57th IIA Chicago Annual Seminar
 
Monday 04/03/2017
7:00 am - 8:00 amRegistration - Continental Breakfast, Exhibitors & Networking
8:00 am - 9:40 amLife Would Be Easy If It Weren't For Other People
Speaker: Connie Podesta, Founder, CEO, Owner, President, Connie Podesta Presents
Difficult people? Move over! Crazy demands? Under control! Critical conversations? No problem! Imagine what you could accomplish if you could decode the mystery of human behavior and truly understand what makes people do what they do and say what they say (including yourself!). Research shows that the #1 key to SUCCESS is the ability to get along with other people. At work and at home. 

With laugh-out-loud humor, killer take-away strategies and her amazing insights into ourselves and others (including a few who “drive you crazy”), Human Relations expert Connie Podesta will both challenge you and empower you with the knowledge you need to get along better with the people in your life. Connie will take you right inside the minds and personalities of the people you deal with every day--bosses, colleagues, partners, customers, friends, and family-- so YOU can ACT, rather than REACT to whatever life throws your way. Get ready for less stress and more success!
9:40am - 10:00 amTransition and Refreshment Break, Exhibitors & Networking
10:00 am - 10:50 amOptimizing Your Three Lines of Defense for IT Risks - Enhancing Your Information Technology Internal Audit Plans
Speaker: Scott Shinners, Director, Risk Advisory Services, RSM US LLP
The learning objectives for this session are: 
1. Discuss optimal IT risk management processes 
2. Discuss the impact of the “Three Lines of Defense Model” on IT Internal Audit 
3. Provide examples and recommendations to improve your IT internal auditing function and how to help your organization improve it’s IT risk management using the “Three Lines of Defense Model” 

We will discuss optimal IT risk management processes and governance models using more advanced implementations of the IIA’s “Three Lines of Defense Model”. We will also discuss the role of other IT Risk management models such as COBIT, NIST, and others in connection with the implementation of the “Three Lines of Defense Model” as well as the role and impact on IT Internal Audit following an organization’s successful deployment of the more advanced “Three Lines of Defense Model”. The presentation will conclude with a model for your consideration that will allow you to further enhance your IT internal audit function. We will provide examples drawn from discussions with practicing corporate internal audit groups, real world practice summaries drawn from interviews with internal audit and IT management leaders in industry, and recommendations drawn from those experiences to help you improve your IT internal audit risk assessments and IT internal auditing activities to improve IT risk management processes, IT security, and other IT processes in relation to the model.
10:50 am - 11:05 amTransition Break, Exhibitors & Networking
11:05 am - 11:55 pmAccountability. Responsibility. Culpability. Welcome to Life Under a Microscope
Speaker: Jarrett W. Kolthoff, CEO, Speartip
Cyber Security now lies squarely on the shoulders of Senior Executives and Directors. This presentation highlights the core tenants of Cyber Counterintelligence operations that guide Senior Executives and Directors to address regulatory/legal requirements and corporate risk. A discussion of recent “real-world” cyber counterintelligence case studies to assist today’s business leaders in overseeing and implementing cyber risk management initiatives.

https://www.eiseverywhere.com/file_uploads/eba5d437525a6a836bf07b2e579d85f2_C5ProcessMiningAnalyticsforInternalAuditors.pdf
11:55 am - 12:50 pmLunch

Lunch Menu:

Salad

Romaine, Roasted Red Peppers, Cucumber, Goat Cheese Crostini

Entree

Bourbon Glazed Grilled Chicken, Parsnip-Youkon Gold Potato Puree, Sauteed Green Beans, Fried Onions, Rolls & Butter

Dessert

Cheesecake, Raspberry Sauce

Beverages

Coffee, Tea and Brewed Decaf.

Pitcher of Ice Tea at each table



12:50 am - 1:00 pmTransition Break, Exhibitors & Networking
1:00 pm - 2:40 pmGet Ready for The Gen Z Effect
Speaker: Tom Koulopoulos, Author The Gen Z Effect, Futurist, Keynote Speaker, Inc 500 CEO, Delphi Group
Drawing from his book, The Gen Z Effect, Tom Koulopoulos delves into a vision of the future that will disrupt every aspect of how we work, live and play. From radical new approaches to marketing and manufacturing to the potential obliteration of intellectual property and the shift to massively open online classrooms, he provides a mind-bending view of why we will need to embrace Gen Z as the last best hope for taking on the world's biggest challenges and opportunities, and how you can prepare yourself and your business for the greatest era of change and advancement the world has ever experienced.
2:40 pm - 3:00 pmTransition and Refreshment Break, Exhibitors & Networking
3:00 pm - 3:40 pmWhy Moving to the Cloud Doesn't Make You Secure
Speaker: Joe Meyer, Director of Risk Management & Governance, NCC
This discussion is to review cloud integration, migrations, but isn’t meant to focus on the technical acumen of cloud technology or on how to actually “secure” the cloud. This is an educational webinar on setting clarification on what it means to move to the cloud and advice of best practices based on past experiences. Additionally, we will look to provide "real-world” advice on how to mitigate roles and responsibility errors in the cloud and how to address the risk and compliance elements within a cloud based solution. This is a non-technical discussion focused on where your organization’s responsibility begins and ends with your cloud vendor plus advice on navigating the risk and compliance elements within a cloud based solution.
https://www.eiseverywhere.com/file_uploads/024216fa8cc1656c2f0b2f0bd44bae66_E5WhyMovingtotheCloudDoesntMakeYouSecure.pdf
3:50 pm - 4:10 pmTransition Break, Exhibitors & Networking
4:10 pm - 5:00 pmSustainable Cybersecurity Management: Why It’s Critical to Review Your Program Now
Speaker: Tom Wojcinski, Director, Baker Tilly
Speaker: Iriana Arias-Chizek, Manager, Baker Tilly
The presentation will provide an overview of the latest cybersecurity developments and how the risk landscape is changing. Tom will walkthrough examples of each phase of the cybersecurity management program including data classification, security controls implementation, and breach preparedness. Attendees will be able to gather key insights on cybersecurity program effectiveness and sustainability for executive leadership, management and boards. Attendees will also walk away with five key considerations for cybersecurity risk management that they can begin to apply to their organization immediately.


https://www.eiseverywhere.com/file_uploads/bd185cc34c02899b31dc9779effb46c6_F5SustainableCybersecurity.pdf
5:00 pm - 6:00 pmReception, Exhibitors & Networking