London, UK: Cyberrisk is a real threat to enterprises and requires diligent risk mitigation strategies. Global IT association ISACA will address at its free virtual conference how enterprises can recognize and prevent cyberattacks with sound security measures. Attendees will learn from industry specialists and network with peers from around the world, all without leaving their desks, at the event titled Enterprise Risk Management: Provide Security from Cyberthreats, on Thursday, 22 March 2012, from 9:00 a.m.–4:00 p.m. CDT (UTC-5).
“The cyberthreat landscape is constantly changing and enterprises must continually monitor controls to minimize risk,” said Ken Vander Wal, CISA, CPA, international president of ISACA. “ISACA’s virtual conference will help attendees identify risk and implement appropriate, effective strategies that will add value to their enterprise’s overall risk management program.”
The event will bring together global leaders in the industry, who will also participate in ISACA’s World Congress: INSIGHTS 2012, a collaborative and engaging conference for IT and business executives, to be held 25-27 June 2012 in San Francisco, California, USA.
During live Q&A sessions at the virtual conference, attendees can interact directly with the session presenters, including:
•Ramsés Gallego, CISM, CGEIT, SCPM, CCSK, CISSP, Six Sigma Black Belt, security strategist at Quest Software, who will present Understanding Cyberthreats in the ERM Ecosystem
•Dr. Ron Ross, senior computer scientist and information security researcher, National Institute of Standards and Technology, and the Honorable Theresa Grafenstine, CISA, CGEIT, CRISC, CIA, CGAP, CPA, the inspector general of the U.S. House of Representatives, who will discuss Emerging Trends in Cybersecurity and Risk Management, including corporate espionage, cloud and mobile computing, insider threats, and cutting-edge standards and guidelines for increased security and privacy in information systems. This topic will continue, in depth, at INSIGHTS 2012.
•Matt Mosley, CISA, CISM, CISSP, senior product manager for NetIQ, who will present Detecting the Stealthy Attacker: Who Can You Trust? This presentation will offer new techniques on how to detect potential breaches that result from mistakes by authorized administrators and how to distinguish between a trusted insider and a hacker.
“There needs to be a shift in the perception of risk from a technology focus to an enterprise focus. We need to go back to the basics and approach risk management as a whole—not only within IT, but also as a business issue,” said Gallego, security strategist at Quest Software. “This virtual conference is timely for enterprise risk management and will provide mitigation strategies, emerging trends and concepts to embrace the ERM discipline robustly and immediately.”