Newsletter Banner

President's Letter

It has been a pleasure to serve as president for this chapter over the past 3 years. Having a great group of board members makes the role much easier and with that, I am happy to turn the presidency over to Kathleen whom I see as a dedicated and motivated board member.  I am confident she will serve our chapter well and bring fresh ideas to aid in our continued chapter growth.  

Tom Hart, 2012 – 2015 SC Midlands President


Welcome to the new Chapter year!

I am your new ISACA Midlands Chapter 54 President!  I have been working with the ISACA Chapter for many years.  I was Vice President in 2008 and 2009 but then I moved back to Wisconsin for a brief period of time – until the snow drove me South last year!  I then had the pleasure of re-joining the Chapter as Vice President again.

I am excited by all the amazing changes which have transpired in my absence!  Membership has grown and we are consistently offering useful and timely training!  We have some great training coming up:  Stu Henderson is back on July 22nd to walk us through TCP/IP on the mainframe, and we will have a local speaker (Brian Kelley from AgFirst) on August 19th to talk about Security and Auditing Across the Entire Data Flow!  Sign up when you receive your personal invitation!

I do have a favor to ask of each of you:  Please look into your lives and see if you have time to dedicate to our Chapter.  We have a few open Board Positions (Vice President, Education Director, and Social Media Director) and we need your help!  You’d be joining a great team of professionals who work to better the Chapter every day, as well as receive CPEs and 25% off training events!  Think about it, and let me know!

Thank you, members, for recognizing the value ISACA membership offers you!  We work to add value to your membership!  If you have any comments or concerns – or simply want to chat – I can be reached at president@scisaca.org!

Here’s to a great year!

Kathleen Hall,
2015 – 2016 SC Midlands President

In This Issue

                                                                                                 
The Chapter is 247 members STRONG!

New Members           Transfers
 
Stacey Coleman             Marc Punzirudu 
  Rafael Garrido
  John Hensley
  Benjamin Owings
  Jonathan Rafferty
  Donnell Ray
  Bridget Sparkman

Techno Security & Mobile Forensics Investigations Conference 2015

 

 SC_Midlands4c

 

Techno Security & Mobile Forensics Investigations Conference 2015

 

Upcoming Chapter Training

You should be receiving individual emails now regarding registration for our upcoming classes.   Here is what is planned for the next few months:

July 22 – We will have Stu Henderson return for a 1 day course on How to Audit Mainframe Security TCP/IP. 8 cpes,  Register here:  http://www.cvent.com/d/trqwjk

August 19 – our own member, Brian Kelley will present a class on ETL: Security & Auditing Across the Entire Data Flow.  6 cpes, To learn more and register, go to http://www.cvent.com/d/9rqd6h

September 21 & 22 – Risk Management with Leighton Johnson

November 4 - 6 - South Carolina State Audit Conference will be held in Columbia, SC. 

Congratulations to Our Newly Certified

July 1, 2015

Samuel Parker Mills – CISM

Techno Security & Mobile Forensics Investigations Conference 2015

Post Report of the 
Techno Security Conference 2015

TechnoSecurity

2015 Post Show Report - Consider joining us next year!  The IT Audit and Security Tracks were great!

 The next edition of Techno Security & Forensics Investigation Conference / Mobile Forensics World will be held June 5 - 8, 2016 at the Marriott Resort at Grande Dunes in Myrtle Beach, South Carolina.

 Atlanta, Georgia, June 18, 2015 – Techno Security & Forensics Investigations Conference / Mobile Forensics World wrapped up its 17th / 8th editions on June 3rd after four days of education, networking and exhibits.

 The 2015 conference program featured 85 sessions led by 90 industry experts and two keynotes. Session topics ranged from Hacker Case Studies, The Dark Web, and iCloud Investigations to Mobile Application Security Challenges and Smartphone Forensics as well as several new software/technology demonstrations and labs.

The event welcomed 650 verified attendees from 18 different countries. This year the event management team worked closely with sponsors to identify and qualify appropriate professionals ensuring that they were of the highest caliber.  

 The events featured 49 exhibiting sponsors from 8 countries which were: AccessData; ADF Solutions, Inc.; Atola Technology; Belkasoft; BlackBag Technologies; Cellebrite, Inc.; Charlotte Metro ISSA; Ciphertex Data Security; Compelson Labs; CRU; CyberFETCH; Digital Intelligence, Inc.; EDAS Fox LLC; EDEC Digital Forensics; ElcomSoft Co. Ltd.; Federal Bureau of Investigation - Columbia Field Office; Fernico Inc.; FINALDATA INC.; Forensic Computers; F-Response; GP SIFT; Guidance Software/Tableau; H-11 Digital Forensics; Katana Forensics; Lima - Case Management Solutions; Magnet Forensics; MediaClone; MH SERVICE GMBH; MSAB; NUIX North America Inc.; OWASP; Oxygen Forensics; Paraben Corporation; Pen-Link, Ltd.; Rimage Corporation; SC ECTF; SC Midlands ISACA Chapter 54; Secure View Mobile Forensics; SiQuest; SUMURI; Syngress; Syntricate; SYSTOOLS; TALINO Forensic Workstations; Teel Technologies; Tritech Digital Forensics; VFC - Virtual Forensic Computing; Voyager Analytics; and X1.

 These events continue to be an important resource for IT security professionals granting an opportunity for discussion and information, bringing together the US market's elite stakeholders and decision makers with the aim to raise international awareness of developments, teaching, responsibilities and ethics in the field of IT security.

 For more information please visit www.TechnoSecurity.us

 
 
 
 
 
 
 
 

Techno Security & Mobile Forensics Investigations Conference 2015

ISACA Calendar of Events & Deadlines


July

9 July

Webinar: Securing Data in the Age of Mega Breaches

20-23 July

Training Week: Healthcare Information Technology, Dallas, Texas, USA

24 July

September CISA and CISM exams final registration deadline

24 July

September CISA and CISM exams refund deadline

24 July

September CISA and CISM exams change deadline (complimentary)

30 July

Training Week: Information Security Essentials for IT Auditors, Miami, Florida, USA, early registration deadline

31 July

Half-year registration opportunity for new members ends


August

1 August

Advanced-year membership registration begins

3 August

September CISA and CISM exams change deadline (US $50 processing fee)

4-7 August

ISACA Training Week, Chicago, Illinois, USA

13 August

Training Week: An Introduction to Privacy and Data Protection, Atlanta, Georgia, USA, early registration deadline

17-19 August

Governance, Risk and Control Conference, Phoenix, Arizona, USA

19 August

December CISA, CISM, CGEIT and CRISC certification exams early registration deadline

24-27 August

Training Week: Social Media in Your Enterprise: Mitigating the Risk and Reaping the Benefits, Seattle, Washington, USA

26 August

CSX 2015 North America, Washington DC, USA, early registration deadline

27 August

Training Week: Taking the Next Step: Advancing Your IT Auditing Skills, Boston, Massachusetts, USA, early registration deadline


September

3 September

Leadership Development Webinar

12 September

CISA and CISM exams date

12-13 September

North America Eastern Region Leadership Conference, Naples, Florida, USA

12-13 September

North America Central Region Leadership Conference, Columbus, Ohio, USA

17 September

Training Week: Cloud Computing: Seeing Through the Clouds—What the IT Auditor Needs to Know, Chicago, Illinois, USA, early registration deadline

21-24 September

Training Week: Information Security Essentials for IT Auditors, Miami, Florida, USA


October

5-8 October

Training Week: An Introduction to Privacy and Data Protection, Atlanta, Georgia, USA

     

button2015Be Part of the CyberLympics

Techno Security & Mobile Forensics Investigations Conference 2015ISACA is sponsoring the 2015 Global CyberLympics competition and is the exclusive host sponsor of the World Finals, scheduled to take place at the CSX 2015 North America Conference in Washington, DC, USA on 19-21 October 2015.

This year, chapters are encouraged to register a team of 4-6 players. The Western Michigan Chapter is already onboard; imagine the fun you will have competing with other chapters from around the world! If your team makes it to the World Finals of this competition, all members of your team will receive a COMPLIMENTARY registration to the CSX 2015 North America Conference (excluding workshops).

Registration for the Global CyberLympics is now open and the first online elimination rounds will commence in August. For details, to register your team and to follow the pre-conference action, visit:  www.cyberlympics.org.   Registration Deadline if July 31st!

                                                                   

Techno Security & Mobile Forensics Investigations Conference 2015

Social Media

Facebook:  https://www.facebook.com/ISACASC

LinkedIn http://www.linkedin.com/groups?home=&gid=1104037&trk=anet_ug_hm.  

Twitter:  @scmidlandsisaca
                                                                                      


“Follow” ISACA's Cybersecurity Nexus page to stay up to date on all things cybersecurity: https://www.linkedin.com/company/cybersecurity-nexus 
CSX-banner-homeb 

Helpful Articles

ISACA Issues 9 Action Items to Improve IT Governance 

http://www.isaca.org/About-ISACA/Press-room/News-Releases/2015/Pages/ISACA-Issues-9-Action-Items-to-Improve-IT-Governance.aspx

 

New ISACA Guide Outlines Seven Key Considerations for Digital Forensics 

http://www.isaca.org/About-ISACA/Press-room/News-Releases/2015/Pages/New-ISACA-Guide-Outlines-Seven-Key-Considerations-for-Digital-Forensics.aspx

 

New ISACA Guide Explores Turbulent Cybersecurity Environment For Industrial Control Systems 

http://www.isaca.org/About-ISACA/Press-room/News-Releases/2015/Pages/New-ISACA-Guide-Explores-Turbulent-Cybersecurity-Environment-For-Industrial-Control-Systems.aspx

 

Study: 82% of Organizations Expect a Cyberattack, Yet 35% Are Unable to Fill Open Security Jobs 

http://www.isaca.org/About-ISACA/Press-room/News-Releases/2015/Pages/Study-82-percent-of-Organizations-Expect-a-Cyberattack-Yet-35-percent-Are-Unable-to-Fill-Open-Security-Jobs.aspx

Techno Security & Mobile Forensics Investigations Conference 2015

 

Techno Security & Mobile Forensics Investigations Conference 2015

 

Techno Security & Mobile Forensics Investigations Conference 2015

We look forward to seeing you at our next event!

Techno Security & Mobile Forensics Investigations Conference 2015

 

Visit SC Midlands Chapter of ISACA at http://www.scisaca.org/ to find out more about our upcoming educational events!  Click on Events at the top of the page, and then hit the Monthly Training tab to review our events.

 



Cvent - Web-based Software Solutions