Presentations Available for Download

Document Library

DocumentJan. 18 2011 VirtualizationRobert Babb, VMWare
DocumentMay 17, 2011-Web Application SecurityJohn Schuller
DocumentCareer Techniques in IT GovernanceN/A
DocumentCompliance Does Not Equal SecurityN/A
DocumentDatabase AuditingN/A
DocumentDatabase Security and Auditing Best PracticesN/A
DocumentDigital Evidence Collections and IssuesJamey Worrell
DocumentHow the Recession is Changing Internal AuditingN/A
DocumentIBM StrongAuthN/A
DocumentIdentity ManagementDustin Puryear
DocumentBrand ProtectMichael Kiefer
DocumentID Theft/Phishing - Oct. 9, 2007Gary Warner
DocumentIT Governance - Apr. 21, 2009N/A
DocumentPerforming Governance ProjectsMyrk Harkins, Southern Company
DocumentProtecting Intellectual PropertyN/A
DocumentSocial EngineeringN/A
DocumentStoring Information OnlineN/A
DocumentTop Information Security Threats for 2010David Hall
DocumentVeracode - Best Practices for ARMN/A
DocumentOct. 18, 2011 VoIP SecuritySteve Guthrie, Blue Ocean Technologies
DocumentSpring Seminar 2012 - Auditing_ApplicationsDr. Tommy Singleton
DocumentMar. 27, 2012-Integration of BPM, BA, SDLC & PM - What are Accountant's ResponsibilitiesPaul Crigler, UAB
DocumentMay 15, 2012 - Cyber ForensicsAaron Singleton, BBVA Compass
DocumentSept. 2012 - Use of ACL and How to Detect and Prevent FraudBrantley Synco, Baptist Health System
DocumentNov. 26, 2012 - Idenity Mgmt & Access ControlBill Aniszewski & Todd Rossin, IDMWorks
DocumentMarch 26, 2013 - 10 Tips for PCI Compliance ProgramsChristopher Heinz - Verizon
DocumentMay 21, 2013, Optimize Your Data Protection Investment for Bottom Line ResultsRobert Eggebrecht - BEW Global
DocumentInternet Safety & Security Tips for ParentsDHS - NCSA
DocumentJan. 14, 2014 - Are you Ready for Big Data?Trey MacDonald - Protiviti
DocumentJan. 14, 2014 - Leading Practice Examples of Audit Committee ReportingKeith Keller - Protiviti
DocumentSeptember 2016 - Cyber FraudJohn Boles - Regions
DocumentJan. 12, 2017 Data Analysis Paul Perry - Warren Averett
DocumentMarch 21, 2017 - Why Cybersecurity Programs FailMark Burnette - LBMC
DocumentCybersecurity Insider Threats 9-19-2017Micheal White
DocumentIT General Controls2017 Fall Seminar
DocumentSecuring your DevOps Toolchain in the Cloud2017 Fall Seminar
DocumentDriving Accountability Through an Effective Risk RegisterChris Womack, BBCA

Newsletters Available for Download

Document Library

DocumentNewsletter3rd QTR 2011
DocumentNewsletter1st QTR 2012
DocumentNewsletter2nd QTR 2012
DocumentNewsletter3rd QTR 2012
DocumentNewsletter4th QTR 2012
DocumentNewsletter2nd QTR 2013

Other Downloads