Central Maryland Chapter Monthly Meeting, Seminar, other Event History
2023
Monthly Meetings, Seminars, and Social Events
Date(s)
|
Topic(s)
|
Speaker(s)
|
CPEs
|
January 11, 2023
|
The Nine C's of Cyber
|
G. Mark Hardy |
7 |
February 14. 2023
|
So, You Think You're Ready for a CMMC L2 Assessment?
|
Joy Beland, Amira Armond |
3 |
March 8, 2023
|
Transformational Leadership: Keys to Making Positive Impact
|
Dr. Lucy Surhyel Newman |
3 |
April 12, 2023
|
Topic: 1. Next Level Threats: A Conversation with Artificial Intelligence
Topic: 2. How to Risk Score Anything
Topic: 3. Lessons Learned from Implementing Continuous Auditing
|
Peyton Hahn |
3 |
April 24 - 27, 2023
|
ISACA-CMC 2023 Spring Seminar:
Audit Masterclass: IT Audit in the Digital World
Business Centric Cybersecurity Risk and Security Workshop
|
Allan Broadman |
14 per seminar / up to 28 total |
May 10, 2023
|
Topic 1: . Human Vulnerabilities in Cybersecurity: Strategies for Mitigating Social Engineering and Insider Threats
Topic 2: Stealing Innovation: Understanding the Threat of Corporate Espionage and Intellectual Property Theft
Topic 3: Guarding Your Ideas: Strategies for Protecting Intellectual Property Against Espionage and Theft
|
Shawnee Delaney |
3 |
June 9, 2023
|
ISACA CMC 22nd Annual Orioles Ball Game Social Event at Camden Yards
|
NA - Social Event |
N/A |
July 29, 2023
|
ISACA-CMC 1st Annual Picnic
|
N/A - Social Event |
N/A |
August 25, 2023
|
ISACA-CMC 6th Annual Golfing Tournament
|
N/A - Social Event |
N/A |
|
|
|
|
2022
Monthly Meetings, Seminars, and Social Events
Date(s)
|
Topic(s)
|
Speaker(s)
|
CPEs
|
January 12, 2022
|
ISACA-CMC 18th Annual Day of Training with G. Mark Hardy - January 2022 Virtual Training
|
G. Mark Hardy |
7 |
February 9, 2022 |
ISACA-CMC February 2022 Virtual Training |
Foster Davis, John Lundgren |
3 |
March 9, 2022 |
ISACA-CMC March 2022 Virtual Training (SheLeadsTech Event 2022) |
Emily Bastedo, ISACA International, Wendy Wang, CareFirst, Maxene Bardwell, WSSC Water, Cristin Cambar, CareFirst, Uche Ogbuokiri, Brown Advisory, and Keynote Speaker Jennifer Swann, Bloomberg Industry Group |
3 |
April 13, 2022 |
ISACA-CMC April 2022 Virtual Training |
Jim Meyer, Jim Bothe |
3 |
May 18, 2022 |
ISACA-CMC May 2022 Virtual Training |
Mike Raggo |
3 |
August 5, 2022 |
ISACA CMC 21st Annual Orioles Ball Game Social Event at Camden Yards
|
N/A |
N/A |
August 26, 2022 |
ISACA-CMC 2022 5th Annual Golfing Tournament |
N/A |
N/A |
September 14, 2022 |
ISACA-CMC September 2022 Virtual Training |
Tom Conkle, Kelly Hood |
3 |
September 24, 2022 |
ISACA-CMC 6th Annual Crab Feast
|
N/A |
N/A |
October 13, 2022 |
ISACA-CMC October 2022 Virtual Training
|
Dr. Baljeet Malhotra |
3 |
November 7-10, 2022 |
ISACA-CMC 2022 Fall Seminar
|
John Tannahill, |
up to 32 |
|
|
|
|
|
|
|
|
2021
Monthly Meetings, Seminars, and Social Events
Date(s)
|
Topic(s)
|
Speaker(s)
|
CPEs
|
February 10, 2021 |
ISACA-CMC February 2021 Monthly Virtual Meeting |
Vivien Osamiluyi, Maria Asuelimen, Wendy Wang |
3 |
March 10, 2021 |
ISACA-CMC March 2021 Monthly Virtual Meeting |
J. Foster Davis, John Lundgren |
3 |
May 11, 2021
|
ISACA-CMC May 2021 Monthly Virtual Meeting |
Mike Raggo |
3 |
August 20, 2021 |
ISACA-CMC 2021 4th Annual Golfing Tournament |
N/A |
N/A |
September 15, 2021 - September 16, 2021
|
ISACA-CMC September 2021 Monthly Virtual Meeting |
John Gatto |
8 |
September 25, 2021
|
ISACA-CMC 5th Annual Crab Feast
|
N/A |
N/A |
October 12, 2021
|
ISACA-CMC October 2021 Monthly Virtual Training |
Baljeet Malhotra |
3 |
November 10, 2021
|
ISACA-CMC November 2021 Monthly Virtual Training |
Mark Berman, Jim Goepel, Michael Kelleher, Sara Keith |
6 |
December , 2021
|
AGA and ISACA-CMC Joint December 2021 Virtual Training |
Charlton Sampson, Larry G. Wlosinski |
3 |
2020
Monthly Meetings, Seminars, and Social Events
2019
Monthly Meetings, Seminars, and Social Events
Date(s)
|
Topic(s)
|
Speaker(s)
|
CPEs
|
December 11, 2019 |
Emerging Technology and Adopting Privacy Centric Security |
Bo Shevchik and Sameer Ahirrao |
3 |
November 13, 2019 |
CMMI Cybermaturity Platform Workshop and Complimentary Happy Hour |
Tom Conkle and Kelly Hood |
4 |
October 23-24, 2019 |
Business Continuity Management for I.S. Auditors and Security Professionals (Seminar) |
Steven Ross and Stacy Olewiler |
16 |
October 21-22, 2019 |
Auditing Security, Resilience and Controls in the Cloud….and Beyond (Seminar) |
Steven Ross and Stacy Olewiler |
16 |
October 9, 2019 |
IoT Security & Industrial Critical Infrastructure |
Navarasu Dhanasekar |
3 |
September 19, 2019 |
Early Career and Young Professionals Multi-Organization Networking Social |
N/A |
N/A |
September 13, 2019 |
2019 Golfing Event at The Woodlands Golf Course |
N/A |
N/A |
September 11, 2019 |
Cloud Strategies and Cybersecurity Best Practices |
Jim Meyer and Tina C. Williams-Koroma |
3 |
July 12, 2019 |
2019 Orioles Event |
N/A |
N/A |
June 1, 2019 |
3rd Annual Crab Feast and Family Picnic at Kurtz's Beach |
N/A |
N/A
|
May 8, 2019 |
Data-Centric Security Approach to Cybersecurity / Learning from the Past to Protect the Future / Annual General Meeting / Happy Hour |
Justin Wilkins and David Abramowitz |
3
|
April 27 - 28, 2019 |
CyberSecurity Nexus (CSX) Fundamentals Workshop |
Lei Zhao |
16
|
April 24 - 25, 2019 |
Virtualization Security and Audit |
John Tannahill |
14
|
April 22 - 23, 2019 |
Cloud Computing Security and Audit |
John Tannahill |
14
|
April 13, 2019 |
ISACA-CMC Young Professionals Duckpin Bowling Event |
N/A |
N/A
|
April 10, 2019 |
Artificial Intelligence: Technology, Usage, Training, Companies, and Job Market / A Security and Privacy Perspective |
Larry G. Wlosinski |
3
|
March 13, 2019 |
CMMI Cybermaturity Platform / Data Minimization |
Tom Conkle, Kelly Hood, and Sameer Ahirrao |
3
|
February 13, 2019 |
ETHICS and Internal Audit / Auditor’s Role in System Development |
John Gatto |
7
|
January 9, 2019 |
16th Annual Day of Training with G. Mark Hardy |
G. Mark Hardy |
7
|
2018
Monthly Meetings, Seminars, and Social Events
Date(s)
|
Topic(s)
|
Speaker(s)
|
CPEs
|
December 12, 2018
|
Limitless Possibilities: Technology and Tomorrow's Profession Change Management Best Practices for ERP Systems |
Kimberly Ellison-Taylor, Jeffrey T. Hare |
3
|
November 14, 2018 |
IT Audit/IT Risk Roundtable |
Johan Lidros |
7
|
October 26, 2018 |
2018 Golfing Event at Diamond Ridge Golf Course |
N/A |
N/A
|
October 22-23, 2018 |
Prevention, Detection, and Recovery from Cyberattacks (Seminar) |
Steven Ross and Robert Parker |
16
|
October 24-25, 2018 |
Data Privacy for IT Auditors and Information Security Professionals (Seminar) |
Robert Parker and Steven Ross |
16
|
October 10, 2018 |
Journey to Eliminate Passwords |
Chris Kostick |
3
|
September 12, 2018 |
Red Teaming and The State of Endpoint Protection |
Jim Bothe, Jim Meyer and John Linkous |
3
|
July 27, 2018 |
2018 Orioles Event |
N/A |
N/A
|
June 2, 2018 |
2018 Picnic at Kurtz's Beach |
N/A |
N/A
|
May 9, 2018 |
Cloud Computing Security and Protiviti Complementary Happy Hour |
Olav Jensen and Jeff Hochberg |
3
|
April 25-26, 2018 |
Risk Management and Control (Seminar) |
Alejandro Mijares |
14
|
April 23-24, 2018 |
Cybersecurity: How to Prevent, Detect and Recover from Cyberattack (Seminar) |
Alejandro Mijares |
14
|
April 11, 2018 |
Current Trends in Healthcare Information Security and HIPAA Compliance |
Corrin Woodard and Kyle Martin |
3
|
March 14, 2018 |
Data Loss Prevention (DLP): A Management Perspective and Cloud Security Update |
Larry G. Wlosinski |
3
|
February 14, 2018 |
Defense Federal Acquisition Regulation Supplement (DFARS) and Auditing Laptop Life Cycle Management |
Collin Freebourne Jr and Lane Boyd |
3
|
January 24, 2018 |
15th Annual Day of Training with G. Mark Hardy |
G. Mark Hardy |
7
|
2017
Monthly Meetings, Seminars, and Social Events
Date(s)
|
Topic(s)
|
Speaker(s)
|
CPEs
|
December 13, 2017 |
AICPA Framework and Cybersecurity risk management programs and On-Premise Technology with a ‘Pay as you Use’ Cloud Utility Model |
James DeVaul, Ray DiGradoand, Kyle Fredette |
3
|
November 15, 2017 |
Today’s Cyber Challenges: Methodology to Secure Your Business |
Joe Leonard |
3
|
November 8-9, 2017 |
Windows 10 Security and Audit (Seminar) |
John Tannahill |
14
|
November 6-7, 2017 |
Cybersecurity and Emerging risk areas (Seminar) |
John Tannahill |
14
|
October 11, 2017 |
Securing Business Cloud Transformation and Automating SOC Operations |
Carlos Gonzalez and Karlo Arózqueta |
3
|
September 13, 2017 |
Insider Threats and Secure Way to Transition off of Tape to the Cloud |
Michael Miller and James Dowd |
3
|
June 16, 2017 |
2017 Orioles Event |
N/A |
N/A
|
June 3, 2017 |
Picnic at Kurtz's Beach |
N/A |
N/A
|
May 10, 2017 |
Cybersecurity Threat Defense and Shared Responsibility in the Public Cloud |
Tim Baker and John Lednak |
3
|
April 26 - 27, 2017 |
Cybersecurity Tabletop Exercise (Seminar) |
Michael DaGrossa |
14
|
April 24 - 25, 2017 |
Auditing in an Internet of Things (IoT) environment (Seminar) |
Robert Moeller |
14
|
April 12, 2017 |
What Are Those Data Breach Reports Telling Us? and Privacy: From A Data Governance Perspective |
Larry G. Wlosinski |
3
|
March 8, 2017 |
Amazon Web Services Security & GovCloud |
Keith Brooks and Leo Zhadanovsky |
3
|
February 8, 2017 |
Business Continuity Management |
Matthew DeFrain |
3
|
January 18, 2017 |
14th Annual Day of Training with G. Mark Hardy |
G. Mark Hardy |
7
|
2016
Monthly Meetings, Seminars, and Social Events
Date(s)
|
Topic(s)
|
Speaker(s)
|
CPEs
|
December 14, 2016 |
Cybersecurity and threats and Cyber Value-at-Risk (CyVaR) |
Conrad Bovell and Dr. James L. Ulrich |
3
|
November 9, 2016 |
Real World Cloud Security (IaaS and SaaS case study) |
Vikas Mahajan |
3
|
October 24-25, 2016 |
Cyber Risk Assessment, Audit and Control (Seminar) |
Michael DaGrossa |
14
|
October 26-27, 2016 |
Securing Cyber Infrastructure from Crime, Hacking and Attack and setting preventive measures (Seminar) |
Michael DaGrossa |
14
|
October 12, 2016 |
How FITARA will improve Cyber Security |
Tom Harrell, Kevin J. Stevens |
3
|
September 14, 2016 |
Planning for a Cybersecurity Data Breach and Insiders are the New Malware |
Jim Bothe, Jim Meyer, Justin Wilkins |
3
|
July 22, 2016 |
2016 Orioles Event (O’s vs the Cleveland Indians) |
N/A |
N/A
|
May 11, 2016 |
FBI Overview & Community Outreach Program Human-Enabled Computer Intrusion: The Cyber Insider Threat FBI InfraGard Program |
Marvella Gray, Daniel Gray, Steve Shepherd |
3
|
April 27-28, 2016 |
Securing & Auditing Mobile Technologies - A Cyber Security Perspective (Seminar) |
John G. Tannahill |
14
|
April 25-26, 2016 |
Database Security and Audit - A Cyber Security Perspective (Seminar) |
John G. Tannahill |
14
|
April 13, 2016 |
Exploration of the NIST Cybersecurity Framework |
Jim Meyers and Jim Bothe |
3
|
March 9, 2016 |
Risk Assessment Analytics and Financial Statement Analytic and HIPAA Privacy and SOC2 requirements for HIPAA |
Lionel Texeira and Mirang Kenia |
3
|
February 10, 2016 |
Mobile Device Security and A Security Analysis of the Mobile Device Environment |
Larry G. Wlosinski |
3
|
January 13, 2016 |
|
G. Mark Hardy |
7
|
2015
Monthly Meetings, Seminars, and Social Events
Date
|
Topic
|
Speaker
|
CPEs
|
December 9, 2015 |
Third Party IT Security Issues/Opportunities |
Ellen Ozderman |
3
|
November 11, 2015 |
XSS Attack & Oracle App Access Controls Governor |
Daniel Zimerman & Lane Boyd |
3
|
November 4-5, 2015 |
Virtualization Security and Audit Seminar (Seminar) |
John Tannahill |
14
|
November 2-3, 2015 |
Audit & Security of Firewalls Seminar (Seminar) |
John Tannahill |
14
|
October 14, 2015 |
Malware |
Larry G. Wlosinski |
3
|
September 9, 2015 |
Incident Response Planning |
Jim Bothe and Jim Meyer |
3
|
May 20, 2015 |
Cloud Computing Security and Audit (Seminar) |
John Tannahill |
7
|
May 18-19, 2015 |
Cyber Security and Emerging Risks (Seminar) |
John Tannahill |
14
|
May 13, 2015 |
Cyber Security: Managing Network Authentication Protocols |
Nathan Mason |
3
|
April 8, 2015 |
Incident Response Planning and Happy Hour |
Jim Bothe and Jim Meyer |
3
|
March 11, 2015 |
Secure the Breach & Implement a SOC 2 Report |
Ron Stamboly & Ngy Ea |
3
|
February 11, 2015 |
Moving from Threat-based to Risk-based Security |
Ted Ritter |
3
|
January 15, 2015 |
12th Annual Day of Training with G. Mark Hardy |
G. Mark Hardy |
7
|