Oceania CACS2012 is the region’s leading conference and must-attend event for IT audit, control, security and governance professionals. This year the conference will focus on 'embracing uncertainty and delivering value in turbulent times’ – a broad theme that explores the value and role of information system risk and strategies. Highly respected industry experts will present their latest thinking, research and practical case studies in topical presentations and workshops that delve into some of the biggest challenges currently facing IT audit and security professionals.
For more than 30 years, ISACA, the leading global association representing more than 100,000 IT risk and governance professional worldwide, has been host to a series of computer audit, control and security (CACS) conferences held around the world. The nonprofit, independent ISACA was established in 1969 and now has members in 180 countries. ISACA developed the Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in the Governance of Enterprise IT (CGEIT) and Certified in Risk and Information Systems Control (CRISC) certifications, as well as the COBIT framework for the governance and management of enterprise IT.
Event Start Date: Monday 10th September 2012
Event End Date: Wednesday 12th September
Event Location: Te Papa – Museum of New Zealand, Wellington
Visit: www.oceaniacacs2012.org or www.isaca.org
Te Papa – Museum of New Zealand, Wellington – www.oceaniacacs2012.org
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.