Financial Institution Cyber Security Case Study (Financial Institutions Conference)

CPE

CPE Credits
1-Other

Details

 Pricing

PICPA Member: $29 | Nonmember: $39


 More Information

Course No.
ON-DEMAND
Level
Update
Prerequisites
None
Note

You will have up to 90 days after the date of purchase to complete the course and take the exam.

Description

If you attended the Financial Institutions Conference on September 28-29, 2015, this course would be considered a duplicate and cannot be used towards your CPE requirement.

Learn how hackers bypass IT controls and how a hacking attempt is structured.

Hear Sudhir Kondisetty, CISSP, CISA, QSA, cover the following:

  • Security threat update
  • Case study
  • Tips to mitigate a data security breach


Speaker(s)

Sudhir K. Kondisetty, CISSP, CISA, QSA
Principal, Risk Advisory Services
RSM US LLP

Sudhir Kondisetty leads the Philadelphia region risk advisory practice. In this role, Sudhir oversees projects over a wide range of services, including internal audit/SOX, IT risk, financial regulatory compliance, security, enterprise risk management, and more. Additionally, Sudhir serves as the managing partner of the Philadelphia office. Lastly, Sudhir services as RSM’s northeast leader of Culture, Diversity, and Inclusion (CDI), an important initiative to increase employee and client engagement.

Prior to leading the risk advisory practice, Sudhir was involved in leading IT risk advisory projects, including IT risk assessments, IT general controls reviews, network infrastructure security testing, Sarbanes-Oxley IT reviews, Payment Card Industry (PCI) audits, Service Organization Control (SOC) attestation engagements, and IT project management. He has 20 years of consulting experience in various industries.

Sudhir carries many professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Payment Card Industry Security Standards Council Qualified Security Assessor (QSA), Certified in the Governance of Enterprise IT (CGEIT), CheckPoint Certified System Administrator (CCSA), and Microsoft Certified Systems Engineer (MCSE).

Received 7/2016

 


You May Also Like

Emerging Issues in Professional Ethics Webcast
April 24 | Webcast
Learn about the latest developments in professional ethics, including the new codification of the AICPA Code of Professional Conduct, recent changes to the Code of Professional Conduct, and hot topics ...
Identity Theft: Preventing, Detecting, and Investigating Identity Theft
Sept. 21 | Malvern
Learn how to detect, investigate, and report identity theft. Understand how thieves obtain personal information. Learn strategies to educate and advocate for your client and to assist them in recovery. ...
Internal Control Best Practices for Small and Medium-Size Entities
Oct. 26 | Philadelphia
Understand and adapt the 2013 COSO Internal Control – Integrated Framework (the COSO framework) to small and medium-size entities. Identify best practices for designing, implementing, monitoring, evaluating, and auditing cost-effective ...