IIA and ISACA Spring Training - March 30-April 1, 2020 Suburban Collection Showplace Novi, MI - The Institute of ...

Page created by Alan Wang
 
CONTINUE READING
IIA and ISACA Spring Training - March 30-April 1, 2020 Suburban Collection Showplace Novi, MI - The Institute of ...
21ST ANNUAL
IIA and ISACA Spring Training

          March 30—April 1, 2020
       Suburban Collection Showplace
                 Novi, MI
IIA and ISACA Spring Training - March 30-April 1, 2020 Suburban Collection Showplace Novi, MI - The Institute of ...
Welcome
If you are responsible for your company's internal auditing, information systems security
and integrity, accounting, finance, Sarbanes-Oxley compliance or other regulatory
matters, or simply need continuing education, you will want to join us for the 21st annual
Detroit Spring Training event.

The Detroit Chapters of the IIA and ISACA are proud to co-sponsor the annual Spring
Training Event. Our goal is to provide a world-class training event tailored to your
needs. Each year, the Spring Training Committee offers a comprehensive series of
course offerings for our members and guests. The 2020 event is no exception.

A number of classes sell out each year so register early. Don't miss this opportunity to
network with your peers, enhance your skills, and learn about new products and services
in the marketplace!

Class size is limited. To be fair and equitable to all, we operate on a first-come
first-serve basis, and maintain a wait list for all sold out courses. Materials are only
ordered for registered individuals. Therefore, registrants are required to attend the
course(s) for which they registered unless they receive prior written approval from the
Spring Training Chairperson.    Registrants attending unauthorized classes will not be
awarded continuing education credits.

We look forward to seeing you at the Spring Training event!

The 2020 Spring Training Committee
Daniel Wiechec, Spring Training Co-Chair
Eulonda Whitmore , Spring Training Co-Chair
Christine Dobrovich
Amber Dunn
Juman Doleh-Alomary
Rhoda Henderson-Fields
Richard Lowe
Diana McFadden
Jason Angelo Sist
Amanda Spikes
Marty Wood

                     NETWORKING SOCIAL EVENT!

   We will have a cocktail social hour on Tuesday, March 31 from 4:30 to 6:30 pm
     at the Hyatt Place, which is adjacent to the Suburban Collection Showplace.

                                              2
IIA and ISACA Spring Training - March 30-April 1, 2020 Suburban Collection Showplace Novi, MI - The Institute of ...
RETURNING THIS YEAR–VENDOR EXPO!
We have invited audit and assurance vendors to set up displays during the training event
giving you an opportunity to learn about products and partners that are in the marketplace,
and their associated benefits for your organization.

Contact Amanda Spikes at amandaspikes@kpmg.com or Jason Sist at jason.sist@gmail.com
for information on sponsorship opportunities.

                                             3
IIA and ISACA Spring Training - March 30-April 1, 2020 Suburban Collection Showplace Novi, MI - The Institute of ...
2020 Spring Training Program

TRACK          MON MARCH 30                        TUES MARCH 31                      WED APRIL 1

            Bribery & Corruption—            Forensic Auditing—Finding        Embezzlement—Prevention
        Risk Mitigation & Investigation      the Needle in the Haystack          thru Investigation
 A                Strategies
                                                   Paul Zikmund                       Paul Zikmund
                Paul Zikmund

        Change the Way You Change                The Power of Social-          Communication Skills for
        Minds: The Power of Influence           Emotional Intelligence             Professionals
 B             and Persuasion
                 Keith Levick                       Keith Levick                      Keith Levick

        Ethical & Authentic Leadership:      Critical Thinking & Problem
         How to Promote a Culture of                                         Credibility & Influence: How
                                             Solving: How to Reason and        to Consistently Achieve
 C                 Integrity                   Resolve Issues Logically           Positive Outcomes
                Don Levonius                       Don Levonius                       Don Levonius
          Alphabet Soup: GRC, ERA,
          ARA, ITRA and IA—How to                   Agile Auditing           Business Ethics for Business
              Connect the Dots                                                         People
 D
                                                  Danny Goldberg                   Danny Goldberg
              Danny Goldberg

        Cyber Security & Emerging Risk                        Linux Security and Audit
  E                  Areas
                                                                     John Tannahill
               John Tannahill

                                             Internal Audit University
  F
                                                Hernan Murdock

                                                Advanced Auditing
 G
                                                  Peter Higgins

                                Fundamentals of Auditing Process Automation
 H
                                                  Tom Salzman

                                          Successful Audit Data Analytics
  I
                                                 Jim Tarantino

         Effective Audit Report Writing                  Best Practices in Internal Auditing
  J
                 James Roth                                           James Roth

        Understanding Blockchain: The                         Assessing Data Reliability
          Underlying Technology for                             Leighton Johnson
 K
            Trusted Transactions
              Leighton Johnson
                                                  Cybersecurity Audits of Modern Web Applications
           Auditing Cybersecurity of
  L           Wireless Networks
                                                                      Ken Cutler
                  Ken Cutler

                                                   4
IIA and ISACA Spring Training - March 30-April 1, 2020 Suburban Collection Showplace Novi, MI - The Institute of ...
TRACK A-1 - MONDAY, MARCH 30
    BRIBERY & CORRUPTION—RISK MITIGATION & INVESTIGATION STRATEGIES
                                  INSTRUCTOR: PAUL ZIKMUND
                                                 7 CPEs

Seminar Focus and Features
In this seminar, attendees will have the opportunity to learn about proven strategies and best practices
for minimizing the risk, detecting red flags and investigating incidents of bribery and corruption. The
impact of bribery and corruption has increased tremendously as the government has become very
aggressive in their efforts to prosecute companies and individuals for violations of the FCPA.
Additionally, other foreign countries have recently passed laws aimed at aggressively targeting this
fraud. Attendees will learn effective techniques to address this risk including the following:

•   Updates on US and other foreign country anti-corruption laws

•   Impact of bribery and corruption schemes

•   Recommendations for developing, implementing and administering best in class compliance
    programs to reduce the risk and protect organizations from incidents of bribery and corruption

•   Methods to deter and detect incidents of bribery and corruption

•   Proven investigative techniques to investigate red flags and help ensure appropriate response and
    resolution to these cases

This highly interactive session will challenge attendees and provide excellent tools and techniques for
anyone involved in the deterrence, detection and investigation of bribery and corruption.

Prerequisite: None
Learning Level: Fundamental
Field of Study: Auditing, Fraud Investigation, or Risk Management

                                                     5
IIA and ISACA Spring Training - March 30-April 1, 2020 Suburban Collection Showplace Novi, MI - The Institute of ...
TRACK A-2 - TUESDAY, MARCH 31
             FORENSIC AUDITING—FINDING THE NEEDLE IN THE HAYSTACK
                                   INSTRUCTOR: PAUL ZIKMUND
                                                  7 CPEs

Seminar Focus and Features
The reliance upon management and auditors to deter and detect fraud continues to increase. Guidance
related to internal and external auditors places more emphasis on professional skepticism, use of
forensic procedures, and fraud detection and prevention techniques. This course covers the practical
side of fraud mitigation techniques. Attendees will learn the art of fraud deterrence and detection
through lecture, case studies and in class discussion designed to facilitate critical thinking skills relating
to fraud risk management. Attendees will develop an understanding of the following concepts:

•   Elements of fraud

•   Nature of why people commit fraud

•   Holistic approach to fraud risk management

•   Deterring and detecting asset misappropriation and financial fraud schemes

•   Designing audit programs to detect red flags of fraud

•   Fraud case studies

•   Critical thinking exercises

Attendees will be challenged to identify red flags for fraud during interactive case studies presented
throughout the seminar.

Prerequisite: None
Learning Level: Fundamental
Field of Study: Auditing, Fraud Investigations, or Risk Management

                                                      6
IIA and ISACA Spring Training - March 30-April 1, 2020 Suburban Collection Showplace Novi, MI - The Institute of ...
TRACK A-3 - WEDNESDAY, APRIL 1
                   EMBEZZLEMENT—PREVENTION THRU INVESTIGATION
                                   INSTRUCTOR: PAUL ZIKMUND
                                               7 CPEs

Seminar Focus and Features
There are many ways to deter, detect and investigate embezzlement, and it is not always easy to
organize a consistently effective anti-embezzlement strategy. This seminar will guide you through
different types of embezzlement schemes with the use of uniquely instructional case studies. The
seminar will emphasize the red flags of different types of embezzlement schemes and highlight best
practices to reduce the risk of embezzlement schemes.

The seminar will provide a comprehensive overview of embezzlement and include the following:

•   Develop an understanding of the legal elements of embezzlement

•   Review best practices to avoid embezzlement and fraud as well as case studies of embezzlement,
    including payroll scams, fraudulent payees, skimming and new technology scams

•   Learn about referring embezzlement cases to law enforcement for criminal prosecution or using civil
    procedures to recover losses

•   Learn how to enhance internal controls to mitigate risk of embezzlement

•   Identify and audit for the red flags of the main types of embezzlement

•   Recommend better anti-embezzlement management structure (board of directors/executive
    management, line management, compliance, general counsel, etc.)

Attendees will be challenged to resolve allegations of embezzlement throughout the seminar.

Prerequisite: None
Learning Level: Fundamental
Field of Study: Auditing

                                                   7
TRACK B-1 - MONDAY, MARCH 30
       CHANGE THE WAY YOU CHANGE MINDS: THE POWER OF INFLUENCE AND
                              PERSUASION
                                      INSTRUCTOR: KEITH LEVICK
                                                  7 CPEs

Seminar Focus and Features

In business, leaders do not have an eternity to get team members motivated to achieve a common
objective. Therefore, they often rely on their ability to persuade and influence their direct reports.
Persuasive leaders can spur someone to action or make a decision without actually earning a sincere
buy-in. However, when effectively influencing others, they win a person’s heart and mind inspiring
commitment, buy-in, and action.

This course is based upon active learning, with rich, interactive exercises and applied experiences.

At the end of this course, participants will be able to:
•   Define influence and persuasion

•   Recognize updated neuroscience research as related to influence and persuasion

•   Identify 4 Bedrock Principles

•   Identify ways to build rapport

•   Practice skillful communication

•   Recognize ways to manage emotions

•   Enhance their social awareness

•   Manage resistance and objections

•   Practice skills

Prerequisite: None
Learning Level: Fundamental
Field of Study: Auditing

                                                    8
TRACK B-2 - TUESDAY, MARCH 31
                     THE POWER OF SOCIAL-EMOTIONAL INTELLIGENCE
                                    INSTRUCTOR: KEITH LEVICK
                                                  7 CPEs
Seminar Focus and Features
Research has shown that Social-Emotional Intelligence (SEI) contributes more to a person’s success in
life rather than raw intelligence (IQ). Leaders and employees with a high SEI are the ones who make
the best decisions, manage people more effectively and contribute the most to the overall success of
the organization. Emphasis is placed on the development of specific skills that strengthen SEI.

This course is based upon active learning, with rich, interactive exercises, case studies, and applied
experiences.

Learning Objectives:
At the end of this course, participants will be able to:
•   Define social-emotional intelligence (SEI)
•   Recognize the role of SEI in the workplace
•   Describe an SEI model
•   Build an intuitive muscle
•   Better manage emotions
•   Improve social awareness
•   Practice and enhance social and empathy skills
•   Listen and respond with empathy

Outcome:
Improved and enhanced Emotional Intelligence resulting in increased customer satisfaction,
relationships, retention, and improved internal employee interactions.

Prerequisite: None
Learning Level: Fundamental
Field of Study: Auditing

                                                      9
TRACK B-3 - WEDNESDAY, APRIL 1
                       COMMUNICATION SKILLS FOR PROFESSIONALS
                                    INSTRUCTOR: KEITH LEVICK
                                                  7 CPEs

Seminar Focus and Features
The challenges in contemporary organizations require workers to excel in communication.             Basic
communication skills are insufficient for working with customers, teams, and individuals. This program
is designed to equip workers with higher-level skills and techniques necessary to initiate and sustain an
open, interactive, and productive workplace.

This course is based upon active learning, with rich, interactive exercises, case studies, and applied
experiences.

Learning Objectives
At the end of this course, participants will be able to:
•   Describe the communication process
•   Identify and avoid communication blockers
•   Avoid manipulation by people with other communication styles
•   Apply several communication choices
•   Master techniques of asking questions, respectful listening, and empathetic responding
•   Follow a specific communication model
•   Practice skills

Outcome:
Enhanced communication skills resulting in higher levels of individual and team interactivity, consistent
messaging, and productivity.

Prerequisite: None

Learning Level: Fundamental

Field of Study: Auditing

                                                     10
TRACK C-1 - MONDAY, MARCH 30
ETHICAL & AUTHENTIC LEADERSHIP: HOW TO PROMOTE A CULTURE OF INTEGRITY
                                   INSTRUCTOR: DON LEVONIUS
                                                7 CPEs

Seminar Focus and Features

Integrity is the heart of leadership and authenticity is its soul.    Yet, there is an ethical crisis in
leadership that is undermining organizational cultures and negatively affecting employee performance
and business results.      This program will engage you in ethical scenarios, case studies, self
assessments, and other real-world applications to help you gain the self-awareness to know what you
value, the transparency to speak the truth, the courage to do what is right, and the ability to promote
a culture of integrity in your organization.

Learning Objectives

•   Describe how people become ethically ambivalent and morally disengaged

•   Compare how contrasting views of behavioral ethics affect decision-making

•   Explain how to move beyond self-gratification and self-interest

•   Differentiate between values and preferences

•   Evaluate potential actions to determine what is right

Prerequisite: None

Learning Level: Fundamental

Field of Study: Behavioral Ethics

                                                    11
TRACK C-2 - TUESDAY, MARCH 31
    CRITICAL THINKING AND PROBLEM SOLVING: HOW TO REASON AND RESOLVE
                             ISSUES LOGICALLY
                                    INSTRUCTOR: DON LEVONIUS
                                                  7 CPEs

Seminar Focus and Features

Critical thinking is not about being critical, it’s an essential skill that enables professionals to
systematically analyze problems and logically evaluate information to identify reasoned solutions.
Through critical thinking discussions, problem-solving activities, and other real-world applications, this
program will help you consciously think about what you’re thinking about, focus on facts, and
recognize logical fallacies in order to analyze and resolve complex issues.

Topics Covered

•   Differentiate between facts and opinions

•   Recognize and avoid critical thinking errors and logical fallacies

•   Identify underlying assumptions

•   Evaluate evidence objectively

•   Apply structured critical thinking and problem-solving processes

Prerequisite: None

Learning Level: Fundamental

Field of Study: Auditing

                                                     12
TRACK C-3 - WEDNESDAY, APRIL 1
              CREDIBILITY & INFLUENCE: HOW TO CONSISTENTLY ACHIEVE
                                POSITIVE OUTCOMES
                                   INSTRUCTOR: DON LEVONIUS
                                                  7 CPEs

Seminar Focus and Features

What differentiates effective leaders from everyone else? Credibility and influence. If you want to be
recognized as a person of character, a trusted advisor, and an effective leader—you must know how to
gain the trust and confidence of others and consistently collaborate with them to achieve mutually
beneficial outcomes. This program introduces practical ways to gain credibility, work with a sense of
purpose, maintain a winning attitude, and rally others toward common goals.

Learning Objectives

•   Explain how conviction, commitment and action affect credibility

•   List principles proven to help leaders gain and sustain credibility

•   Solicit feedback to identify and overcome blind spots

•   Integrate collaborative problem solving so you can win and help others win

•   Demonstrate the ability to be unpretentious and unflappable

Prerequisite: None
Learning Level: Fundamental
Field of Study: Auditing

                                                     13
TRACK D-1 - MONDAY, MARCH 30
    ALPHABET SOUP: GRC, ERA, ARA, ITRA AND IA— HOW TO CONNECT THE DOTS
                                INSTRUCTOR: DANNY GOLDBERG
                                                7 CPEs

Seminar Focus and Features

The burgeoning field of Enterprise Risk Assessment continues to integrate with other risk assessment
concepts, in addition to the concept of Governance, Risk and Compliance.

Objectives
•   Basic definitions of what GRC is and how it fits into the numerous risk assessment processes in an
    organization

•   Integration of each risk assessment into one process

•   Learn the importance of the ERA and audit’s role in the process

Prerequisite: None
Learning Level: Fundamental
Field of Study: Enterprise Risk Management

                                                   14
TRACK D-2 - TUESDAY, MARCH 31
                                         AGILE AUDITING
                                INSTRUCTOR: DANNY GOLDBERG
                                                 7 CPEs
Seminar Focus and Features
The audit profession is one of many that is slow to embrace change. For a profession that focuses on
operational auditing (efficiency, economy, effectiveness), many audit shops do not have these E’s
optimized. The subject of Agile Auditing has become an emerging topic in our industry. Many of the
basic premises of Agile Auditing are things that all audit shops should be doing. Regardless, GoldSRD
has taken the basics of Agile Auditing and applied the standards that all GoldSRD attendees are
accustomed to: continuous communication, strong relationships and a transparent audit process.

Objectives
•   Understand Internal Audits’ Role in Client Usage or Emerging Technologies

•   Discuss emerging technologies and key risks

•   Discuss a methodology to audit everything!

•   Learn about a useful exercise to determine (prior to the planning cycle) how risky an
    engagement will be

Prerequisite: None
Learning Level: Fundamental
Field of Study: Auditing

                                                   15
TRACK D-3 - WEDNESDAY, APRIL 1
                           BUSINESS ETHICS FOR BUSINESS PEOPLE
                                 INSTRUCTOR: DANNY GOLDBERG
                                                   7 CPEs

Seminar Focus and Features
A company’s ethics will determine its reputation. Good business ethics are essential for the long-term
success of an organization. Implementing an ethical program will foster a successful company culture
and increase profitability. Developing a Business Ethics program takes time and effort, but doing so will
do more than improve business, it will change lives.

A company’s ethics will have an influence on all levels of business. It will influence all who interact with
the company including customers, employees, suppliers, competitors, etc. All of these groups will have
an effect on the way a company’s ethics are developed. It is a two-way street; the influence goes both
ways, which makes understanding ethics a very important part of doing business today. Ethics is very
important, as news can now spread faster and farther than ever before.

Objectives

•   Define and understand ethics

•   Understand the benefits of ethics

•   Create strategies to implement ethics at work

•   Recognize social and business responsibility

•   Identify ethical and unethical behavior

•   Learn how to make ethical decisions and lead with integrity

Prerequisite: None

Learning Level: Fundamental

Field of Study: Behavioral Ethics

                                                     16
TRACK E-1 - MONDAY, MARCH 30
                         CYBER SECURITY & EMERGING RISK AREAS
                                INSTRUCTOR: JOHN TANNAHILL
                                                7 CPEs

Seminar Focus and Features
This seminar will focus on the risk, security and control issues related to cyber security and emerging
technologies.

Objectives
Key learning objectives are:
•   Understand cyber security risk and control issues
•   Understand emerging risk areas
•   Discussion of security and audit tools and techniques
•   Understand current assessment frameworks and tools

Prerequisite: None
Learning Level: Fundamental
Field of Study: IT Risk & Auditing

                                                   17
TRACK E-2 - TUESDAY— WEDNESDAY, MARCH 31 TO APRIL 1
                                  LINUX SECURITY AND AUDIT
                                INSTRUCTOR: JOHN TANNAHILL
                                               15 CPEs

Seminar Focus and Features
This seminar will focus on the audit and security issues related to the use of Linux Operating Systems.

Objectives
Key learning objectives for the session are:

•   Detailed discussion of Linux security mechanisms

•   Linux operating system will be used to demonstrate key security features and audit tests

•   Review of standard Linux Commands to extract and analyze information for audit purposes

Prerequisite: None
Learning Level: Fundamental
Field of Study: IT Risk & Auditing

                                                   18
TRACK F - MONDAY—WEDNESDAY, MARCH 30 — APRIL 1
                                 INTERNAL AUDIT UNIVERSITY
                               INSTRUCTOR: HERNAN MURDOCK
                                               22 CPEs

Seminar Focus and Features
In this seminar you will master fundamental operational auditing techniques and learn how to use a
risk-based approach to enhance your audits of the Purchasing, Marketing, Human Resources, IT,
Management, Finance/Treasury and Accounting functions.

Participants will explore the objectives of major business operation areas and learn how to identify the
key risks threatening them. You will find out how to make your audits more efficient and effective and
how to use data analytics to gain an in-depth understanding of business processes.       You will cover
such critical areas as the impact of SOX, ERM and GRC on the organization, uncovering fraud schemes
that threaten business operations and the role of IA in helping management build strong risk
management and strategic planning processes.        You will learn the skills necessary to go beyond
outputs and to examine the organization's ability to achieve the necessary outcomes.

Prerequisite: None

Learning Level: Fundamental

Field of Study: Auditing

                                                   19
TRACK G - MONDAY-WEDNESDAY, MARCH 30— APRIL 1
                                      ADVANCED AUDITING
                                 INSTRUCTOR: PETER HIGGINS
                                               22 CPEs

Seminar Focus and Features
In this three-day session you will learn all of the elements involved in leading risk-based audits from
the unique perspective of the in-charge position. Through discussion and exercises, participants will
review such concepts as audit program development and changes, performing risk assessments,
setting priorities while assigning tasks, managing staff performance during fieldwork, and reviewing
workpapers. Since internal auditors are expected to have sufficient knowledge to evaluate the risk of
fraud, this course also provides participants with an overview to: enhance fraud awareness, improve
fraud risk-assessment capabilities and identify high-risk areas and the indicators of fraud. This course
will also equip participants with the techniques to communicate effectively with team members and
clients, including ways to get client buy-in through the effective preparation, documentation and
communication of issues and recommendations.

The course provides a solid foundation on how to leverage fundamental internal audit concepts,
practices, trends, and focus areas to achieve quality audits. It also provides strategies on how to
market and sell internal audit effectively to the client. Audit clients expect the work done to meet high
quality standards, so this class examines ways to measure performance, increase efficiency and
improve effectiveness. As the liaison between the audit team and the client, the in-charge auditor has
a large responsibility that requires effective planning and flawless execution of the audit plan using
project management techniques appropriately.

Team leaders face many challenges from the time the audit program is developed, and the budget is
set until the final report is issued. Failing to plan, anticipate or correct any of the management,
technical or communication aspects of their role could lead to a failed project that reflects negatively
on the auditor-in-charge or the entire department. This class provides the necessary skills and tech-
niques to help you avoid such negative outcomes.

Prerequisite: Internal Audit University or equivalent experience
Learning Level: Intermediate
Field of Study: Auditing

                                                   20
TRACK H - MONDAY-WEDNESDAY, MARCH 30 — APRIL 1
                  FUNDAMENTALS OF AUDITING PROCESS AUTOMATION
                                   INSTRUCTOR: TOM SALZMAN
                                                22 CPEs

Seminar Focus and Features
In the quest toward enhanced speed to market, lower expenses and improved customer engagement,
enterprises of all shapes and sizes are looking to see how automation can give them the advantage
over their competition and aide in maintaining the increased pressure of regulatory compliance.
Determining what solution best fits, a given entity can be challenging as automation solutions can
range from simple macros to functional specific tools generally used for IT process automation to
robotic and cognitive automation tools including Robotic Process Automation.

In this three-day session, we will provide a high-level overview of the preparation required and
important changes an entity should plan for before and during the transformation of IT and business
processes.

Attendees will learn through lecture and small group activities, the differences between various types
of process automation and DevOps, the importance of governance and ethics in automation, how to
understand workflows and gain tips for assessing automation.

By the end of the event attendees will have heard and participated in several exercises to get a better
feel of the activities that aide in determining, building and assessing automation initiatives.

Prerequisite: Internal Audit University or equivalent experience

Learning Level: Intermediate

Field of Study: Auditing

                                                     21
TRACK I - MONDAY-WEDNESDAY, MARCH 30 — APRIL 1
                             SUCCESSFUL AUDIT DATA ANALYTICS
                                  INSTRUCTOR: JIM TARANTINO
                                               22 CPEs

Seminar Focus and Features
In this three-day seminar designed for data analytics practitioners, attendees will learn everything they
need to effectively integrate data analytics, or CAATs (Computer Assisted Audit Techniques), into an
audit process. You will learn how technology can be used to more efficiently and effectively achieve
desired results and brainstorm analytics across most major business cycles. You will learn how to
progress from basic analytics into a fully automated/repetitive mode and learn the basics of Continuous
Auditing. We will review common hurdles and hear how the most successful organizations in the world
have been able to exploit the power of data analysis to achieve visible and sustainable value.

This seminar provides critical experience and content for the audit analytics practitioner. You will get a
chance to see how to align your analytics with your department’s vision for the use of data
analysis.   You will get the opportunity to work on real-world scenarios with sample data files, and
practice designing effective tests and critiquing and QAing the work of others.

As the course progresses, you will move quickly from understanding basic analytic techniques such as
stratifications, summarizations, and duplicate identification into more advanced techniques such as
fuzzy matching, Benford’s Law, and statistical and regression analysis. You will explore cutting-edge
topics such as visual analytics, risk score carding, and spatial analysis. Regardless of the tool you
currently use or plan to use in your department - whether generic like MS Excel or MS Access,
audit-centric like ACL or IDEA, or more IT-oriented like SQL or SAS - the standard pseudo-code used
throughout the course will allow you to easily take what you have learned and quickly code it in your
tool of choice. Additionally, you will get hands-on experience working with demo versions of several
popular tools, giving you the chance to see first-hand the strengths of each.

Prerequisite: Internal Audit University or equivalent experience

Learning Level: Intermediate

Field of Study: Auditing

                                                    22
TRACK J-1 - MONDAY, MARCH 30
                              EFFECTIVE AUDIT REPORT WRITING
                                     INSTRUCTOR: JAMES ROTH
                                                  7 CPEs

Seminar Focus and Features
Audit report writing is a critical skill for internal auditors at all levels. This dynamic workshop takes you
through the entire process, with practice and feedback at every stage. You will learn how to develop
meaningful audit issues that clarify the risk and identify the root cause. Just as important, you will
learn how to get buy-in from management. You will discover a simple technique for organizing your
thoughts and why it’s important to have a clear structure of ideas before starting to write. You will
practice an approach to writing that can cut your writing time in half. And you will learn how
“de-fogging” will vastly improve the quality of your writing.

Prerequisite: None
Learning Level: Intermediate
Field of Study: Auditing

                                                     23
TRACK J-2 - TUESDAY—WEDNESDAY, MARCH 31— APRIL 1
                           BEST PRACTICES IN INTERNAL AUDITING
                                    INSTRUCTOR: JAMES ROTH
                                                15 CPEs

Seminar Focus and Features
This seminar presents more than 50 practices from world-class internal audit departments. This is not
just an overview. You will get their actual tools, techniques and other practices. You will also learn how
they apply the tools and how to tailor their practices to your own organization. After the seminar, you
will be able to use these examples as models to create or enhance your own value-added practices.

Prerequisite: None
Learning Level: Intermediate
Field of Study: Auditing

                                                    24
TRACK K-1 - MONDAY, MARCH 30
    UNDERSTANDING BLOCKCHAIN: THE UNDERLYING TECHNOLOGY FOR TRUSTED
                            TRANSACTIONS
                                INSTRUCTOR: LEIGHTON JOHNSON
                                                7 CPEs

Seminar Focus and Features
Bitcoin exploded on the monetary scene in 2008, and then rose dramatically in 2015-2017 to soaring
heights. It is one of many transaction applications that use Blockchain as its enabling technology.
Business are investigating and investing large resources in protocols to establish trusted financial
transactions between trading partners. It is used to manage intellectual property, digital content,
financial and securities transactions.

This course is designed to introduce this core technology, the Blockchain, the fundamental concepts
behind it and the uses available today and tomorrow. In order to control these transactions, it is
necessary to understand it.

Learning Objectives

•   Understand the characteristics and value proposition of Blockchain

•   Understand the security advantages and disadvantages

•   Identify the top security risks

•   Describe the use and advantage of the various Blockchain implementations

•   Identify control issues with Blockchain

•   Describe the top technical challenges with the use of Blockchain

•   Discuss the future of Blockchain

Prerequisite: None
Learning Level: Basic
Field of Study: Auditing

                                                   25
TRACK K-2 - TUESDAY— WEDNESDAY, MARCH 31 — APRIL 1
                                     ASSESSING DATA RELIABILITY
                                   INSTRUCTOR: LEIGHTON JOHNSON
                                                 15 CPEs

Seminar Focus and Features
Assessing the reliability of computer generated data is an important step in audit planning as well as
addressing specific audit objectives.

Data is aggregated from various sources, processed using automated rule sets, and stored in
databases, data warehouses, etc. Applications and business users extract or retrieve data as the basis
for strategic decisions, reporting, day-to-day operations, and auditing. The reliability of data may be at
significant risk when placed in operational and IT environments lacking processing, transmission,
storage or security controls. Misinterpretation of reliability risk factors may result in misdirected audit
effort or incorrect conclusions.

This training session will provide you with the concepts and tools to effectively evaluate the reliability
of data processed and available for analysis and decision making.

We will focus on

•   How reliability assessment of data from IT systems should be conducted during audit planning
    when developing audit objectives and audit procedures.
•   Key factors to be reviewed during audit planning to assist the auditor in evaluating the sufficiency,
    reliability and relevance of data to be used as audit evidence.
•   Steps to perform when obtaining evidence during the audit regarding data accuracy, completeness
    and validity.
•   Data reliability issues relating to organization, appropriateness of controls, risk, and testing.
Learning Objectives

•   Understanding the requirements of data relevance and data reliability

•   Evaluating data classification

•   How to introduce good practices for data management

•   Identifying data integrity requirements

•   Assessing security and availability requirements

•   Evaluating factors that impact data reliability

•   Assessing risk with respect to data reliability

•   Determining the impact of data reliability assessment on developing audit objectives

•   Establishing audit evidence requirements

•   Using data reliability assessment in developing audit procedures

Prerequisite: None
Learning Level: Intermediate
Field of Study: Auditing

                                                      26
TRACK L-1 - MONDAY, MARCH 30
                    AUDITING CYBERSECURITY OF WIRELESS NETWORKS
                                    INSTRUCTOR: KEN CUTLER
                                                 7 CPEs

Seminar Focus and Features
Wireless technology has become a major enabler for an increasingly mobile workforce and dynamic
workplace environments. This technology creates opportunities for a variety of exploits including
unauthorized access and message interception. Its low cost and widespread availability also presents
the opportunity for employees and intruders to set up rouge access points that can undermine existing
security safeguards in wired networks. In this state-of-the-art CyberSecurity/CyberAudit workshop,
you will sort out the often-confusing array of current and emerging wireless technology protocols and
examine their operational and security implications. You will get practical tips on how to best secure
wireless applications and learn how to “wardrive” and audit wireless technology throughout your
organization.

Learning Objectives

•   Identify protocols, standards, and building blocks for 802.11 wireless technology
•   Assess significant risks, including but not limited to: rogue access points, “evil twins”, wireless
    password cracking, denial of service
•   Locate sources of industry best practices and regulatory requirements for the secure use of 802.11
    CyberSecurity
•   Gain familiarity with device management and CyberSecurity configuration options, including wire-
    less controller architectures and lightweight access points
•   Learn effective techniques for discovering, testing, and CyberAudit of 802.11 wireless networks

Prerequisite: A basic understanding of wireless networks and IT security controls
Learning Level: Intermediate
Field of Study: Auditing

                                                    27
TRACK L-2 - TUESDAY - WEDNESDAY, MARCH 31– APRIL 1
                   CYBERSECURITY AUDITS OF MODERN WEB APPLICATIONS
                                      INSTRUCTOR: KEN CUTLER
                                                15 CPEs

Seminar Focus and Features
Operating an Internet web site is a necessity in today’s eBusiness environment; however, there are
many important CyberSecurity risks that come with web applications. Increasingly demanding
regulatory requirements, litigations, and intensified lethal attacks on Web-based applications, along
with traditional information asset protection, have significantly raised the stakes on the importance of
secure application design, testing, certification/accreditation, and audit. Additionally, CyberSpace (IT)
applications have become more complex and frequently rushed to market by poorly trained commercial
CyberSpace (IT) product and internal developers, increasing the business risks and the challenges to
applying and verifying reliable CyberSecurity safeguards.

In this information-packed workshop, we will cover key building blocks and significant risks, and
systematically sort through the available CyberSecurity safeguards in today’s complex Web-enabled,
multi-tiered applications.

NOTE: Several demonstrations in the course will optionally afford the opportunity for students to try
the associated procedures on the Internet with their own computers. Students are invited to bring their
own computers to replicate some of the procedures and/or research useful resource sites on the
Internet.

Learning Objectives
• Identify and assess CyberSecurity control points and software building blocks in a multi-tiered web
    application
•   Understand the risks and causes associated with different types of CyberAttacks on web
    applications
•   Evaluate different methods of CyberSecruity testing CyberAuditing web applications throughout the
    System Development Life Cycle (SDLC) and after they go into production
•   Gain familiarity with industry best practices for secure web application design and operation

Prerequisite: Basic understanding of the application development process and IT security
Learning Level: Fundamental
Field of Study: Auditing

                                                    28
ABOUT THE INSTRUCTORS….

Ken Cutler, CISA, CISSP, CISM is a Senior Teaching Fellow with CPEi, specializing in Technical Audits
of IT Security and related IT controls. He is the President and Principal Consultant for Ken Cutler &
Associates (KCA) InfoSec Assurance, an independent consulting firm delivering a wide array of
Information Security and IT Audit management and technical professional services. He is also the
Director – Q/ISP (Qualified Information Security Professional) programs for Security University.
An internationally recognized consultant and trainer in the Information Security and IT audit fields, he
is certified and has conducted courses for: Certified Information Systems Security Professional
(CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA)
and CompTIA Security+. In cooperation with Security University, he recently was featured in two full
length training videos on CISSP and Security+.
Ken was formerly Vice-President of Information Security for MIS Training Institute, Chief Information
Officer of Moore McCormack Resources, a Fortune 500 company. He also directed company wide IS
programs for American Express Travel Related Services, Martin Marietta Data Systems, and Midlantic
Banks, Inc.
Ken has been a long-time active participant in international government and industry security
standards initiatives, including: The President’s Commission on Critical Infrastructure Protection,
Generally Accepted System Security Principles (GSSP), Information Technology Security Evaluation
Criteria (ITSEC), US Federal Criteria, and Department of Defense (DOD) Information Assurance
Certification Initiative.
He is a prolific author on information security topics. His publications include: Commercial International
Security Requirements (CISR), a commercial alternative to military security standards for system
security design criteria, NIST SP 800-41, “Guidelines on Firewalls and Firewall Policy”, of which he was
co-author, and various works on security architecture, disaster recovery planning, wireless security,
vulnerability testing, firewalls, single sign-on, and the Payment Card Industry Data Security Standard
(PCI DSS).
He has been frequently quoted in popular trade publications, including Computerworld, Information
Security Magazine, Infoworld, Information Week, CIO Bulletin, and Healthcare Information Security
Newsletter, and has been interviewed in radio programs My Technology Lawyer and Talk America.
Ken received his Bachelor of Science degree in Business Administration and Computer Science degree
from SUNY Empire State College.
Danny Goldberg is the Founder of GOLDSRD, a leading provider of Staff Augmentation, Executive
Recruiting and Professional Development services. Danny is a well-regarded speaker on internal
auditing and People-Centric Skills, co-authoring and coining the term People-Centric Skills:
Communication and Interpersonal Skills for Internal Auditors, via Wiley Publications.
Danny has over 19 years of professional experience, including five years leading/building internal
audit functions. Danny was named as one of the Fort Worth Business Press 40 Under 40 in 2014. He
has published numerous articles in trade magazines.
Mr. Goldberg is an active member of the Institute of Internal Auditors, both at a local and national
level. Leadership roles include
•   Current IIA Dallas Chapter Board Member and former Fort Worth Chapter Board Member

•   Current IIA Dallas and Fort Worth Chapter Programs Committee Co-Chair

Danny is a Certified Public Accountant, Certified Internal Auditor, Certified Information Systems Audi-
tor, Certified in the Governance of Enterprise Information Technology, Certified in Risk and Infor-
mation Systems Control, Certified in Risk Management Assurance, has obtained his Certification in
Control Self-Assessment and is a Chartered Global Management Accountant.

Peter Higgins, CIA, CRMA is a consultant for the MIS Training Institute and principle consultant/
trainer for Boston Audit Solutions Group, which specializes in audit and risk management advisory and
training services.
Prior to starting Boston Audit Solutions Group, Pete spent the majority of his career as an internal audi-
tor in financial services, including three years as VP Corporate Audit Professional Practices at State
Street Bank, where he was responsible for the research, design, implementation, and continuous im-
provement of audit methodologies and operating standards for approximately 200 audit professionals.

                                                    29
ABOUT THE INSTRUCTORS….
Peter Higgins, CIA, CRMA Continued
Also at State Street, Peter transitioned to the 1st-Line of Defense as VP Risk and Compliance, where he
led a team (20+) to provide all facets of risk, compliance and audit/examination support for multiple
business lines, geographies, and approximately 1,800 employees.
Leighton Johnson is a Senior Fellow with CPE Interactive focusing on information security and IT
audit. In addition to his training role at CPE Interactive, he is CTO of ISFMT, a company focusing on
computer security, forensics consulting and certification training, and cybersecurity. He is also the
founder and CEO of Chimera Security, a research and development company focusing on cryptography,
mobile technology, and cloud computing to create better and more secure solutions for today’s
advanced users and providers.

He has over 40 years’ experience in computer security, cybersecurity, software development,
communications equipment operations and maintenance, incident response, and forensic investigations.
He has taught numerous cybersecurity, anti-terrorism, forensics, and risk management courses both
domestically and internationally.

He previously was the Regional CIO and Senior Security Engineer for a large directorate within
Lockheed Martin Information Systems and Global Solutions Company. He is members of the CSA
CloudSIRT Working Group developing the model for collaboration among cloud providers, CERT
organizations, responders and users; the CSA Security-as-of-Service working group, and other cloud
related working groups. He is a contributing author to the “Encyclopedia of Information Assurance”, and
authored “Computer Incident Response and Forensics Team Management”, and “Security Controls Eval-
uation, Testing, And Assessment Handbook”.

He holds certifications in CISM (Certified Information Security Manager), CISA (Certified Information
Systems Auditor), CISSP (Certified Information Systems Security Professional), CIFI (Certified
Information Forensics Investigator), CSSLP (Certified Secure Software Lifecycle Professional), CAP
(Certified Authorization Professional), CRISC (Certified in Risk & Information Systems Control), CMAS
(Certified Master Antiterrorism Specialist), FITSP-A (Federal IT Security Professional – Auditor), ATOL2
(DOD Anti-Terrorism Officer Level 2), CAS-CTR (Certified Antiterrorism Specialist – Cyber Terrorism
Response) and MBCI (Certified Member Business Continuity Institute).

Keith Levick, Ph.D. is the CEO of Goren and Associates, Dr. Levick has over 25 years of experience in
training, professional coaching, and consulting. As a psychologist, he has spent many of his clinical
years in private practice. In 1987, he began to transfer his clinical expertise into the field of business
management.
For the past 20 years Dr. Levick has coached managers and executives in a variety of industries in the
area of personal and professional productivity, change management and interpersonal skills. He has
coached many executives in their transition from the world of management into the world of leadership.
He has developed many award winning leadership training programs and workshops that are being
used by Fortune 500 organizations nationwide. Some of his clients include Chrysler, GM, Daimler, Mon-
roe Bank & Trust, MGM Detroit Grand Casino, X-Ray Industries, and many other Fortune 500 compa-
nies.
As an executive coach, Dr. Levick is a firm believer in the value of coaching. “With high impact effective
coaching, people are able to remove some of the blinders to see what is possible. Coaching can help
executives and leaders to discover their core habits that are working and those that are not; only then
can they reach their highest potential.”

Don Levonius, M.A. is Principal Consultant, Victory Performance Consulting LLC. As a consultant,
trainer, and national public speaker, Don Levonius draws on over 17 years of progressive leadership
experience, including 13 years with The Disney Company and 4 years with the Institute of Internal Au-
ditors. He taught organizational communication for the University of Central Florida, is a leadership de-
velopment instructor with Valencia State College, and holds master’s degrees in human resource devel-
opment and business & organizational security management. Don is also an author for the Association
of Talent Development.
After years of leading security and investigations for major retail chains and Disney theme parks, Don
was asked to help create and lead Disney Security Training Institute in an effort to help combat the
emerging threat of terrorism following the horrific attacks in 2001. Under his leadership, Disney
security training was transformed to become an international benchmark for private and public sector
security organizations.

                                                    30
ABOUT THE INSTRUCTORS….
Don Levonius, M.A. continued
Don was later promoted to lead operations and guest service training for 23 Walt Disney World Resort
hotels (25,000 guest rooms), 200 retail and dining locations, and Disney Transport (monorails, water-
craft, and buses). He subsequently became a senior leader of Disney University, the company’s corpo-
rate university.
In 2009, Don left Disney, founded Victory Performance Consulting (VPC), and began providing learning
solutions for a number of organizations including General Electric, NBC Universal, the Florida Attorney
General’s Office and The Institute of Internal Auditors (IIA). The IIA subsequently hired Don full-time to
manage and direct development of its curriculum and learning strategies and delivery of over 200 lead-
ership development seminars annually.
Today Don leads the VPC team in serving a growing list of clients, including: ASIS International, Associ-
ation of Certified Fraud Examiners, CoreNet Global, Florida Attorney General’s Office, Florida Crime Pre-
vention Association, Just$ave Foods, Land O’Lakes, Inc., Lowes Foods, Society for Human Resource
Management, Institute of Internal Auditors, YRC Worldwide, and others.
Dr. Hernan Murdock, CIA, CRMA is Vice President, Audit Division for MIS Training Institute. Before
joining MIS he was the Director of Training at Control Solutions International, where he oversaw the
company’s training and employee development program. Prior to that, he was a Senior Project Manag-
er leading audit and consulting projects for clients in the manufacturing, transportation, high tech, ed-
ucation, insurance and power generation industries. Dr. Murdock also worked at Arthur Andersen, Lib-
erty Mutual and KeyCorp.
Dr. Murdock is a senior lecturer at Northeastern University where he teaches management, leadership
and ethics. He is the author of 10 Key Techniques to Improve Team Productivity and Using Surveys in
Internal Audits, both published by the IIA Research Foundation. He has also written articles and book
chapters on whistleblowing programs, international auditing, mentoring programs, fraud, deception,
corporate social responsibility, and behavioral profiling. He has conducted audits and consulting pro-
jects, delivered seminars and invited talks, and made numerous presentations at internal audit, aca-
demic and government functions in North America, Latin America, Europe and Africa.
Tom Salzman is the IT Audit Manager for Illinois State University, where he manages all computer
audits conducted by the University. His responsibilities include working with educational, athletic, and
administrative departments throughout the University to prepare and streamline and improve IT pro-
cesses, computer security, IT policies and procedures, operational processes and internal controls; and
develop methodologies for managing computer resources. His work requires him to be skilled in net-
work controls, application management, computer intrusion, security management,
and application design and development.
Previously, Mr. Salzman was Director of Professional Services for the Information Systems Audit and
Control Association (ISACA) where he was responsible for establishing and supporting its worldwide
network of educational programs, conferences, and special events; as well as authoring the Profession-
al Seminar Series of diverse educational offerings. He also served as editor and co-author of the ISACA
CISA Review Manual . Prior to joining ISACA, Mr. Salzman was with Coopers & Lybrand, heading their
Technical Training and Information Security practices. Tom also served on the faculty of DePaul Univer-
sity, authoring and presenting undergraduate and post-graduate degree programs.
A much in-demand speaker, Mr. Salzman teaches a variety of computer and audit topics worldwide. He
also tracks and presents numerous CISA review courses. To broaden his support of the IT audit profes-
sion, Tom also presents a range of topical webinars for MIS Training Institute. In addition, his consult-
ing practice has assisted a number of organizations develop cost-effective internal IT audit functions.
Mr. Salzman is a recipient of the College and University Auditors Excellence In Service Award.
Jim Tarantino is a Senior Instructor for MISTI and a Manager at RSM, on the the largest accounting
and consulting firms in the world. He has over 20 years of information technology, analytics, audit and
GRC experience with recognized expertise in developing solutions to enable data-driven auditing, risk
assessment and investigations. Prior to joining RSM, he was the Client Solutions Director for High
Water Advisors, a consulting firm specializing in using technology to help organizations improve
goverenance, risk management, compliance (GRC) and audit processes. He has also held a number of
GRC practitioner roles including Solution Lead/Practice Manager for ACL Services, Senior Auditor at RTI
International, and various management positions at Nortel Networks implementing a HR analytics
program. Mr. Tarantino holds a bachelor’s degree in Psychology and master’s degree in Industrial/
Organization Psychology from Norh Carolina State University.
As a member of the IIA, ISACA and ACFE, he participates in local chapter activities, including serving as
an instructor for CISA certification exam preparation seminars.

                                                   31
ABOUT THE INSTRUCTORS….

James Roth, PhD, CIA, CCSA, CRMA is president of AuditTrends, LLC, a training firm devoted to
identifying and communicating the best of current internal audit practice. Jim has 35 years of
progressive internal audit and teaching experience. His publications include nine AuditTrends seminars,
nine books and seven other major works for the IIA International. He wrote all of the IIA’s early
research studies and training programs on COSO. His publications include:
• Value-Added Business Controls: The Right Way to Manage Risk
• Control Model Implementation: Best Practices
• Internal Audit’s Role in Corporate Governance: Sarbanes-Oxley Compliance
• Four Approaches to Enterprise Risk Management
• Best Practices: Evaluating the Corporate Culture
• Adding Value with COSO 2013: Beyond Sarbanes-Oxley Compliance

In 2008 the IIA gave Jim the Bradford Cadmus Memorial Award, which was “established…to honor
individuals making the greatest contribution to the advancement of the internal audit profession.”
Energetic and motivating, Jim is one of the highest rated speakers on internal audit.
John G. Tannahill, CA, CISM, CGEIT, CRISC, CSXP is a management consultant specializing in in-
formation security and audit services. His current focus is on information security management and
control in large information systems environments and networks. His specific ares of technical
expertise include Windows Server & Linux operation system security, network security, and database
security. John is a frequent speaker in Canada, Europe, Africa, Asis and USA in the subjects of
information security, cybersecurity and IT audit.

John is a member of the Toronto ISACA Chapter and has spoken at many ISACA Conference and
Chapter events. He is a member of the Institute of Chartered Accountants of Scotland.

Paul E. Zikmund serves as a Director of Baker Tilly’s Global Fraud and Forensic Investigations, Com-
pliance and Security Services practice where he is responsible for helping clients develop, assess and
administer ethics and compliance programs, conduct global and cross-border fraud and misconduct in-
vestigations, including, bribery, corruption and compliance matters and manage risks related to ethics
and compliance failures. Paul specializes in internal and regulatory investigations; governance matters;
risk assessment, design and implementation of compliance programs; global fraud risk management
programs; and compliance coordination and monitoring services for the private, public, not-for-profit
sectors. Paul develops and implements enterprise security and risk mitigation programs and controls
including crisis management, workplace violence and physical security assessments.
Prior to his role at Baker Tilly Paul served as Deputy Chief Compliance Officer & Vice President Global
Security, Bunge in White Plains, NY where he          esponsible for development and implementation of
Bunge’s fraud, ethics, compliance and security risk management programs and controls designed to
protect company assets, mitigate fraud and misconduct, ensure compliance with federal and state laws,
protect company assets, and promote adherence to Bunge’s core values.
He managed and conducted investigations of compliance matters, fraud and ethics violations. Paul as-
sisted with the development and implementation of tools and techniques to mitigate enterprise securi-
ty, fraud & compliance risk, manages the company’s third party risk management program, and admin-
isters security, compliance training and awareness programs.
Prior to joining Bunge, Paul worked as the Senior Director Forensic Audit at Tyco International in
Princeton, NJ and the Director Litigation Support Services at Amper, Politziner, & Mattia, LLP, in
Philadelphia, PA where he was responsible for developing, implementing, and administering fraud
risk management services to Tyco and to clients. He possesses nearly 28 years of experience in this
field and has effectively managed global compliance and forensic audit teams at various Fortune 500
companies.

                                                   32
REGISTRATION INFORMATION

Space is limited so registration will be accepted on a first-come, first-serve basis. Pricing has been es-
tablished to provide the maximum educational benefit for the lowest cost. Therefore, we do not offer
discounts from the established prices for early registration, membership affiliation or groups. Dress
code for the training is business casual.

Morning refreshments will be provided from 7:30 – 8:30 AM, and sessions will be from 8:30 AM – 4:30
PM each day. Lunch will be provided daily with vegetarian options.

Due to circumstances outside of our control, we may find it necessary to reschedule or cancel sessions,
or change instructors. We will give registrants advance notice of such changes, if possible.

                                Payment and Cancellation Policy
Please note all times are stated in Eastern Daylight Time (EDT). All reservations must be made online
at : https://www.eiseverywhere.com/2020springtraining and all payments must be received by midnight
Tuesday March 17, 2020. Payments may be made at the time of registration using Visa, MasterCard,
Discover or American Express, or check payments may be mailed to the address listed below.

Cancellations may be made online until midnight on Tuesday March 17, 2020 without penalty. Any
cancellation received after Tuesday midnight March 17, 2020, and before Tuesday midnight March 23,
2020 will be charged a non-refundable service fee based on the CPEs of the registered course being
cancelled. No refunds will be given for registrations that are cancelled after midnight March 23, 2020.

                                                    Non-Refundable
                                CPEs                  Service Fee
                                 7                       $25
                                 15                       $50
                                 22                       $75

Payments (payable to: IIA Detroit) should be mailed to the address below. Please do not remit pay-
ment to the ISACA Detroit Chapter. Training or registration questions should be sent to administra-
tor@isaca-det.org.
IIA - ISACA Spring Training
Administrator
P.O. Box 99340
Troy, MI 48099
                                         Hotel Information

Individual attendees can make reservations for the event directly with the Hyatt Place at the Suburban
Collection Showplace reservations at 1-800-233-1234.

Reservations may also be made by logging on to: https://novi.place.hyatt.com/en/hotel/home.html?
corp_id=G-ADIT Use the Group Code: G-ADIT to receive your discounted group rate of $134.00. Once
the arrival and departure dates have been entered click on special rates and then enter the Group Code
in the Group Code Box (make sure to include the G when entering the code).

All reservations must be accompanied by a first night room deposit, or guaranteed with a major credit
card. Hotel will not hold any reservations unless secured by one of the above methods. Cancellations
must be received a minimum of (72) hours prior to arrival for a full refund. Cancellations received
less than (72) hours prior to arrival will forfeit one (1) night room and tax.

Reservations by attendees must be received on or before February 8, 2020

                                                    33
You can also read