2019 - Grand Rapids, MI
NOTE: Not all presenters make their presentation available prior to the conference.
IT Workshop
Onsite Brochure
Presenter Biographies
Tuesday, September 24
Securing Regulated Workloads in the Cloud
Timothy Sandage, Senior Security Partner Strategist, Amazon Web Services |
Auditing Software-as-a-Service Vendor Security
Jeff White, Legislative Information Systems Auditor, Office of the Comptroller of the Treasury (TN) |
Auditing Web Applications
PDF Other |
Gina Alvarado, IT Auditor II, Office of the Auditor General (AZ) Sajay Rai, President and CEO, Securely Yours LLC |
IT CONFERENCE
Onsite Brochure
Presenter Biographies
Wednesday, September 25
Anatomy of a Failed Development Project: What Difference Can Auditors Make?
Mark Mathison, IT Audit Director, Office of the Legislative Auditor (MN) Joe Sass, IT Audit Coordinator, Office of the Legislative Auditor (MN) |
Auditing Disaster Recovery and Business Continuity of IT Systems
Becky Murray, Prinicpal Audit Supervisor, Office of the Auditor General (MI) Kathy Lovejoy, Senior Audit Manager, Office of the Auditor General (IL) |
Blockchain 101
Table Talk Time
Implementing COSO Principle 11 for IT Audits
Dan Altobelli, IT Audit Manager, Office of the State Auditor (NJ) |
Table Talk Time
Shelly Fanson, Audit Manager, Office of the Auditor General (MI) |
Implementing COSO Principle 11 for IT Audits
Colin Shogren, IT Audit Manager, Legislative Audit Bureau (WI) Bruce Flinn, Assitant IT Principal Auditor, Legislative Audit Bureau (WI) |
Hiring the Unicorn - How to Hire and Retain IT Auditors
Peg Bodin, Assitant Director of IT Audit, Office of the State Auditor (WA) Katrin Osterhaus, IT Audit Manager, Legislative Division of Post Audit (KS) Melissa Schuiling, Audit Division Administrator, Office of the Auditor General (MI) |
Network Security Audit
Ten Common Roadblocks to Implementing Social Engineering and Potential Solutions
IT Audit Report: Our Journey Across Various Formats
Prescription Drug Registry Audit: What Do You Do When They Won't Give You the Data?
PDF Other |
Keith Edwards, Audit Supervisor, Office of the Auditor General (MI) Jesse Soerries, Audit Supervisor, Office of the Auditor General (MI) |
Ten Common Roadblocks to Implementing Social Engineering and Potential Solutions
Alex Gard, Principal IT Auditor, Legislative Division of Post Audit (KS) |
IT Audit Report: Our Journey Across Various Formats
Katrin Osterhaus, IT Audit Manager, Legislative Division of Post Audit (KS) |
Prescription Drug Registry Audit: What Do You Do When They Won't Give You the Data?
Miki Cestnik, Information Systems Auditor, Legislative Audit Division (MT) |
Data Collection Sources, Techniques and Analytical Processess: What's the Big Data Deal?
A Call for Two Factor Authentication
Partnering for Success: Incoporating Threat Intelligence Sources into Cyber Security Programs
Friday, September 27
Cyber Predictions for the 2020s: Trends and Forecasts
Table Talk Time
Dr. Greg Gogolin, Professor, Ferris State University |
A Call for Two Factor Authentication
Peg Bodin, Assitant Director of IT Audit, Office of the State Auditor (WA) Kathy Lovejoy, Senior Audit Manager, Office of the State Auditor (IL) |
Partnering for Success: Incoporating Threat Intelligence Sources into Cyber Security Programs
Chris Buse, Deputy Legislative Auditor, Office of the Legislative Auditor (MN) |
Cyber Predictions for the 2020s: Trends and Forecasts
Dan Lohrmann, Chief Startegist and Chief Security Officer, Security Mentor Chris Buse, Deputy Legislative Auditor, Office of the Legislative Auditor (MN) |
Table Talk Time
Shelly Fanson, IT Audit Manager, Office of the State Auditor (MI) Dan Altobelli, IT Audit Manager, Office of the State Auditor (NJ) |