News and Events

Prior Events


Date Topic Speaker CPE Credits
2018
Feb 15-16
Spring Seminar: NIST CSF Framework Sajay Rai-SecurelyYours LLC 16
Jan
The Effect of (Emerging) Disruptive Technologies on Audits Tommy Singleton 2
2017
Nov 2
Vendor Security Risks Matt Cherian-BitSight Technologies 1.5
Oct 19-20
Fall Seminar: Various Topics Various Speakers 16
Sept 19
Cybersecurity-Insider Threats from Privileged Users Mike White-BBVA Compass 1
May 16
AGM: Agile Auditing Raven Catlin-Raven Global Training 1
April 18
CISO Panel Discussion Brantley Synco, Brian Rivers and Scott Stokes 1
Mar 21
Why Many Organizations are Failing at Information Security Mark Burnette-LBMC 1
Feb 16-17
Spring Seminar: Various Topics LBMC Information Security 16
Jan 12
Big Data, Internet of Things, and Data Analysis Techniques Paul Perry-Warren Averett 2
2016

November 15

Taking the Pain Out of Application Security

Hans Lemons-SecurIT360 1
Oct 31 - Nov 1

Fall Seminar

Various 16
Sept 16

Cyber Fraud, Trends & Techniques

John Boles - Regions 1
May 17

Annual General Meeting - Armour Up: Defending Against Today's CyberSecurity Threats

Jason Riddle, LBMC 1
April 19

Chief Audit Executive Panel Discussion

Michael Balbirnie-Regions Director of Audit; Greg Lemley-UA Systems Director of Internal Audit; and Dean Taggart-HealthSouth VP of Internal Audit and Controls 1
March 16

Higher Education Audit and Control Issues

Curtis Carver-UAB VP & CIO 1
February 22 & 23

Spring Seminar: IT Risk Assessment/Threat and Vulnerability Assessment; Threat Actors; Mobile Threats and Security

Peter Davis-Peter Davis & Associates; Mary Singh-Mandiant; Asad Baheri-FireEye 16
January 14

Social Media and Dangerous Emails: The Criminals are Experts, are You?

Gary Warner-UAB 2
2015
2015 Events will be listed soon for reference
 
2014

 

 
Oct 16-17

Fall Seminar: Smart Devices; Cyber Security

Sanjay Rai, Securely Yours 16
Sept 16

Data Analysis and Extract with ACL

Brantley Synco, Baptist Heath System 1
May 20

It Takes a Village: The Influence of Insider Community Behavior on Organizational Security Posture

Paul Di Gangi & Allen Johnston, UAB 1
Apr 15

HIPPA Security Requirments

Angella Carlisle, HealthSouth 1
Mar 18

BYOD:The Good, The Bad & The Ugly

Joe Popinski, UAB 1
Feb 20-21

Spring Seminar: Network Security & Audit; Network Vulnerability Assessment

john Tannahill, J. Tannahill & Associates 16
 Jan 14

Are You Ready For Big Data?/

Leading Practice Examples of Audit Committee Reporting
Trey MacDonald/Keith Keller - Protiviti 2

 2013
 Nov 19
Data Privacy  PwC 1
 Oct 17 (Fall Seminar)
Data Analytics for IT Auditors/ BYOD/ Mobile Security  Felix Kan & David Ames 8
 Sept 17
IT Audit Coordination/roles  PwC 1

 May 21
Optimize Your Data Protection Investment for Bottom Line Results Robert Eggebrecht - BEW Global 1

 Apr. 16
Governance Trends in Access Certification and Compliance Steven Butler & Bryce Harvey - Oracle 1

 Mar. 26
10 Tips for PCI Compliance Programs Christopher Heinz - Verizon 1

 Feb. 21 (Spring Seminar)
Cloud Computing-Critical Security and Control Issues Jeff Kalwerisky, CPE Interactive 8

 Jan. 15
Cloud Security Jeff Spivey, Security Risk Management, Inc. 1

 2012 

     

 Nov. 26
Idenity Mgmt & Access Control Bill Aniszewski & Todd Rossin, IDMWorks 1

 Oct. (Fall Seminar)
Securing Mobile Assets and Applications Jeff Kalwerisky, CPE Interactive 8

 Oct. 16
Passwords: Love 'em or Hate 'em Joe Popinski, PhD. University of AL at Birmingham 1

 Sept. 18
Use of ACL and How to Detect and Prevent Fraud Brantley Synco, Baptist Health System 1

 May 15 (AGM)

Cyber Forensics Aaron Singleton, BBVA Compass 1

 Apr. 17

Mapping IT entity controls with Reg 141 and SSAE 16 (previously SAS 70) to streamline IT audit testing and promote reporting efficiency Sarah Baggs, BCBS of Alabama 1

 Mar. 27

Financial Controls, Project Management, and Accountants' responsibilities to work with Project Teams Paul Crigler, UAB 1

 Feb. 21

Internet Security & Fraud Mike Whitt, BBVA Compass 1

Feb. 9-10

Spring Seminar-Virtualization, Auditing Applications & Social Media John Tannahill, Dr. Tommy Singleton, Dr. Jamey Worrell, Dr. Paul Di Gangi and Dr. Allen Johnston 12

 Jan. 17

Technology, HR and Education Dr. Sanjay Singh 1

2011

     
Nov. 15 Social Media is Changing the World David Sher, Buzz12 Social Media Outsourcing 1
Oct. 18 VoIP Security Steve Guthrie, Blue Ocean Technologies 1
Sept. 20 Continuity-Business Impact Analysis Mark Martin, BCBS of AL 1
May 17 Better Security Starts by not giving criminals the keys to the front door James Brooks, Cyveillance Inc. 1
Apr 19 Computer Forensics Dean Schaumburg 2
Mar. 22 Combating the Growing Insider Threat within the Database Mark Martin, Application Security Inc. 1
Feb. 15 Protecting Your Company Against Cyber-Based Attacks Todd Berryman, FBI 1
Feb. 24 Spring Seminar 2011 Brian Dykstra, Todd Carey, Blake Askew 8
Jan. 18 Virtualization Robert Babb, VMWare Inc. 1
2010      
Sept. 21 Securing Open File Shares Todd Bailey, Regions 1
May 18 Application Risk Management Erik Peterson, Veracode 1
Apr. 20 Taking Control of Your User Accounts

Dustin Puryear, Puryear IT,


LLC

1
Mar. 23

Top Information Security Threats for


2010

David Hall, Protective 1
Feb. 25 Spring Seminar 2010 - 8 CPE Cloud Computing, Cobit 4.1 Overview, Embedding CAATs into your Audit Process, IT Security Architecture/Roadmaps Taiye Lambo, Beth Walter, Seth Davis, Pat Ferrel and Ashley Ewing 8
Feb. 16

How the Recession has Changed


Internal Audit


Danny Goldberg, Managing


Parter of SOFT GRC

1
Jan. 19 Data Validation

Nikki Brinkerhoff, Regions


Financial

1
2009      
Nov. 10 Internet Threats and the Rise of Social Media Michael Kiefer, Brand Protect 1
Oct. 20 Compliance Does Not Equal Security Jerry McCarthy, Verizon Business 1
Sept. 15 Protecting Intellectual Property Maurice Liddell 1
May 19 Database Auditing: Who did what to which data when and how? Craig N. Mullins 1
Apr. 21 What is IT Governance and How Do You Measure It? Scott Andress, Executive Director, Ernst & Young 1
Mar. 24 PCI Compliance Ashley Ewing, Director of Info Security & Compliance 1
Feb. 18 IT Audit and Controls in Financial Reporting Engagements Dr. Tommie Singleton,Associate Professor,UAB,Accounting and Information 1
Jan. 20 Digital Evidence Collections and Issues Jamey Worrell 1
2008      
Oct. 21 Fraud Investigation Tools for the IT Auditor Kevin Andrews - Forensic Strategic Solutions 1
Sept. 16 Internet Threat and Risks/Web Application Security Michael Kiefer, Senior Vice President - Brand Protect 1
May 13 Change Management Wyndell Dykes, CISA, CIA, QSA - Jefferson Wells 1
Apr. 16 Performing Governance Assessments Myrk Harkins, Director of Audit Operations - Southern Company 1
Mar. 11 Storing Information Online Larry A. Bates, Director of Technology –WebSafe, Inc. 1
Feb. 12 Is Your IT Security Assessment Complete? Facilitator - Gib Johnson, Managing Director, Birmingham Resources Global Professionals 1
Jan. 8 Panel Discussion - Career Techniques in IT Governance/Audit Facilitator - Gib Johnson, Managing Director, Birmingham Resources Global Professionals 1
2007      
Nov. 14 The New Auditing Standards - What about IT Security? Dr. Richard A. Turpen, Professor: Accounting & Information Systems, UAB 1
Oct. 09 Identitiy Theft & Phishing Gary Warner, Computer Forensics - UAB 1
Sept. 27-28 Seminar: Securing and Auditing Oracle Databases Betty Dorsey, Sr. Instructor - MIS Training Institute (MISTI) 16
Sept. 11 Securing Virtualization Environments & PCI Audit Compliance Strategy Todd Evans, National Account Manager - ConfigureSoft 1
May 21 Proposed PCAOB Auditing Standard No. 5 Jennifer Laudermilch, Sr Manager & Nancy Stuart, Mgr - PwC 1
Apr. 23 Spreadsheet Compliance Jeff Metz, Mobius Management Systems, Inc. 1
Mar. 12 Complying with New Electronic Discovery Rules Lynn Hare & Sam Duck 1
Feb. 19 Implementing Strong Authentication Jose Bravo 1
Jan. 22 Business Continuity - Planning for a Pandemic Sandra Behel 1
2006      
Nov. 6 How to Build Secure Software in Large Organizations John Dickson 1
Oct. 16 Protiviti: Best Practices in Managing Data Related Links Johnny Lee 1
Sept. 25 CipherTrust: Messaging Security Guy Lever 1
Apr. 17 Computer Intrusion Dale Miskell 1
Feb. 13 Identity Theft Steve Dedmon 1
Jan. 23 The Audit Market and Emerging Trends Yvonne Shefler 1
2005      
Nov. 14 DR: Practice Makes Perfect Bob Browning 1
Oct. 24 Wireless Security 101 Thomas Torgerson 1
Sept. 19 Intrusion Detection Chris Harper & Stan Sargent 1
May 12 Joint Meeting with IIA: Can-Audit Gordon Smith 1
Apr. 25 Software Quality Assurance: SQA is not an Option! John Burdett 1
Mar. 14 Cyber Crime FBI 1
Feb. 14 Pouring your Heart into IT Risk Assessment Patrick McLendon 1
Jan. 24 From Magic City to Tech City Curtis Palmer 1

 

     
     

     

     

     

     

     

     

     

     

 

2016 Events will be listed soon for reference


The ISACA® e-Learning Campus features a variety of educational web-based courses including the CISA® Online Review Course. ISACA members will earn an additional 30 days on their course subscription length using our chapter's code: "ISACA065".