The Future of Reality: AR versus VR

The following podcast publication compares augmented reality and virtual reality. The authors, Brendon Hales and Hayden White, provide an analysis of the strengths and weaknesses of reality-based technologies. A main takeaway from this podcast is the versatility of augmented reality within a work and educational environment. Virtual reality can also provide additional functionality within a gaming environment.

Please find the podcast below:

Download it here

Upcoming Event

ISACA 2018 North America CACS
Computer Audit, Control, and Security


Saturday, 28 April
8:00AM – 5:00PM
Registration Desk Open

8:00AM – 9:00AM
Workshop Breakfast

9:00AM – 5:00PM
WS1–COBIT 5 Foundation, Day 1
WS2–Cybersecurity Fundamentals, Day 1
WS3–CISA Cram Course, Day 1
WS4–Develop and Implement a Risk Management Process, Day 1

12:30PM – 1:30PM
Workshop Lunch

Sunday, 29 April
8:00AM – 6:30PM
Registration Desk Open

8:00AM – 9:00AM
Workshop Breakfast

9:00AM – 5:00PM
WS1–COBIT 5 Foundation, Day 2
WS2–Cybersecurity Fundamentals, Day 2
WS3–CISA Cram Course, Day 2
WS4–Develop and Implement a Risk Management Process, Day 2

12:30PM – 1:30PM
Workshop Lunch

5:30PM – 6:30PM
Welcome Reception

Monday, 30 April
7:00AM – 7:15PM
Registration Desk and Innovation Exchange Open

7:00AM – 8:30AM
Continental Breakfast

8:30AM – 10:00AM
General Session
Leadership Brief | Theresa Grafenstine
Keynote Address | Erik Wahl | The Spark and the Grind: The Discipline of Creativity

10:00AM – 10:30AM
Refreshment Break in the Innovation Exchange

10:30AM –11:45AM
111–Prepare for the Future of Internal Audit
112–Encryption: Lower Risk, Increase Compliance
113–Risk Assessments and Risk Management
114–Cryptocurrency Economic Attacks & Defenses
115–SSH Guidance – What Does it Mean to You?
116–Cloud Security Strategy & Considerations
117–The Art of Verbally Communicating
118–Practical Application of Qualitative Risk 1

11:45AM – 1:00PM

1:00PM – 2:15PM
121–Additional Information Coming Soon!
122–Understanding & Preparing for Emerging Risk
123–Art of Performing Risk Assessments
124–Additional Information Coming Soon!
125–Sound IT Audit Based on FFIEC IT Booklets
126–Automated Compliance
127–Security KPI/Metrics for Senior Executives
128–Practical Application of Qualitative Risk 2

2:15PM – 2:30PM
Session Movement Break

2:30PM – 3:45PM
131–Machine Learning for Auditors – An Overview
132–Cloud Security Controls Revealed
133–Hidden Traps in Third-Party Risk Management
134–Cyber Resilience for the Changing World
135–Auditing in the Cloud: The Business Case
136–Securing and Auditing a Crisis Response
137–Board Director Concerns about Cyber & Technology Risk
138–Connecting the Dots: GLBA Risk Assessment

3:45PM – 4:15PM
Refreshment Break in the Innovation Exchange

4:15PM – 5:15PM
141–Contemporary Data Analytics Approaches
142–Active Directory for Auditors
143–Overview of Blockchain Technology
144–Why is Database Security so $^%# Difficult?
145–Rise of the Drones: Prepare Your Enterprise
146–Security Automation in Cloud Environments
147–Tips for Effective Presenting
148–Untangling the Spaghetti Diagram

5:30PM – 6:00PM
Spotlight Educational Sessions

6:15PM – 6:45PM
Spotlight Educational Sessions

5:15PM – 7:15PM
Networking Reception in the Innovation Exchange

Tuesday, 1 May
7:30AM – 4:00PM
Innovation Exchange Open

7:30AM – 5:00PM
Registration Desk Open

7:30AM – 8:30AM
Continental Breakfast

8:30AM – 9:45AM
211–Innovating Audits with Data Analytics
212–Build and Understand Tabletop Exercise
213–Prepare for Blockchain Disruption
214–Determining Your Cyber Score Using NIST
215–Cyber Assurance Plan
216–Software Assurance Audit Program
217–How to Build & Grow Your IT Security Team
218–IT Risk Management for Everyone

9:45AM – 10:15AM
Refreshment Break in the Innovation Exchange

10:15AM – 11:30AM
221–Building Skynet for Audit & Risk Management
222–AWS Security Controls, Hardening the Cloud
223–BIA: The Root of Security & Recovery Plans
224–How COBIT Supports the Security Expert
225–The Next Generation in Data Mapping
226–Auditing Network Devices
227–The Hidden in Sight: Addressing the Cybersecurity Skills Gap
228–Managing Security with COBIT 5: Practical Guidance on Using the Framework

11:30AM – 12:45PM
Lunch in the Innovation Exchange

12:45PM – 2:00PM
231–21st Century Compliance: Continuous Audit
232–Auditor’s Guide to a Penetration Test
233–Container Security: Fake News or Opportunity
234–Insider Threat Investigation
235–Compliance in the Cloud
236–Zero Trust Networks for Audit & Compliance
237–Cybersecurity for Leadership
238–Building an Insider Threat Program

2:00PM – 2:15PM
Session Movement Break

2:15PM – 3:30PM
241–Data Visualization: Telling the Right Story
242–Assessing for Physical Security
243–Managing IT Risk Beyond Core IT
244–Defending Against the Insider Threat
245–Auditing Internet of Things (IoT) Processes
246–Innovation & Analytics in Audit
247–Insuring Your Cyber Assets
248–When HIPAA and Cybersecurity Intersect

3:30PM – 4:00PM
Refreshment Break in the Innovation Exchange

4:00PM – 5:00PM
251–IA Analytics PwC & Microsoft
252–Security Monitoring & Incident Response
253–Got Risk? Risk Management in M&A
254–SSH Keys—Lowest Cost, Highest Risk Tool
255–Control & Monitor Remote Access Pathways
256–Auditing Service Oriented Architecture
257–Cyber Across the Organization
258–Privacy by Design – Think Beyond GDPR

5:15PM – 5:45PM
Spotlight Educational Sessions

6:30PM – 9:00PM
Networking Evening: Additional Information Coming Soon!

Wednesday, 2 May
7:30AM – 5:00PM
Registration Desk Open

7:30AM – 8:30AM
Continental Breakfast

8:30AM – 9:45AM
311–Additional Information Coming Soon!
312–Avoid Incident Response Pitfalls
313–Additional Information Coming Soon!
314–Beyond the Audit: NIST in Action
315–Cyber Security – Audit Smarter Not Harder
316–Understanding the Role of a Bank ISO
317–Cybersecurity: Getting the Business Engaged
318–IT Governance Effectiveness

9:45PM – 10:15AM
Refreshment Break

10:15AM – 12:00PM
Closing General Session
Leadership Brief | Robert Clyde
Keynote Address | To Be Announced Soon!

12:00PM – 1:00PM
Workshop Lunch

1:00PM – 5:00PM
WS5–Cybersecurity for Auditors, Part 1
WS6–Leverage Data Analytics in Internal Audit, Part 1
WS7–PCI Data Security Standard, Part 1

Thursday, 3 May
8:00AM – 1:00PM
Registration Desk Open

9:00AM – 12:00PM
WS5–Cybersecurity for Auditors, Part 2
WS6–Leverage Data Analytics in Internal Audit, Part 2
WS7–PCI Data Security Standard, Part 2