INTERFACE Phoenix 2024
Welcome to INTERFACE Phoenix 2024! IT Infrastructure is constantly changing, bringing new challenges every day. From ransomware and the latest security threats to the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educate, advise...
INTERFACE Phoenix 2023
WELCOME TO INTERFACE Phoenix 2023! IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to needs for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educa...
INTERFACE Phoenix 2022
WELCOME TO INTERFACE Phoenix 2022! IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to needs for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educa...
Auditing Cybersecurity Programs
Cybersecurity is one of the biggest internal control areas that need executive attention. You just received an urgent call from the CEO. An e-mail was received demanding $10M Bitcoin to be paid as ransom to unencrypt the company's data. "Oh no! Maybe if we audited the organization's Cybersecurity program and controls before this happened, we might not be in this mess!" Sound familiar? Hundreds of Security, Compliance and Audit professionals ha...
Becoming an Awesome New Auditor!
So, you've accepted a new position as an Internal Auditor; congratulations, and welcome to our world! Internal Auditors provide an extremely important and unique function: to independently assess controls to balance risk that may impede the objectives of an organization. We are the "last line of defense" in organizations to report risk events. Please join us for this valuable in-person, interactive training and allow our expert instructors to...
Being an Audit Leader
Are your audit leadership skills working to get the job done? This in-person event is focused on helping attendees in mastering the skills necessary to efficiently lead audit teams. This course provides new leaders with the tools needed to effectively lead audit teams, while exploring the life cycle of an audit from an audit leader's perspective. "This course is not just for auditors or new audit leaders, it is for anyone who wants an understa...
Physical Security Engineering Convergen...
With electronic technologies quickly converging in the physical security vertical it is paramount to understand; first, the basics of physical security, ssecondly, how this new technology will effect the physical security landscape of the future, and thirdly, how the correct physical security environment can actually enhance the technology's effectiveness. Every good physical security program starts with assessing and quantifying criticality,...
Scottsdale Cyber Security Summit
The inaugural Scottsdale Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Standard Admission is $350 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception. Receive 50% off Admission with code GovEventsCSS
Internal Audit Basic Training Workshop
Join us for a unique, interactive course that "walks you through" the Internal Audit process. "This course is not just for auditors or new auditors. It is for anyone who wants an understanding of the relationship between business objectives, risk, control, assessment and reporting." This comprehensive internal audit training course is for anyone who wants to have a strong base of knowledge and understanding of the essential audit and the perso...
Cybersecurity Risk Program Training Academy
New cybersecurity risk regulations for all organizations are approaching faster than you might think. "Computers, software, programming and algorithms are all parts of a cybersecurity risk program, but it is the interaction with the "humans" that makes all the difference in the world." An effective cybersecurity risk program requires an organization to have everything from program policies to incident response plans to specific breach notifica...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.