Newsletter Banner

President's Letter

Hello All!                                                        

Members:  We have a gift for you!!  ISACA came out with ball caps and we have one JUST FOR YOU!!  All you need to do is join us at training!!  We have some great sessions coming up … Leighton Johnson returns this month with Risk Assessment training (two days … 16 CPEs for $180 before September 14th) and October 8th, we will have a seminar on Critical Asset Protection – 4 CPEs for $32 Early Bird Pricing for Members! We need 4 members to participate on a panel - you come for free!  Contact if you are interested.

Please welcome our new Research Director, Audra Woods (see for Biography)!  For those of you keeping score, that makes our second Research Director (it’s a two year term, so one person rolls off each year) … We have exciting stuff going on in Research right now!!  We need SMEs – that’s YOU!  Contact either Audra Woods or Peter Morrill to help out!

We still have a few open Board Positions (Vice President, Education Assistants, Social Media Director, and Young Professionals Liaison) and we need your help!  You’d be joining a great team of professionals who work to better the Chapter, as well as receive 20 CPEs for the year and 25% off training events!  Think about it, and let me know! Please contact me at for more details.

Thank you, members, for recognizing the value ISACA membership offers you!  We work to add value to your membership!

Kathleen Hall, 
2015 – 2016 SC Midlands President


In This Issue

The Chapter is 258 members STRONG!

New Members         New Student Members
Christopher Andres           Heidi Bartel
Austin Blackmon              Joseph Beasley
Donald Frank                   Adam DiStefano
Elizabeth Hubbard            Matthew Dyson
Eric Muhammad               John Haslup



Techno Security & Mobile Forensics Investigations Conference 2015


Upcoming Chapter Training

You should be receiving individual emails now regarding registration for our upcoming classes.  If you are receiving too many emails, please eliminate the email addresses you do not want to receive communications from us. Here is what is planned for the next few months:

September 21 & 22 – Leighton Johnson, the CTO of Information Security Forensics Management Team (ISFMT), will present a 2-day class on How to Conduct a Risk Assessment.  16 CPEs,  To learn more and register, go to

October 8, 2015 for 4 CPEs – Registration now open. Safeguarding critical assets in the age of the mega-breach Presented and sponsored by InteliSecure and Websense.  Go to October 8th Class Signup

November 4 - 6
- State Audit Conference.
 To learn more and register, go to

Track 1 Fraud Forensics and Incident Response for Digital Evidence
Presented by Leighton Johnson, CISSP, CISA, CISM and CTO of ISMT. 

Track 4
Certified Information Systems Auditor (CISA) Exam Review Presented by Diane De Lucia, M.S., PMP, CISA, CISM.  
Participants will bring and utilize their own personal CISA exam review manuals in addition to materials used by the presenter. See .

December 4, 2015 for 3 CPEs – Registration Opening Soon
Darknet and Beyond! Cyber Risk “Outside the Firewall” Presented by Jeff Spivey, President, Security Risk Management, Inc. 
Second Speaker TBD – Any volunteers from the Chapter?

Certification Update



    Mr. Thomas F. Allen, CISM, August 06, 2015

    Ms. Donna M. Swinbank, CISA, July 16, 2015
    Kathryn Basha, CISA, August 03, 2015


    CISA June 2015 Exam
    Mr. Wendall H. Mayson, CISM
    Mr. Eliud Francisco Rivera Collazo, CISM
    Kathryn Basha, CISA
    Matthew McFail Thompson
    Mr. Willie Cornell Mullins
    Richard Mark Stingel
    Mr. Gregg Hamby

     CISM June 2015 Exam
    Dorlis Ouellette, CISA
    Mr. Thomas F. Allen, CISM
    Mr. Marc Punzirudu, CISA
    James Rhodes
    Mr. Cyrus L. R. Walker
    Mical Scott Bowling

     CRISC June 2015 Exam
    Mr. Thomas Jake Rich, CISM   

Techno Security & Mobile Forensics Investigations Conference 2015

ISACA  Research August 2015


Recently Released Research Deliverables:

All research products can be found on the ISACA website:  

  • Cybersecurity Guidance for Small and Medium Sized Enterprises  This Cybersecurity Guidance provides additional guidance for multinational enterprises that have business interests outside of their home country, regardless of enterprise size.  It is based on the COBIT 5 framework and its family of products from ISACA.  The publication is available for $35 for both the PDF and the book for members and $60 for the PDF and the book for non-members. 
  • Implementing Cybersecurity Guidance for Small and Medium-Sized Enterprises This publication provides practical advice on how to implement Cybersecurity Governance, Risk Management, Assurance and Compliance using the Cybersecurity Guidance and its COBIT 5 foundation and is available for $35 for both the PDF and the book for members and $60 for the PDF and the book for non-members. 
  • ISACA Innovation Insights  ISACA has launched a new service to provide easy to use, timely, relevant, and unbiased information to organizational leaders at board and C-suite levels to help them quickly adapt to changing information technology. In June the first Innovation Insight report was published which reported on the top ten digital trends most likely to delivery business value today and tomorrow.  Supplemental "drill-down" reports (ISACA Trend Reports) were also released on four particular areas, Big Data Analytic, Mobile Technologies, Cloud Computing, and Machine Learning.  All of these are available as a White paper free to members and non-member will have access with a light registration.  
  • Cloud Computing Market Maturity White Paper This white paper reports the results of a recent study conducted by ISACA and Cloud Security Alliance (CSA) to examine cloud market maturity through four lenses: cloud use and satisfaction level, expected growth, cloud-adoption drivers, and limitations to cloud adoption and  is available for download free of charge to member and non-member has a light registration. 
  • Benchmarking and Business Value Assessment of COBIT 5 This report focuses on establishing an international benchmark and a business value assessment of COBIT 5. A second part focuses on the business value assessment of COBIT 5 by looking at the association between the use of COBIT enablers and processes, and the achievement of IT-related and enterprise goals.   
  • Security, Audit and Control Feature SAP ERP This is the 4th publication of the book. Security, Audit and Control Features SAP® ERP, 4th Edition provides practical guidance for all stakeholders involved in the SAP Enterprise Resource Planning (ERP) Audit/Assurance process.  There are four new areas added to the book, Financial Account, Managerial Account, Viewing Capital Management, and Basis Administration and Security.  The publication is available for $60 for both the PDF and the book for members and $75 for the PDF and $80 for the book for non-members.  Along with the publication there is a toolkit which contains audit programs for the various business cycles and an internal control questionnaire that provides suggested control objective and questions for conducting audits of the business cycles.  The toolkit for the audit program is available for download free of charge to members and $45 for non-members. 
  • DevOps: Practitioner Considerations DevOps is quickly growing phenomenon that is quite literally transforming the way that software is developed, tested and supported in many businesses. The paper also contains a table of possible controls that the platform may consider for their environment as the organization embrace DevOPs. 
  • The Cyberresilient Enterprise: What the Board of Directors Needs to Ask This white paper will help an enterprise make the important transition to become a Cyber resilient enterprise and is available on the ISACA website at no charge to members.

Current Research Projects In Development as of August: 

The products have undergone a Subject Matter Expert (SME) and will be available soon: 

  • Keeping a Lock on Privacy: How Enterprises are Managing Their Privacy Function White Paper It will be released in September. 
  • A Practical Guide to PCI DSS: Available as a PDF to members free of change and a hard copy will available for member at a discounted cost. Both the PDF and hard copy will be available for non-members for a fee. An Audit Program will be included with this publication. The book is scheduled to be available in the third quarter 2015. 
  • ISACA Privacy Principles and Program Management Guide. 14 global privacy principles, defined and connected to COBIT 5, will serve as the basis for building and maintaining a privacy program. Available In December. 

For information on these publications

 Subject Matter Experts (SMEs) needed to assist with the following future projects 

  • Quick State Guide to Audit/Assurance Programs
  • COBIT 5 Audit/Assurance Programs
  • Operational Risk Management/BASEL III

For additional information:
If you would like to participate in any of the above projects, please contact Audra Woods, SC Midlands ISACA Research Director at



Techno Security & Mobile Forensics Investigations Conference 2015

ISACA Calendar of Events & Deadlines



12 September

CISA and CISM exams date

12-13 September

North America Eastern Region Leadership Conference, Naples, Florida, USA

12-13 September

North America Central Region Leadership Conference, Columbus, Ohio, USA

17 September

Training Week: Cloud Computing: Seeing Through the Clouds—What the IT Auditor Needs to Know, Chicago, Illinois, USA, early registration deadline

21-24 September

Training Week: Information Security Essentials for IT Auditors, Miami, Florida, USA

26-27 September

North America Western Region Leadership Conference, Vancouver, British Columbia, Canada


5-8 October

Training Week: An Introduction to Privacy and Data Protection, Atlanta, Georgia, USA

15 October

ISACA Training Week, Scottsdale, Arizona, USA, early registration deadline

19-22 October

Training Week: Taking the Next Step: Advancing Your IT Auditing Skills, Boston, Massachusetts, USA

22 October

Training Week: Network Security Auditing, Seattle, Washington, USA, early registration deadline

23 October

December CISA, CISM, CGEIT and CRISC certification exams final registration deadline


9-12 November

Training Week: Cloud Computing: Seeing through the Clouds—What the IT Auditor Needs to Know, Chicago, Illinois, USA


7-10 December

ISACA Training Week, Scottsdale, Arizona, USA

14-17 December

Training Week: Network Security Auditing, Seattle, Washington, USA

Become a Member!


Discover the power of Global Resources


Be part of a community that is dedicated to keeping you informed and helping advance your career! ISACA
®provides access to key information resources, globally recognized certifications, Cybersecurity Nexus (CSX), expert peer network, latest industry research, and premier conferences and events. 

Join today for up to 5 months free with your paid 2016 dues!

Cybersecurity Nexus

Recently ISACA launched a new cybersecurity resource from ISACA—a Cybersecurity Nexus (CSX) web site featuring certification and career path information, the ability to purchase self-paced training lab or register for training courses to prepare for the upcoming CSX Practitioner exam, and more.

Please visit to take advantage of this new addition to the CSX program. Here are some additional CSX opportunities:

 Techno Security & Mobile Forensics Investigations Conference 2015“Follow” ISACA's Cybersecurity Nexus page to stay up to date on all things cybersecurity: 


Social Media




Tips for Registering for our Events

To register for one of our events simply respond to the invite you receive by email.  The invitation has several links where you can find more information.  I generally advise looking at the Event Summary.  On that page across the top will be additional tabs that will allow you to see the Fees, the Agenda for the class, Speaker content, Class Attendees.

To register, simply click on the Register button at the top right or the bottom right and fill in your information.  If you are one of our members, remember to use only your Email address that you have on record with ISACA International in your profile.  If you do not remember what that is, please go to , log in and go to your profile.  We update our records two times a month to capture your most recent changes.  If you have any questions, please feel free to contact the Event Planner.

After you have registered, you will receive a confirmation email and if you need to make changes, go back to the Event website and use your confirmation number to register additional people or to make a credit card payment.  You may also now print an invoice that you can send to your Accounts Payable Department for reimbursement at those organizations who fund training.

If you are receiving too many emails from us, please contact us and we will be happy to assist you in cleaning out the email addresses you no longer wish to use.  We have noticed that many people have several email addresses on record.

If we can be of any assistance - do not hesitate to contact us! We are happy to help.

After attendance at one of our events, you will receive a request to complete a follow-up survey.  Please fill out the survey - it takes just a few minutes and does provide us guidance on customer service and your training needs.  Within a day, you should receive another email to print out your CPE Certificate from class.

We look forward to seeing you at our next event!

Techno Security & Mobile Forensics Investigations Conference 2015


Visit SC Midlands Chapter of ISACA at to find out more about our upcoming educational events!  Click on Events at the top of the page, and then hit the Monthly Training tab to review our events.


Social Media




Twitter:  @scmidlandsisaca

Cvent - Web-based Software Solutions