GTACS Header
Governance. Technology Audit. Control.
 Security Conference 2014.
The Sands Convention & Exhibition Center, Marina Bay 
 Sands, Singapore
21 to 22 April 2014 – GTACS 2014 Conference 
  23 to 24 April 2014 – Post-Conference Workshops
 THE IT TREND 
The Governance, Technology Audit, Control and Security
 Conference (GTACS) Conference 2014 is Asia’s premier conference 
 for IT Audit, Information Security, Governance, Risk and 
 Compliance Professionals. The conference promises to bring new 
 insights into the current IT and regulatory environment needed to
 develop strategies to address these growing risks and concerns at 
 the root cause.
Banner
AUDIT SECURITY
Linguistics Lie Detection
SCAN (Scientific Content Analysis) – a process of analyzing oral and written testimonies.

Internal Auditors can use SCAN to better investigate and observe responses. Many a time crimes happened when there is a trigger point; the motive for this trigger could be due to certain reasons. SCAN helps auditors to narrow down trigger points by analyzing simple English sentences, e.g. Pronouns, verbs and the structure of the sentence.


Fraud Risk Management
3 key important factors when it comes to fraud risk assessment:

  1. Identification – Gather information to obtain the population of fraud risks that could apply to the organization, which includes the development of all types of fraud schemes and scenarios; such as incentives, pressures, and opportunities to commit fraud; and any IT fraud risks specific to the organization.
  2. Assessment – Assess the likelihood and potential significance with historical information, e.g. known fraud schemes, business partners.
  3. Response – Decide how on how address the situation and performing a cost-benefit analysis of fraud risk. Decide which the organization should choose to implement control.

Censorship
Hidden Attacks on Computing Devices
There has been an increase in malwares on computing devices as technology rapidly advances.

  1. Trojans – disguising as benign program to users but actually designed to retrieve or insert malicious files or data into the user’s system.
  2. Backdoor – A program that a hacker installs on target system to allow access to system anytime he wants.
  3. RootKits – A collection of tools/programs that allow the attacker to mask intrusion. Usually to hide files and/or process
Registration Fees
Conference registration.
Register by 28 Feburary 2014 to enjoy the Early – Bird Rate

Early Bird By

28 Feburary 2014

Member
SGD $850
Non-Member
SGD $950
Workshop Registration
Member
SGD $650
Non-Member
SGD $750
Note:
All fees are quoted in Singapore Dollars. Members pricing are applicable to affiliated organizations. 
Please refer to www.isaca.org.sg.
Group Discount:
Signing in groups of 3 or more at the same time will enjoy additional discount of 
S$50 per pax. Remember to enter GRP3 in the discount code at checkout to enjoy 
the discount.

For all registration details: www.gtacs.sg.

Continuing Professional Education (CPE):
To maintain ISACA Certification holders are required to earn 120 CPE credit 
hours over a three-year period in accordance with ISACA’s continuing
professional education (CPE) policy. Attendees can earn up to 30 CPE credits; 16 
by attending the GTACS 2014 Conference and an additional 7 CPE credits for 
attending each day of optional post conference workshops.
JoinUsNowBanner
For All Enquries, please contact:
Miss Leisha Kuah / Miss Brigitte Lee
(GTACS@isaca.org.sg)
Tel: (65) 62788666 | Fax: (65) 62784077
Conference and Exhibitions Management Services Pte Ltd
1 Maritime Square, #09-43 HabourFront Centre
Singapore 099253
 
 
Organized By: 
ISACALogo
Supporting Organizations: 
AISPLogo
ASIS Logo
CSA Logo
IIA Logo
itSMF Logo

Managed By:

CEMSLogo