oFF-lINE / Page1

Remote Access and Mobile Computing Security and Audit(8 CPEs)

Instructor: Ken Cutler, CISSP, CISA, CISM

Date: January 22, 2009

Time: 8:00 am to 5:00 pm

Location:BlueCross BlueShield of SC

4101 Percival Road

Columbia, SC29219

Course Description

The combination of small office/home high-speed Internet service, virtual private networks, mobile computing, and wireless technology have empowered a rapidly growing population of highly mobile, decentralized workers. These technologies have also unfortunately spawned opportunities to create numerous backdoors on many enterprise networks for both inbound and outbound access. In this diversified network security and audit workshop, you will explore the various wired network access methods and issues associated with extending the reach of the enterprise network, in conjunction with and apart from the firewalled connections to the Internet and other public networks. You will evaluate different security safeguards and audit procedures including: authentication mechanisms, enterprise authentication systems, end-point security, session-level encryption, and virtual private networks. Topics covered include:

  • Risk analysis of remote access and mobile computing
  • Sorting out the choices for enhanced user authentication protocols and mechanisms
  • Enterprise authentication systems: RADIUS, TACACS+
  • Trusted and secure virtual private networks (VPNs)
  • Securing notebooks, tablets, smart phones, and PDAs and other mobile computing environments
  • Audit procedures for testing remote access and mobile computing applications

Course Cost

$170 – Members

$185 – IIA, ISSA, and other ISACA and Partner Members

$250 – Non Members

Bonus: You will also receive the Standard Edition of the MIS Swiss Army Knife Reference listing hundreds of valuable information security and IT audit resources.

Breakfast and Lunch Included.

Registration Process

Registration and payment is required in advance for the seminar and is requested by Monday, January 5, 2009. No refunds, but substitutions are allowed.

Option 1: If you would like to pay by credit card, please go to our chapter website If you pay online, please email your RegistrationForm .

Option 2: If you prefer to pay by check, checks should be made out to SC Midlands ISACA Chapter. Please complete yourRegistration Form and mail with check to:

Phil Brock, Chapter Secretary, 1426 Main Street – MC 067,

Columbia, South Carolina, 29201.

Driving Directions to BlueCross BlueShield of SCisprovided on page4.

REGISTRATION FORM

Driving Directions to BlueCross BlueShield of SC

From Camden, SC Take I-20W to exit #80/Clemson Road. Turn left onto Clemson Road. Turn right onto Percival Road and stay right turning into parking lot of the facility.

From Charlotte, NC, Take I-277 S to exit #1B/Columbia onto I-77S. Go approximately 85 miles. Take exit #16A/Florence onto I-20E. Take exit #80/Clemson Road. Turn right onto Clemson Road. Turn right onto Percival Road and stay right turning into parking lot of the facility.

From the Columbia Metropolitan Airport, Start on Airport Blvd going toward Aviation Way, Turn right on Lexington Dr. Turn right on John N Hardee Expressway, Turn left on SC-302, Take ramp onto I-26 E, Take left exit #116/Charlotte onto I-77 N for approximately 15 miles, Take exit #16/Augusta/ Florence onto I-20 E toward Florence. Exit onto Clemson Road (Exit #80). Turn right onto Clemson Road. Turn right onto Percival Road and stay right turning into parking lot of the facility.

From the Irmo/Lexington area, take I-26 E. Exit onto I-20 E toward Florence and travel approximately 15 miles. Exit onto Clemson Road (Exit #80). Turn right onto Clemson Road. Turn right onto Percival Road and stay right turning into parking lot of the facility.

From Columbia, take I-20 toward Florence. Exit onto Clemson Road (Exit #80). Turn right onto Clemson Road. Turn right onto Percival Road and stay right turning into parking lot of the facility.

Parking and Security

You may park in any space outlined in white. Proceed to the Lobby at the center front of the building and obtain a Visitor’s Pass. This will require a photo id. BCBS staff will collect you from the lobby and direct you to the classroom. Coffee, juices and a light breakfast will be served in the morning, lunch and a light snack in the afternoon. Contact Sue Rusher at 803-264-7631 or 803-331-2059 with concerns.

Western Carolina IIA Chapter

Credits: 8-hour CPE Seminar

Date: December 12, 2008

Time: 8:00 am to 5:00 pm

Location: MichelinConferenceCenter, Greenville, SC

Sponsored by: Grant Thornton

Cost: $100

The Western Carolina IIA Chapter is offering an 8-hour CPE seminar with the assistance of Grant Thornton to bring you up to speed on issues facing internal auditors. This is an outstanding opportunity to learn the latest on very relevant topics impacting Internal Auditors. If you are looking for CPE credits before the end of the year, this is the ideal seminar for you as well. An outline is below. To register, clickhere.

Effective Corporate Governance – 8:30 to 9:20 am

Organizations are held accountable for accuracy and integrity in their business operations, and they must have effective and reliable governance and compliance procedures in place. This segment provides real examples of ineffective corporate governance practices (including a case study on the headline-grabbing Fannie Mae proceedings) and provides good examples of what not to do.

Enterprise Risk Management –9:30 to 10:20 am

This segment focuses on Enterprise Risk Management and the benefits associated with the approach of analyzing and considering how risks (financial, operational, etc.) are interconnected for risk mitigation.

CAATs – ACL –10:30 to 11:20 am

Computer Assisted Audit Techniques (CAATs) and Audit Command Language (ACL) can contribute considerable value when planning and performing audit work. This segment will focus on how to utilize CAATs and ACL to make your internal audit process more efficient.

Fraud – 12:20 to 1:10 pm

As the economy tightens, incidences of fraud increase. This segment focuses on fraud risks and how internal auditors can strengthen internal controls and prevent fraud.

COSO Monitoring –1:10 to 2:00 pm

For the past year and a half, COSO has been working diligently with a dedicated team from Grant Thornton (including our speaker, Jay Brietz), on a guidance initiative designed to help organizations better understand and utilize the Internal Control-Integrated Framework. This segment will provide you a better understanding of the framework so you can better implement it and realize a broad range of benefits through improved financial, operational, and compliance controls.

AccountingTechnical Update – 2:10 to 3:00 pm

This segment addresses changes in audit and accounting pronouncements.

IT Security – 3:10 to 4:00 pm

Organizations today depend on information systems for nearly all aspects of their financial and operational functions, making the need for IT security paramount. This segment will provide guidance to auditors for improving the IT security environment, including the use of a security framework that can assess a company’s overall risk levels, prioritization of data and corresponding IT security, and tips for implementing and monitoring security programs.

Panel Discussion – 4:00 to 4:50pm

The final segment will be an open forum for discussion.

ISACA Supports Academic Research

Academic research is the foundation of many of the breakthroughs and new theories supporting the IT assurance, information security and IT governance professional space. ISACA is pleased to support academic research projects by posting these descriptions of peer-reviewed research projects underway. You are encouraged to participate in those you find of special interest or pertinence.

The descriptions below have been reviewed by ISACA’s Academic Relations Committee for relevance, appropriateness, rigor and value of the results.

  • IT Security and Sarbanes-Oxley Compliance
  • Security Metrics - Enumeration of QoP for Information Assurance of IT Systems
  • Personality Factors in ERP Adoption and Success

Each project will result in an article or white paper that will be posted on the ISACA Academic Researchwebpage.

The opportunity for the potential to post research studies is available to professors from universities represented by an ISACA academic advocate and doctoral students (who are ISACA members) at universities worldwide. To request review and posting of a link to a research project survey, please use the submission form.

For more information on the program, contact Linda Wogelius, Research Coordinator or visit

Our chapter has been asked to respond to a survey for research into the Personality Factors in ERP Adoption and Success. We will be sending out an email for this survey shortly. Thank you for your participation.