Personal Devices in the Workplace Create New Risk and Security Challenges

ISACA's North America CACS Conference Will Address BYOD, Big Data and Cloud

Rolling Meadows, IL, USA (07 March 2013)—Growth of the "consumerization of IT" (employees accessing the corporate network with their personal devices) has created many new risk and security challenges for enterprises. To help IT and business professionals be prepared for this new era, ISACA is hosting the North America Computer Audit, Control and Security (CACS) conference in Dallas, Texas, USA, on 15-17 April 2013.

"In the face of considerable challenges, businesses need to understand how to best address the consumerization movement," said Nelson Gibbs, CISA, GEIT, CRISC, North America CACS Conference Advocate. "At the root, businesses should clearly identify the expected benefits of allowing employees to bring their own devices (BYOD) and have a good understanding and plan for addressing the potential risk."

Gibbs suggests enterprises take a new approach that includes a blend of  educating employees and adapting the IT architecture and controls to take advantage of increased productivity and other benefits of employees' BYOD freedoms. "A proactive approach to the consumerization of IT benefits from a �nothing ventured, nothing gained' attitude," he said. 

In addition to BYOD, other topics including social media trends, cloud service provider security and privacy assessments will be featured throughout four tracks at the conference:  Consumerization, Information, Technology and Delivery. Big data issues and challenges will be discussed in sessions, including Big Data and Information Governance:  Applying Discipline to the Jungle, presented by Dirk deRoos, of IBM. Keynote speaker David Pogue, New York Times tech reviewer, will examine trends on the IT horizon in his talk titled, "Disruptive Tech: What's New, What's Coming and How It Will Change Everything." Closing keynote speaker Bob Kodzis, president of Flight of Ideas Inc., will motivate attendees to boost individual creativity to add value.

Panel discussions driven by audience interaction will examine strategic approaches to IT from the business perspective and how global legislation will impact the future of IT security. Pre- and post-conference workshops offer hands-on training in areas such as IT risk governance and assessment, audits and data analytics, cloud computing, privacy requirements and the COBIT 5 Foundation Exam. COBIT 5 is a business framework for the governance and management of enterprise IT. Two milestones for ISACA's Certified Information Systems Auditor (CISA) designation will be recognized at the conference:  the certification's 35th anniversary and the 100,000th CISA certification.

Registration for North America CACS is US $1,550 for ISACA members and US $1,750 for nonmembers. Attendees can earn up to 39 continuing professional education (CPE) hours. Additional details and registration information on North America CACS are at www.isaca.org/NorthAmericaCACS.

About ISACA

With more than 100,000 constituents in 180 countries, ISACA® (http://www.isaca.org) is a leading global provider of knowledge, certifications, community, advocacy and education on information systems (IS) assurance and security, enterprise governance and management of IT, and IT-related risk and compliance. Founded in 1969, the nonprofit, independent ISACA hosts international conferences, publishes the ISACA® Journal, and develops international IS auditing and control standards, which help its constituents ensure trust in, and value from, information systems. It also advances and attests IT skills and knowledge through the globally respected Certified Information Systems Auditor® (CISA®), Certified Information Security Manager® (CISM®), Certified in the Governance of Enterprise IT® (CGEIT®) and Certified in Risk and Information Systems Control (CRISC) designations.

ISACA continually updates and expands the practical guidance and product family based on the COBIT® framework. COBIT helps IT professionals and enterprise leaders fulfill their IT governance and management responsibilities, particularly in the areas of assurance, security, risk and control, and deliver value to the business.

MORE HISTORIC HACKS
Would you like more insight into the history of hacking? Check out Calvin's other articles about historical hackery:
About the Author

GoCertify's mission is to help both students and working professionals get IT certifications. GoCertify was founded in 1998 by Anne Martinez.