NSAA IT Conference Materials
NOTE: Not all presenters make their presentation available prior to the conference.
- Conference Program
- CPE Worksheet
- Presenter Biographies
- Roster (alpha by last name)
- Roster (alpha by organization)
Tuesday, September 28
Cyberthreat Landscape & How The Cybersecurity & Infrastructure Security Agency Can Help
Bill Nash, Cybersecurity Advisor, Cybersecurity and Infrastructure Security Agency, U.S. Department of Homeland Security |
Common Root Causes for Major IT Findings
Peg Bodin, Assistant Director of IT Audit, Office of the State Auditor (WA) Alex Gard, Principal IT Auditor, Legislative Division of Post Audit (KS) |
Revisions to GAO's Methodology for Assessing IS Controls
Table Talk Time
Data Analytics R Tool
PDF |
Vijay D'Souza, Director, Information Technology & Cybersecurity, U.S. GAO Rosanna Guerrero, Senior IT Analyst, Information Technology & Cybersecurity, U.S. GAO Nicole Burkart, Assistant Director, Financial Management & Assurance, U.S GAO |
Table Talk Time
Shelly Fanson, Audit Manager, Office of the Auditor General (MI) Dan Altobelli, IT Audit Manager, Office of the State Auditor (NJ) |
Data Analytics R Tool
PDF |
Ben Ward, Principal Auditor, Office of the State Auditor (CA) Kaylee Hodgson, Project KIDS Manager, Office of the State Auditor (UT) |
Cultivating a Culture of Cybersecurity
Daniel J. Lohrmann, Chief Strategist and Chief Security Officer, Security Mentor |
Privileged Access Management
Joseph Carson, Chief Security Scientist & Advisory CISO, ThycoticCentrify |
Audit Documentation for Systems Audits
Karen Wilson, IT Systems Audit Manager, Office of the State Auditor (WA) |
Retaining & Engaging IT Auditors (on a Government Salary)
Miki Cestnik, IS Audit Manager, Division of Legislative Audit (MT) Peg Bodin, Assistant Director of IT Audit, Office of the State Auditor (WA) Matt Devlin, Deputy State Auditor, IT Audits, Office of the State Auditor (CO) |
I Am From IT and I Am Here to Help
Steven Birchfield, CEO, Automation Centre Keith Duke, Senior Systems Analyst/Application Developer, Office of the Legislative Auditor (LA) |
Auditors in Glass Houses
Ransomware
Thursday, September 30
Data Analytics Panel
Encryption for Safeguarding PII
SOC Reports & Cloud Vendors
What Would You Do?
PDF |
Katrin Osterhaus, IT Audit Manager, Legislative Division of Post Audit (KS) Dodi Smith, Information Security Manager, Office of the Auditor General (MI) Hunter McClure, IS Auditor, Legislative Audit Division (MT) |
Ransomware
PDF Handout |
Sunia Laulile, Senior IT Security Specialist, Office of the State Auditor (WA) Katie Morris, IT Governance, Risk, and Compliance Manager, Information Services Division, Arizona Health Care Cost Containment System |
Thursday, September 30
Data Analytics Panel
PDF |
Beth Pendergrass, Legislative Audit Manager, Office of the Comptroller of the Treasury (TN) David Cook, Review Officer, Office of the Comptroller of the Treasury (TN) Tara Lindholm, Audit Manager, Statewide Technology Audit Team, Office of the State Auditor (WA) |
Encryption for Safeguarding PII
Brendan Coffey, IT Audit Manager, Office of the Legislative Audits (MD) |
SOC Reports & Cloud Vendors
Kathy Lovejoy, Principal of IS Audits, Office of the Auditor General (IL) Miki Cestnik, IS Audit Manager, Division of Legislative Audit (MT) Jeff White, Legislative Information Systems Audit Manager, Office of the Comptroller of the Treasury (TN) |
What Would You Do?
Dan Altobelli, IT Audit Manager, Office of the State Auditor (NJ) Shelly Fanson, Audit Manager, Office of the Auditor General (MI) |