Speaker profile last updated by AAE Talent Team on 05/11/2024.
Furnishes insights concerning the need for structural integration and collaboration between the key supply chain players, processes, and IT platforms
Organizational leadership responsibility to provide a strong ethical environment that fosters performance consistent with the highest ethical standards
The relationship between corporate governance and information security governance in United States corporartions
As computing power has advanced, entities have become increasingly dependent on technology to carry out their operational requirements and to collect, process, maintain and report essential data. This reliance on electronically encoded data and on the systems that affect managerial decisions are a major concern of audit professionals. Consequently, Information Technology (IT) auditors examine the adequacy of controls in information systems and related operations to assure effectiveness and efficiency in business processes. In addition, among other assurance services, IT auditors evaluate the reliability of computer generated data supporting financial statements and analyze specific programs and their processing results. To ensure maximum value delivery from audit area assessments, oversight committee members need an evaluation methodology that enables confidence in the work performed by IT auditors. This speech/presentation conveys the use of accepted information criteria to determine appropriate enterprise-wide IT due diligence.
Seeking to preserve electronically encoded evidence implies an incident or event has occurred that will require facts extrapolation for presentation as proof of an irregular, if not illegal act. Anticipating potential breach scenarios requires information security management proactively construct incident response and forensic investigation capabilities considering legal imperatives. Consequently, procedures addressing the infrastructure and processes for incident handling should exist within the security response documentation inventory. My speech/presentation addresses the management of information security incidents.
Robert E. Davis, MBA, CISA, CICA is a keynote speaker and industry expert who speaks on a wide range of topics such as Identifying Risks in Supply Chain Controls, Consequences of Ethical Choices in Business, Information Security Governance, IT Auditing: Principles and Practices and Information Security Incident Response: Controlling Mayhem. The estimated speaking fee range to book Robert E. Davis, MBA, CISA, CICA for your event is $5,000 - $10,000. Robert E. Davis, MBA, CISA, CICA generally travels from PA, USA and can be booked for (private) corporate events, personal appearances, keynote speeches, or other performances. Similar motivational celebrity speakers are Nik Bhatia, Alex Lawrence, PhD, David Closs, David Hollister and Edgar Perez. Contact All American Speakers for ratings, reviews, videos and information on scheduling Robert E. Davis, MBA, CISA, CICA for an upcoming live or virtual event.
This website is a resource for event professionals and strives to provide the most comprehensive catalog of thought leaders and industry experts to consider for speaking engagements. A listing or profile on this website does not imply an agency affiliation or endorsement by the talent.
All American Entertainment (AAE) exclusively represents the interests of talent buyers, and does not claim to be the agency or management for any speaker or artist on this site. AAE is a talent booking agency for paid events only. We do not handle requests for donation of time or media requests for interviews, and cannot provide celebrity contact information.
If you are the talent and wish to request a profile update or removal from our online directory, please submit a profile request form.