COBIT 5

COBIT 5: A Business Framework for the Governance and Management of Enterprise IT COBIT 5 is the latest edition of ISACA’s globally accepted framework, providing an end-to-end business view of

CISA

CISA (Certified Information Systems Auditor) is ISACA's cornerstone certification. Since 1978, the CISA exam has measured excellence in IS auditing, control and security. The CISA certification has been earned by more than 70,000 professionals.

CISM

The Certified Information Security Manager (CISM) certification is a unique management focused certification that has been earned by over 10,000 professionals since its introduction in 2003.

CGEIT

Certified in Governance of Enterprise IT

CRISC

Certified in Risk and Information Systems Control

COBIT

The ITGI’s leading research publication is Control Objectives for Information and related Technology (COBIT®). COBIT is fast becoming the most popular and internationally accepted set of guidance materials for IT

VAL IT

  Enterprise Value: Governance of IT Investments The Val IT publications help those with an interest in value delivery from IT. The series consists of four volumes, available for free download: Enterprise Value: Governance of IT Investments, Getting Started With Value Management (PDF, 560K) Enterprise Value: Governance of IT Investments, The

RISK IT

The Risk IT Framework Risk is a natural part of the business landscape. If left unmanaged, the uncertainty can spread like weeds. If managed effectively, losses can be avoided and benefits obtained. In business today, risk plays a critical role. Almost every business decision requires executives and managers to balance risk and reward. Effectively

http://www.isaca-malta.org/live/components/com_gk2_photoslide/images/thumbm/274535cobit5.JPG http://www.isaca-malta.org/live/components/com_gk2_photoslide/images/thumbm/266545cisa.jpg http://www.isaca-malta.org/live/components/com_gk2_photoslide/images/thumbm/289621cism.jpg http://www.isaca-malta.org/live/components/com_gk2_photoslide/images/thumbm/901986cgeit.jpg http://www.isaca-malta.org/live/components/com_gk2_photoslide/images/thumbm/444103crisc.jpg http://www.isaca-malta.org/live/components/com_gk2_photoslide/images/thumbm/412478COBITlogo.jpg http://www.isaca-malta.org/live/components/com_gk2_photoslide/images/thumbm/455828valit.jpg http://www.isaca-malta.org/live/components/com_gk2_photoslide/images/thumbm/738396riskit.jpg

A Free Template From Joomlashack

A Free Template From Joomlashack

ISACA MALTA CHAPTER on LinkedIn

Upcoming Chapter Events

Mailing List

Subsribe

Unsubscribe

Home
Welcome to the ISACA® MALTA CHAPTER
The changing legal landscape within data protection law (Updated: Slides) PDF Print E-mail
Tuesday, 05 March 2013 08:06

Date: Thursday 21st March 2013 17:00 to 19:00
Location: Radisson Blu, St.Julians

ISACA MALTA CHAPTER Members are invited to attend this educational event free of charge. They in turn, can be accompanied by a colleague / non-member to attend also free of charge (Bring-a-Collegue Initiative).

Session Details: The changing legal landscape within data protection law

In this session, we will be discussing the following topics:

  • The right to privacy and informational self determination
  • Historical background on Data Protection (DP) legislation and salient DP Principles
  • The impact of technology on DP law
  • Detailed analysis of the new DP Regulation and its effect on companies processing Personal data

Speaker Biography: Dr. Antonio Ghio

Dr. Antonio Ghio heads the ICT law Department at Fenech & Fenech Advocates and specializes in telecommunications law, data protection, Intellectual property law, e-commerce, remote gaming and internet law. For the past eleven years his work has solely revolved around ICT law issues and trying to find solutions that the constant struggle between law and technology creates, both inside and outside of the courtrooms. Ghio also lectures ICT law and Cyber Crime at the University of Malta and is the Chairman of the Malta Communications Authority after having served as a member of the board of directors for over four years. He has an LL.M in ICT law from the University of Strathclyde. He is a regular speaker on ICT and IP law issues in conferences both locally and abroad. He also serves as EU Digital Champion for Malta.

 
COBIT 5: An Introduction (Update: SLIDES) PDF Print E-mail
Saturday, 26 January 2013 22:29

Access the SLIDES

Read more...
 
Storage & Data Protection PDF Print E-mail
Wednesday, 26 October 2011 15:57

Date: Thursday 7th February 2013 17:00 to 19:00
Location: Radisson Blu, St.Julians

ISACA MALTA CHAPTER Members are invited to attend this educational event free of charge. They in turn, can be accompanied by a colleague / non-member to attend also free of charge (Bring-a-Collegue Initiative).

Session Details: Storage & Data Protection

In this session, we will be discussing trends in the enterprise storage, impact on virtualization and the enhancements that new storage concepts offer to business applications. We will also discuss about different methodologies and concepts for Data Protection (Enterprise Backups on both physical & Virtual Environments) and the opportunities for Disaster Recovery and Business Continuity setups.

Speaker Biography: Mr. Nuno Fernandes

Mr. Fernandes is IT Architect, Technology Services at Systec Limited (Malta). Since 2005, he has been focusing on the development of IT Solutions across Enterprise Class Servers & Storage, both on Physical and Virtual Environments, providing sound Microsoft Solutions for the corporate market segment. At Systec Limited he was also given the opportunity to work with blue chip customers with a WW reputation, have the privilege to manage/grow our key strategic partnership network, establishing solid relationships in order to better fulfill our customer's requirements.

 

 
Compromised! How hackers gain access to your systems and steal your data - A hands on approach PDF Print E-mail
Wednesday, 26 October 2011 15:57

Date: Thursday 17th January 2013 17:00 to 19:00
Location: Radisson Blu, St.Julians

ISACA MALTA CHAPTER Members are invited to attend this educational event free of charge. They in turn, can be accompanied by a colleague / non-member to attend also free of charge (Bring-a-Collegue Initiative).

Session Details: Compromised! How hackers gain access to your systems and steal your data - A hands on approach

A central database and authentication services are common services that every business requires. This talk will focus on attacks particular to these services and how attackers may leverage them to gain a foothold in your network, and ultimately compromise your data. Through this hands-on walkthrough, hacking attacks will be demystified and this will help convey a better understanding and appreciation of Information Security. The talk will conclude with pragmatic solutions to counter security challenges and recommendations on how to assess your security posture.

Speaker Biography: Mr. Ian Attard

Ian Attard's interest in IT security started at a very early age. While downloading software from the Internet, his system was hacked and took on a mind of its own. This piqued his interest and introduced him to the subject of Information Security. Little did he know that what started as mere curiosity will end up being the thing he does with a passion for most of his waking hours!

In his career Ian Attard has been responsible for the security of a number of highly sensitive Government systems and is currently a freelance contractor and a Systems Administrator with a leading group of gaming companies.

 

 

 

Attachments:
Download this file (Presentation Slides.pdf)Presentation Slides.pdf[“Compromised! How hackers gain access to your systems and steal your data - A hands on approach”]572 Kb
 
Selling security to the C-Level: A security strategy PDF Print E-mail
Wednesday, 26 October 2011 15:57

 

Date: Thursday 22nd November 2012 17:00 to 19:00
Location: Radisson Blu, St.Julians

ISACA MALTA CHAPTER Members are invited to attend this educational event free of charge. They in turn, can be accompanied by a colleague / non-member to attend also free of charge (Bring-a-Collegue Initiative).

Session Details: Selling security to the C-Level: A security strategy

Investments in information security technology often come around as a result of mishaps and when they don't, it is a well known fact that selling security at the C-Level is always a hard sell - since unlike other investments, such investments are not seen to have a direct correlation to revenue and since executives seem to have a very limited understanding of the risks of under-investment.

In an attempt to help IT people build a robust business case for C-Level executives to justify information security investments, this talk will touch upon some of the predominant challenges that IT Departments are facing and presents a holistic risk-based approach to tackling IT risks as part of an overall security strategy that could be willingly endorsed by C-Level executives.

Speaker Biography: Mr. Donald Tabone

Coming from a technical background, Donald Tabone has worked in virtually all facets of IT over the past sixteen years. He has held various technical
hands-on and managerial positions exposing him to practices ranging from software development to the implementation of turnkey IT solutions befitting a variety of different business models. Working with an American-based card processing company for six years, he continued to expand his knowledge in information security. As a certified IT trainer, he has lectured Computer Forensics since 2007 on behalf of the NCC UK and delivered several presentations to several national entities and private organisations on security related topics. Since then, he has taught and mentored over 300 students for their final IADCS (NCC) projects.

Donald holds a Masters degree in ICT Law from the University of Strathclyde and a Bachelors degree in Computing & Information Systems together with several other security related industry standard certifications. Donald is currently an Associate Director with KPMG IT Advisory.

 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

 
Joomla 1.5 Templates by Joomlashack