Print Page   |   Contact Us   |   Sign In   |   Join
AEA Search
Annual General Meeting - AEA Ottawa-Gatineau
View Registrations Tell a Friend About This EventTell a Friend
 

Great AGM Lined up starting with an All-Canadian Breakfast and three professional development seminars by seasoned professionals on Cyber-Secured Business Assurance, IT Governance and Security Architecture: Crypto Underpinnings of Secure Infrastructure. This will be followed up by a one hour Chapter Meeting to look at what happened this year and plan for the next. Please register at https://www.eventbrite.ca/e/annual-general-meeting-aea-ottawa-gatineau-chapter-tickets-34915325679 .

6/15/2017
When: 6/15/2017
"From 0730 AM to 12:00 Noon"
Where: Sheraton Hotel
150 Albert Street
Ottawa K1P5G2
Canada
Presenter: Numerous
Contact: Robert Weisman
1-613-841-5118

« Go to Upcoming Event List  

Joint Annual General Meeting

AEA Ottawa – Gatineau Chapter

ISACA Ottawa Valley Chapter

15th of June 2017 - 0730-1200 hrs

Sheraton Ottawa Hotel, 150 Albert Street, Ottawa, ON, K1P 5G2, Canada

Agenda

  1. 0730 – Breakfast Starts
  2. 0800 – Welcome Address
  3. 0810-0900 – Next Generation Auditing: Cyber Secured Business Assurance - Dr. Philip Elsas – Redcanari
  4. 0900-1000 - Public Sector IT Governance Lessons from US State and Federal Governments? How Can They Help Canada Improve? Dr. Jim Denford – Royal Military College of Canada (Kingston Ontario)
  5. 1000-1100 - The Cryptographic Underpinning of Enterprise Security Infrastructure - Bruno Couillard – CTO - Chrysalis-ITS
  6. 1100 – 1200 General Meetings - ISACA – Main Hall and AEA Meeting Room Adjacent

PLEASE REGISTER at https://www.eventbrite.ca/e/annual-general-meeting-aea-ottawa-gatineau-chapter-tickets-34915325679. Lots of Door Prizes !!!

Presentation 1 - Next Generation Auditing: Cyber Secured Business Assurance

Dr. Philip Elsas, Director R&D, Red Canari Information Security

Abstract - The current and internationally accepted Audit Risk Model (ARM), as per the International Standards on Auditing is AR = IR x CR x DR, where AR is Audit Risk; IR is Inherent Risk; CR is Control Risk; and DR is Detection Risk. Furthermore, standard ARM reasoning says that when CR is high, investigating more data will lower DR. For independent, external audit, today’s ARM works well in detecting fraudulent overstatement; but fails in cases to detect fraudulent understatement. Missing or weak completeness controls results in missing data that is hard, if not impossible, to find. This is exacerbated as much of the data, due to weak controls, is provided by the very party who is committing the fraud. This is particularly relevant to extended enterprise operations such as supply chain.

This presentation will demonstrate, using Dutch Government and Private Sector case studies, a refined ARM that leverages existing cybersecurity controls in conjunction with process and data mining to determine those that are not used effectively. The baseline completeness controls coincide with cyber baselines like Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE) and Open Vulnerability, Assessment Language (OVAL) and can be used with standards such as the Canadian Government ITSG-33 - IT Security Risk Management: A Lifecycle Approach.

Biography - Dr. Philip Elsas is R&D director at Red Canari Information Security and is founder and director of ComputationalAuditing.com, starting in the Netherlands in 2003 and in Canada in 2006. From 2010 to 2015, ComputationalAuditing.com, PricewaterhouseCoopers and the Dutch Tax Agency partnered in the Jacquard project “Next Generation Auditing: Data-assurance as a Service” led by the National Center of Mathematics and Computing Science in the Netherlands. Prior to ComputationalAuditing.com Philip spent 15 years with Deloitte: the first half in auditing, the second in consultancy, with a 3-year intermezzo at Bakkenist Management Consultants, sold to Deloitte in 1999.

Philip holds a PhD in mathematics and computing science in the field of financial auditing. His dissertation "Computational Auditing" appeared in 1996, in courtesy of Deloitte in cooperation with the VU university of Amsterdam, the Netherlands, and was directly after appearance awarded the Alfred Coini auditing prize.

Presentation 2 - Public Sector IT Governance Lessons from US State and Federal Governments? How Can They Help Canada Improve?

Dr. James S. Denford, Associate Professor of Management and the Interim Dean of Arts at the Royal Military College of Canada (RMC)

Abstract: In cooperation with US colleagues, Dr Jim Denford has conducted a series of studies of US public sector IT governance extending including both state and federal levels. State-level findings have been in areas of legislative oversight and steering, decisions on centralization and decentralization, and factors that enable innovation ecosystems. Federal-level findings have been in domain of IT-led innovation and the creation of a culture and the metrics to grow it. Discussion will focus on differences between Canadian and US realities and how some of the lessons may be applicable in a Canadian context.

Biography - Dr. James S. Denford is an Associate Professor of Management and the Interim Dean of Arts at the Royal Military College of Canada (RMC). He holds a PhD in Management Information Systems from Queen’s University and an MBA and Bachelor of Engineering Management from RMC. Before making the transition to academics, he spent 24 years as an Army Officer in the Royal Canadian Corps of Signals in diverse roles including tactical communications and information systems deployment, IT project management, network management and operations, and IT training. He also led two defense research labs, first as Director of the Army Experimentation Centre and then as the Director of the Electro-Magnetic Battlespace Lab. In these roles, Dr Denford employed advanced simulation systems to create IT-enabled innovation in both Army and Joint manoeuver and network operations within complex security environments.

Within the Association of Information Systems, Dr. Denford is the President-Elect of the College of Academic Leadership and Vice-President of the Special Interest Group on IS Leadership. Applying his expertise and interest in this area, he is the Track Chair for IS leadership at the annual Americas Conference on Information Systems. In addition to his current decanal role at RMC, he previously served as Interim Dean of Continuing Studies, Department Head for Management & Economics and Director of Research Administration at the university. His research is focused on strategic alignment, knowledge strategy, IT governance and innovation. His research has appeared in the Journal of Management Information Systems, the Journal of Strategic Information Systems, the Journal of Knowledge Management, and various other knowledge management and information systems journals, books, and public forums including InformationWeek, the IBM Center for The Business of Government and the Brookings Institution.

Presentation 3 - The Cryptographic Underpinning of Enterprise Security Infrastructure

Bruno CouillardCTO Chrysalis-ITS

Abstract: - Much of the security infrastructure underlying our modern information-driven society depends on the strength of our cryptographic algorithm and protocols. These are the engines providing the secure transport, integrity and storage for our precious secrets and private data. As is the case for jet engines needing high-end fuel, so too do cryptographic engines need strong random source for their keying material. This talk will focus on the quality or presumed quality of the random data being used in existing cryptographic systems and describe new emerging techniques that are coming to the rescue.

Biography - Bruno Couillard has over 30 years of experience in the field of cybersecurity and security technology in general. He is best known for his leading role in the development of the Luna hardware security module (HSM) and as the co-founder and Chief Technology Officer (CTO) at Chrysalis-ITS. He has also played a leading role in multiple high assurance security product evaluations as well as being involved with the Canadian Cryptographic Modernization Program since its inception as a senior security engineer.

Sign In
Login with LinkedIn
OR
Sign In securely
Latest News
AEA Events

1/25/2018
AEA Webinar with Jason Uppal | Enterprise Architecture Driven Innovation - Session 3

1/29/2018 » 2/1/2018
The Open Group San Diego | The Value of Reference Architectures

1/31/2018
TOGAF® and ArchiMate® User Group Meeting - San Diego, CA USA

2/1/2018
AEA Webinar with Jason Uppal | Enterprise Architecture Driven Innovation - Session 4

2/22/2018 » 2/24/2018
The Open Group Conference and Awards for Innovation and Excellence | Bangalore, India

 

Join our AEA LinkedIn Group!