Monday 04/03/2017 | ||||||||||||||||
![]() | Registration - Continental Breakfast, Exhibitors & Networking | |||||||||||||||
![]() | Life Would Be Easy If It Weren't For Other People Speaker: Connie Podesta, Founder, CEO, Owner, President, Connie Podesta Presents Difficult people? Move over! Crazy demands? Under control! Critical conversations? No problem! Imagine what you could accomplish if you could decode the mystery of human behavior and truly understand what makes people do what they do and say what they say (including yourself!). Research shows that the #1 key to SUCCESS is the ability to get along with other people. At work and at home. With laugh-out-loud humor, killer take-away
strategies and her amazing insights into
ourselves and others (including a few who
“drive you crazy”), Human Relations expert
Connie Podesta will both challenge you
and empower you with the knowledge
you need to get along better with the
people in your life. Connie will take you
right inside the minds and personalities of
the people you deal with every day--bosses,
colleagues, partners, customers, friends,
and family-- so YOU can ACT, rather than
REACT to whatever life throws your way.
Get ready for less stress and more success!
| |||||||||||||||
![]() | Transition and Refreshment Break, Exhibitors & Networking | |||||||||||||||
![]() | Optimizing Your Three Lines of Defense for IT Risks - Enhancing Your Information Technology Internal Audit Plans Speaker: Scott Shinners, Director, Risk Advisory Services, RSM US LLP The learning objectives for this session are: 1. Discuss optimal IT risk management processes
2. Discuss the impact of the “Three Lines of Defense Model” on IT Internal Audit
3. Provide examples and recommendations to improve your IT internal auditing function and how to help your organization improve it’s IT risk management using the “Three Lines of Defense Model”
We will discuss optimal IT risk management processes and governance models using more advanced implementations of the IIA’s “Three Lines of Defense Model”. We will also discuss the role of other IT Risk management models such as COBIT, NIST, and others in connection with the implementation of the “Three Lines of Defense Model” as well as the role and impact on IT Internal Audit following an organization’s successful deployment of the more advanced “Three Lines of Defense Model”. The presentation will conclude with a model for your consideration that will allow you to further enhance your IT internal audit function. We will provide examples drawn from discussions with practicing corporate internal audit groups, real world practice summaries drawn from interviews with internal audit and IT management leaders in industry, and recommendations drawn from those experiences to help you improve your IT internal audit risk assessments and IT internal auditing activities to improve IT risk management processes, IT security, and other IT processes in relation to the model.
| |||||||||||||||
![]() | Transition Break, Exhibitors & Networking | |||||||||||||||
![]() | Accountability. Responsibility. Culpability. Welcome to Life Under a Microscope Speaker: Jarrett W. Kolthoff, CEO, Speartip Cyber Security now lies squarely on the shoulders of Senior Executives and Directors. This presentation highlights the core tenants of Cyber Counterintelligence operations that guide Senior Executives and Directors to address regulatory/legal requirements and corporate risk. A discussion of recent “real-world” cyber counterintelligence case studies to assist today’s business leaders in overseeing and implementing cyber risk management initiatives. https://www.eiseverywhere.com/file_uploads/eba5d437525a6a836bf07b2e579d85f2_C5ProcessMiningAnalyticsforInternalAuditors.pdf | |||||||||||||||
![]() | Lunch Lunch Menu:
| |||||||||||||||
![]() | Transition Break, Exhibitors & Networking | |||||||||||||||
![]() | Get Ready for The Gen Z Effect Speaker: Tom Koulopoulos, Author The Gen Z Effect, Futurist, Keynote Speaker, Inc 500 CEO, Delphi Group Drawing from his book, The Gen Z Effect, Tom Koulopoulos delves into a vision of the future that will disrupt every aspect of how we work, live and play. From radical new approaches to marketing and manufacturing to the potential obliteration of intellectual property and the shift to massively open online classrooms, he provides a mind-bending view of why we will need to embrace Gen Z as the last best hope for taking on the world's biggest challenges and opportunities, and how you can prepare yourself and your business for the greatest era of change and advancement the world has ever experienced. | |||||||||||||||
![]() | Transition and Refreshment Break, Exhibitors & Networking | |||||||||||||||
![]() | Why Moving to the Cloud Doesn't Make You Secure Speaker: Joe Meyer, Director of Risk Management & Governance, NCC This discussion is to review cloud integration, migrations, but isn’t meant to focus on the technical acumen of cloud technology or on how to actually “secure” the cloud. This is an educational webinar on setting clarification on what it means to move to the cloud and advice of best practices based on past experiences. Additionally, we will look to provide "real-world” advice on how to mitigate roles and responsibility errors in the cloud and how to address the risk and compliance elements within a cloud based solution. This is a non-technical discussion focused on where your organization’s responsibility begins and ends with your cloud vendor plus advice on navigating the risk and compliance elements within a cloud based solution. https://www.eiseverywhere.com/file_uploads/024216fa8cc1656c2f0b2f0bd44bae66_E5WhyMovingtotheCloudDoesntMakeYouSecure.pdf | |||||||||||||||
![]() | Transition Break, Exhibitors & Networking | |||||||||||||||
![]() | Sustainable Cybersecurity Management: Why It’s Critical to Review Your Program Now Speaker: Tom Wojcinski, Director, Baker Tilly Speaker: Iriana Arias-Chizek, Manager, Baker Tilly The presentation will provide an overview of the latest cybersecurity developments and how the risk landscape is changing. Tom will walkthrough examples of each phase of the cybersecurity management program including data classification, security controls implementation, and breach preparedness. Attendees will be able to gather key insights on cybersecurity program effectiveness and sustainability for executive leadership, management and boards. Attendees will also walk away with five key considerations for cybersecurity risk management that they can begin to apply to their organization immediately. https://www.eiseverywhere.com/file_uploads/bd185cc34c02899b31dc9779effb46c6_F5SustainableCybersecurity.pdf | |||||||||||||||
![]() | Reception, Exhibitors & Networking |