Data Connectors Raleigh Tech Security Conference

Data Connectors will be hosting the Raleigh Tech-Security Conference in Raleigh on Thursday, April 7th, 2016, at The Hilton North Raleigh-Midtown Hotel.  This conference will have 12 companies speaking on various IT Security topics such as cloud security, compliance, social media security, personal devices security, network security and more, as well as a vendor exhibit area featuring more than 40 vendor exhibits.  We give away numerous door prizes such as iPads, gift cards, Kindles, cash and more.  We also provide breakfast and a full lunch for our attendees.

2016 Raleigh Tech-Security Conference
 
Place: Hilton North Raleigh-Midtown 3415 Wake Forest Rd. Raleigh, NC 27609
Date:  Thursday, April 7th, 2016 8:15am-5:00pm

Registration: Register for your FREE VIP Pass

  • VIP passes include Breakfast, Lunch, Conference materials and Entrance into conference sessions and exhibit areas.
  • This conference qualifies for CPE credits and Certificates of Attendance.
  • Gift Cards, iPads, Kindles and many other door prizes and give aways.
  • Featuring (11) IT Security speakers and over 30 exhibits!!

Call For Papers: SSR 2015

                    Call for Papers (SSR 2015)

          SSR 2015: 2nd International conference on Security
                       Standardisation Research

              15th-16th December 2015, Tokyo, Japan
                        http://ssr2015.com


Background

Over the last two decades a very wide range of standards have been developed covering a wide range of aspects of cyber security. These documents have been published by national and international formal standardisation bodies, as well as by industry consortia. Many of these standards have become very widely used - to take just one example, the ISO/IEC 27000 series has become the internationally adopted basis for managing corporate information security.

Despite their wide use, there will always be a need to revise existing security standards and to add new standards to cover new domains. The purpose of this conference is to discuss the many research problems deriving from studies of existing standards, the development of revisions to existing standards, and the exploration of completely new areas of standardisation. Indeed, many security standards bodies are only beginning to address the issue of transparency, so that the process of selecting security techniques for standardisation can be seen to be as scientific and unbiased as possible.
Conference scope

This conference is intended to cover the full spectrum of research on security standardisation, including, but not restricted to, work on cryptographic techniques (including ANSI, IEEE, IETF, ISO/IEC JTC 1/SC 27, ITU-T and NIST), security management, security evaluation criteria, network security, privacy and identity management, smart cards and RFID tags, biometrics, security modules, and industry-specific security standards (e.g. those produced by the payments, telecommunications and computing industries for such things as payment protocols, mobile telephony and trusted computing).

Read more: Call For Papers: SSR 2015

NC Data Analytics User Group June Meeting

Please join us for the June NC Data Analytics User Group meeting.

Date and time: June 18, 2014 from 2 to 4 PM

Location: Duke University PRMO, 5213 S Alston Avenue, Durham, NC

Agenda:

IDEA Demonstration

This is another installment in the series of introducing alternative tools to ACL as we refocus from ACL to data analytics in general and embrace any data analytics software available on the market.

What’s New in Continuous Auditing

Since the late 1990’s, Rutgers University has operated an Accounting Research Center that includes a special focus on continuous auditing. In fact, in November 2014 Rutgers will be hosting the 33rd World Continuous Auditing and Reporting Symposium (WCARS). Multiple representatives from Charlotte-based Visual Risk IQ have attended many of these previous symposia, and Joe Oringel, a Managing Director from Visual Risk IQ will be on hand for our June meeting to share what he learned from the 2013 symposium and why he would like to return in November.

• What’s new in data analytics and continuous auditing

• External and Internal Audit perspectives on continuous auditing

• Emerging themes/trends

Visualization

Big Data

Text Analytics

Workflow

Cloud

Which firms are leading edge in analytics and continuous auditing?

Please send your RSVPs to Marysol Colon at This email address is being protected from spambots. You need JavaScript enabled to view it.

Invitation to the 2014 Mid Atlantic District II Conference

We are very excited to announce the 2014 IIA Mid-Atlantic District II Conference to be held on March 11-12 at the Grandover Resort in Greensboro, NC. Each day consists of two distinct tracks targeted to your training needs; feel free to mix and match the courses that catch your interest to make the most of your conference experience while earning up to 16 CPE credit hours! Breakfast, lunch, and snacks will be provided each day, and a happy hour will be sponsored by McGladrey, LLC, on the evening of March 11. We are thrilled about the lineup that our chapter has been able to put together this year, including some of the following topics: 

• Running Internal Audit like a Business
• Succession Planning
• Cutting Edge Audit Techniques
• Data Protection: What is Your "Exposure Factor"? 
• Practical Implementation of 360 Feedback
• Risk Management for Today's IT
• Developing Your Personal Leadership Legacy

And much more to come! 

Register by February 14 to take advantage of the early bird discount. Larger groups of 3 or more may be eligible for discounts as well; contact us for more information. A limited number of rooms are available at the Grandover Resort and Conference Center at a special discounted rate until February 14.

 

Register today - You won’t want to miss this amazing training and networking opportunity!

Click on the links below for more information and registration.

 

 

When:               Tuesday, March 11, 2014 – Wednesday, March 12, 2014

Where:              Grandover Resort and Conference Center 

1000 Club Road

Greensboro, North Carolina 27407

 

Attire:                Business Casual Attire

 

                       

 

                        View Event Summary

                        View Event Agenda

 

Click here to register!

2014 Raleigh Tech-Security Conference


This posting is for informational purposes only and does not indicate ISACA RTC's endorsement of the conference, speakers or sponsors

 

Place:            Hilton North Raleigh/Midtown
3415 Wake Forest Road, 
Raleigh, North Carolina, 27609-7330

 

Date:            Thursday, January 16th, 2014   8:15am-5:00pm

Click on the following link to register for your free VIP pass:

http://www.dataconnectors.com/events/2014/01Raleigh/inv_np.asp

 

VIP passes include Breakfast, Lunch, Conference materials and Entrance into conference sessions and exhibit areas.
This conference qualifies for CPE credits and Certificates of Attendance.
Gift Cards, iPads, Kindles and many other door prizes and give aways.
 Featuring (11) IT Security speakers and over 30 exhibits!!

 For full conference agenda click on:

http://dataconnectors.com/events/2014/01Raleigh/agenda.asp

or call Chris Meier at 636-778-9495 for more information.

This email address is being protected from spambots. You need JavaScript enabled to view it.

Raleigh ISSA CISSP Review Study Group

Raleigh ISSA would like to invite ISACA members to participate in our upcoming study group for the CISSP exam.

::: CISSP REVIEW REGISTRATION:::

Registration is OPEN! See details on the website event at http://raleigh.issa.org/i/ai1ec_event/cissp-review-2013/ and register using "Buy Tickets" there. Registration is processed via EventBrite. The study group will review the CISSP 10 Domains, with instruction led by CISSP-certified ISSA members. Meetings are 3 Saturdays in April and May, from 8am-3pm each day.

Saturdays, April 13th, April 27th and May 4th

FOR INFO ON THE REVIEW GROUP please contact David Vaughn & Robert Pitney at This email address is being protected from spambots. You need JavaScript enabled to view it.

Triangle InfoSecon October 21

Only three (3) days and a wake up until our Sixth Annual Triangle InfoSec Conference, on Thursday, October 21st, 2010. Don't miss out!

The Early Bird Registration deals closed. However, the standard registration fee is still a great value!  Attending the conference is worth valuable CPEs, learning about leading edge ITSec technologies, concepts and products from expert technologists and 25 exhibitors.

 

Read more: Triangle InfoSecon October 21

NC OWASP - Pete Herzon from ISECOM

On October 14th from 6:30-8:30PM, Pete Herzog from ISECOM will be presenting at the local OWASP chapter meeting on web application security. Pete is the founder of ISECOM, a non-profit organization that has created the OSSTMM (Open Source Security Testing Methodology Manual), and

Read more: NC OWASP - Pete Herzon from ISECOM