|
Post by Bob Smart on Apr 29, 2007 5:54:08 GMT -5
"IT Governance - What it is and why you need it" by Howard Nicholson Howard Nicholson has given us a great presentation with some real-life examples. If you missed out, please check out the presentation slides posted on the members-only area of the website: www.isaca-adelaide.org/memb_login.aspThis is a perfect place to kick-off discussion about the presentation.
|
|
|
Post by Bob Smart on Jun 8, 2007 3:11:36 GMT -5
It is always great to see a local company making exciting IT security products. Lync is the leader in their niche and I hope that Kym Welsby's presentation will spark discussions not just at the PD session, but also on-line on this discussion board.
How much freedom should be left to staff? Is monitoring of USB traffic intrusion of their privacy or necessary measure when an iPod can be used for copying 80GB of confidential corporate data without anybody suspecting it.
Please, let us know what you think.
Bob
|
|
|
Post by Bob Smart on Sept 27, 2007 6:12:47 GMT -5
The chat we had after the PD session proved that Jarek Modra's presentation really sparked the discussion and provoked some interesting points about security controls and (for some reason) particularly about biometrics. Now we have posted slides (partially stripped of Jarek's practical and ingenious approach to social engineering) on the members-only area of the website (http://www.isaca.asn.au/memb_login.asp). Hope to see your comments and experiences with penetration testing.
|
|
|
Post by Bob Smart on Dec 4, 2007 7:12:15 GMT -5
As promised during the presentation, I am happy to answer any questions you may have in relation to wireless security on-line. This may also be a good forum to discuss your view and opinions in regards to WiFi technology, wireless VoIP and the impact of convergence to overall network security. I'm listening. Cheers, Bob
|
|
|
Post by Bob Smart on Mar 16, 2008 21:59:06 GMT -5
After Steve Darrall's intriguing case studies with his experiences around IT projects and security requirements, it would be interesting to share and discuss your experiences. Should IT security requirements be specified in details for new IT project? Is there a clear minimum acceptable level of IT security for new project? Would not delivering a 'reasonably secure' system constitute negligence by the vendor? These are the interesting questions that Steve’s presentation and the discussion that followed raised. I hope we’ll get it going online, as well.
Regards, Bob Smart
|
|
|
Post by wowposter on Sept 2, 2008 5:32:04 GMT -5
|
|