Attendees have made it clear that having session presentations available PRIOR to the event is a significant benefit and helps them get the most out of each session. In addition, session surveys show that speakers who do not make their presentations available prior to the event often receive lower ratings.

Attendees today are looking for more more hands-on learning, more interaction with the presenter, and more opportunities to dive deeper into certain topic areas. We strongly encourage you to consider new ways to incorporate these types of interactions while you are developing your session. Be sure to indicate in your submission how you intend to deliver this interactive type of learning environment.

To improve the chance that your session submission is selected, please clearly demonstrate the following criteria:


  • The topic of the session is timely for the industry today.
  • Attendees will able to relate to the content and apply what they have learned in their roles.
  • The topic must be something that will attract attendees.


  • The subject matter is cutting-edge or presents new ideas.
  • The content provides a thought-leadership perspective for the conference attendees.
  • Content is presented in a creative and engaging way.


  • The abstract and title of the session demonstrate the intent in a clear and concise way—feel free to be creative.
  • Learning objectives are well-defined.
  • The learning level of the presentation is clearly defined and supported by the learning objectives.


  • The presenter is knowledgeable and experienced on the topic submitted.
  • The presenter will use different ways to engage the attendees throughout the session.
  • The submission is complete and the presenter is committed to meeting all requirements and expectations.

Topic Areas for the Symposium

The ISACA Atlantic Provinces Chapter IT Security & Risk Symposium is the premier conference for Audit/Assurance, COBIT, Compliance, Risk, Security, and Strategy/Governance professionals in Atlantic Canada. The list below is neither complete nor restrictive, but rather is intended to stimulate ideas and describe timely topics that might be addressed in session proposals.

IS Audit & Assurance

  • Software Assurance: Threats, Vulnerabilities and Controls
  • Auditing Social Media Policies
  • The ERM and Audit Partnership
  • Implementing Effective Controls for BYOD
  • Understanding and Using SOC Reports
  • The Benefits of Continuous Monitoring
  • Effective Audit Sampling Procedures
  • A Holistic Approach to IT Auditing
  • Auditing in the Cloud
  • SAP Implementation Assurance
  • Shadow IT: Risk & Audit Consideration

Security/Cyber Security

  • Effective Defense Strategies for Cyber Security Threats
  • Implement and Sustain Security Awareness Programs
  • Third Party Compliance With Data Security and Privacy Policies
  • Incident Response Plans in Action: Case Study
  • Importance of a Cohesive Information Security Program
  • The Evolving Threat Landscape
  • Emerging Technology and Security Trends
  • Cyber Security and SAP
  • Threat Intelligence
  • Auditing Against the NIST Cyber Security Framework
  • Internet of Things (IOT)
  • Ransomware

Integrated Risk Management

  • Managing Social Media Risks
  • Understanding and Managing the Risk Associated with Emerging Technologies
  • Embedding an IT Risk Management Culture within the Organization
  • Turning Risk into Results – Managing Risks for Better Performance
  • Enterprise Risk Management for Cloud Computing
  • Risk Assessments of Outsourced Service Providers
  • Network Security Risks and Controls Framework
  • Auditing IT Governance – A Practical Guide
  • Governance, Risk, and Compliance (GRC) Framework – A Comprehensive Approach to Compliance

Big Data, Data Analytics & Visualization

  • Effective Data Destruction Practices
  • Modern Data Analytics
  • Big Data: Audit and Governance
  • Embedding Data Analytics in Fraud Auditing
  • Data Classification and Privacy Compliance
  • Enabling IT Audit with Big Data & Analytics
  • Managing and Classifying Big Data
  • Big Data: Risks and Rewards
  • Make your DLP Program Work
  • A Risk Based Approach to Data Governance