Cyber Security of the Supply Chain
With over 76% of all data breaches resulting from a third-party which introduced the security deficiencies that were ultimately exploited, it is critical that organizations... Read More
The Cybersecurity Game – How Are You Playing?
We live in a world where conversations are held and relationships are built using social media. We share our thoughts, experiences, and other personal information... Read More
Managing Evolving Cyber Security Threats
Session description will be available soon.
Security and Privacy: A Practical Approach
The world has moved from one where information is centralized and shared on an “as needed’ basis to a restricted group of people to a... Read More
Information Technology Outsourcing (ITO): Fact, Fiction and my life as a convicted Felon
Increasingly, organizations are embracing outsourcing as an opportunity to thrive or survive during uncertain economic times. The promise of enhanced service delivery, scalable workforce, and... Read More
Auditing your Organization’s Cyber Security Posture in a Rapidly Changing World
Auditing an Organization’s Cyber Security Posture will be jointly presented by an internal audit (IA) specialist, an IT security professional and the City of Ottawa’s... Read More
Auditing Smart Devices
According to some of the industry experts, the security and management of smart devices like iPads, iPhones and Android phones are quickly becoming the weakest... Read More
Data analytics and continuous auditing: Leveraging the organisation’s data management program to improve efficiency
In this session, the following topics will be covered: – The Caisse, its business context and its Internal audit team – Our existing... Read More
Auditing Big Data
As organizations embark upon the use of big data and perform analysis on large volumes of data, the security and protection of the information is... Read More