|
London Chapter Events
2003/2004
| Timing |
Venues |
| All Technical Presentations
take place on the
fourth Thursday of each month (except December) and will commence at 5.30
pm. |
ABN
Amro, 250 Bishopsgate, EC2M 4AA, Map
KPMG, 8 Salisbury Square, EC4Y 8BB, Map
KPMG, 20 Farringdon Street, London, EC4 Map |
| Booking |
Charges |
| Places are limited.
Please book ahead to secure your seat. Use
(Online Registration)
or contact Christine to reserve your
place. |
There is no charge for members but a charge
of £20.00 will be payable for non-members. |
| Date |
Subject |
CISA *
CISM ** |
Speaker |
Venue |
| 25 Sep 2003 |
Corporate
Governance/CoBIT &
Making a Start with CobiT
(presentation
.zip 1.4MB)
|
6
1 |
Gary Hardy
Roger
Southgate |
ABN-Amro
250 Bishopsgate |
| 30
Oct 2003 |
IT
Risk Management - A Case Study
(presentation
.pdf 481KB)
|
7
2 |
John
Mitchell |
ABN-Amro
250 Bishopsgate |
| 27 Nov 2003 |
SAP
Security and Auditing Tools
(Presentation
.pdf 1.96 MB)
|
2
4 |
Jason Viola |
ABN-Amro
250 Bishopsgate |
| 18 Dec 2003 |
Email and
other messaging security
(presentation
.ppt 102 KB)
|
3
3
|
Allan Boardman
|
ABN-Amro
250 Bishopsgate |
| 22 Jan
2004 |
Web
application hacking and how to defend against it
(presentation
.pdf 2.53MB)
|
3
5
|
Peter Wood
|
ABN-Amro
250 Bishopsgate
|
| 26
Feb 2004 |
"Human
Rights Act", privacy in the context of email auditing
(presentation
.ppt 56 KB)
|
1
1 |
Neil
Barrett |
ABN-Amro
250 Bishopsgate |
| 25
Mar 2004 |
Auditing
the Outsourcing of IT
(presentation
.ppt 137 KB)
|
2
4 |
Tim
Wright |
ABN-Amro
250 Bishopsgate |
| 22
Apr 2004 |
Security
built-in through a structured service
|
3
4 |
John
Smith |
ABN-Amro
250 Bishopsgate |
| 27
May 2004 |
How
to audit an ERP system via the risk management route
(presentation
.ppt 2.39 MB)
|
6
2 |
Gabriel
Lung |
ABN-Amro
250 Bishopsgate |
| 24
Jun 2004 |
Real
Life Security Incidents
|
3
5 |
David
Ramirez |
ABN-Amro
250 Bishopsgate |
2002/2003
Events | 2002/2001
Events | 2000/2001
Events
| 1999/2000 Events
* CISA Domains
1.
Management,
Planning and Organisation of IS
2.
Technical Infrastructure and Operational Practices
3.
Protection of Information Assets
4.
Disaster Recovery and Business Continuity
5.
Business Application System Development, Acquisition,
Implementation and Management
6.
Business Process Evaluation and Risk Management
7.
The IS Audit Process
** CISM Domains
1.
Information Security Governance
2.
Risk Management
3.
Information Security Program(me) Management
4.
Information Security Management
5.
Response Management
|