Publications

ISACA South Florida Chapter Publications

Information Technology Governance in Government (ITGIG) Conference – 5-19-2017

Michael_Echols - Governing_Emerging_Smart_City_Technologies-and-their-Risks-to-Create-Strategic-Value1.  Michael Echols – Governing Emerging Smart City Technologies and their Risks to Create Strategic Value
2. Michael Watson - Maintaining Effective Cybersecurity Governance2. Michael Watson – Maintaining Effective Cybersecurity Governance
3.Larry Whiteside, Jr. -Governing_Data-for-Optimum-Benefits-in-Governance3. Larry Whiteside, Jr. –  Governing_Data for Optimum Benefits in Governance
4. Eric Sweden - Cyber Disruption Response Planning4. Eric Sweden – Cyber Disruption Response Planning

Information Technology Governance in Government (ITGIG) Conference – 5-19-2017

05_Implimenting_NIST_Cybersecurity_Framework_Using_COBIT5_Tom_Conkle.pdf05. Tom Conkle – Implementing NIST Cybersecurity Framework Using COBIT5
Dr_Tejay St. Thomas-University-2017-ITGIG.pdf6. Dr. Tejay – Novel Research, Community Engagement – St. Thomas University
4. Eric Sweden - Cyber Disruption Response Planning7. Alexis Perdereaux-Weekes – President Opening Presentation

10th Annual WOW Event – April 21st, 2017

 Leo-Taddeo- Keynote - Lessons Learned From Recent Breaches - Leveraging Law Enforcement and Technology to Change Hacker Behavior1. Leo-Taddeo- Keynote – Lessons Learned From Recent Breaches – Leveraging Law Enforcement and Technology to Change Hacker Behavior
2. Jorge-Rey -Phish by phish, building a culture of cybersecurity awareness of Moving to the Cloud 2. Jorge-Rey -Phish by phish, building a culture of cybersecurity awareness of Moving to the Cloud
3. Ira-Winkler-Curing Detection Deficit Disorder3. Ira Winkler, Curing Detection Deficit Disorder
4. Ramses-Gallego- The Future of NOW4. Ramses Gallego, The Future of NOW

10th Annual WOW Event – April 21st, 2017

4. Ramses-Gallego- The Future of NOW5. Ralph Echemendia, The Ethical Hacker
6. Robert-Stroud - IoT Overview - ISACA-South-Florida-Chapter 6. Robert Stroud – IoT Opportunities, Trends, and Momentum
President ISACA SFL WOW Presntation7. Alexis-Perdereaux-Weekes-President _WOW_Conference-4-21-2017.pdf

9th Annual WOW Event – February 26th, 2016

01 - 2016 Security Predictions Bill Harmer1- Bill Harmer – 2016 Security Predictions
2- Christian Linacre - Securing the Cloud - Assessing the Risk and Rewards 2- Christian Linacre – Securing the Cloud – Assessing the Risk and Rewards of Moving to the Cloud
3- Randy Armknecht , Matt Farrar, Protiviti- Cloudy Audits3- Randy Armknecht , Matt Farrar, Protiviti- Cloudy Audits
4-Dr.  Chase Cunningham – Creating a world class open source threat intel platform from scratch...How the hell...?4-Dr.  Chase CunninghamCreating a world class open source threat intel platform from scratch…How the hell…?

9th Annual WOW Event – February 26th, 2016

5- Lance James: <strong>Designing Security for the Cloud - KEYNOTE PRESENTATION5- Lance James: Designing Security for the Cloud – KEYNOTE PRESENTATION
6 -Tony UcedaVelez : Security Risk Management for Cloud Based Environments
7 – Heather Eastham – Presenting Sponsor – Intro – RSA/OPTIV

8th Annual WOW Event – February 20th, 2015

1-Mark Lippman: Protiviti - Managing Risk & Compliance1-Mark Lippman: Protiviti – Managing Risk & Compliance
2-Derek Carver: FireEye - The New Threat Landscape2-Derek Carver: FireEye – The New Threat Landscape
3-Sanjay Deo - 24B7Security - Cybersecurity Strategy: Defense in Depth3-Sanjay Deo – 24B7Security – Cybersecurity Strategy: Defense in Depth
4-Jeff Roth – Security Incident Response4-Jeff Roth – Security Incident Response

8th Annual WOW Event – February 20th, 2015

5-Mike Gotham – RSA – Digital Forensic Basics5-Mike Gotham – RSA – Digital Forensic Basics
6-Lance_James - Deloitte - Advanced Persistent Threat6-Lance_James – Deloitte – Advanced Persistent Threat
7-Moses Hernandez – The Modern Day Malware Primer7-Moses Hernandez – The Modern Day Malware Primer

7th Annual WOW Event – February 28th, 2014

1-Mauricio Angee- ISP Program Development1-Mauricio Angee- ISP Program Development
2-Kaufman-2014 ISACA Regulatory and Compliance Update2-Kaufman-2014 ISACA Regulatory and Compliance Update
4-FireEye- Incident Response4-FireEye- Incident Response
5-Elevate-Ray Guzman- Secure Code Development5-Elevate-Ray Guzman- Secure Code Development

Past Event Presentations

Disaster Recovery & Business Continuity – March 12, 2010

John-Ceraolo---Disaster-Recovery-for-Home-Based-ContractorsJohn Ceraolo – Disaster Recovery for Home-Based Contractors
Becky-Cohen---BCP-Lessons-LearnedBecky Cohen – BCP Lessons Learned
Frank-Sancho---3-Pillars-of-Business-ContinuityFrank Sancho – 3 Pillars of Business Continuity

3rd Annual WOW Event – January 15, 2010

Ralph-Echemendia---Emerging-Threats-in-CyberspaceRalph Echemendia – Emerging Threats in Cyberspace
Edward-Haletky---Measuring-Hypervisor-Footprints-Accessing-RiskEdward Haletky – Measuring Hypervisor Footprints: Accessing Risk
Robert-Stroud---Goverance-COBIT-and-the-CloudRobert Stroud – Goverance, COBIT and the Cloud
Alan-Shimel---Compliance-for-Compliances-SakeAlan Shimel – Compliance for Compliance’s Sake

ITIL & COBIT – June 2009

Elevate-Consulting---ITIL-and-COBIT-ExplainedElevate Consulting – ITIL and COBIT Explained

Security Management Strategies – March 20, 2009

Sunera---Web-Application-Security-Management-&-Best-Practices-Part-ISunera – Web Application Security Management & Best Practices Part I
Sunera---Web-Application-Security-Management-&-Best-Practices-Part-IISunera – Web Application Security Management & Best Practices Part II

2nd Annual WOW Event – January 30, 2009

PCI-Council---PCI-Security-Standard-and-Compliance-PresentationPCI Council – PCI Security Standard and Compliance Presentation
Telefonica-USA---Security-as-a-Business-Function-PresentationTelefonica USA – Security as a Business Function Presentation
Federal-Reserve-Bank---GLBA-Section-501Federal Reserve Bank – GLBA Section 501(b) and Customer Notification Presentation

HIPAA Compliance Workshop – September 12, 2008

Grant-Thornton---Is-Your-Privacy-Secure Grant Thornton – Is Your Privacy Secure

Contributed Articles

Courtesy of Enterprise Risk Management

Identity-Theft-New-RegulationsIdentity Theft: New Regulations
Authentication-in-Banking-Pt2Authentication in Banking Pt2
Bugs-Cost-Money Bugs Cost Money
Bugs-Cost-Money-Pt2Bugs Cost Money Pt2
New-Rules-Regarding-E-DiscoveryNew Rules Regarding E-Discovery

Chapter Forms

Scholarship-FormElection Form
Election-AnnouncementElection Announcement
Employment-FormEmployment Form
Scholarship-FormScholarship Form

Subscribe to our Newsletter

Get Certified