News and Events

Prior Events

Date Topic Speaker CPE Credits
Feb 15-16
Spring Seminar: NIST CSF Framework Sajay Rai-SecurelyYours LLC 16
The Effect of (Emerging) Disruptive Technologies on Audits Tommy Singleton 2
Nov 2
Vendor Security Risks Matt Cherian-BitSight Technologies 1.5
Oct 19-20
Fall Seminar: Various Topics Various Speakers 16
Sept 19
Cybersecurity-Insider Threats from Privileged Users Mike White-BBVA Compass 1
May 16
AGM: Agile Auditing Raven Catlin-Raven Global Training 1
April 18
CISO Panel Discussion Brantley Synco, Brian Rivers and Scott Stokes 1
Mar 21
Why Many Organizations are Failing at Information Security Mark Burnette-LBMC 1
Feb 16-17
Spring Seminar: Various Topics LBMC Information Security 16
Jan 12
Big Data, Internet of Things, and Data Analysis Techniques Paul Perry-Warren Averett 2

November 15

Taking the Pain Out of Application Security

Hans Lemons-SecurIT360 1
Oct 31 - Nov 1

Fall Seminar

Various 16
Sept 16

Cyber Fraud, Trends & Techniques

John Boles - Regions 1
May 17

Annual General Meeting - Armour Up: Defending Against Today's CyberSecurity Threats

Jason Riddle, LBMC 1
April 19

Chief Audit Executive Panel Discussion

Michael Balbirnie-Regions Director of Audit; Greg Lemley-UA Systems Director of Internal Audit; and Dean Taggart-HealthSouth VP of Internal Audit and Controls 1
March 16

Higher Education Audit and Control Issues

Curtis Carver-UAB VP & CIO 1
February 22 & 23

Spring Seminar: IT Risk Assessment/Threat and Vulnerability Assessment; Threat Actors; Mobile Threats and Security

Peter Davis-Peter Davis & Associates; Mary Singh-Mandiant; Asad Baheri-FireEye 16
January 14

Social Media and Dangerous Emails: The Criminals are Experts, are You?

Gary Warner-UAB 2
2015 Events will be listed soon for reference


Oct 16-17

Fall Seminar: Smart Devices; Cyber Security

Sanjay Rai, Securely Yours 16
Sept 16

Data Analysis and Extract with ACL

Brantley Synco, Baptist Heath System 1
May 20

It Takes a Village: The Influence of Insider Community Behavior on Organizational Security Posture

Paul Di Gangi & Allen Johnston, UAB 1
Apr 15

HIPPA Security Requirments

Angella Carlisle, HealthSouth 1
Mar 18

BYOD:The Good, The Bad & The Ugly

Joe Popinski, UAB 1
Feb 20-21

Spring Seminar: Network Security & Audit; Network Vulnerability Assessment

john Tannahill, J. Tannahill & Associates 16
 Jan 14

Are You Ready For Big Data?/

Leading Practice Examples of Audit Committee Reporting
Trey MacDonald/Keith Keller - Protiviti 2

 Nov 19
Data Privacy  PwC 1
 Oct 17 (Fall Seminar)
Data Analytics for IT Auditors/ BYOD/ Mobile Security  Felix Kan & David Ames 8
 Sept 17
IT Audit Coordination/roles  PwC 1

 May 21
Optimize Your Data Protection Investment for Bottom Line Results Robert Eggebrecht - BEW Global 1

 Apr. 16
Governance Trends in Access Certification and Compliance Steven Butler & Bryce Harvey - Oracle 1

 Mar. 26
10 Tips for PCI Compliance Programs Christopher Heinz - Verizon 1

 Feb. 21 (Spring Seminar)
Cloud Computing-Critical Security and Control Issues Jeff Kalwerisky, CPE Interactive 8

 Jan. 15
Cloud Security Jeff Spivey, Security Risk Management, Inc. 1



 Nov. 26
Idenity Mgmt & Access Control Bill Aniszewski & Todd Rossin, IDMWorks 1

 Oct. (Fall Seminar)
Securing Mobile Assets and Applications Jeff Kalwerisky, CPE Interactive 8

 Oct. 16
Passwords: Love 'em or Hate 'em Joe Popinski, PhD. University of AL at Birmingham 1

 Sept. 18
Use of ACL and How to Detect and Prevent Fraud Brantley Synco, Baptist Health System 1

 May 15 (AGM)

Cyber Forensics Aaron Singleton, BBVA Compass 1

 Apr. 17

Mapping IT entity controls with Reg 141 and SSAE 16 (previously SAS 70) to streamline IT audit testing and promote reporting efficiency Sarah Baggs, BCBS of Alabama 1

 Mar. 27

Financial Controls, Project Management, and Accountants' responsibilities to work with Project Teams Paul Crigler, UAB 1

 Feb. 21

Internet Security & Fraud Mike Whitt, BBVA Compass 1

Feb. 9-10

Spring Seminar-Virtualization, Auditing Applications & Social Media John Tannahill, Dr. Tommy Singleton, Dr. Jamey Worrell, Dr. Paul Di Gangi and Dr. Allen Johnston 12

 Jan. 17

Technology, HR and Education Dr. Sanjay Singh 1


Nov. 15 Social Media is Changing the World David Sher, Buzz12 Social Media Outsourcing 1
Oct. 18 VoIP Security Steve Guthrie, Blue Ocean Technologies 1
Sept. 20 Continuity-Business Impact Analysis Mark Martin, BCBS of AL 1
May 17 Better Security Starts by not giving criminals the keys to the front door James Brooks, Cyveillance Inc. 1
Apr 19 Computer Forensics Dean Schaumburg 2
Mar. 22 Combating the Growing Insider Threat within the Database Mark Martin, Application Security Inc. 1
Feb. 15 Protecting Your Company Against Cyber-Based Attacks Todd Berryman, FBI 1
Feb. 24 Spring Seminar 2011 Brian Dykstra, Todd Carey, Blake Askew 8
Jan. 18 Virtualization Robert Babb, VMWare Inc. 1
Sept. 21 Securing Open File Shares Todd Bailey, Regions 1
May 18 Application Risk Management Erik Peterson, Veracode 1
Apr. 20 Taking Control of Your User Accounts

Dustin Puryear, Puryear IT,


Mar. 23

Top Information Security Threats for


David Hall, Protective 1
Feb. 25 Spring Seminar 2010 - 8 CPE Cloud Computing, Cobit 4.1 Overview, Embedding CAATs into your Audit Process, IT Security Architecture/Roadmaps Taiye Lambo, Beth Walter, Seth Davis, Pat Ferrel and Ashley Ewing 8
Feb. 16

How the Recession has Changed

Internal Audit

Danny Goldberg, Managing

Parter of SOFT GRC

Jan. 19 Data Validation

Nikki Brinkerhoff, Regions


Nov. 10 Internet Threats and the Rise of Social Media Michael Kiefer, Brand Protect 1
Oct. 20 Compliance Does Not Equal Security Jerry McCarthy, Verizon Business 1
Sept. 15 Protecting Intellectual Property Maurice Liddell 1
May 19 Database Auditing: Who did what to which data when and how? Craig N. Mullins 1
Apr. 21 What is IT Governance and How Do You Measure It? Scott Andress, Executive Director, Ernst & Young 1
Mar. 24 PCI Compliance Ashley Ewing, Director of Info Security & Compliance 1
Feb. 18 IT Audit and Controls in Financial Reporting Engagements Dr. Tommie Singleton,Associate Professor,UAB,Accounting and Information 1
Jan. 20 Digital Evidence Collections and Issues Jamey Worrell 1
Oct. 21 Fraud Investigation Tools for the IT Auditor Kevin Andrews - Forensic Strategic Solutions 1
Sept. 16 Internet Threat and Risks/Web Application Security Michael Kiefer, Senior Vice President - Brand Protect 1
May 13 Change Management Wyndell Dykes, CISA, CIA, QSA - Jefferson Wells 1
Apr. 16 Performing Governance Assessments Myrk Harkins, Director of Audit Operations - Southern Company 1
Mar. 11 Storing Information Online Larry A. Bates, Director of Technology –WebSafe, Inc. 1
Feb. 12 Is Your IT Security Assessment Complete? Facilitator - Gib Johnson, Managing Director, Birmingham Resources Global Professionals 1
Jan. 8 Panel Discussion - Career Techniques in IT Governance/Audit Facilitator - Gib Johnson, Managing Director, Birmingham Resources Global Professionals 1
Nov. 14 The New Auditing Standards - What about IT Security? Dr. Richard A. Turpen, Professor: Accounting & Information Systems, UAB 1
Oct. 09 Identitiy Theft & Phishing Gary Warner, Computer Forensics - UAB 1
Sept. 27-28 Seminar: Securing and Auditing Oracle Databases Betty Dorsey, Sr. Instructor - MIS Training Institute (MISTI) 16
Sept. 11 Securing Virtualization Environments & PCI Audit Compliance Strategy Todd Evans, National Account Manager - ConfigureSoft 1
May 21 Proposed PCAOB Auditing Standard No. 5 Jennifer Laudermilch, Sr Manager & Nancy Stuart, Mgr - PwC 1
Apr. 23 Spreadsheet Compliance Jeff Metz, Mobius Management Systems, Inc. 1
Mar. 12 Complying with New Electronic Discovery Rules Lynn Hare & Sam Duck 1
Feb. 19 Implementing Strong Authentication Jose Bravo 1
Jan. 22 Business Continuity - Planning for a Pandemic Sandra Behel 1
Nov. 6 How to Build Secure Software in Large Organizations John Dickson 1
Oct. 16 Protiviti: Best Practices in Managing Data Related Links Johnny Lee 1
Sept. 25 CipherTrust: Messaging Security Guy Lever 1
Apr. 17 Computer Intrusion Dale Miskell 1
Feb. 13 Identity Theft Steve Dedmon 1
Jan. 23 The Audit Market and Emerging Trends Yvonne Shefler 1
Nov. 14 DR: Practice Makes Perfect Bob Browning 1
Oct. 24 Wireless Security 101 Thomas Torgerson 1
Sept. 19 Intrusion Detection Chris Harper & Stan Sargent 1
May 12 Joint Meeting with IIA: Can-Audit Gordon Smith 1
Apr. 25 Software Quality Assurance: SQA is not an Option! John Burdett 1
Mar. 14 Cyber Crime FBI 1
Feb. 14 Pouring your Heart into IT Risk Assessment Patrick McLendon 1
Jan. 24 From Magic City to Tech City Curtis Palmer 1












2016 Events will be listed soon for reference

The ISACA® e-Learning Campus features a variety of educational web-based courses including the CISA® Online Review Course. ISACA members will earn an additional 30 days on their course subscription length using our chapter's code: "ISACA065".