If the handout download links from within past event articles are broken, please navigate to Chapter->Downloads to obtain the document.

2020 October Training Session

When: October 7, 2020 - 1300-1630
Where: Webinar
Registration: WebinarJam Website
Cost
ISACA-RTC Members - Free
CPEs: Upto 3
Handouts: Will Be Uploaded When available

Session I Best Practicies for Firewall Configuration and Policy Configuration

Speaker: Aaron Rose, Regional Architect for Check Point Software Technologies

Aaron Rose is Check Point Software Technologies' Security Architect for the Mid-Atlantic Region & Federal Division. A subject matter expert in Cloud technologies, Aaron has focused his career on securing organizations & their resources beyond the perimeter of the traditional network firewall. An avid international traveler, Aaron welcomed the opportunity to spend three months in Tel Aviv’ training with Check Point’s research & development teams at the company’s global headquarters. Prior to joining Check Point, Aaron worked for Cisco as a Cyber Security Partner Account Manager, and Presidio as a Cyber Security Technical Account Manager. Aaron received his Bachelor of Arts from the University of Kentucky and a Masters of Information Systems Security from the University of the Cumberland’s.

 Session II Managing and Auditing Cybersecurity – Data, Infrastructure and Applications
Seminar Objective/Background
After being on the audit side for the first half of his career 30-year career, the instructor has spent most of the last 15 years consulting full-time with systems development groups, Infrastructure groups and data centers, uncovering many cybersecurity control issues which were in many instances unknown to the most experienced auditors. The instructor has devised unique methods for performing compliance testing which disclose major gaps in an organization’s cyber security programs.
Seminar Length
One hour and 40 minute sessions
Who Should Attend?
This seminar is designed for senior IT Auditors, Security and GRC personnel.
Learning Outcomes
Attendees will achieve the following learning outcomes:
• Identify key network security deign initiatives required to prevent cyber security attacks
• Understand the key components to performing an effective Cybersecurity and data privacy audit
• Effective methods for implementing a Cybersecurity program
Seminar Outline
The following topics will be discussed:
• Cybersecurity overview
• Implementing a Cybersecurity program using the NIST and other frameworks
• Cybersecurity approaches when using third party service providers
• Conducting Cybersecurity and Assessments
• Alternatives to approaching the Cybersecurity Audits
• In-depth auditing techniques for Cybersecurity focus areas
o Network Security

• Implementing and Auditing Incident Management and Data Breach Handling processes which includes
enhances requirements mandated by Data privacy regulations

Speaker: Mitch Levine, Founder, Audit Serve Inc.

Mitchell Levine is the founder of Audit Serve, Inc. which is an IT Audit & Systems consulting company. For the last 29 years at Audit Serve, Mitch has split his time between traditional IT & Integrated Audit consulting projects, implementing solutions for the latest data privacy regulations, implementing IT Governance initiatives, performing assessments of Agile implementations and conducting pre & post-implementation reviews of system migrations. Mitch spends 220+ days per year consulting which is the basis for the material which is included in the seminars.

Over the past eleven years Mitch has presented over 115 seminars to twenty-five different ISACA & IIA chapters. Mitch also is the primary writer and editor of Audit Vision which is published bi-monthly and has a subscription base of over 3,500 audit & security professionals. Prior to establishing Audit Serve in 1990, Mr. Levine was an IT Audit Manager at Citicorp where his duties included managing a team of IT Auditors who were responsible for auditing 25+ service bureaus and the corporate financial systems


 

For more information and to register for the training session, please visit the ISACA RTC website.