Skip to Main Content

Spring Seminar: Managing and Auditing Cybersecurity – Data, Infrastructure and Applications

Summary

Attendees will achieve the following learning outcomes:

  • Will be able to identify the production resources which need to be included in-scope for a security access audit
  • Understand the controls that need to be established to prevent traditional access controls from being bypassed
  • Identify key network security, host-level, database and application design initiatives required to prevent cyber security attacks
  • Understand the key components to performing an effective data privacy audit
  • Effective methods for implementing a Cybersecurity program
  • Understanding how new regulations are raising the bar of the expected requirements of a cybersecurity program



After being on the audit side for the first half of his 30-year career, the instructor has spent most of the last 15 years consulting full-time with systems development groups, Infrastructure groups and data centers, uncovering many cybersecurity control issues which were in many instances unknown to the most experienced auditors. The instructor has devised unique methods for performing compliance testing which disclose major gaps in an organization’s cyber security.


Details

  • When

  • Monday, June 24, 2019 - Tuesday, June 25, 2019
    8:15 AM - 4:45 PM
    Central Time

  • Where

  • Conference Center at One North Wacker
    1 North Wacker Drive
    2nd floor - Michigan II Conference Room
    Chicago, Illinois 60606
    312-327-2370

Outlook Outlook
iCal iCal
Google Google
Yahoo! Yahoo!
MSN MSN
Top