Navigate Up

Pricing:

 
 
 
 

 ACGA Virtual Symposium Cyber Defense in the Public Sector

Webinar
5/15/2014 1:00 PM
5/15/2014 2:00 PM
  |

Virtual Symposium: Cyber Defense in the Public Sector​

May 15, 2014
12:00 p.m.–4:00 p.m. Eastern Time (ET)
 
 
 
 
 
 
 
 
IIA Event Description
​The ACGA invites you to attend the virtual symposium, Cyber Defense in the Public Sector. This online event features three compelling sessions that will help you better understand and manage the risks associated with cyber defense within your organization.
Cyber attacks are occurring at all levels of government. Are you prepared to address the risks associated with cyber defense within your organization?
This program is designed to benefit both IT and non-IT auditors.
TeamMate Wolters KluwerSymposium
Symposium Sessions
 

Session 1: 12:00–1:20 p.m. Eastern Time (ET)

 

​Cyber Defense: Understanding the Issues

The connectedness of today’s digital era has provided incredible advancements in communications, science, and commerce. This greater level of interconnectedness brings greater risk to the information security that makes these achievements possible.
Public sector organizations encounter numerous risks to private and sensitive data and the potential for degradation of the public trust, which can have an economic ripple effect. News of data breaches or the mismanagement of data occurs almost daily. The war against cyber threats is being fought on many fronts, but these efforts can only succeed when they are complete, continuous, and monitored — this is where auditor support is critical. A strategy for countering cyber threats is not sufficient; it requires regular monitoring, updating, and accountability.
During this session, a panel of experts will examine:
  • Why cyber security matters.
  • Challenges and considerations unique to the government sector.
  • Critical risks today and tomorrow.
  • Why auditors should care and the role they can play.

Presenters

Catherine Melvin
Audit Manager, Texas Department of Public Safety
Bob Brese
Chief Information Officer, U.S. Department of Energy
Matt Snyder
Chief Information Security Officer, Texas Department of Public Safety
Jonathan Reichental, Ph.D.
Chief Information Officer, City of Palo Alto, California
 

Session 2: 1:30 p.m.–2:30 p.m. Eastern Time (ET)

 

​TACIT Security: Institutionalizing Cyber Protection for Critical Assets

Today is a golden age of information technology, so it is somewhat ironic that the same information technology that has brought unprecedented innovation and prosperity to millions has now become a significant vulnerability to nations, states, corporate entities, and individuals.
So how do we provide for the common defense in this digital age? We are vulnerable because our information technology is fragile and susceptible to threats such as natural disaster, structural failures, cyber attacks, and human error. In this session we will explore the risks faced today and how the concept of TACIT Security can aid an organization in its efforts.

TACIT Security is an acronym for:
  • Threat
  • Assets
  • Complexity
  • Integration
  • Trustworthiness

Presenter

Ron Ross, Ph.D.
Senior Computer Scientist and Fellow
National Institute of Standards and Technology
 

Session 3: 2:40 p.m.–4:00 p.m. Eastern Time (ET)

 

​Tools and Techniques for Auditing Cyber Security

There are many tools and techniques to help us counter cyber attack threats. Maybe too many. Where can an organization get started or how can they increase or complement their current efforts? Auditors can answer these questions, but they first must understand the tools and methodologies that provide the greatest defense to assist in assessing the effectiveness of controls and as well as gaps.
This session will outline some foundational tools for vulnerability management, such as Tenable’s Nessus, which can assist in identifying holes in an organization’s efforts such as misconfigurations and missed patches across a variety of platforms.
Attendees will also learn:
  • How to use Active Directory tools during fieldwork to gather information about account management and security configurations.
  • The importance of using task automation and configuration management framework, such as Windows PowerShell, to monitor and manage Windows environments.
  • What Windows utilities are available to assist organizations and their audit teams in assessing security.

Presenters

Debbie Hunter
Deputy Inspector General, Audits & Investigative Services
U.S. House of Representatives, OIG
Mike Howard
Assistant Director, Information Systems Audits
U.S. House of Representatives, OIG
 
 
 
 
 
Presenter/Facilitator
IIA Event Presenter
Catherine Melvin
Audit Manager, Texas Department of Public Safety
Bob Brese
Chief Information Officer, U.S. Department of Energy
Matt Snyder
Chief Information Security Officer, Texas Department of Public Safety
Jonathan Reichental, Ph.D.
Chief Information Officer, City of Palo Alto, California
Ron Ross, Ph.D.
Senior Computer Scientist and Fellow
National Institute of Standards and Technology
Debbie Hunter
Deputy Inspector General, Audits & Investigative Services
U.S. House of Representatives, OIG
Mike Howard
Assistant Director, Information Systems Audits
U.S. House of Representatives, OIG
Pricing
 
ACGA:
$.00
Public:
$130.00
 
 
 
Event Information
Course Duration:
4 hours
CPE Hours:
4
Knowledge Level:
Basic
Field of Study:
Auditing (Governmental)
 
 
 
 
Delivery Method:
Internet Group Live
 
 
 
 
 
 
The IIA is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.learningmarket.org.