28 June, 2017
 

Presentations from Prior meetings

       Date Attendees                             Title CPE           Speaker
2012-05-12  15  Android Mind Reading  1  Joe Sylve, Digital Forensics Solutions
2012-04-12  24  Incident Response Panel Discussion  1  Joshua Morrison, Hunter Ely, Mark Maher, Phillip Blake
2012-03-08  17  Update on NO Inspector General's Activities  1  Edouard Quatrevaux, NO Inspector General
2012-02-16  20  Virtualization Security  1  Tauseef A. Ghazi, KPMG
2012-01-12  24  Protect, Detect, Respond, Recover - New Models for Data Protection  2  JJ Guy, ManTech Inc.
 


2011

   
 2011-12-12  25  Holiday Social    
 2011-11-10  24         InfoSec: High and Low Tech Cyber Attacks and Digital Forensics      3  Golden Richard III, UNO CS Dept
 2011-10-20  28  What Businesses Need to Know about Encryption  3  Scott Downie, FBI
 2011-09-08  32  Symantec Internet Security Threat Report  1.5  John Hill, Symantec
 2011-08-11  30  Low Tech Risk Management: Protecting Your Business With Pen and Paper  3  Brandon Dunlap, Brightfly
 2011-07-21            42  The True Cost of Compliance and IT Blindside  3  Tripwire
 2011-06-09  18  Algorithmic Trading: Black Ops?  1  Joseph LeBlanc, Tulane
 2011-05-12  32  ICS/SCADA systems with Hacking Demonstration  1  Chris Shipp, DynMcdermott
 2011-04-14  24  The Role of IT Auditor in Software Selection and Implementation      1  Mignon Kohnke, Royal Bus. Sol.
 2011-03-17    9 Strategically Managing Change in IT Environment  0.5  Matt Schnauder, Globalstar
 2011-03-15  45  Joint with ISC2 -- The Language of Risk (free to ISC2 & ISACA members)  9  multiple speakers
 2011-02-10

 34

 IT Controls and Audit              0.5  Connie Freeland
 2011-01-24      Joint with SANS  (CANCELLED)    
   
2010
   
2010-01-12      30 Joint ISACA-Infragard Holiday Social   1  David Welker, FBI SAC
2010-11-Nov    24  e-Discovery   1  Tom O'Connor
2010-14-Oct    47  Verizon Data Breach Report       3  Wade Baker, Verizon
2010-09-Sep    43  Identity Theft    Will Hatcher, Special Agent, FBI
2010-11-Aug
2010-12-Aug
   48
   53
 NIST Computer Security for Small Businesses   4
  4
 Richard Kissell, NIST
2010-08-Jul    33 Electronic Weapons of Mass Destructions - eWMDs
Policy Review article on eWMDs
  1 John Kelly, PhD
2010-10-Jun   30 Understanding and Preventing Corporate Espionage
1. Corporate Espionage
2. Physical Security
  1 Kai Axford
2010-13-May   46 e-Discovery
1. ED for IT
2. Top 10 things General Counsel need to know about Electronic Discovery
  1 Ernest Svenson
2010-08-Apr   27 Accounts & Identity Management
Identity Management Basics
  3 Dustin Puryear
2010-11-Mar   23 Integrated Cyber in Critical Infrastructure
Encari Cyber Incidents in Critical Infrastructure
  3 Matt Luallen
2010-18-Feb   60 Incident Response   1 Tony Brooks
2010-13-Jan   92 SANS Course 504 Hacking Techniques & Incident Response   3 John Strand
   
2009
   
2009-16-Dec   38  Joint ISACA-Infragard Holiday Social    
2009-13-Nov   34 IT Risk Assessment Training   3 Dayle Alsbury, Sean Lowder, Slava Sotnikov
2009-07-Oct   27 Penetration Testing
Tiger Trap 2010
  3 Chad Oliver
(IT Consultant)
2009-10-Sep   15 1: A Web 2.0 Application: Second Life in Business and Education
2: What You Need to Know about Web 2.0 Security
  3 1: Dr. Kay McLennan (Tulane University)
2:Lydia Lourbacos (CISSP,CISA)
2009-13-Aug   50 Analysis of Internet Threats of 2008   2 John McCumber (Symantec)
2009-9-Jul   32 Security, Auditing, Governance in the Cloud   3 Gary Geddes (Microsoft)
2009-11-Jun   23 PCI and the PCI DSS   1 John Marsh (Deloitte)
2009-14-May   20 FBI Cyber Program & Cyber Crimes   3 Kristy Green (FBI)
2009-9-Apr   23 Visible Ops and Hi-Performance IT   1 Eugene Kim (Tripwire)
2009-12-Mar   21 Penetration Testing (Course #562)   3 John Strand (SANS)
2009-12-Feb   58 E-Discovery (Joint/IIA)   1 Tony Brooks
2009-8-Jan   29 Risk Management   1 Caroline Hamilton, (Riskwatch)
   
2008
   
2008-10-Dec   16  Joint ISACA Infragard Holiday Social    
2008-13-Nov   34 Web Application Penetration Testing   3 Seth Misenar (SANS)
2008-Oct 27 - Dec 1     3 CISA Review course   1 Lydia Lourbacos, CISA
2008-9-Oct   20 Enterprise Architecture   1 Jim Williams, (MMS)
2008-11-Sep   CANCELLED/Hurricane Gustav    
2008-7-Aug   28 Security & Auditing Firewalls/Routers   1 Chad Smith (Cisco)
2008-10-Jul   20 IT Risk Management   1 Raj Mehta (Deloitte)
2008-12-Jun   35 Cryptography: The Art of Secret Writing   3 Chris Davis (Forescout)
2008-8-May   33 Ethics in Public Service   1 Robert Cerasoli (NOLA IG)
2008-10-Apr   38 Perimeter Defense and Log Analysis   3 Seth Misenar (SANS)
2008-13-Mar   28 Securing Web Applications   1 Conrad Clark (HP)
2008-14-Feb   22 Wireless Security and Current Issues in RFID   1 Doug Haider (Accuvant)
2008-10-Jan   34 Hacker Exploits and Incident Handling   3 John Strands(SANS)
   
2007
   
2007-8-Nov (Joint IIA)   70 Digital Forensics'   1 Golden Richard(UNO)
2007-9-Oct   18 Cyber Crime   1 Will Hatcher (FBI)
2007-6-Sep   52 Trends in IT Security   1 Gary Geddes (Microsoft)
2007-25-Jul   40 Information technology's role in disaster recovery   1 David Bourgeois (MyITSupport)
2007-31-May   17 Privacy & Data Protection   1 Raj Mehta(Deloitte)
2007-Feb   13 Cyber Crime   1 Will Hatcher (FBI)
   
2006
   
2006-11-May   ENTERGY - Responds to Hurricanes Katrina & Rita    
2006-20-Apr  15 IT Governance- A Framework and Implementation Guide    1 Marios Diamianides (Ernst & Young LLP)
2006-16-Feb   Enterprise Risk Management Shareholder Value    1 Shad Higdon (Deloitte)
2005-Nov  20 COBIT    1 Marios Diamanedes (ISACA)

Counter
Counter