Newsletter Banner

President's Letter for June 2016

Hello All!                                                        

I will resist the urge to break into song, “June is Bustin’ Out All Over …” from the musical Carousel  LOL

Aside from the TechnoSecurity Conference in Myrtle Beach this week, we have an event and Annual Meeting scheduled at the Riverbanks Zoo Botanical Garden on June 24th!  Keep an eye out for your personal invitation!

July 5th and 6th we are hoping to pull together an event on CyberSecurity Fundamentals.  Lots of great stuff planned!

Have you considered becoming an ISACA member but have had trouble “pulling the trigger”?  To incentivize you, ISACA is offering a ½ year’s membership at ½ price!  Join online now!  You get access to member pricing on training events through December plus:

  • Over 70 free CPE hours per year
  • Member discounts on ISACA's certification exams and products
  • Special offers and reduced rates on world class conferences and webinars
  • Access to the award-winning member only ISACA®Journal
  • Free COBIT 5 downloads, benefits and more — the framework for governance and management of enterprise IT
  • More than 575 searchable books in ISACA’s eLibrary
  • Thought leadership insights, research, whitepapers, etc.
  • Career resource tools to put you in touch with hiring managers and recruiters across the globe
  • Peer-to-peer, in-person and online networking with 140,000 professionals in 180 countries

Consider joining today! 

Kathleen Hall  
SC Midlands ISACA
President 2015-2017


In This Issue

The Chapter is 284 members STRONG!

New Members        
Monica Cochran                                   

Stephen McCauley
Stephen Taylor



Techno Security & Mobile Forensics Investigations Conference 2015


Upcoming Chapter Training

You should be receiving individual emails now regarding registration for our upcoming classes.  If you are receiving too many emails, please eliminate the email addresses you do not want to receive communications from us. Here is what is planned for the next few months:

June 24, 2016 - FBI Stories and Adventures in Cybercrime - 3 CPEs, plus a social event at the RiverBanks Botanical Gardens - register here:

Look for information coming soon on upcoming events

July 5 and 6, The CSX Fundamentals Review Course and Exam - 16 CPEs

August 29, 2016 - CyberAudits of Microsoft Windows Active Directory - 8 CPES

September 13, 2016 - The BlindSpot Zone - 6 CPES

October 13, 2016 - Virtualization - CPES to be determined

November 2, 3 and 4th - State Audit Conference - IT Track and CISA Review - Hold the date!  Columbia Marriott Hotel at Main & Hampton Streets Book Your Room for 2016 Here Now                                          



Education Information


Please make sure you do not choose to opt out of our communications.  If you do, several of these processes will not work, as we cannot send you email when you have asked us not to.

Instructions for obtaining CPE certificate:
After attending class, you will receive an email that is titled Feedback and CPE for (class name).  The Feedback Survey requires answers for three or four questions. When done, hit submit.  Each individual will receive a second email that has a link for downloading their CPE Certificate.  It will download as “badgexxxxxxxx” where the “x’s” are random characters, but represent the unique identifier assigned to each registrant.  This file will appear in the “Recently Downloaded” file, and it will also be seen at the bottom left of the monitor.  Click on it and save with Name and Class Info to a Folder to retain the certificates.  SC Midlands ISACA Chapter 54 does not report your CPEs to ISACA International – this is each member’s responsibility.

Class Materials:
To obtain any class materials, use your class confirmation number and the weblink for the event to reenter the class website.  When you are on the Summary Page, there are several Tabs running across the top of the page – one will be “Class Material.”  Click on the tab, and download, save and print if you would like.

Class Registration, Confirmation Numbers and Class Invoice:
Payment is now due at the time of registration by Credit, Debit or E-Checks.  We have eliminated the option for Mail in Payments for individuals.  Once you are registered, you will be able to print an Invoice.  If you do not choose to do that at the time of registration, but find you need this Invoice later, use the confirmation email that you received after registering which contains your Confirmation Number and a link to the Class website.  Re-enter the class website by using  the Class Link and enter your Confirmation Number.  Under the Tab “My Registration, you will then see a tab “Invoice.”  If you need reimbursement, you can choose to print out your invoice for submittal to your organization’s Accounts Payable Department. 

Corporate Payment:
Organizations may choose to register their groups of employees to come to our events.  Instead of registering one by one, do this as a group registration which will produce one confirmation number for your Accounts Payable to process the payment.  After inputting all the names and information of the individuals to attend, select Corporate Payment as the process to use for payment. A confirmation notice will appear and produce the Confirmation Number and a link to the class event. The Confirmation number and the Class link is all Accounts Payable will need to go back into the event and make payment by Credit or E-Check.  Special permission from the Chapter President ( is needed for a mail-in check.  Personal mail-in checks or cash are no longer accepted.  Each employee registered will receive an email confirmation notice and be able to enter the class website to obtain class materials and their CPE certificate.  If you have any questions, please do not hesitate to ask!


Techno Security & Mobile Forensics Investigations Conference 2015

Featured Research


ISACA's Leadership in Research

ISACA actively promotes research that results in the development of products that IT governance, control, assurance, risk and security professionals can use to add value to their enterprises.   

If you would like to be considered for the expert review team of a current project, please submit a brief biography summary detailing your expertise and experience to                                                                                               

Effectiveness of an Audit Depends on the Quality of Your Audit Program

Free Downloads

To help address these issues and ensure the best possible outcomes for your audit programs, Information Systems Audit and Control Association, Inc. (ISACA) has created the FREE White Paper, Information Systems Auditing: Tools and Techniques—Creating Audit Programs. It outlines the basic steps necessary to develop comprehensive audit programs that clearly and consistently document the procedures used to test controls and gather supporting data.

Moreover, ISACA has developed a useful companion template, Sample Audit and Assurance Program in 5 Steps—Virtual Private Network, which you also can download for FREE. This tool takes you through the process of designing an audit plan, then proceeds through each test step of its execution.

Finally, be sure to download ISACA’s Free Infographic, Audit Plan Activities: Step-by-Step, a colorful one-page reminder of the important keys to audit success.

Get Local! 

Volunteer opportunities are not only at the International level, your local chapter needs volunteers too! ISACA Chapters sponsor local educational seminars and workshops, engage in IT research projects, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security professional. Volunteering at your local chapter is a great way to become an active member of ISACA.  

Opportunities can range from one-time tasks or committee involvement, to chapter board leadership roles, including serving as chapter president. Volunteer roles differ among chapters, so the first step is to contact your chapter ( and ask how you can get involved!





Techno Security & Mobile Forensics Investigations Conference 2015

ISACA Calendar of Events & Deadlines


9 June 2016 Ransomware: Breaking the Criminal Business Model - Webinar

15 June 2016 September CISA and CISM Certification Exam - Early Registration Deadline

18-21 July 2016 Taking the Next Step: Advancing Your IT Auditing Skills - Seattle Washington USA

1-4 August 2016 Training Week: COBIT, governance, Cybersecurity, and IS Management - Chicago Illinois USA

8-11 August 2016 Analytics in Action - San Jose California USA                                                   


 New Membership State Agencies


The Chapter extends a Warm Welcome to our New Members from the South Carolina State Agencies

Dexter Alston                      Vidya Mareddy

Christie Baird                      John Merrifield

Tracie Bradacs                    Khalid Neely

Melissa Carpenter                Fred Owens

Barry Floyd                         Donald Player

Jerome Frazier                    Dale Purvis

Vivian Giles                        Sherri Rogers

Jennifer Green                    Craig Sears

Joshua Hair                        Drew Shealy

Joel Hilke                            Michael Sipos

Sharmina Kona                   Benjamin Trotman

Brian Leach                        Todd Wilkins

Mark Lester                        Taisha Willie

Elizabeth Lowther




Cybersecurity Nexus

New CSX Practitioner Boot Camp Accelerates Cyber Training

Raise your cyber skills from intermediate to the level of an in-demand cyber security first responder. Be among the first to take the new CSX Practitioner Boot Camp from ISACA®’s Cybersecurity Nexus™ (CSX).

This intensive, five-day course focuses on skills and concepts that align to existing global cyber security frameworks and enables you to:

  • Train in an adaptive, performance-based cyber laboratory environment
  • Develop your technical cyber skills
  • Learn and practice applying industry-leading methods
  • Utilize open-source tools within real-world scenarios
  • Prepare for the CSX Practitioner Certification exam and advance your career faster

CSX Boot Camp courses are available in Denver, Colorado: 13-17 June 2016 and San Francisco, California: 20-24 June 2016.

Register Now

The Nexus contains original Cybersecurity Nexus (CSX) content and curated cybersecurity articles from around the web.
Visit The Nexus subscription page of the ISACA web site to subscribe now.

 Techno Security & Mobile Forensics Investigations Conference 2015“Follow” ISACA's Cybersecurity Nexus page to stay up to date on all things cybersecurity: 


Social Media




Certification Updates

Newly Certified

Caroline Overcash, CISA, May 6, 2016

GOOD LUCK to everyone taking the June ISACA exams                                    

Why Certify!

ISACA certifications are globally accepted and recognized. They combine the achievement of passing an exam with credit for your work and educational experience, giving you the credibility you need to move ahead in your career. Certification proves to employers that you have what it takes to add value to their enterprise. In fact, many organizations and governmental agencies around the world require or recognize ISACA’s certifications.                                  

Earn the Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in the Governance of Enterprise IT (CGEIT) or Certified in Risk and Information Systems Control (CRISC) certification

Get started today! Register for an exam 

Visit the ISACA Bookstore for certification exam prep materials.



We look forward to seeing you at our next event!

Techno Security & Mobile Forensics Investigations Conference 2015


Visit SC Midlands Chapter of ISACA at to find out more about our upcoming educational events!  Click on Events at the top of the page, and then hit the Monthly Training tab to review our events.


Social Media




Twitter:  @scmidlandsisaca

Cvent - Web-based Software Solutions