GAM 2014 Speaker Interviews

CS 4-3 Fraud in the Digital Age

Speaker: Lynn Fountain, CRMA
Session Date & Time: Tuesday, March 25th at 10:15 a.m.

What you will learn during this GAM session:

  • Understand the inherent dynamics in today’s technologically advanced society that contribute to the “fraud triangle.”
  • Review the evolution of fraud and the contributing impact found in advancements such as social media, the cloud, and advanced data systems.

CS 5-4 Success Strategies: Integrating Data Analytics in a Risk-Based Audit Plan

Speakers: Andrew Simpson and Todd Freeman
Session Date & Time: Tuesday, March 25th at 12:45 p.m.

What you will learn during this GAM session:

  • Learn how to apply data analytics to overall risk assessment.
  • Integrate analytics into the audit management processes.
  • Identify how analytics are employed throughout a risk-based audit life cycle as part of risk assessment by testing internal control effectiveness, benchmarking with external data, and looking at trends and predictions.
  • Apply strategies for effective use of analytics, drawn from real-world examples.

​CS 1-4 COBIT 5: A New Governance Framework for Managing and Auditing the Technology Environment

Speaker: Nelson Gibbs
Session Date & Time: Monday, March 24th at 12:45pm

What you will learn during this GAM session:

  • How IT management issues affect enterprises.
  • Assess how the COBIT 5 processes help guide the creation of the five basic principles and the seven governance and management enablers.
  • Understand the differences between COBIT 4.1 and COBIT 5 and what to consider when transitioning.
  • Explain the benefits of using COBIT 5.

CS 7-5 Impact of Privacy and Data Collection on Organizational Compliance Risk: What the CAE Should Know

Speaker: Omer Tene, Ph.D.
Session Date & Time: Tuesday, March 25th at 3:55 p.m.

What you will learn during this GAM session:

  • Learn how privacy can impact business processes in a big data environment.
  • Discover the challenges and complexities of managing privacy expectations across cultures and business models.
  • Find out what key concepts mean, including privacy impact assessment, security breach notification, privacy by design, and data protection by default.