ONe OF THRee:

IT Risk Governance and Three/Six Lines of Defence

The importance of three lines of defence for IT risk management and risk governance is not new anymore. However, how does an organization go about implementing three lines of defence for IT risks? What has been the experience of organizations in the last two years and what are the best practices emerging from successful organizations? How are successful organizations further fine-tuning IT risk governance? How does an organization go about right-sizing these initiatives? These are the questions this session will attempt to answer.

After a brief primer on “three lines of defence” using real-life examples, the session will discuss concepts such as IT risk appetite, risk tolerance, key risk indicators, risk reporting, control self-assessment, enterprise risk aggregation and how IT risk gets incorporated into measurement and management of business risks. The session will use case studies, including a discussion on “six lines of defence” and howthese–contrarytowhatsoundsliketoomuch–couldleadtoamoreefficientwaytomanageandgovern IT risks.

Speaker: Baskaran Rajamani, deloitte

OR Modern Cloud Operations: The Basics You Need to Know

In this session, you will be introduced to the basic design tenets of a modern cloud datacentre. We will explain the regulation landscape of a datacentre, and the common metrics by which to evaluate cloud operations service providers (hint: high availability, disaster recovery, identity management…).

Speaker: dominic Fung, Oracle Canada

OR Communicating with the Audit Committee about Known and Unknown IT Risks

Audit committee members expect to hear at least annually from internal audit about risk management, control and governance processes, including IT risks and processes in place to mitigate these risks and govern IT. Are you doing sufficient audit and/or consulting engagements in these areas to provide annual comments to the audit committee? In this session, we’ll provide insights to help you answer this question.

Speakers: Richard Leblanc, york University and Paul Wallis, City of vaughan

10:30 – 11:00 COFFee BReAK – eXHIBITS OPeN

CONFERENCE SESSION DESCRIPTIONS

Page 5: 2015 CONFERENCE ON IT AUDIT, THE ONLy EvENT ... - castore.ca · The rise of the chief data officer (CdO) in the C-suite is due, in part, to the recognition that data is a valuable

2015 CONFERENCE ON IT AUDIT, GOVERNANCE AND SECURITY MARCh 25-26, 2015 OPTIONAL POST-CONFERENCE WORKSHOP MARCH 27 • Hyatt Regency tOROntO TORONTO, ON

5For more details and registration, visit: cpacanada.ca/ITAudit

11:00 – 12:00 CONCURReNT SeSSIONS – CHOOSe ONe OF THRee:

Key Trends and Issues of Information Security

Information security risks continue to mount, along with the associated financial losses. In fact, the annual average financial losses attributed to security incidents have increased by 34% since 2013. The question is, are you prepared to deal with today’s threats and losses?

Join us as we explore this question and other critical drivers of information security effectiveness. We’ll identify key global cyber security issues and trends, and the actions IT risk professionals should be taking. We’ll also dive deeper into the Canadian and industry-specific results to help you identify, and take action, in the areas critical to your business.

Speaker: Adriana Gliga-Belavic, PwC

OR Top Five “Hot Spots” in International IT Audit

In this session, we’ll explore the top five biggest current and near-term changes happening in international IT audit. you’ll gain an improved understanding of areas where increased training and capabilities can improve audit coverage and you will be better able to plan training programs for IT auditors and allocate appropriate resources to mitigate these emerging business risks.

Speaker: Gary Robertson, Pall Corporation

OR The Rise of the Chief Data Officer in the C-Suite

As the scale and granularity of data explode, boards and senior management want to unlock the “power” of data-driven decision making. There is a recognition that the ability to leverage the informational value of “big data”’ is an opportunity for revenue generation, innovation and competitive advantage. The rise of the chief data officer (CdO) in the C-suite is due, in part, to the recognition that data is a valuable business asset that must be managed to maximize its analytical value and to the realization that data is more than a technology issue. This discussion will further explore the drivers behind the rise of big data and the CdO, the multi-dimensional skill set required of a CdO and the evolving expectations of the CdO role.

Speaker: Cathy R. Cobey, Ey

12:00 – 1:15 NeTWORKING LUNCH

1:15 – 2:15 CONCURReNT SeSSIONS – CHOOSe ONe OF THRee:

Making Change Stick

Change is “the new norm.” It’s frenetic, all-encompassing and no one is immune. Organizations need to be agile and flexible in order to survive and thrive, but change only sticks when the people it affects are involved in the change management process.

In this session, we’ll look at the big picture of change management, including how it has evolved in recent years and what it looks like in today’s organizations. Through a case study, we’ll also investigate the importance of leadership alignment and the ability to win the buy-in of the organization’s employees on the change needed to lead to a successful business transformation, and the key lessons learned.

Moderator: Bronwyn Burke, PwC

Panelists: Gord Beal, CPA Canada; Steve Martin, Metrolinx

OR Mobile Banking … What’s NOT in Your Wallet?

Forget about your wallet … it’s passé! your cell phone does it all! From taking pictures, sending emails, playing games, watching movies … and making banking transactions! The trend in mobile banking will continue to rise with some believing they will not be carrying cash within 10 years.

In this session, we’ll address: the drive behind the transformation of the banking and payments ecosystems; the essentials for financial institutions to be successful; the leveraging of innovation as part of the business strategy; and game changers in competitive mobile banking and payments.

Speaker: Greg J. Thompson, Scotiabank

OR Refresh Your eRM Process

Enterprise risk management (ERM) methodologies have come a long way over the last 10 years. Have you updated your ERM methodology to address new IT risks? Is your ERM process dynamic enough to respond to emerging IT risks?

Speaker: Peter Heimler, KPMG LLP

2:15 – 2:20 SeSSION CHANGe BReAK

Page 6: 2015 CONFERENCE ON IT AUDIT, THE ONLy EvENT ... - castore.ca · The rise of the chief data officer (CdO) in the C-suite is due, in part, to the recognition that data is a valuable

2015 CONFERENCE ON IT AUDIT, GOVERNANCE AND SECURITY MARCh 25-26, 2015 OPTIONAL POST-CONFERENCE WORKSHOP MARCH 27 • Hyatt Regency toRonto TORONTO, ON

For more details and registration, visit: cpacanada.ca/ITAudit6

2:20 – 3:20 CONCURReNT SeSSIONS – CHOOSe ONe OF THRee:

Managing Your Significant Others

Reliance on third parties continues to grow, and companies are becoming increasingly comfortable outsourcing higher-risk business functions. But while you can outsource operational activities, you can’t outsource risk and compliance activities. If your third parties don’t have the proper safeguards and controls in place, you could be exposed to increased fiscal, operational, regulatory or reputational risk. Many regulators have reported that instances of noncompliance with regulations in outsourced areas are becoming more common, and that companies’ “best efforts” to manage third-party sourcing risk are no longer good enough.

In this session, we’ll explore the risks and pitfalls to look out for as you outsource your critical business functions. We will also discuss how to build an effective sourcing and risk management program from vendor selection, due diligence, contract negotiation through to ongoing monitoring and reporting.

Speaker: david Florio, Grant Thornton LLP

OR COBIT 5 – All-in-One Solution to Govern and Manage IT

The COBIT 5 framework for the governance and management of enterprise IT is a leading-edge business optimization and growth roadmap that leverages proven practices, global thought leadership and ground-breaking tools to inspire IT innovation and fuel business success. Since the release of COBIT 5 in 2012, enormous work has been done to expand its breadth and broaden its coverage to assist IT and control professionals around the world. This presentation will provide participants with an overview, recent updates and a brief walk-through of the available resources and tools for learning, certification and implementation.

Speaker: APMG Accredited COBIT Trainer with in-depth knowledge on ISACA-developed COBIT Tools and Resources.

OR The New Art and Science of Decision Making

Businesses make thousands of decisions a day. Most are routine, designed in some way to improve profitability. Some are strategic. The advance of data –boththesheeramountofit,andtheanalytics–now underpins many of those decisions. data is now recognized as one of the most valuable assets an organization possesses. yet too many organizations fail to unlock the full value of their data.

So how can organizations make use of advanced technology to turn mass data into useful information, perform predictive analytics and incorporate big data into their decision making process? In this session, we’ll also explore the role data and analytics play in guiding business leaders to make significant decisions about the strategic direction of the business and the role governance plays in all of this.

Speakers: Ramy Sedra, and Mark Mandel, PwC

3:20 – 3:35 COFFee BReAK – eXHIBITS OPeN

3:35 – 4:30 Risk Assessment and Management: Continuity of Business Operations – A Tabletop exercise

This session will challenge you, test your incident management preparedness, decision making skills and knowledge of risk management by placing you squarely in the command hot seat. you can’t be a passive attendee in this session. you are the session! Bring what you know and be prepared to share your experiences and explore different options from different perspectives as you deal with the threat scenario that is presented. Gain insights into best practices from our facilitator and, by interacting with your peers, form relationships for the duration of the conference and beyond.

Facilitator: Albert J. Marcella, Business Automation Consultants, LLC

4:30 – 6:00 NeTWORKING ReCePTION

DAY TWO – THURSDAY, MARCH 26, 2015

7:30 – 8:30 ReGISTRATION AND CONTINeNTAL BReAKFAST

8:30 – 9:30 KeYNOTe ADDReSS: Let’s Innovate – The Importance of Collaboration in Disaster Response

This session will describe how an innovative approach using collaboration is key to a successful response to disasters of all shapes and sizes.

Keynote Speaker: desiree (desi) Matel-Anderson, “Chief Wrangler”, Field Innovation Team (FIT) and CEO, Global disaster Innovation Group, LLC

9:30 – 9:35 SeSSION CHANGe BReAK

9:35 – 10:30 CONCURReNT SeSSIONS – CHOOSe ONe OF THRee:

Shellshock and Heartbleed … It Was a Rough Year!

More than ever, companies are experiencing sophisticated cyber-attacks that aim to disrupt their operations or compromise sensitive information. The evolution of these threats requires companies to continue to be vigilant because yesterday’s defence may prove inadequate.

This panel will address the current threats, future landscapes and the security readiness that companies must establish. The experts will also discuss the best practices in identifying and battling the threats in real time through situation and intelligence awareness.

Moderator: Rob Rowe, KPMG LLP

Panelists: Joe LoBianco, CIBC; Robert Masse, Mandiant; Greg Markell, HUB International; Alexander Rau, Symantec

Page 7: 2015 CONFERENCE ON IT AUDIT, THE ONLy EvENT ... - castore.ca · The rise of the chief data officer (CdO) in the C-suite is due, in part, to the recognition that data is a valuable

2015 CONFERENCE ON IT AUDIT, GOVERNANCE AND SECURITY MARCh 25-26, 2015 OPTIONAL POST-CONFERENCE WORKSHOP MARCH 27 • Hyatt Regency tOROntO TORONTO, ON

7For more details and registration, visit: cpacanada.ca/ITAudit

OR Game Theory and the IT Audit: How to Detect and Deter Fraud by Thinking Like A Beautiful Mind

John Forbes Nash, Jr., who was portrayed by Russell Crowe in the four-Academy-Awards-winning film A Beautiful Mind, received the 1994 Nobel Prize in Economics for his work in Game Theory. Game Theory is a mathematical method of strategic decision making which has been widely applied in all kinds of fields, such as economics, engineering, management and political science. Luckily, you don’t need a Phd in mathematics to apply the basic tools of Game Theory. This session will introduce you to some of the basic concepts and techniques of Game Theory and provide a few examples of the practical application of Game Theory in IT auditing.

Speaker: Mohamed drira, University of New Brunswick

OR Sleep Better at Night: SOC 2 Brings HIPPA Third-Party Assurance within Reach

In today’s healthcare market, data is a double-edged sword. On the one hand, the increasing digitization of the health system holds the promise of unimaginable benefits for patients, healthcare providers, health plans and the service providers and business associates that work with them. On the other, the increased risk of protecting sensitive information and meeting regulatory requirements has many organizations concerned.

The value that SOC 2 brings to the health sector goes well beyond simply instilling confidence and helping compliance managers sleep better at night. For covered entities and business associates, the shift towards using SOC 2 reports as a standard for gaining assurance regarding data security, availability and confidentiality will enable focus on the key risks and controls. This session will discuss the key trends that have emerged in this market sector with the focus on third-party assurance using SOC 2.

Speakers: Emily S. Frolick, KPMG LLP (U.S.) and Erlinda L. Olalia-Carin, KPMG LLP (Canada)

10:30 – 11:00 COFFee BReAK – eXHIBITS OPeN

11:00 – 12:15 CONCURReNT SeSSIONS – CHOOSe ONe OF THRee:

Using Data Mining in Procurement Audits

In this session, you will be introduced to an approach to mining the procure-to-pay masterdata and transaction flows. We will discuss available tools, potential roadblocks, and practical case studies of payback realization.

Speakers: Lal Balkaran, author and internal audit consultant; Efrim Boritz, University of Waterloo; Laura Clare, deloitte

OR Leveraging Legislative Compliance Overview

Given the complexity and volume of new legislation, regulations and guidelines impacting financial institutions, internal audit functions need to work closely with compliance functions to eliminate gaps and minimize overlaps between the second and third lines of defence. In this session, our panel will provide their insights into the joint efforts that are required in areas such as: monitoring compliance with the Code of Conduct for the Credit and Debit Card Industry in Canada; understanding the new OSFI guidelines for corporate governance and regulatory compliance management; identifying privacy, security and evolving data breach obligations.

Moderated by panel of industry leaders and subject matter experts including Barry Rowland, Canada Pension Plan Investment Board

OR Avoid Titanic IT Risks by Seeing the Whole Iceberg

Organizationsineverysector–industry,government,andacademia–arefacingincreasinglycomplex business and operational environments. They are constantly being bombarded with conditions and events that can introduce stress and uncertainty that may disrupt the effective operation of the organization. This session will highlight potential hidden risks that may have the ability to sink your ship if not uncovered and addressed.

Speaker: Lisa young, CERT, Software Engineering Institute at Carnegie Mellon University

12:15 – 1:30 NeTWORKING LUNCH

Page 8: 2015 CONFERENCE ON IT AUDIT, THE ONLy EvENT ... - castore.ca · The rise of the chief data officer (CdO) in the C-suite is due, in part, to the recognition that data is a valuable

2015 CONFERENCE ON IT AUDIT, GOVERNANCE AND SECURITY MARCh 25-26, 2015 OPTIONAL POST-CONFERENCE WORKSHOP MARCH 27 • Hyatt Regency toRonto TORONTO, ON

For more details and registration, visit: cpacanada.ca/ITAudit8

1:30 – 2:45 CONCURReNT SeSSIONS – CHOOSe ONe OF THRee:

Project Management and Audit Risks with Agile

Software Development Methodology

Agile software development methodologies present risks to both project managers and auditors. Knowing these risks in advance can help managers and auditors avoid the common pitfalls and risks associated with these methodologies.

Speakers: Ron Foster, internal audit and risk management consultant; Neil Price-Jones, NvP Software Solutions

OR Privacy – Shooting at a Moving Target?

Undoubtedly privacy is one of the biggest challenges today’s organizations are facing. At times, the impact of privacy violation can be so high and real that no one can afford to ignore it. due to a number of regulations in place and the fast-changing landscape, each organization needs not only to be prepared to comply with the applicable regulations but needs to be vigilant and proactive in understanding the current events, regulations and best practices.

In this session, privacy experts will briefly discuss the latest trends in privacy regulations/requirements and best practices and share their views on how to be on the top of the wave.

Speakers: Sylvia Kingsmill, deloitte and Fazila Nurani, PrivaTech Consulting

OR PCI DSS 3.0 – Think Security NOT Compliance

PCI-dSS was introduced to prevent data breaches and ensuing fraud losses as well as protect the brand reputation while maintaining consumer confidence. PCI-dSS 3-0 was introduced to ensure that it is about security and NOT compliance, and that PCI is not treated as an annual exercise but done on a risk basis and interwoven into daily routines of the enterprise to ensure security. you will hear from one of the key players of this standard as to how this can be achieved and how the tide of organizations being breached on a regular basis can be turned around in an effective and sustainable manner.

Speaker: Bashir S. Fancy, Corporate Solutions and Services Inc.

2:45 – 3:00 COFFee BReAK – eXHIBITS OPeN

3:00 – 4:00 Closing Session: emerging Technologies – Looking Forward

during these two days we have explored issues relating to IT audit, governance and security. We have looked at risks and identified a range of potential risk mitigation strategies for management and requirements for auditors.

We have seen how technology is invading every aspect of our lives. We have the Internet of Things: we can now control our homes and offices remotely through smart phones; there are proximity-based services, credit, debit, access and other hands-free activated services; telling time is just one of many functions your watch can perform. These technologies already exist.

In this final session we will look at “What is Next?” in emerging technologies. As organizations face new risks and exposures, management will have to develop new policies and procedures to ensure the effective use of these technologies while protecting against new breeds of security weaknesses and establishing new governance structures to comply with upcoming regulatory requirements. We’ll also explore how audits will need to change. Join us to find out how you and your organization will be impacted.

Speaker: Robert G. Parker, Risk Masters Inc.

DAY THREE – THURSDAY, MARCH 27, 2015 – OPTIONAL POST-CONFERENCE WORKSHOP

7:30 – 8:30 ReGISTRATION AND CONTINeNTAL BReAKFAST

8:30 – 4:00 Data Visualization – Seeing Things Differently

Learn why data visualization is important and how to use industry-leading data visualization tools to create insightful and interactive presentations.

The objectives of this one-day workshop will be to help participants learn about data visualization and how to apply data visualization tools and techniques, with a focus on using the Tableau (Public version) data visualization tool.

The key workshop components include:• Whatisdatavisualizationandwhyisitimportant?• Howdoyouapplydatavisualization?• Datavisualizationexamples• Hands-onworkshoponhowtouseindustry-leading

data visualization tools• Nextstepsinimplementingadatavisualization

program

The workshop will be highly interactive, including presentations, demonstrations, hands-on learning and a panel discussion.

Workshop Leaders: Efrim Boritz, University of Waterloo; Kieng Iv, deloitte, and May Leung, Bank of Montreal

Page 9: 2015 CONFERENCE ON IT AUDIT, THE ONLy EvENT ... - castore.ca · The rise of the chief data officer (CdO) in the C-suite is due, in part, to the recognition that data is a valuable

9For more details and registration, visit: cpacanada.ca/ITAudit

FUNDAMeNTALS OF IT AUDIT – A THRee-DAY WORKSHOPMARCH 25-27, 2015 (RUNNING CONCURRENTLy WITH THE CONFERENCE) • Hyatt Regency tOROntO TORONTO, ON

GET A SOLID FOUNDATION TO CONTINUE TO BUILD YOUR IT AUDIT EXPERTISE.

FUNDAMENTALS OF IT AUDIT – A THREE-DAY WORKSHOP

March 25 – 27, 2014

Workshop runs from 8:30 a.m. to 4:30 p.m. each day with continental breakfast available at 7:30 a.m.

This three-day workshop is designed to provide new IT assurance-and-control professionals with the core skills needed by all information technology auditors. you will review and understand key audit and control principles as well as many practical techniques, which are all necessary to complete a wide range of IT audit assignments within today’s complex computing environments.

Topics covered include overall IT audit planning and objectives, as well as audit risk assessment. We will also examine the wide range of controls needed for managing the IT function, system development/acquisition and implementation, IT operations, logical and physical security and business resumption/disaster recovery. Included are the vital business process controls found within specific financial tracking and reporting systems. In addition, we will consider important technology components IT auditors must be able to understand, use and evaluate.

Key topics include: • understandingITauditrisksanddefiningaudit

scope • internalcontrolconceptsandtheroleof

computer control standards • generalcontrolsprotectingtheITenvironment• businessprocesscontrolscoveringspecific

financial systems • communicatingauditfindings

your understanding will be facilitated by demonstrations and discussions of current technology and audit techniques to help reinforce the key concepts.

After completing the workshop, you will be able to take part in many types of IT audit assignments and have a solid foundation on which to continue to build your audit expertise.

Workshop Leader: Craig R. McGuffin, C.R. McGuffin Consulting Services

Workshop Leader Craig McGuffin, CPA, CA, CISA, CISM, CGEIT, CRISC, Principal of C.R. McGuffin Consulting Services, has more than 25 years of experience in the field of computer and network controls

and security. He has a background in computer science and has worked as an information systems auditor, security consultant and security manager, obtaining experience in all major computing and networking environments. He is also the co-author of two books on networking technology.

Craig is an award-winning and extremely popular speaker on the use of computer technology, controls and security, delivering core knowledge and practices through university courses, training seminars and conferences on six continents.

Page 10: 2015 CONFERENCE ON IT AUDIT, THE ONLy EvENT ... - castore.ca · The rise of the chief data officer (CdO) in the C-suite is due, in part, to the recognition that data is a valuable

2015 CONFERENCE ON IT AUDIT, GOVERNANCE AND SECURITY AND FUNDAMENTALS OF IT AUDIT – A THREE-DAY WORKSHOP

For more details and registration, visit: cpacanada.ca/ITAudit10

HOTeL INFORMATION:

Hyatt Regency Toronto 370 King Street West Toronto, ON M5v 1J9 T. 1-877-806-0006 torontoregency.hyatt.com

The Hyatt Regency Toronto is conveniently located in the centre of the city’s vibrant downtown. Enjoy being within walking distance of the business and financial districts, numerous attractions and over 150 restaurants and bars.

CPA Canada has reserved a limited block of guest rooms at a guaranteed room rate of $196 plus applicable taxes until March 3, 2015, or until the rooms sell out. Book early to avoid disappointment.

Reservations: Telephone: 1-877-806-0006 (Reference “Conference on IT Audit, Governance and Security”) or online: www.cpacanada.ca/ITAudit (Accommodation page).

PROGRAM dISCLAIMER The speakers, topics, program format and events are current at time of printing. If unforeseen circumstances occur, CPA Canada reserves the right to alter or delete items from the program or cancel the Conference and/or Workshop and refund all registration fees.

CANCELLATION POLICy If you are unable to attend the event for any reason, you may substitute, by arrangement with the Participant Coordinator, someone else from your organization, or you may cancel up to 14 calendar days prior to the event start date for a full refund. Cancellations received within 14 calendar days of the event start date will be subject to a $150 administration fee (plus applicable taxes). All cancellation requests must be received by 5:00 p.m. ET on the day prior to the event start date. Refunds are not available after that point.

PLEASE NOTE: All cancellations must be received in writing by email to [email protected].

REGISTRATION INFORMATION AND CONDITIONS

Page 11: 2015 CONFERENCE ON IT AUDIT, THE ONLy EvENT ... - castore.ca · The rise of the chief data officer (CdO) in the C-suite is due, in part, to the recognition that data is a valuable

2015 CONFERENCE ON IT AUDIT, GOVERNANCE AND SECURITY AND FUNDAMENTALS OF IT AUDIT – A THREE-DAY WORKSHOP

11For more details and registration, visit: cpacanada.ca/ITAudit

REGISTRATION FORMPlease register me for the following:

Conference* ONLY (March 25-26) $1,295

Conference* PLUS Post-Conference Workshop (March 25-27) $1,790

Post-Conference Workshop ONLY (March 27) $495*Conference registration includes online access to recorded presentations. (Online access will be available approximately 2-4 weeks post-event.)

OR

Fundamentals of IT Audit – A Three-Day Workshop (March 25-27) $1,495(Conference or online access to conference sessions not included.)

Plus 13% HST

GST/HST # R10686 1578 RT0001 QST #1010544323TQ0001SS TOTAL

YOU MUST HAVe AN ACCOUNT TO ReGISTeR

I have an up-to-date account/profile at the CPAstore:

yES NO

If NO, visit the CPAstore at www.cpastore.ca and click “my account” (top right-

hand corner), and either Login and ensure your profile information is current,

or create a profile if you do not have an account.

WAYS TO REGISTER

ONLINewww.cpacanada.ca/ITAudit

BY PHONe416-204-3263

MAIL ReGISTRATION FORM AND PAYMeNT TO:CPA Canada 277 Wellington Street West Toronto, ON M5v 3H2

PAyMENT OPTIONS(NOTE: registration cannot be processed until payment is received.)

Credit Card: visa MasterCard AMEX

CARd NO. EXPIRy dATE

NAME OF CARdHOLdER

FIRST NAME (PREFERREd) MIddLE INITIAL(S)

BAdGE NAME (IF dIFFERENT FROM ABOvE)

SURNAME

dESIGNATION(S)

TITLE

FIRM/EMPLOyER

dEPARTMENT

BUSINESS AddRESS

CITy

PROvINCE POSTAL COdE

BUSINESS PHONE

BUSINESS FAX

EMAIL

SPECIAL dIETARy OR OTHER REQUIREMENTS (NEEdS, NOT PREFERENCES)

Page 12: 2015 CONFERENCE ON IT AUDIT, THE ONLy EvENT ... - castore.ca · The rise of the chief data officer (CdO) in the C-suite is due, in part, to the recognition that data is a valuable

277 WellinGTon STReeT WeST ToRonTo, on M5V 3H2 CanaDa

TWo annual programs uniquely designed for iT professionals

2015 CONFERENCE ON IT AUDIT, GOVERNANCE AND SECURITYMarch 25-26, 2015 OPTIONAL POST-CONFERENCE WORKSHOP MARCH 27

Hyatt Regency TorontoTORONTO, ON

THE ONLy EvENT OF ITS KINd!

New for 2015. Expanded agenda with new insights, best practices

and industry-leading speakers on a North American basis.

FUNDAMENTALS OF IT AUDIT – A THREE-DAY WORKSHOPMarch 25-27, 2015(RUNNING CONCURRENTLy WITH THE CONFERENCE)

Hyatt Regency Toronto TORONTO, ON

In this practical, hands-on

workshop you will get the core

skills necessary to complete or

supervise a wide range of IT audit

assignments in today’s complex

environments.

KEyNOTE SPEAKERS

Co-presented by:

Claudiu PopaTechnology expert, specializing in security and privacyPresident and CEO, Informatica Corporation

Desiree (Desi) Matel-Anderson“Chief Wrangler”, Field Innovation Team (FIT) CEO, Global disaster Innovation Group, LLC

CONFERENCE EXHIBITORS TO dATE


Recommended