J U N E , 2 0 1 5 Letter from the President Documents/The Password - 201… · Letter from the...

10
1 JUNE, 2015 INSIDE THIS ISSUE: Letter from the President 1 Next Meeting Agenda: Luncheon 2 Next Meeting: Pre & Post-Luncheon 3 News from ISACA International 4 ...and in other news 4 ISACA NTX Events Policy 5 Payments / Cancellations 6 A call for volunteers! 6 2014-2015 ISACA NTX Board & Coordinators 7 Conferences & Training Opportunities 8 ISACA NTX 2015 Spring Seminar! 9 Career Opportunities 10 Letter from the President It’s hard to believe another chapter year comes to a close this month. Our June meeting takes place on Thursday, June 11th at the Globe Life Park in Arlington (The Ballpark) - 1000 Ballpark Way, Arlington, TX 76011. Nitin Salvi with GM Financial presents "Architecting to Auditing Risk Based Controls" at the pre-session. Courtenay Thompson with Courtenay Thompson & Associates presents "Exploring Fraud in Technology Projects & Contracting" at our lunch session and Rick Brunner with GM Financial presents "Suggested/Recommended Audit Points in the Software Lifecycle (From thought to sunset)" at our post-session. Please register for this meeting on our web site at www.isaca-northtexas.org. Bonus Session: Following the post-session, the chapter Facilities team has arranged for a guided tour of the Ballpark for those interested. No advance reservation required – just leave some time in your schedule to stick around. Sorry – no CPE for this one :-) Our Spring Seminar, Auditing Web Applications, held June 1st – 3rd was a great success. If your company is interested in hosting a seminar or if you are interested in volunteering your time toward making our seminars successful please email the Education team at [email protected]. Our Summer Seminar, A Risk-Based Guide to IT Infrastructure Controls, will take place August 11 -13, 2015 at UTD. In this three-day seminar, attendees will explore the varied aspects of developing an effective risk-based IT audit plan and examine the use of risk-based standards and frameworks, including COSO ERM. The instructor will review such risk elements in IT audit planning as regulatory compliance risks, IT governance risks, business information risks and IT infrastructure risks. The seminar will also cover the increased risks introduced by outsourced IT operations and functions. Throughout this high- impact seminar, focus will be on developing an annual IT audit universe based on assessing enterprise information risks. Attendees will leave this intensive seminar with a proactive strategy that will help establish a comprehensive risk-based IT audit plan that will boost the efficiency and effectiveness of IT audits. This seminar will be taught by Mark Edmead, Senior Instructor for MIS Training Institute. Mark has developed and delivered courses for the SANS Institute, MIS Institute and the University of California San Diego, Institute of Internal Auditors (IIA), Technology Training Corporation, Professional Development Academy, and Learning Tree International. He is also an adjunct professor at Keller Graduate School of Management. Mark is a master trainer, facilitator, and storyteller and has a very energetic and entertaining style that keeps audience's attention from start to finish. Mark is a Certified COBIT 5 Assessor, TOGAF 9.1 Certified, Certified Baldrige Internal Assessor, Business Relationship Management Professional (BRMP), Certified Information systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and member of the Malcolm Baldrige National Quality Award Board of Examiners. Registration for this summer seminar will open soon. Watch our website and your email box for an announcement. I hope you have a terrific summer filled with family, friends, and hopefully, some vacation time! Laurie Flandrau, CISA, CRISC President – ISACA North Texas Laurie Flandrau Chapter President

Transcript of J U N E , 2 0 1 5 Letter from the President Documents/The Password - 201… · Letter from the...

1

J U N E , 2 0 1 5

I N S I D E T H I S

I S S U E :

Letter from the

President

1

Next Meeting

Agenda:

Luncheon

2

Next Meeting:

Pre &

Post-Luncheon

3

News from

ISACA

International

4

...and in other

news

4

ISACA NTX

Events Policy

5

Payments /

Cancellations

6

A call for

volunteers!

6

2014-2015

ISACA NTX

Board &

Coordinators

7

Conferences &

Training

Opportunities

8

ISACA NTX

2015 Spring

Seminar!

9

Career

Opportunities

10

Letter from the President It’s hard to believe another chapter year comes to a close this month. Our June meeting

takes place on Thursday, June 11th at the Globe Life Park in Arlington (The Ballpark)

- 1000 Ballpark Way, Arlington, TX 76011. Nitin Salvi with GM Financial presents

"Architecting to Auditing Risk Based Controls" at the pre-session. Courtenay

Thompson with Courtenay Thompson & Associates presents "Exploring Fraud in

Technology Projects & Contracting" at our lunch session and Rick Brunner with GM

Financial presents "Suggested/Recommended Audit Points in the Software Lifecycle

(From thought to sunset)" at our post-session. Please register for this meeting on our

web site at www.isaca-northtexas.org.

Bonus Session: Following the post-session, the chapter Facilities team has arranged

for a guided tour of the Ballpark for those interested. No advance reservation required – just leave some

time in your schedule to stick around. Sorry – no CPE for this one :-)

Our Spring Seminar, Auditing Web Applications, held June 1st – 3rd was a great success. If your company

is interested in hosting a seminar or if you are interested in volunteering your time toward making our

seminars successful please email the Education team at [email protected].

Our Summer Seminar, A Risk-Based Guide to IT Infrastructure Controls, will take place August 11 -13,

2015 at UTD. In this three-day seminar, attendees will explore the varied aspects of developing an

effective risk-based IT audit plan and examine the use of risk-based standards and frameworks, including

COSO ERM. The instructor will review such risk elements in IT audit planning as regulatory compliance

risks, IT governance risks, business information risks and IT infrastructure risks. The seminar will also

cover the increased risks introduced by outsourced IT operations and functions. Throughout this high-

impact seminar, focus will be on developing an annual IT audit universe based on assessing enterprise

information risks. Attendees will leave this intensive seminar with a proactive strategy that will help

establish a comprehensive risk-based IT audit plan that will boost the efficiency and effectiveness of IT

audits.

This seminar will be taught by Mark Edmead, Senior Instructor for MIS Training Institute. Mark has

developed and delivered courses for the SANS Institute, MIS Institute and the University of California San

Diego, Institute of Internal Auditors (IIA), Technology Training Corporation, Professional Development

Academy, and Learning Tree International. He is also an adjunct professor at Keller Graduate School of

Management. Mark is a master trainer, facilitator, and storyteller and has a very energetic and entertaining

style that keeps audience's attention from start to finish. Mark is a Certified COBIT 5 Assessor, TOGAF

9.1 Certified, Certified Baldrige Internal Assessor, Business Relationship Management Professional

(BRMP), Certified Information systems Security Professional (CISSP), Certified Information Systems

Auditor (CISA), and member of the Malcolm Baldrige National Quality Award Board of Examiners.

Registration for this summer seminar will open soon. Watch our website and your email box for an

announcement.

I hope you have a terrific summer filled with family, friends, and hopefully, some vacation time!

Laurie Flandrau, CISA, CRISC

President – ISACA North Texas

Laurie Flandrau Chapter President

2

...and elsewhere

Did you enjoy CACS last year? This year it’s in Vegas! Be sure to get

registered!

Time is running out! Get your colleagues to join ISACA by December

31st to win a tablet or other prizes!

Many of us think we have all the right answers...but how many of us

know the right questions? Submit your certification exam questions to

ISACA and get PAID!

Haven’t even taken that test yet? The June 2014 exams are now open

for registration.

The 2013 IT Risk/Reward barometer examines plans and perceptions of

many of the hot topics in our field, taken from members around the

world.

Have a passion for helping out your fellow IT geeks? Want to do more

within the community? Become an ISACA volunteer!

T H E P A S S W O R D

How much is too much when it comes to IT risk management?

Microsoft has joined the FIDO (Fast IDentity Online) alliance in an

attempt to move away from passwords to more secure means of

authentication. Sounds great...but surely nobody will ever guess “123456”

is your password?

P A G E 2

Scenes from our June meeting...

Pre & Post Luncheon on Page 3

Luncheon

Luncheon registration opens at 11:15 am Lunch served no later than 11:45 am

Speaker at 12:20 pm

Topic: “Exploring Fraud in Technology Projects & Contracting ”

Presenter: Courtenay Thompson, Courtenay Thompson & Associates

Description: Technology projects are always challenging but they are made even more difficult by fraud and corruption. This session will explore the role fraud plays in cost overruns and failed

projects. It will address bribery, improper gifts and entertainment and techniques used to deter detection and investigative response.

Speaker Bio: Courtenay Thompson is a recognized authority on training managers, auditors and

investigators in fraud-related matters. He has designed and presented courses on fraud prevention,

detection and investigation for business and government organizations worldwide. His courses are known for providing practical, proven approaches to real problems. These practical approaches have

yielded dramatic results for class attendees.

Courtenay’s experience prior to entering the consulting field includes public accounting, audit supervisor for consumer financial services for a large retailer, and director of auditing for a life insurance

company. His career in public accounting and internal auditing provided exposure to a number of types of impropriety including embezzlement, insurance fraud, loan fraud, stock fraud, kickbacks and bribery,

misappropriation of funds and mail fraud.

Courtenay received his BBA and MBA degrees from Southern Methodist University and is a Certified

Public Accountant. He is a member of the Institute of Internal Auditors, Inc., the American Institute of Certified Public Accountants, and the Texas Society of Certified Public Accountants. Objectives - Attendees will learn about:

Fraud in technology contracting.

Lessons from technology projects in the U.S. and other countries.

The role of bribery and kickbacks in selling and keeping projects going.

Program Level: Basic

Category: Specialized Knowledge & Applications

Prerequisites/Advance Preparation: None

Recommended CPE Hours: 1 per session

June Meeting Agenda When: Thursday, June 11th

Where: Globe Life Park in Arlington

1000 Ballpark Way

Arlington, TX 76011

Room: Hall of Fame off

Randol Mill Rd.

Parking: Lot B

BONUS!!! Stick around after the post-

session for a tour of the ballpark!

3

T H E P A S S W O R D

Pre-Luncheon 10:30 AM (Pre-Luncheon registration begins at 10:00 am)

Topic: “Architecting to Auditing Risk Based Controls" Presenters: Nitin Salvi, Infrastructure Security Architect, GM Financial

and Dan Seider, Infrastructure Security Architect, GM Financial

Description: Traditionally organizations have focused their security and controls on meeting the compliance requirements and the risks of failing a compliance audit. Recent changes in the Security threat environment (e.g. cyber terrorism) have prompted forward thinking executives to change their approach to risk based security and controls.

Speaker Bios: Nitin has over 22 years of experience across the fields of IT security, physical security, privacy, audit, and risk management. Nitin is currently an Enterprise Information Security Architect with GM Financial and has

worked for the Schlumberger; INS; Caremark and CVS. He is a graduate of Bombay University and currently holds the CISSP, TOGAF, SABSA, ITIL, PMP, CIPP, CIPP/IT, CISA, CISM, and CPISM. Nitin teaches CISA, CISSP and PMP certification classes for Crescent foundation, which is an nonprofit organization that supports unemployed community members to get jobs within IT.

Dan has more than 35 years of experience in information technology and security, specializing in enterprise architecture, security architecture, information architecture, secure systems and application design and development, secure system

engineering, information risks and controls, audit, and strategy and program management. Dan is currently an Enterprise Security Architect at GM Financial. Prior positions include the International IT Security

Manager (ISO) for GameStop, CIO for Thomas Group, and CIO for Good Shepherd Medical Center. He holds a Master’s degree and Bachelor’s degrees in Business and Bachelor of Architecture. All three degrees are from the University of

Arizona.

Objectives - Attendees will learn about:

Architecting Risk Based Security Controls

Baseline and Monitoring Controls

Developing an Audit Plan

-------------------------------------------------------------------------------------------------------------------------

Post-Luncheon 1:30 PM

Topic: “Suggested/Recommended Audit Points in the Software Lifecycle (From thought to sunset)” Presenter: Rick Brunner, AVP Security and Architecture, GM Financial

Description: What are some key audit points within a software lifecycle, for that matter does software even have a lifecycle? IT Auditors may have a solid grasp as to what these audit points are, or maybe they do not. Whether you do or not, the topic at hand is sure to raise one’s awareness, possibly challenge some others. Either way,

presentation will raise individual awareness and be a sanity check whether an organization has the “right” audit points, assuming “right” is properly defined.

Speaker Bio: Rick has more than 35 years’ experience in information security and technology, specializing in secure systems/application design and development, system architectures, information risks and controls, testing, and strategy and program management. Rick is an Assistant Vice President, Security Strategy and Architecture at GM Financial and has worked in Healthcare, Finance, Human Resources, Military, and Intelligence. Rick has 32 years of

military service, both active and reserves, rising to the rank of Colonel (0-6). He holds an Executive Jurist Doctorate degree, concentration in Law and Technology from Concord Law School; Master of Science degree in Computer Science, concentration in Information Systems Security from James Madison University; and a Bachelor of Science degree in

Mathematics and Computer Science from University of Texas at San Antonio. Rick is an Assistant Faculty member at Collin College , instructing courses in their cyber security program. Rick holds the following certifications: Certified Information Systems Security Professional (CISSP), SABSA Chartered Security Architect - Foundation Certificate (SCF),

and ITIL Foundation Certificate in IT Service Management.

Objectives - Attendees will learn about:

Define and gain an understanding into software and software lifecycle terms

Describe various software development models, with emphasis on identifying similar processes within the various

models

Identify suggested/recommended Audit Points within the

identified similar processes

Provide some thoughts on Software as a Service

Provide references for additional support or for conducting

individual research

P A G E 3

**Note about Presentations: ISACA North Texas can only post

presentations from monthly meetings that are provided by the speaker with their permission. If a presentation is not on the website it either means we have not been granted permission or the speaker has not provided us the presentation to post yet.

4

...and elsewhere

Did you enjoy CACS last year? This year it’s in Vegas! Be sure to get

registered!

Time is running out! Get your colleagues to join ISACA by December

31st to win a tablet or other prizes!

Many of us think we have all the right answers...but how many of us

know the right questions? Submit your certification exam questions to

ISACA and get PAID!

Haven’t even taken that test yet? The June 2014 exams are now open

for registration.

The 2013 IT Risk/Reward barometer examines plans and perceptions of

many of the hot topics in our field, taken from members around the

world.

Have a passion for helping out your fellow IT geeks? Want to do more

within the community? Become an ISACA volunteer!

T H E

How much is too much when it comes to IT risk management?

Microsoft has joined the FIDO (Fast IDentity Online) alliance in an

attempt to move away from passwords to more secure means of

authentication. Sounds great...but surely nobody will ever guess “123456”

is your password?

News from ISACA International ISACA has officially launched the Cybersecurity Nexus, a new security

knowledge platform and professional program that provides cutting-

edge thought leadership, training and certification programs.

Speaking of Cybersecurity, sign up today to attend the inaugural CSX

North America conference October 19th-21st!

Contribute to ISACA’s knowledge center - Gather and share

knowledge, and earn badges!

...and be sure to take advantage of ISACA’s available research and

publications!

Have a passion for helping out your fellow IT geeks? Want to do more

within the community? Become an ISACA volunteer!

P A G E 4

...and in other news Reading that a “moron” posting on social media led to U.S. bombing of ISIS

targets brings up a good question - What are your employees doing on social

media? Does your organization have good policies in place to limit exposure? Do

employees know about these policies?

You’ve probably heard by now of China’s recent breach of one of our federal

agencies (Office of Personnel Management). The Washington Post’s report on the

event outlines how the agency responded. Do you have a good Incident Response

Plan in place. What will you do when you’re breached?

In the latest exploit news, a vulnerability affecting Macs shipped prior to mid-2014 may

open a backdoor for malicious users to remotely overwrite your machine’s BIOS.

While Apple has fixed this in later releases, they have yet to release a firmware update

to address this issue.

SC Magazine’s report on MEDJACK (or “medical device hijack”) explains how attackers

are breaching healthcare networks through unpatched

devices, many of which are never turned off. These

are often closed systems that require a vendor’s

support for patching, leaving them vulnerable.

...and Dark Reading explains why we’re just on the

cusp of healthcare attacks and links to the latest

benchmark on security of healthcare data.

5

T H E PA S S W O R D

ISACA North Texas Events Policy 10/24/14

The ISACA North Texas Chapter offers three types of fee based programs: Chapter Monthly Meetings, CISA® and CISM® Review Courses, and Seminars. The chapter strongly encourages advance registration and payment for all events, as this reduces chapter expenses and the capacity for many of our events is limited due to the size of the event locations. Therefore, seats may not be available on the day of the event for walk-up registrants. The following table summarizes the chapter's payment and cancellation policies: Payment Policy All advance, online event registration payments will be made through CVENT. For advance, online

registrations, payment is accepted via Visa, MasterCard, American Express, Discover and PayPal. Advance registrations will not be accepted after the time noted above unless otherwise noted in online event

details. For Pay at Door registrations, credit card via Cvent, check, cash or Paypal payment at the door is required. For walk-in registrations, credit card via Cvent, check, cash or Paypal payment is required. Cancellation and Refund Policy The North Texas Chapter of ISACA (ISACA NTX) strives to provide appropriate facilities for meetings, seminars and certification review classes. Since facility providers and/or speakers require advance notice and financial commitment, ISACA NTX must balance those obligations against our members’ periodic need to cancel a reservation based on job requirements, illness or other circumstances. Upon receipt of e-mail notification to [email protected], ISACA NTX will refund prepaid fee according to the following deadlines:

Monthly Program Meetings - cancellations must be received by 6:00 PM three days prior to the meeting. Certification Reviews - cancellations must be received at by 6:00 PM eight days before the first class. Seminars - cancellations must be received by at least one week prior to the first day of the seminar. If

unusual cancellation terms are required based on speaker and/or venue, details will be included in the online event details.

Attendee substitution is permitted at any time until the event by contacting the Registration Coordinator at [email protected] and is subject to any additional charge for non-member fees. Cancellations and refund for advance registrations are allowed if cancellations are submitted to [email protected] by the deadline noted in the table above. Advance registrants who do not attend the event or do not cancel by the date noted in the table above are not eligible for a refund. Attendee substitutions are permitted at any time until the event, subject to any additional charge for non-

member fees. Inquire with Chapter Registration Coordinator at [email protected].

-->Please see Page 7 for table that summarizes payments & cancellations policy<--

P A G E 5

6

T H E PA S S W O R D P A G E 6

The following table summarizes the chapter's payment and cancellation policies:

Policy Chapter Monthly Meetings CISA or CISM

Review Courses Seminars

Payments

Advance registration payments accepted

Credit Card** (Visa/MC/AMEX/Discover) and PayPal**

Credit Card** (Visa/MC/AMEX/Discover), PayPal**, Check, and

Purchase Order (Invoice payment must be received by the

pre-registration deadline)

Credit Card** (Visa/MC/AMEX/Discover), PayPal**, Check, and

Purchase Order (Invoice payment must be received by the

pre-registration deadline)

Advance registration cutoff date

6:00 PM three days before the event

(May be earlier if a joint event with another organization that requires

earlier registration counts)

6:00 PM eight days before the first class.

6:00 PM two weeks prior to the first day of the seminar.

Walk-in registration payments accepted

Cash, Check, Credit Card** (Visa/MC/AMEX) and PayPal**

All attendees must pre-register for this event. Walk-in registration is not

permitted.

All attendees must pre-register for this event. Walk-in registration is not

permitted.

Cancellations

Cut-off date for cancellations

6:00 PM three days prior to the event.

6:00 PM eight days before the first class.

At least one week prior to the first day of the seminar.

Substitutions permitted for cancellations after

cutoff date?

Attendee substitution is permitted at any time until the event,

subject to any additional charge for non-member fees.

Inquire with Chapter Registration Coordinator at [email protected]

Attendee substitution is permitted at any time until the event.

Inquire with Chapter Registration Coordinator at [email protected]

Attendee substitution is permitted at any time until the event, subject to any

additional charge for non-member fees.

Inquire with Chapter Registration Coordinator at [email protected]

**Credit Card and Paypal only if you register electronically via Cvent on the chapter website

Call for Volunteers for 2015 -2016 Chapter Year!

It takes may people many hours to provide all the programs and services that the North Texas chapter provides to its members each year. In addition to the nine elected Board members the chapter is served by members who hold the appointed positions listed below. These positions can have one or more members holding the position.

Please let us know if you are interested in being appointed to any of these positions for 2015 – 2016 by emailing [email protected].

Position Reports to

Website Coordinator(s) VP Communications

Marketing Coordinator(s) VP Communications

Chapter Photographer (s) VP Membership

Jobs Coordinator(s) VP Membership

CPE Compliance Coordinator(s) VP Membership

Volunteer Coordinator(s) VP Membership

Position Reports to

Assistant Treasurer(s) Treasurer

Education Coordinator(s) VP Education

Certification Coordinator(s) VP Certification

Academic Relations Coordinator(s) VP Certification

Reservation Coordinator(s) VP Facilities

Newsletter Coordinator(s) VP Communications

7

2014-2015 ISACA North Texas Coordinators

P A G E 7

T H E P A S S W O R D

2014-2015 ISACA North Texas Board of Directors

Position Name Affiliation E-mail Address

President Laurie Flandrau GM Financial [email protected]

Secretary Iddah Wangondu Alliance Data [email protected]

Treasurer Brian Evans Briggs International [email protected]

VP Programs Carol Barke Barke & Associates, LLC [email protected]

VP Education Matthew Smith Independent Contractor [email protected]

VP Facilities Doug Gorrie Vendor Resource Management [email protected]

VP Communications Brittany George Weaver [email protected]

VP Membership Chris Jordan Quicksilver Resources Inc [email protected]

VP Certification Kyle Wess Ernst & Young [email protected]

1st Past President Greg Streder General Datatech, L.P. N/A

2nd Past President Marvin Reader Coalfire Systems N/A

3rd Past President Sue Pagel GameStop N/A

Position Reports to Volunteer(s) Affiliation

Assistant Treasurer Treasurer Sowmitha Kalyan Ernst & Young

Education Coordinator VP Education Sean McAloon Crowe Horwath

Certification Coordinator VP Certification Dariel Dato-on Ernst & Young

Certification Coordinator VP Certification Valerie Doty Santander Consumer USA

Academic Relations Coordinator VP Certification Jose Lineros University of North Texas

Reservation Coordinator VP Facilities Leslie Norwood Ocwen Financial Corporation

Newsletter Coordinator VP Communications Ian Connors Crowe Horwath

Website Coordinator VP Communications Jeff Kromer UT Southwestern

Marketing Coordinator VP Communications Shirley Walker JCPenney

Marketing Coordinator VP Communications Neha Patel Weaver

Chapter Photographer VP Membership Zac Taylor Grant Thornton

Jobs Coordinator VP Membership Joe McKeman IBM

CPE Compliance Coordinator VP Membership Lisa Bartsch Capital One

Volunteer Coordinator VP Membership Eryn Shields GM Financial

8

P A G E 8 T H E PA S S W O R D

Upcoming Conferences & Training

Opportunities

Gartner’s Security & Risk Management Summit takes place in the Washington DC area

June 8-11. Register and get more details here!

ISACA International and Deloitte LLP, are bringing a unique healthcare IT training course

to Dallas, Texas, USA, 20-23 July 2015. See next page for details!

2015 GRC - An ISACA/IIA collaboration - This year’s GRC conference takes place at the

historic Arizona Biltmore hotel in sunny Phoenix, AZ, August 17-19, where you can earn

up to 18 CPE! Register!

A little further down the road, EuroCACS is taking place in Denmark November 9-11,

2015. This mega-conference gets you a whopping 39 CPE! Early bird registration until

September 2nd saves you $200.

Don’t have time for all that travel? Try one of ISACA’s virtual conferences! The latest

covers Mobile Security for the enterprise environment and will earn you 5 free CPE!!!

Travel AND time-constrained? Check for free webinars with ISACA that are short and

sweet ways to earn that extra hour of CPE.

Get more CPE!

9

P A G E 9 T H E PA S S W O R D

ISACA and Deloitte Bring Healthcare IT Training to Dallas

ISACA International and Deloitte LLP, are bringing a unique healthcare IT training course to Dallas, Texas, USA, 20-23 July 2015. The four-day instructor led course will provide participants with an overview of current healthcare IT topics as well as an update on regulatory issues, trends and future reform that affect IT audit professionals. The course is designed for IT auditors, information security professionals, finance, business process and compliance auditors and CIO and IT executives in healthcare. Learning objectives of the course include:

Describe healthcare background and trends and anticipated changes

Navigate through the healthcare industry in an era of reform

Gain a deeper understanding of the hot IT related topics in the healthcare industry

Analyze the framework, requirements, and challenges of the most pressing healthcare IT issues “Healthcare is one of the fastest growing and dynamic industries for IT professionals,” said Robert E Stroud, CGEIT, CRISC, international president of ISACA and vice president of strategy and innovation at CA Technologies. “Designed and presented in conjunction with Deloitte, this training course will be valuable to healthcare IT professionals who need to know the latest about audit and security as well as anticipated challenges and reforms.”

“We are very proud of the opportunities this course provides IT auditors to enhance the skills they need to help their organizations and take their careers to the next level,” said Tim Okrie, Internal Audit Transformation partner at Deloitte & Touche LLP. The ISACA Deloitte Training Course, which includes course materials, is US $2,495 for ISACA members and US $2,695 for nonmembers. Participants are eligible to earn up to 32 continuing professional education (CPE) hours. For additional ISACA Training Week information and to register, please visit www.isaca.org/training.

Who ISACA and Deloitte

What Healthcare Information Technology

When 20-23 July 2015

Where 2200 Ross Ave, Suite 1600, Dallas, Texas 75201

Web site www.isaca.org/training

10

Current Career Opportunities P A G E 1 0

The Password is a free copyrighted publication of the North Texas Chapter of ISACA. It is published periodically from August through June. It is objective of the North Texas Chapter of ISACA to be a forum of free expression and interchange of

ideas. Statements of position or expressions opinion appearing herein are those of the authors and not, by the fact of publi-cation, necessarily those of ISACA or the North Texas Likewise, the publication of any advertisement is not construed

to be an endorsement of the product or service offered unless specifically

Copyright 2015 ISACA North Texas Chapter

all rights

Questions? Comments? Corrections? Please advise us at [email protected] T H E P A S S W O R D

Job Title Company Location Category Career Level Post Date Exp. Date

Sr. IT Security Architect Cyber

Defense (Nuclear environment) Energy Future

Holdings Dallas, Texas Permanent Management 1/15/2015 6/30/2015

Lead Third Party Information Security

Assessor Citi Irving, TX Permanent Non-Management 2/23/2015 6/30/2015

Sr. Auditor, Internal Audit Ocwen Financial Coppell, TX Permanent Non-Management 3/3/2015 6/30/2015

Senior Manager, Internal Audit Ocwen Financial Coppell, TX Permanent Management 3/3/2015 6/30/2015

Lead IT Auditor, Internal Audit Ocwen Financial Coppell, TX Permanent Management 3/3/2015 6/30/2015

Senior Corporate Auditor

(Integrated) Dr Pepper Snapple

Group Plano, Texas Permanent Non-Management 3/11/2015 6/30/2015

Information Security Analyst Texas Capital Bank Richardson, Texas Permanent Non-Management 3/23/2015 6/30/2015

Internal Auditor Fossil Corporate Dallas, TX Permanent Non-Management 3/23/2015 7/1/2015

Senior IT & Financial Auditor Fossil Corporate Dallas, TX Permanent Non-Management 3/23/2015 7/1/2015

Manager, Information Risk - Risk

Intelligence (Assessments) Santander Consumer

USA Dallas, TX Permanent Non-Management 4/14/2015 6/30/2015

Lead IT Compliance Analyst TXU Energy/Energy

Future Holdings Irving, TX Permanent Non-Management 4/19/2015 7/31/2015

Risk and Control Advisor, Technology

Audit Depository Trust &

Clearance Corporation Coppell, TX Permanent Non-Management 4/23/2015 7/31/2015

IS Senior Auditor Addison Group Irving, Texas Permanent Non-Management 5/6/2015 7/31/2015

Control Specialist Sr ( req#

1501820) BNYMellon Dallas, TX Permanent Non-Management 5/11/2015 6/29/2015

Control Specialist Sr ( req#

1501820) BNYMellon Dallas, TX Permanent Non-Management 5/11/2015 6/29/2015

Data Analytics Specialist Weaver Dallas, Texas Permanent Non-Management 5/12/2015 6/30/2015

Internal IT Auditor Associa Dallas, TX Permanent Non-Management 5/12/2015 8/1/2015

Sr. Information Systems Auditor Mary Kay Inc. Addison, TX Permanent Non-Management 5/12/2015 8/1/2015

IT Auditor (Entry to Sr. level) Aquarius Professional

Staffing Dallas, TX Permanent Non-Management 5/20/2015 8/1/2015

Analyst - IT Compliance Energy Future

Holdings Downtown Dallas Permanent Non-Management 5/20/2015 7/31/2015

Senior Information Technology

Auditor University of North

Texas System Internal Denton, TX Permanent Non-Management 6/1/2015 6/29/2015