SC Midlands Chapter 54 of ISACA

SC Midlands Chapter 54 of ISACA

October 2011 Newsletter
In This Issue
Welcome New Members!
Congrats Newly Certified!
COBIT Misconceptions and Facts
2012 Membership Renewals Begin
Job Hunting?
Emerging Threats and Trends in Cyber Security (3 CPEs)
Advanced Persistent Threat: The Battle to Own Your Network (6 CPEs)
Information Technology and the Auditor
Welcome New Members!  

October
Lisa Willett
Kimberly Miller
Linda Weeks
Jeffrey Rosenberger
Congrats Newly Certified!

CRISC
David O'Berry 
COBIT Misconceptions and Factseatured Article
 

We would like to clear up some general misconceptions related to COBIT�.

 

MISCONCEPTION:

COBIT is a standard.

 

FACT:

COBIT is a framework. Unlike a standard, which requires an enterprise to follow the complete guidance as it is documented, a framework is flexible and can-and should-be customized to fit an enterprise's size, culture, risk profile, business needs, etc.

 

MISCONCEPTION:

COBIT is an IT audit framework.

 

FACT:

COBIT is a framework that covers governance and management aspects of information and technology used across the complete enterprise from "end to end" and beyond, providing a common business language for the business's use of information and technology assets.

 

MISCONCEPTION:

COBIT is technical.

 

FACT:

COBIT is business-language-oriented and avoids use of technical terms wherever possible.

 

MISCONCEPTION:

COBIT is a competitor of ITIL.

 

FACT:

COBIT and ITIL are complementary. COBIT brings breadth, covering all governance and management activities related to information and technology, and ITIL provides depth of guidance in IT service management areas.

 

MISCONCEPTION:

COBIT provides only control objectives for IT processes.

 

FACT:

In addition, COBIT also provides guidance on good management practices. To reflect this shift in framework content, COBIT now goes by its acronym only.

 

MISCONCEPTION:

COBIT is a tool for Sarbanes-Oxley compliance only.

 

FACT:

COBIT helps enterprises comply with any and all relevant legislation and regulations, including, but not limited to, Sarbanes-Oxley.

 

MISCONCEPTION:

COBIT is complicated and overwhelming.

 

FACT:

The principles and supporting guidance in COBIT use business language to facilitate comprehension of the material; however, governance and management of enterprise IT are not simple topics to grasp or address.

 

MISCONCEPTION:

COBIT must be "implemented" in its entirety or not at all.

 

FACT:

No enterprise is expected to implement all of the practices in COBIT; each enterprise should select the practices and activities that fit its business objectives, needs and capabilities.

 

MISCONCEPTION:

COBIT is of value for big enterprises only.

 

FACT:

COBIT can be used by enterprises of any size, particularly when considering the principles and enablers related to the governance and management of enterprise IT.

 

MISCONCEPTION:

COBIT provides specific directions and answers.

 

FACT:

COBIT is not a specific route that tells an enterprise exactly where to start and stop; instead, it is a broader map that enterprises can use to determine their starting points and where they want to go. As a result, it can be used by any enterprise, regardless of its size, location, industry or current level of management and governance capability.

 

 

COBIT 5 is expected to be released in early 2012. Look for continuous and regular updates about the release on the COBIT 5 page of the ISACA web site. 


2012 Membership Renewals Begin

The ISACA� 2012 membership renewals open 20 September 2011, and this year will see the first dues increase (by US $5) since 2008. In those 4 years, member benefits have expanded substantially.  

 

* A full suite of COBIT�-related products and tools for implementing information systems audit, control, risk and security, including:
- Val IT™:  Based on COBIT� (2008)
- IT Assurance Framework™ (ITAF™) (2008)
- Risk IT:  Based on COBIT� (2009)
- Business Model for Information Security™ (BMIS™) (2010)


* Steep discounts on COBIT products (including COBIT� 5, scheduled for release in 2012):
- 85 percent discount on COBIT Online�
- Free COBIT Quickstart�


* Substantial discounts on exam fees and review materials for ISACA's four certifications: Certified Information Systems Auditor� (CISA�), Certified Information Security Manager� (CISM�), Certified in the Governance of Enterprise IT� (CGEIT�), and Certified in Risk and Information Systems Control™ (CRISC™)


* More than 75 research deliverables in just the last 4 years, including new audit programs and COBIT mapping documents that are free to members only


* Free, members-only eSymposium events that provide 36 continuing professional education (CPE) hours per year


* An eLibrary of more than 425 searchable books


* An expanded Career Centre with new capabilities to post and search for jobs by country


* The new Knowledge Center, which offers members-only online communities on more than 100 topics of interest


* A free, members-only digital edition and mobile app of the ISACA� Journal     

 

For additional information on the value of ISACA membership, visit the Member Benefits page of the ISACA web site.

Job Hunting?

Frequently, the ISACA SC Midlands Chapter is contacted by businesses that have an employment opportunity that would be of interest to our membership.  We've received quite a few in the past few weeks so we wanted to remind you that these opportunities are posted on our web site at www.scisaca.org under the heading "Current Job Openings".  Be sure to check the site regularly to stay informed of the latest postings.

::
Join Our Mailing List
From the President

Hello friends and members: 

Calling all CISA and CISM candidates!  The CISA review class has begun.  It is not too late to still take advantage of the class!   These classes are also available for CPE hours for those already certified.  Need a refresher?  Come and get it - the CISA class provides 18 CPE hours ($5.55 a CPE) and the CISM class provides 16 CPE hours at $6.25 a CPE.  The CISA class is on Tuesdays and Thursdays and the CISM class starts this Saturday.  Go to the events registration tab to sign up.

We have room in the November session of Modern Cyber Trends and Threats Update for 3 CPEs.  Get yourself signed up.

Be sure to catch these early bird prices for the Penetration Testing against APT in December for 6 CPEs.  The early bird pricing goes through November 7th.  Additionally, if you live on the western side of the state, we are attempting to offer this class in Greenville.  So far, only three folks are signed up.  We need five people at least before we can justify the additional travel costs for the instructor.  Please sign up now if you intend on going!

Welcome to Linda Weeks, our new Marketing Director.  Check out her bio on the officer's page.  Linda will be working to get the news about ISACA out to folks in the four domains we cover - Risk, Governance, Security and Audit.  We will be hosting booths at local conferences where these career paths would congregate for education.  If you know of a great conference we should be at, please send Linda a note!   

We are looking for volunteers to continue to build relationships with our local universities:  We need a volunteer who would help us get the ISACA information out to students at our universities.  If you are a graduate of a local university and would like to help, please contact either Tom Hart or Sue Rusher to let us know.  Working on the Board offers great networking with leaders locally, nationally, and internationally, extra CPEs and a chance to make a difference.

Sincerely,
Sue Rusher
2011 - 2012 President
Emerging Threats and Trends in Cyber Security
(3 CPEs)
Leighton Johnson - CTO of ISFMT (Information Security & Forensics Management Team

DATE:           November 4, 2011

LOCATION:
   BCBSSC Tower Auditorium
                    2501 Faraway Drive, Columbia, SC 29223
                    Free Parking
TIME:            
Registration:  8:30 am (Breakfast served)
Class Time:   9:00 am - 12 noon
Lunch:           12 noon - 1:00 pm

Pre-Registration and payment required at http://www.scisaca.org/ Click on future events, and locate this date.  Checks and credit cards accepted for pre-registration.  

Pricing:
Registration: Oct 26th- Nov 3rd
$75- SC Midlands ISACA Members
$95- Affiliate Members
$115- Non-Members

*Affiliate Members of IIA, SIAA, IMA, other ISACA chapters, etc.

What you will learn:
Cybersecurity incidents are major concerns for enterprises and governments worldwide. Data breaches are expected to account for US $130.1 billion in global corporate losses this year, according to the Ponemon Institute.

This course will help enterprises to be prepared against the rise in threats from cyber criminals. The latest cybersecurity threats will be identified; the current cyber-trends across the Internet will be defined; network vulnerabilities will be discussed; and tools, techniques, and tactics will be provided to combat threats.

Current threats to the information security landscape are:

�         Data breaches
�         Identity theft
�         Web 2.0 and client-side attacks
�         Targeted messaging attacks
�         Botnets
�         Rootkits
�         Logic Bombs

Phishing e-mails are the most common attack vector, and combating them requires a varied approach that includes:

�         User awareness and training
�         Incident response capability
�         In-bound and out-bound filters at gateways

Each threat and attack is different, and should be considered independently. This course will provide tips on how to gather a team of well-trained experts to develop the best approach possible and how to be sure your filtering methods and incident response capabilities are up to date and efficient to effectively combat attacks.

Leighton Johnson, the CTO of ISFMT (Information Security & Forensics Management Team), has presented computer security, cyber security and forensics classes and seminars all across the United States and Europe. He was the regional CIO and Senior Security Engineer for a 450 person
directorate within Lockheed Martin Information Systems & Global Solutions Company covering 7 locations within the Eastern and Midwestern parts of the U.S. He is an adjunct instructor of digital and network forensics and incident response at Augusta State University. He has over 35 years experience in Computer Security, Cyber Security, Software Development and Communications Equipment Operations & Maintenance; Primary focus areas include computer security, information operations & assurance, software system development life cycle focused on modeling & simulation systems, systems engineering and integration activities, database administration, business process & data modeling. He holds CISM (Certified Information Security Manager), CISSP (Certified Information Systems Security Professional), CIFI (Certified Information Forensics Investigator) CSSLP (Certified Security Software Lifecycle Professional), CMAS (Certified Master Antiterrorism Specialist) and CISA (Certified Information Systems Auditor) credentials. He has taught CISSP, CISA, CISM, DIACAP, Digital and Network Forensics, and Risk Management courses around the US over the past 7 years. He has presented at EuroCACS 2010, ISMC 2007, ISMC 2006, CyberCrime Summit 2007, multiple year presentations for OPNET Technologies international conferences, INFOSEC WORLD 2005, multiple presentations for military and civilian conferences for customers and clients worldwide.

 

Advanced Persistent Threat: The Battle to Own Your Network (6 CPEs)
Peter Morin CISSP, CISA, CGEIT, CRISC and GCFA - Senior Manager of Information Security at Bell Aliant Corporate Security

DATE:          December 7, 2011 (Columbia)
                    December 8, 2011 (Greenville)

LOCATION:   Columbia:
                    BCBSSC Tower Auditorium
                    2501 Faraway Drive, Columbia, SC 29223
                    Free Parking

                    Greenville

                    Clemson at the Falls

                    55 Camperdown Way

                    Greenville, SC 29601

 

TIME:            
Registration:   8:30 am (Breakfast served)
Lunch:            12 noon - 1pm
Seminar:        9:00 - 12 noon and 1:00 to 4:00 pm

Pre-Registration and payment required at http://www.scisaca.org/  Click on future events, and locate this date.  Checks and credit cards accepted for pre-registration.  

Pricing:
Early Bird Registration:  Now - Nov 11th  $85 - SC Midlands ISACA Members
$105 - Affiliate Members
$125 - Non-Members

Regular Registration: Nov 8th - Nov 30th
   
$105- SC Midlands ISACA Members
$125 - Affiliate Members
$145 - Non-Members

Late Registration: Dec 1st - Dec 6th
$125 - SC Midlands ISACA Members
$145 - Affiliate Members
$165 - Non-Members

*Affiliate Members of IIA, SIAA, IMA, other ISACA chapters, etc.

What you will learn:

The current cyber-battlefield involves persistent campaigns of targeted and sophisticated hacking attacks aimed at governments, military, fortune 500 corporations and other sources of high-value targets, commonly referred to as Advanced Persistent Threats or APT.

Do the following questions interest you?

  • How do groups such as Lulzsec and Anonymous hack into seemingly high-security networks with such ease?
  • Curious what terms such as "command and control" refer to?
  • Interested how a spear phishing attack can lead to a data breach?
  • How can a Security Information Event Management (SIEM) system help my organization identify when it is under attack?   

This one day workshop will provide insight into the anatomy of Advanced Persistent Threats including the various stages of attack, common attack vectors used, and examples of high-value targets (i.e. SCADA). We will also discuss some examples of organizations that have been breached and the complex attack methods used (i.e. RSA, Sony, Lockheed Martin, HB Gary, etc) as well as some of the defenses organizations are employing to better protect their information assets. During this workshop we will use common hacker tools such as MetaSploit and BackTrack to perform real-life demonstrations to highlight the significance of the attacks occurring today.

 

Peter Morin is a Senior Manager with Bell Aliant where he is responsible for managing security planning, vulnerability assessments, security event management and incident response. His position with Bell Aliant focuses on information security risk management, penetration testing, application code analysis, malware analysis, and developing standards for secure application development. Peter has over 15 years of in-depth information technology experience in the fields of enterprise computing and networking with an emphasis on IT security, application development, business continuity, incident response and forensics. Prior to Bell Aliant, Peter was a Senior Manager with KPMG LLP and Ernst & Young LLP's IT Security, Risk Advisory & Forensic practices. Peter is a frequent speaker on the subject of social networking, risk management, information security, penetration testing, malware analysis and forensics and has presented at numerous events held by the HTCIA, Blackhat/DefCon, PMI, Computer Security Institute, Interop, SANS, and ISACA. Peter is also a frequent guest lecturer at numerous colleges and university throughout North America.

 

Information Technology and the Auditor:  Basic IT Audit Skills and Concepts (6 CPEs)
Presented by John Gatto, CISA, CRISC of Health Care Service Corporation (HCSC), Divisional Vice President, Audit Services

Breakfast, Lunch and 6 CPEs

DATE:
         January 12, 2012
LOCATION:   BCBSSC Tower Auditorium
                   2501 Faraway Drive, Columbia, SC 29223
                   Free Parking
TIME:            
Registration:   8:30 am (Breakfast served)
Lunch:            12 noon - 1pm
Seminar:        9:00 - 12 noon and 1:00 to 4:00 pm

Pre-Registration and payment required at http://www.scisaca.org/  Click on future events, and locate this date.  Checks and credit cards accepted for pre-registration.  ISACA Student Members and Academic Advocates attend for free but must register in advance.

Pricing:
$65 Early Bird:  Now - December 10, 2011
$85 Regular Registration: December 11, 2011 - December 31, 2011
$105 Late Registration: January 1, 2012 - January 9, 2012

What you will learn
Every auditor is faced with the world of technology in almost every audit in the audit plan. This course is great for those auditors who have not been formally trained in IT or IT Auditing and an excellent brush up on basic skills for the experienced IT Auditor. Topics to be covered will be; General Overview of IT, IT Controls, IT General Controls, Outsourcing and Social Networking. The General Controls area will highlight the major issues an auditor should be concerned with and provide some testing matrices that can be used in the future.

John Gatto has been with Health Care Service Corporation (HCSC) in Chicago, IL, since December, 2005 and is currently the Divisional Vice President, Audit Services. In this role, he is responsible for all aspects of IT Audit for the four Plans comprising HCSC (Illinois, Texas, New Mexico and Oklahoma) and encompasses NAIC / MAR compliance and testing, risk based audits, advisory engagements for new development projects, coordination of SSAE #16 reviews and E&Y Year-End Financial Audits. John is a member of a number of Steering Committees within the IT area of HCSC.

Prior to HCSC, John worked at Federal-Mogul in Michigan as the Sox coordination supervisor, Avery Dennison in California as a Project Manager, and spent 13 years with Horizon BlueCross BlueShield of New Jersey, where he was Director of Systems Audit, Customer Audit and Operations Audit.

John has over 40 years of audit experience, most of it in the IT arena. He is a CISA and CRISC and has his MBA from Fairleigh-Dickinson University in New Jersey. John is a frequent speaker for the BCBSA, IIA and ISACA organizations.