Cybersecurity Fundamentals Career Starter


Oceania CACS – 11th to 13th September 2016



  Register Now!

Learn from world-changing thinkers and innovators in information systems audit, control and security

Oceania CACS 2016 Conference, will be hosted by the Papua New Guinea Chapter of
ISACA, in association with ISACA Brisbane Chapter. The conference will be held at the
Gold Coast Convention and Exhibition Centre, 11 – 13 September 2016. The theme for Oceania CACS 2016 is entitled:

Building Trust and Value in a Digital World – Protect, Govern, Empower.

A broad theme that will explore how to ensure organisations keep creating value, while at the same time safeguarding the necessary information. In today’s interconnected world organisations rely more and more on technology that is increasingly interconnected and accessible to third parties.

This technology brings a lot of business benefits and creates enormous value for
individual organisations and the society, as a whole. It’s difficult to imagine these days,
not being able to check-in online for a flight or pay a bill on the mobile. But the same
openness and connectivity, as we all know too well, is what creates challenges for us as
IS Governance, Assurance and Security professionals.


Bow Ties – Fashion & High Tech for the Project/Risk Manager

Thursday, August 25, 2016  to

401 Little Bourke, Melbourne (map)

The Apartment, 401 Little Bourke St, Melbourne VIC 3000

Is your project risk management trendy or dull?  Perhaps what you need is a good Bow Tie

…and there’s an app for that too!
The Bow Tie principle to analyse and document risk was used by Royal Dutch Shell back in the 70’s. Unlike 70’s fashion, it has taken a while to catch on but since then, construction, oil and gas, mining, banking/financial and IT companies amongst others, have discovered the power and simplicity of the Bow Tie principle to explore and communicate risk.This session analyses the use of the Bow Tie principle in project risk management and demonstrates how it can be used to better understand, manage and communicate Project Decision, Delivery and Delivered risk.This is a fashion item that should be part of the wardrobe of any project and risk manager. Come along and see how it can complement your Project Management outfit.

We are privileged to have an experienced risk expert such as David present this topic. David will leave you thinking about risk in a positive, different way.

Door prizes include a one year subscription to Protecht’s new iPad Bow Tie App, and a signed copy of David’s book, “A Short Guide to Operational Risk”.

Expand your Spreadsheet Smarts with ISACA Virtual Instructor Led Training

Ideal for Information technology auditors, financial, business process and compliance auditors, chief information officers and other IT executives, ISACA®‘s Virtual Instructor Led Training (VILT) course—Spreadsheet Controls: Finding and Controlling the Flow of Data—starts 28 September 2016.

Improve your understanding of effective spreadsheet programs through state-of-the-art, two-hour sessions that cover:

  • Spreadsheet program models
  • Techniques for determining the scope of high risk spreadsheets
  • How to perform analytical analysis of spreadsheets, understand the results and address the risks
  • Best practices for avoiding  future spreadsheet errors, and more

Sign up now and experience four weeks of expert-led VILT Spreadsheet Controls training at work, at home or on your travels.

Register Now >

Earn up to 8 CPEs!

Offering the best of both worlds: personal interaction with an experienced Deloitte instructor, and the convenience of online access to a virtual classroom —ISACA’s VILT can advance your knowledge, skills and career potential virtually anywhere you go.


Building Digital Trust


Data Privacy Asia 2016 - Asia's Premier Data Protection, Privacy and Cyber Security ConferenceBuilding Digital Trust - Establishing an Ecosystem of Trust and Protection in the Digital AgeVenue: One Farrer Hotel & Spa, 1 Farrer Park Station Rd Singapore 217562

Nexus of Data Protection, Privacy and Cyber Security.

Data Privacy Asia brings together in one forum, legal, compliance, IT and information security professionals to discuss issues of global importance from an Asian perspective. Data Protection, Privacy and Cybersecurity has moved from the periphery to the center, becoming a key issue that businesses have to face. Now more than ever, there is a greater imperative for Information Security, Assurance, Risk Management and Governance professionals to understand the implications and lead the way forward in our digital economy.

More Than 30 Sessions and Speakers from 15 Countries

Hear from global thought leaders as experts from around the world converge at Data Privacy Asia to discuss issues of global importance. Gain insights and learn what works.

Dr. Ann CavoukianCovering Developments in Data Protection and Privacy of 10 Asia Pacific Countries

Asia Pacific is the fastest growing region in the world. What are the developments in data protection and privacy regulations? What is Asia’s perspectives on global issues of digital trust? How will this impact global businesses expanding into this key market? Learn more and start expanding your Asia Pacific professional network.

 Michelle DennedyTechnology Revolution and the Future of Privacy

Michelle Dennedy, VP and CPO of Cisco Systems

  • Stevie Business Awards – Woman of the Year in Technology & Transformation
  • IAPP Vanguard Award
  • EWF-CSO Magazine Woman of Influence Awar

Carl E. Anduri, Jr.Leading Practitioners from Lex Mundi

World’s leading network of premier independent law firms

Carl E. Anduri, Jr., President at Lex Mundi, brings a team of thought leaders from more than 10 jurisdictions around the world to discuss the state of data protection, privacy and cyber security practices

Rebecca HeroldHands-On Training Workshop

Going Digital? Think Privacy Impact and Security Design

Go in-depth on Privacy Impact Assessments and the ISACA Privacy Principles with Rebecca Herold, lead developer and author of ISACA’s Privacy Principles and Program Management Guide. Learn More

Join us at Data Privacy Asia 2016

Take advantage of the special rates for ISACA members:

  • Register with the code DPA16SCEV1 for a 20% reduction.
  • Get 30% off for 3 or more attendees with the code DPA16SCEG1.
  • Hands-On Training Workshop (with conference pass purchase) at S$300.00
  • Be sure to also check out the Attendee Incentive Programme which provides you with further reductions off the conference fees.

Please contact the organizer for these additional offers:

  • ISACA CSX 2016 Asia Pacific Conference attendees get additional S$100 off
  • Get organized and get 35% off bulk conference passes of 10 or more

Register Now

Cyber Intelligence Forensic Investigation Summit

Cyber Intelligence Forensic Investigation Summit Melbourne – 20th and 21st September 

Melbourne Convention Centre: 1 Convention Centre Place, South Wharf, Victoria

cifiThe Melbourne CIFI Security Summit is an essential 2 day conference and exhibition bringing together leading security experts from across Australia to discuss Cyber Intelligence, Digital forensics, Cyber Security and Cyber Investigation. The event will explore the latest technologies in the industries, challenges being faced and the outlook for Cyber Security in Asia Pacific. This is the only event of its kind that will run 4 simultaneous streams over 2 days in addition to case studies and demonstrations from global business leaders. With 400 attendees expected from across a plethora of sectors and a sell- out exhibition, this is the must attend event of the year!



Melbourne Chapter wins K. Wayne Snipes Award 2015

K. Wayne Snipes Award 2015The ISACA Melbourne Chapter has earned the 2015 K. Wayne Snipes award for the Best Very Large Chapter in Oceania. The award will be presented to our chapter at the 2016 Global Leadership Summit scheduled to take place in Lisbon, Portugal on 7-9 April, 2016. Worldwide winners will be announced at the Global Leadership Summit.