A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Blending business and technical benefits together to achieve an effective and streamlined compliance assessment.  (Hacking Illustrated Series InfoSec Tutorial Videos)

Blending business and technical benefits together to achieve an effective and streamlined compliance assessment.
Jim Czerwonka and Jimmy Noll 

        The business considerations of determining where an organization stands with its IT enterprise wide compliance posture from a senior management perspective to the technical professional’s perspective. We will address creating a cost effective and efficient compliance program through the use of technical resources and automated tactical tools to meet senior management’s compliance strategy. 

Speakers:  Jim Czerwonka and Jimmy Noll 

Mr. Noll, CISSP is the Director of Security Solutions with Systems Design Group. Mr. Noll manages the daily operations of the security practice. He also served as SDG’s senior technology consultant where he spent the last six years focused on information security and network infrastructure design and protection for clients.

Mr. Czerwonka, CISA, CISM, CGEIT is a Compliance Specialist with Systems Design Group. He has significant tactical and management experience as a compliance and audit, information technology, and business process professional. His industry experience includes healthcare, manufacturing, “Big 4” IT audit and management consulting, and financial services

 

Download link: http://blip.tv/file/get/Irongeek-2009LMIJimCzerwonkaJimmyNoll829.mp4

Descriptions and details from http://www.louisvilleinfosec.com, with small edits.
Thanks to Lee Pfeiffer and the student volunteers for handling the video the day of the conference, and Brian Blankenship for editing the videos.

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast