Newsletter Banner

President's Letter for September 2016

Hello All!

The heat will soon break and my favorite season will begin:  Fall!  Kids are back in school and we all are getting used to the new routine.  We are all looking forward to our CPE requirements as the end of the year approaches quickly!

Don’t forget to upload your CPEs on the ISACA website … And, soon, we will be able to upload CPE details and all you will need to do is accept them!  Yay!

An exciting class is coming up on September 13th and should set the pace for your approach to audit, security, risk management and IT Governance by helping you uncover any “blindspots” you may have.  This class will give you the tools to know what bias you bring to your everyday work and to your relationships as well.  Register now to enter “The Blind Spot Zone” at

Be sure to mark it on your calendars to fit in this class!  We’re excited to have you join us!!

Kathleen Hall  
SC Midlands ISACA Chapter #54
President 2015-2017


In This Issue

     The Chapter is 317 members STRONG!

      New Members        
      Benjamin Acord           Badr Alharthi
lexa Budry                    Nicholas Cain 
      Victoria Gilbert-Hayes      Jeff Hoskins   
      Jonathan Limpalair          Robert Luther 
      Todd Mastin                    Jeri McKee
      Catherine Moles              LaRiqueka  Moore      
      Ryan Oliver                    Mark Shepherd  
      Tim Tracy                       Kayla Wilson                                                           
     Ms. Tiffany Amber Dubra                              
     Mr. Larry D. Canup, Sr., CISM, CRISC                              



Techno Security & Mobile Forensics Investigations Conference 2015


Upcoming Chapter Training

You should be receiving individual emails now regarding registration for our upcoming classes.  If you are receiving too many emails, please eliminate the email addresses you do not want to receive communications from us. Here is what is planned for the next few months:                                                     


Open Now! - September 13, 2016 - The BlindSpot Zone - 6 CPES - Register now 

Open Now! - October 5th and 6th, 2016 - Introduction to Malware and Reverse Engineering - 2 Days Hands On - 12 CPEs Register now

Open Now!  November 2, 3 and 4th - State Audit Conference - IT Track - The Treacherous 12 - Cloud Computing Top Threats in 2016 and the CISA Review - Register Now at  Book your room at the Columbia Marriott Hotel at Main & Hampton Streets Book Your Room for 2016 Here Now

SAVE THE DATES To Close this year and to Open Next Year:

Save the Date! - Coming on December 7th, 2016 - A daylong session of updates on Data Breach, Penetration Testing, Go Phish? and other topics

Save the Date! - January 10th, 2017 - Virtualization - 6 CPEs

Save the Date! - February 7, 8, and 9, 2017 - The Official COBIT 5 Foundation Course and Optional Exam

Save the Date! - March 8th, 2017 - Topic to be Determined and co-hosted with Palmetto IIA

Save the Date! - April 3rd and 4th, 2017 - Raven Global Training and SC Midlands ISACA present a two day class on "Root Cause Analysis" 


October Class Details


    Introduction to Malware and Reverse Engineering – Hands on!!

    October 5th and 6th, 2016 – Bring yourself and your laptop to class at 1301 Gervais Street, 2nd Floor, Columbia, SC


With the consistent increase in the use of malware as an attack vector, having the ability to analyze worms, bots and Trojans have become a necessity for organizations. Using in-the-wild samples, this hands-on lab will allow attendees to gain an understanding of the concepts and techniques necessary to analyze the malware they come across in their organizations.

This is a two day, onsite instructor led, demo and hands-on class. 

  • What is malware? Review of various types.
  • How criminals, nation states and hacktivists are using malware
  • Review of basic Windows internals and the effects of malware on the operating system
  • Static vs. dynamic malware analysis
  • Understanding malware obfuscation (i.e. packing)
  • Understanding malware behavior - how to detect and monitor
  • Performing behavioral analysis of malware
  • Understanding basic code analysis techniques
  • Using sandboxing technology to analyze malware (i.e. Cuckoo)
  • Analyzing malicious Microsoft Office (Word, Excel, PowerPoint) documents and malicious Adobe PDF documents
  • Physical memory capture and analysis using Volatility
  • Setting up a malware analysis lab - Tools and tricks
  • Using tools to analyze malware such as OllyDBG, OllyDump, Process Monitor, Wireshark, RegShot, RedLine, REMNUX, etc. 

​To find out more information about the laptop you need to bring and to register, click on the event website at:  

Techno Security & Mobile Forensics Investigations Conference 2015

Featured Research


ISACA's Leadership in Research


Share Your Expertise. Explore New and Ongoing Volunteer Opportunities

Volunteer opportunities are now more flexible and respect your busy time and schedule. From a year-long commitment to an hour of your time, ISACA projects enable you to get involved as your schedule permits. 

A volunteer does not need to be a member or hold a certification; however, they should then have proven experience in support of the subject matter they are reviewing.  Any volunteer is required to sign a Participation Agreement and submit it to the ISACA Legal Department.

Take a look at what is currently open and get involved today!

All of ISACA HQ’s volunteer opportunities are posted on the volunteer portal found here:  There is also a Volunteer Now” link that takes users to a form to fill out.  Anyone who completes this form is entered into the volunteer database for project managers to refer to for future projects.

For additional information:
Please contact Audra Woods, SC Midlands ISACA Research Director at

Get Local! 
Volunteer opportunities are not only at the International level, your local chapter needs volunteers too! Volunteering at your local chapter is a great way to become an active member of ISACA.  

Opportunities can range from one-time tasks or committee involvement, to chapter board leadership roles, including serving as chapter president. Contact your chapter ( and ask how you can get involved!





Techno Security & Mobile Forensics Investigations Conference 2015

ISACA Calendar of Events & Deadlines

13 Sept 2016 SSH Keys: Access Out of Control-Webinar

15 Sept 2016
Securing “Shadow IT” and Sensitive Company Data in the Cloud-Webinar

19-22 Sept 2016 Network Security Auditing-Dallas Texas USA

21 Sept 2016 Virtual Conference – Cybersecurity Evolves: Risk in the Age of Dark Data, loT, and Advance Analytics

10-13 Oct 2016 Healthcare Information Technology-Chicago Illinois US  

28 Nov-1 Dec 2016 Taking the Next Step: Advancing Your IT Auditing Skills-Atlanta Georgia USA



 Regional Autonomous Robotics Circuit (RARC)


New Robotics Competitions for Grades 3-12!


IT-oLogy is proud to bring the Regional Autonomous Robotics Circuit (RARC) to South Carolina. RARC is a series of cyber and STEM (science, technology, engineering, and mathematics) robotics competitions that include liberal arts lessons. The competitions build upon one another and allow students in grades 3-12 to showcase their skills by competing against other students in their division (elementary school, middle school, and high school).


The series is perfect for robotics veterans as well as those new to the technology. For “newbies”, IT-oLogy has scheduled Robotics Fundamentals trainings for students and team leaders. You can learn more by clicking here.


The three competitions will take place at Spirit Communications Park in Columbia, SC on Saturday, November 19, February 18, and April 29.


Start a team! Teams are made up of 3-6 students within the same division. The RARC website gives you the information to get started!

Please help us spread the word about RARC. Please forward this email to teachers or others who may be interested in starting a team or who may want to volunteer at one of the three competitions. The RARC robotics competition registration site is up and available for team registrations.


Cybersecurity Nexus

CSX 2016 North America – 17-19 October, Las Vegas, Nevada

Cyber threats affect every enterprise in every industry—no one is too big or too small. Threats don’t take holidays and they are becoming more intrusive and potentially more devastating every day. To help you stay ahead of the most critical issues and find effective solutions, ISACA’s Cybersecurity Nexus (CSX) is hosting the acclaimed CSX 2016 North America Conference.

CSX 2016 brings together thought leaders, experts and professionals at all levels of cyber security as well as the next generation of cyber defenders. Here you can find new connections, innovations and resources to build your cyber security profile and help defend your enterprise from the ever growing cyber security threat.

Register Today

The Nexus contains original Cybersecurity Nexus (CSX) content and curated cybersecurity articles from around the web.
Visit The Nexus subscription page of the ISACA web site to subscribe now.

 Techno Security & Mobile Forensics Investigations Conference 2015“Follow” ISACA's Cybersecurity Nexus page to stay up to date on all things cybersecurity: 


Social Media




Certification Updates

Newly Certified

Mr. Edwin B. Waleh, CISA, August 17, 2016
Mr. Tremayne J. Brown, CISA, August 19, 2016
James A. Remsey, CISA, August 19, 2016

Jeffrey Craig Lyon, CISM, August 19, 2016


Why Certify!
ISACA certifications are globally accepted and recognized. They combine the achievement of passing an exam with credit for your work and educational experience, giving you the credibility you need to move ahead in your career. Certification proves to employers that you have what it takes to add value to their enterprise. In fact, many organizations and governmental agencies around the world require or recognize ISACA’s certifications.                                  
Earn the Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in the Governance of Enterprise IT (CGEIT) or Certified in Risk and Information Systems Control (CRISC) certification

Get started today! Register for an exam 

Visit the ISACA Bookstore for certification exam prep materials.



We look forward to seeing you at our next event!

Techno Security & Mobile Forensics Investigations Conference 2015


Visit SC Midlands Chapter of ISACA at to find out more about our upcoming educational events!  Click on Events at the top of the page, and then hit the Monthly Training tab to review our events.


Social Media




Twitter:  @scmidlandsisaca

Cvent - Web-based Software Solutions