60th IIA Chicago Annual Seminar
 
Monday 03/08/2021
7:30 am - 8:00 amOpen Webinar, Virtual Exhibitors & Networking
8:00 am - 8:10 amPresidents Welcome & 60th Anniversary Celebration
8:10 am - 9:25 amKeynote - Nonverbal Communication Skills that Display Trust, Exhibit Ethical and Professional Truths and Demonstrate Respect During Virtual Conversations and from 6 Feet Away
Speaker: Jan Hargrave, Body Language Expert, Jan Hargrave & Associates

It’s a scientific fact that a person’s body gestures give away his true intentions.  Actually, over ninety percent of all face-to-face or face-to-computer conversations derive from nonverbal clues. Conveying competent and ethical behavior, both on virtual conversations and from 6-feet away, is of utmost importance.

Since our body language, the most crucial and sound part of our personality, “speaks the loudest,” it is imperative that we learn how to apply appropriate and deliberate nonverbal gestures that display confidence, exude integrity and create a sense of trust during virtual calls.  Since social distancing conditions seem to intensify uncertainty and fuel anxiety, every aspect of our role as tax preparers is now magnified and complicated.

Body language expert Jan Hargrave teaches you the ways in which your body communicates to the world around you.  As the nation’s leading behavioral authority, Jan will provide you with the nonverbal behaviors/practices that exude trust, display competence and build credibility during virtual conversations and at in-person events.  Discover how to:

  • Communicate ideas clearly, impressively and powerfully during conversations.
  • Engage the fundamentals of ethical and professional nonverbal intelligence (NI) as set forth in the IPT guidelines for all members.
  • Demonstrate respect for the key moral principles of honesty, professionalism, and dignity.
  • Employ the “TRIPLE-THREAT-Communication Method.”  Learn to demonstrate meaningful eye contact, purposeful gestures and intentional body posture to develop clarity during virtual meetings or in-person events.
  • Become familiar with the facial expressions of emotions (interest, curiosity, attention, contempt, anger, disgust, happiness).  
  • Detect fraudulent/deceptive claims: learn to read the “micro-expressions” of deception, craftiness and cunningness during conversations.
  • Decipher quick ways to sharpen rapport and likeability through mirroring and matching.

 

CPE: 1.5 hours

Field of Study: Communication

Knowledge Level: Basic

Prerequisites: None

9:25 am - 9:40 amTransition Break, Virtual Exhibitors & Networking
9:40 am - 10:30 amCloud Governance and Security
Speaker: Steven Randall, Partner, Vonya Global
Speaker: Earl Potjeau, Director, Information Technology Audit Services, Vonya Global

In this session, we define cloud governance and explain its role in achieving security, compliance, and architecture best practices. We will also present how Internal Audit can assess the information security processes for data stored in the cloud.

Cloud solutions continue to be adopted at a rapid rate as Cloud Service Providers offer flexible computing and storage needs, easier collaboration with internal users and customers, added security features, and more; allowing organizations to focus on their core business functions. While the adoption of cloud services and resources offers many benefits, it also raises significant risks. It is important to establish governance procedures to ensure the successful, sustainable adoption of cloud computing and cloud services.

We will demonstrate how Internal Audit can determine whether the IT organization has put in place processes to actively identify and inventory all cloud services in use, including the data being stored within each cloud services provider’s environment, and how to determine whether the IT organization has processes in place to manage cloud services.

Cloud governance is not a “one and done” activity. To keep up with innovations in technology and business models, governance must be reviewed and maintained.

The learning objectives for this session are:

  1. Provide overview of Cloud Governance and Cloud Security
  2. Present top risks that auditors should understand
  3. Demonstrate audit procedures

CPE: 1 hour

Field of Study: Auditing

Knowledge Level: Basic

Prerequisites: None

10:30 am - 10:45 amTransition Break, Virtual Exhibitors & Networking
10:45 am - 11:35 amCybercrime - A Conversation with the Department of Justice
Speaker: Melody Wells, Assistant United States Attorney, Department of Justice

During this session, participants will learn what the DOJ does to protect us from cybercriminals. Participants will have the opportunity to ask questions and guide the conversation.

CPE: 1 hour

Field of Study: Auditing

Knowledge Level: Basic

Prerequisites: None

11:35 am - 12:30 pmLunch Break, Virtual Exhibitors & Networking
12:30 pm - 1:45 pmKeynote - The Power and Value of Artificial Intelligence
Speaker: Tanmay Bakshi, Artificial Intelligence Engineer

Artificial intelligence or “AI” is often referred to though the capabilities of AI are generally not well understood as well as the value that may be obtained. There isn’t yet even a single set of AI terminology that can be agreed upon to use. Tanmay will answer the questions of what AI is, what it's capable of, what it’s not capable of, and how might AI be used by internal auditors in their professional and personal lives.

During the presentation, Tanmay will display transforming examples of this power.

CPE: 1.5 hour

Field of Study: Information Technology

Knowledge Level: Basic

Prerequisites: None

1:45 pm - 2:00 pmTransition Break, Virtual Exhibitors & Networking
2:00 pm - 2:50 pmLessons Learned from a Pandemic - Remote Workforce Security
Speaker: Anthony Catalano CISSP, CISA, PCI QSA, Director, Risk Consulting, RSM US LLP

The shift to remote workforces has proven to be a long-term one, and cybersecurity measures are critical as attacks continue to increase exponentially. Businesses need to ensure protection from cyberattacks for not only their perimeter, but also their end points, and we’ve found many businesses fall short.

In this webcast, we’ll share six examples of prevalent remote workforce mistakes, their implications for your business, and what you can do to address them.

CPE: 1 hour

Field of Study: Auditing

Knowledge Level: Intermediate

Prerequisites: None

2:50 pm - 3:20 pmTransition Break, Virtual Exhibitors & Networking
3:20 pm - 4:10 pmAligning Your Audits with Leadership’s Cybersecurity Questions
Speaker: Nathan Anderson CRISC, CISA, Senior Director, Internal Audit, McDonald's Corporation
Speaker: Titus Weijma, McDonalds
Speaker: Lucas Morris, Crowe

Cyber security is and will remain a key focus for our boards and audit committees. The traditional skillset for IT Audit limits our ability to assess and provide assurance over cyber security risks. Turning to third parties can help, but the demand for cyber security assurance is great, and the coverage that third parties can provide is limited based on traditional budgets.

To address the gap between our skillset and the demand for cyber security assessments, McDonald's has partnered with a third party to develop a “penetration testing light” assessment that IT Audit can deliver. This increases the engagement of our team, as internal audit is growing its skills and assessing the most relevant risks for the organization. This also enables internal audit to leverage our third-party partners more strategically, providing them with assessments that are more challenging and targeted.

During this session, we will take you through our journey, covering the following topics:

  1. Identifying and measuring the organization’s cyber security assessment gap
  2. Making the case for building a “Penetration Testing Light” service in IT Audit and designing the assessment based on the organization's needs
  3. Identifying and hiring IT Auditors that are ready for the cyber security metamorphosis as well as selecting a third party to be your trusted advisor and training partner
  4. Partnering with Information Security and legal to ensure that your assessments are safe, sanctioned, and best serve to improve security in your organization

After completing this session, participants should be able to:

  1. Learn about the latest cybersecurity trends
  2. Understand how teams typically evaluate cybersecurity risks
  3. Understand leading methods used to evaluate cybersecurity risks
  4. Learn from an audit team’s penetration testing experience

CPE: 1 hour

Field of Study: Auditing

Knowledge Level: Basic

Prerequisites: None

4:10 pm - 4:25 pmTransition Break, Exhibitors & Networking
4:25 pm - 5:15 pmKeynote - Storytelling With Data: Bringing Data to Life through Pictures and Stories
Speaker: Cole Nussbaumer Knaflic, CEO, Storytelling with Data
Stories resonate and stick with your audience in ways that data alone does not. Why wouldn’t you leverage the power of story when communicating with data? Join this engaging session, during which Cole Nussbaumer Knaflic demonstrates the untapped potential of combining the magic of story with best practices in data visualization for communicating effectively with data. You'll leave the session inspired to bring your data to life and make it a pivotal point in an overarching story that motivates your audience!

CPE: 1 hour

Field of Study: Auditing

Knowledge Level: Basic

Prerequisites: None

5:15 pm - 6:00 pmVirtual Reception: Award Ceremony and Giveaway Raffle