databytedatabyte - information technology - · pdf file · 2014-04-14venkatesh...
Post on 13-Mar-2018
222 Views
Preview:
TRANSCRIPT
VOLUME 28 #8 REGION 4 CHAPTER 8
DATABYTEDATABYTE
DIRECTORS
Greg Boehmer, CISA, CIA, CFE, CGEIT, CISSP, CISM, CRISC, CRMA, PMP
Deloitte & Touche
313-394-5524
Derrick Buckingham CISA, CISSP, CISM CRISC
313-729-8816
Juman Doleh-Alomary, MSc.E, CISA,
CISM, CRISC, ISO27001 Wayne State University
313-577-6406
Michael A. Forrest, CISA, CGEIT
586-292-4740
Michele Haroon, CPA, CISA Federal-Mogul Corp.
734-637-9270
Ryan Hodges, CISA
Deloitte & Touche
248-953-1151
M. Siobhan Jordan
Ford Motor Company 734-891-5082
Brenda Karl, CISA, CGEIT, CRISC, QSA
Accretive Solutions
248-633-2347
Bhaskar Kakulavarapu TD Auto Finance
248-925-7001
D. Robert Okopny, PhD, CIA, CFE, CMA
Eastern Michigan University
734-487-0246
Rajesh Patel
Plante & Moran PLLC 248-223-3428
Brandy Pfeiffer, CISA
Federal-Mogul Corporation
248-354-2602
Carrie Schrader, CISA, CBM, CFE, CGEIT CRISC
GM Financial 586-817-8590
Doug Wahr, CISA, CRMA, CISSP Auto Club Group (AAA)
313-436-7277
Susan A. Yamin, CPA Ally Financial
734-619-8425
Manish Zaveri, CISA, CPA Delphi Corporation
248-888-9090
Monthly MeetingMonthly MeetingMonthly Meeting April 16, 2014April 16, 2014April 16, 2014
Pre-Dinner Topic: Journey to a Security Operations Center Angela Williams, CISM, CRISC, GSLC After-Dinner Topic: Recent Privacy Developments Keith A. Cheresko
Date: April 16, 2014
Time: 4:30 – 5:00 Registration & Networking
5:00 – 6:00 Pre-Dinner Presentation 6:00 – 6:45 Dinner 6:45 – 7:45 After-Dinner Presentation
Location: University of Michigan – Dearborn Fairlane Center North
Quad E Room, North Building. (It’s the 1st room to the right in the 1st aisle
past the reception desk. See map and directions on page 8) 19000 Hubbard Dearborn MI 48126 313-583-6511
Cost: Advance Registration: $20.00 Members $30.00 Non-Members $10.00 Students and Retirees
Advance registration ends at midnight Saturday, April 12, 2014. Members & Non-Members making reservations after the reservation deadline will be charged an additional $10. Walk-ins, excluding Students and Retirees, are subject to the late charge. Reservations can be made at www.isaca-det.org
PRESIDENT VICE PRESIDENT TREASURER SECRETARY Sajay Rai CPA, CISSP, CISM Brad Barton CISA Linda Kearney CISA, CIA, CIPP-US Jason Sist CISA, CISSP, CIA
Securely Yours LLC Lear Corporation Chrysler Group, LLC Cooper Standard Automotive 248-723-5224 248-707-9372 586-219-9041 248-946-1771
Registration Changes To make better use of your membership dollars, we will NO LONGER accept credit cards at the DOOR for walk-ins and unpaid pre-registrations. We WILL continue to accept credit cards for pre-registrations in Cvent. We encourage you to register and pay via Cvent for all ISACA Chapter activities. ISACA Chapter Meeting CPEs will no longer be distributed at the meetings, but will be emailed to the meeting participants after the meeting.
2
DATABYTE
DETROIT CHAPTER ISACA – YOUR ‘YEAR-ROUND’ PARTNER FOR PROFESSIONAL GROWTH
Dear Detroit Chapter Members, We wrapped up March as one of our
busiest months of the year with our
monthly meeting and the Spring Confer-ence. As expected, both the monthly
meeting and the Spring Conference were
very well attended. A big thanks to all who worked on the Spring Conference
Committee: Pamela Bishop, Steve Bolander, Juman Doleh
-Alomary, Siobhan Jordan, Robert Okopny, Jason Sist,
Pam Weipert, Daniel Wiechec, and Susan Yamin. Also, thanks to all of the speakers and panelists who partici-
pated during our monthly meeting.
The year is not over yet, as we have the following events
coming up soon:
April: Our monthly meeting for April is on the 16th. We have very exciting topics. Angela Williams, CISM, CRISC,
GSLC, will present the topic “Journey to a Security Op-
eration Center” and Keith A. Cheresko will present the topic “Recent Privacy Developments”.
In addition, the scholarship contest is from April 4th through April 6th. This contest is available to all students
who want to earn some extra cash to pay for their studies.
The details are posted on page #6 in this Databyte. I en-
courage all students to form teams and register for the event.
Reminder: Final Registration Deadline for the June 2014 certification exams is April 11th.
May: The Spring seminar is on May 7th and May 8th. The topic is Information Security Management. The details are
posted on page #5 in this Databyte. This is another way
the chapter is making it easy for the members to earn CPE
credits.
The annual social event of the ISACA and IIA Dinner
Cruise will take place on May 30th this year. See page #4 for more details.
I look forward to seeing you during our April monthly
meeting.
Sincerely,
Sajay Rai, CPA, CISSP, CISM
ISACA Detroit Chapter President
Before Dinner Topic Journey to a Security Operations Center (SOC) is about BCBSM’s journey to establishing a formal security operations center. The presentation will provide a high level overview of what risks/threats BCBSM wanted to address, their strategic approach to address these risks, the execution path that man-agement decided to take and the benefits of establishing a SOC. This is a real case of implementing a security program in a large size organization. Before Dinner Speaker
Angela Williams, CISM, CRISC, GLSC Angela Williams is a senior manager for the de-partment of Information Security at Blue Cross Blue Shield of Michigan (BCBSM). BCBSM is one of the largest non-profit organizations in Michi-gan giving almost $400 million to social mission activities while averaging a profit margin on
Panel Speakers at the March 2014 Chapter Meeting
3
Welcome New ISACA Detroit Chapter Members
Saundra Pollard Gregory Giesler Charles Dirks Shawn Pignatiello Kevin DelCotto Mark Jasinski Bridget Kravchenko Peter Samoray Richard Tello Hisham Alhakimi David Trader Robert Meyering Venkatesh Dhanapal Araceli Escobar Vargas Venkatesh Ramachandra
DATABYTE
DETROIT CHAPTER ISACA – YOUR ‘YEAR-ROUND’ PARTNER FOR PROFESSIONAL GROWTH
After Dinner Speaker Keith A. Cheresko is a Principal of Privacy Associates Inter-national LLC. Privacy Associates International LLC is a Michigan-based privacy consultancy delivering experienced-based, practical guidance in assisting its clients address all aspects of privacy. Mr. Cheresko spent the majority of his career at Ford Motor Company where he was a member of the Office of the General Counsel. During his 26 year ten-ure at Ford, he held an assortment of legal assignments supporting Ford’s diverse business activities, including time with Ford Motor Credit Company, Ford’s finance subsidiary. He also served as counsel to Ford Motor Company’s Corpo-rate Privacy Office and advised or chaired working groups addressing an assortment of privacy matters, from market-ing-related activities to development of corporate-wide policies. In his last assignment before deciding to leave Ford, Mr. Cheresko was the primary privacy counsel and de facto privacy leader.
After leaving Ford and prior to joining Privacy Associates
International LLC, Mr. Cheresko served briefly as general
counsel to the Ponemon Institute, and continues serving as
a longtime member of the Ponemon Institute's Responsible
Information Management Council’s Advisory Board. He is
a member of the International Association of Privacy Pro-
fessionals and a Certified Information Privacy Professional
(CIPP/US/IT). Mr. Cheresko also serves as co-chairperson
of the Information Technology Law Section of the State Bar
of Michigan's Privacy Law Committee. Mr. Cheresko re-
ceived a BA from the University of Michigan-Dearborn, a
J.D. from Wayne State University, and is a member of the
State Bar of Michigan and the American Bar Association.
health insurance of less than 1/10 of 1 percent since 1990.
In her current role, Angela Williams has been a key leader in elevating the posture of the Information Security Program at BCBSM. These efforts include: ensuring systems and applica-tions are in compliance with organizational and governmental security requirements; increasing employee awareness about information security; assessing and reducing security risks; and protecting the confidentiality, integrity and availability of member, employee, and business information. She directs a staff of (22) people with (4) direct reports.
A visionary, strategic and certified Information Technology professional with more than 23 years of in-depth and cross-industry experience that includes healthcare, government, and manufacturing. She is currently focused on leading the devel-opment of strategic and innovative implementations of Infor-mation Security and IT Risk Management initiatives that lever-age enabling technologies within the healthcare industry by applying a practical, business-driven vision to develop sensi-tive data protection strategies.
Angela holds a Bachelor and Masters degree in Computer In-formation Systems and maintains three highly accredited se-curity certifications: Certified Information Security Manager (CISM), Certified Risk and Information Security Controls (CRISC), and SANS Global Security Leadership (GSLC).
She is a member of several respected organizations, which includes the Michigan Council of Women in Technology, ISACA Detroit Chapter, the Executive Women’s Forum, Blue Cross Blue Shield Information Security Round Table (ISRT), and Infor-mation Technology Senior Management Forum (ITSMF). An-gela is also an advisory board member of the Henry Ford Com-munity College Computer Information Systems (CIS) program providing guidance to shape the curriculum, leading discussion on the latest security trends and technology, and offering ideas to prepare students as future security professionals.
As a result of Angela’s success, her team has been the recipi-ent of two awards from nationally recognized organizations, CSO Magazine and the TechExec Network. Both awards ac-knowledge information security projects that delivered out-standing business value. After Dinner Topic Recent Privacy Developments This is a quick paced and often irreverent discussion of recent privacy developments affecting companies. Topics include changes to California law, the post-Snowden status of the proposed revisions to the European Data Protection Directive, impact of major privacy-related enforcement actions by the Federal Trade Commission and similar hot topics where recent matters will have an impact on companies and their auditors.
4
DATABYTE
DETROIT CHAPTER ISACA – YOUR ‘YEAR-ROUND’ PARTNER FOR PROFESSIONAL GROWTH
Attend up to 4 Chapter Meetings FREE In these difficult times, the ISACA Detroit Chapter Board wants to help. If you are unemployed, laid-off, or are not currently receiving a paycheck, we have some good news. It’s during times such as these that maintaining a network of peers and maintaining your level of training is so very important. We are, therefore, offering to allow you to attend up to four (4) meetings FREE. You must register for each meeting through the Membership Chairman by sending an e-mail stating that you are currently out of work and wish to attend the meeting. The e-mail must be received prior to the meeting registration close for that meeting. Please send the e-mail to Mike Forrest at m_forrest@wowway.com.
ISACA Introduces Certification Open Badges Working with ISACA’s vendor, Pearson, ISACA is making available web-enabled versions of your cre-dentials that you can display on social and profes-
sional networking sites, emails or personal web sites.
Open badges are online representations of an achievement. ISACA’s open badges, offered in compli-ance with the Mozilla Open Badges Standard, provide ISACA certification holders additional value by ena-bling interested parties to learn more about the creden-tials via single-click verification. When they click on your badge, they link to metadata that describe your qualifications and the process required to earn them. This extra layer of content helps you tell a more com-plete and compelling story of your achievements. With your ISACA open badge you can share your IS-ACA certifications on popular social and professional networking sites, emails or personal web sites. The visual representation of your ISACA certification will also allow your contacts to verify the credentials that you have achieved. It is a quick and easy way to share your achievements with your contacts. You’ve worked hard to earn your certification, so why not share this accomplishment with your colleagues? You will receive an email notification prior to April 14, 2014 with details on how to claim your badge(s). For more information, visit www.isaca.org/badges. Brenda Karl, CISA, CGEIT, CRISC
Detroit Chapter Certification Director
March Chapter Meeting Raffle Winners
Mersiha Cunmulaj Jeff Spicuzzi Travis Bray
Keith Cheresko Ronald Kapler Philip Snell
Saundra Pollard Matthew Bounds Diane Baker
Chun Yin Tony Chan
ISACA and IIA Chapters Partner for FUN!!
Network, dine and dance the night away. Join us for the Fourth Annual Cruise Aboard the
Detroit Diamond Jacks.
You and any number of guests you would like to bring are invited to a
Private Chartered Dinner Cruise on the Detroit River with
Diamond Cruises. Friday May 30, 2014
Non-Refundable Cost for Members and their Non-Member Friends only $31.00 per person!
3 Hour Cruise – Boarding 6:00pm, Launch from Dock 6:30pm, Return to Dock 9:30pm
Your cost includes the following; Prime Rib of Beef with Au Jus (chef to carve)
Vegetable Lasagna Mostaccioli w/ Marinara Sauce
Michigan Salad: Mixed Greens, Sliced Pears, Crumbled Blue Cheese, Dried Cherries, Toasted Walnuts & Cherry Vinaigrette
Parsley Baby Carrots, Red Skin Potatoes Rolls and Butter, Cake Coffee and Soft Drinks
Entertainment & Cash Bar
Additional details will be provided upon registration
5
DATABYTE
DETROIT CHAPTER ISACA – YOUR ‘YEAR-ROUND’ PARTNER FOR PROFESSIONAL GROWTH
Spring Seminar
The Detroit Chapter of ISACA is happy to announce the up-coming spring seminar: Information Security Management. This workshop will provide detailed discussion on key informa-tion security areas and will focus on practical development and implementation of processes to manage governance, risk and compliance areas relating to information security. The full cur-riculum, found in detail below, includes many topics related to understanding key information security governance require-ments, practices, security risks, risk mitigation strategies and emerging information security issues.
The seminar instructor, John Tannahill, is a management con-sultant specializing in information security and audit services. His specific areas of technical expertise include UNIX and Windows operating system security, network security, and Oracle and Microsoft SQL Server security. John has been awarded the John Kuyer Best Speaker/Best Conference Con-tributor award and is a frequent speaker in Canada, Europe and the US.
This two day seminar will be held on May 7 and 8 (Wednesday and Thursday) at the Automotive Industry Action Group offices in Southfield, MI. Those attending will be awarded 15 hours of continuing professional education (CPE) credits. Enrollment can be completed by visiting the Events section of the ISACA Detroit website at: http://www.isaca.org/detroit, or by scanning the QR code below.
So mark your calendar for this important date and take advan-tage of one of the unique opportunities associated with being a member of ISACA. The Seminar Committee of the Detroit Chapter of ISACA
Seminar Outline:
Information Security Governance
Information Security Management Framework
Information Security Frameworks and Standards (e.g. ISO27001/27002)
Security Organization Components
Information Security Policy and Standards
Compliance Processes and Procedures
Information Security Management
Performing Information Security Risk Assessments
Dealing with emerging security issues (e.g. Cyber Se-curity, Cloud, BYOD, Social Media and Mobile De-vices)
Security Architecture and Design
Key Security Control Processes. including Security Configuration, Vulnerability Assessment and Host-Based Compliance areas
Information Security Areas
Information Security Threats and Vulnerabilities
Information Security Awareness
Identity and Access Management (including privilege management)
Network Security
Operating System Security (Focus on Windows, Unix and Linux)
Database Security
Virtualization Security
Malicious Code Management
E-mail and Messaging Security
SIEM, Incident Response and Incident Handling
Secure System Development and Maintenance
Application System Security (including web applica-tion security)
Disaster Recovery and Business Continuity Planning
Vendor Management, including Service Providers and Cloud Services
MANAGER, IT AUDIT
The qualified candidate will manage the development and execu-
tion of a comprehensive annual IT audit plan based on risk assess-
ment, corporate goals and objectives, regulatory requirements,
audit committee fiduciary needs, and professional auditing stan-
dards. Identify and audit IT systems and processes wherein poten-
tial control weaknesses, fraud, errors, waste, abuse, or other condi-
tions pose excessive risk to the organization or impair corporate
performance. Establish audit time budgets, target dates and staff-
ing to achieve audit objectives.
A Bachelor’s degree in Computer Science, Accounting, Business Administration, Finance, or a related field and CISA, CPA, or CIA
designation are required. Advanced degree, financial services
industry experience, and supervisory experience are desired.
The qualified candidate will have a thorough understanding of IT
security, control standards and processes. Knowledge of system
development process controls, including project management
practices. Excellent communication and interpersonal skills, and
have experience managing several audits or projects simultane-
ously. Significant experience in IT Auditing, with a minimum of
5 years, as a Senior Auditor or above, is required.
Please summarize your qualifications in a resume accompanied
with a cover letter, and include salary requirements. Please for-
ward your cover letter and resume to: Clare Ruetz, The Auto
Club Group, Email: jobs@aaamichigan.com.
Reference Job# 1000661-ISACA
The Auto Club Group is an Equal Opportunity Employer
6
DATABYTE
DETROIT CHAPTER ISACA – YOUR ‘YEAR-ROUND’ PARTNER FOR PROFESSIONAL GROWTH
ISACA Detroit 2013 2014 Program Schedule Date Topic Speaker Company
September 18, 2013
U of M Dearborn Pre Dinner Dark Cloud Rising Melissa L. Markey
After Dinner Data Making Case Study Keith Fournier Major Oak Consulting, LLC
October 16, 2013
(Joint Meeting with ISSA) Pre Dinner Attack Paths and Mitigations J. Wolfgang Goerlich VioPoint
After Dinner 2013 Data Breach Investigations Report (DBIR) Michael T. Betts
November 13, 2013
U of M Dearborn Pre Dinner IT Outsourcing Brad Barton
After Dinner Big Data Harnessing for Security & Prevention Ryan Miller
December 10, 2013
U of M Dearborn Pre Dinner Outsourcing Management Jan Vromant Fruition
Joint Mtg. IIA After Dinner Leveraging Data Analytics 7 Continuous Audit-ing
Jim Littley, Joe Hammond KPMG
January 15, 2014
U of M Dearborn Pre Dinner How to Build an Audit for a Disaster Paul Haley City of Trenton
After Dinner Cyber Vice a Train: PCI Data Breach, Billing Problems, Upset Employee Willing to Steal Be-fore Being Fired
Paul Haley City of Trenton
February 19, 2014
U of M Dearborn Pre Dinner Wireless Infrastructure Audits & Control Douglas McDonald Henry Ford Health Systems
After Dinner Identity & Access Management (IAM) Jim Shaw Deloitte
March 19, 2014
U of M Dearborn Pre Dinner Rolling Out an IT Risk Management Methodology Matt LoCricchio Flagstar Bank
Students’ Night After Dinner Panel Speakers on Careers for Student's Night Brenda Karl, Craig Kelly,
Jamshid Sadaghiyani, Eric Napier, David Flynn, Raj Patel
Accretive Solutions; GM; BCBCM, Orion Solutions;
Plante-Moran
April 16, 2014
U of M Dearborn Pre Dinner Journey to a Security Operations Center Angela Williams BCBSM
After Dinner Recent Privacy Developments Keith Cheresko
Robert L. Rothman Privacy Associate Int’l LLC
May 21, 2014
U of M Dearborn Pre Dinner Making SIEM Work for Security and Compliance in a Real World Setting
Ethan Steiger Polk
After Dinner What can GRC/SOD/Compliance Monitoring do for your Company?
Eric Ringle & Kelly Rau Deloitte
1st Annual Detroit Chapter ISACA Scholarship Competition
ISACA Detroit has been sponsoring scholarships for full time students in the Metro Detroit area for several years. To qualify, the students had to write an essay, which was evaluated by the ISACA Detroit Board members. This year, we thought we would enrich the experience of the students even further by providing them with a “real world” experience by asking them to work on a “case study” and present their conclusions to a panel of potential future bosses. So, welcome to the 1st Annual Detroit Chapter ISACA Scholarship Competition. This competition will start on April 4, 2014 at 6 p.m. and end on April 6, 2014 at 2 p.m. The format of the competition is as follows:
You are free to form a team. It is recommended that the team consist of two students, one with a background of IT Auditing or Assurance, and the second with a background of IT Security and Web Applications
A university can send multiple teams to the competition
Teams will be competing for three scholarships: 1st place is $3,000, 2nd place is $2,000 and 3rd place is $1,000. All team participants receive a honorable mention on ISACA’s website and in the monthly newsletter, Databyte.
Teams will be issued a case study at 6 p.m. on April 4, 2014. Teams will be expected to work on the case study till noon on April 6, 2014. At that time, the teams will present their report to a panel of judges. The presentation will be held at the University of Michigan Dearborn campus Fairlane Center (off of Hubbard St.). The winners will be an-nounced after all the teams have presented (around 2 p.m. on April 6, 2014).
The case study will be made available on April 4, 2014 at 6 p.m. on the following website: www.a-zcomp.com/isaca
Registration deadline is April 4, 2014 at 3 p.m. An email invitation to register for the Scholarship Competition will be sent out soon as well as a registration link posted to the ISACA Detroit Chapter web page.
7
2013/14 ISACA Detroit Chapter Committees
ADVERTISE IN YOUR DATABYTE NEWSLETTER
¼ Page $50.00
½ Page $100.00
Full Page $200.00
Contact Geralyn Jarmoluk at administrator@isaca-det.org
or Mike Forrest at m_forrest@wowway.com
CALL FOR PAPERS
To make the Databyte more meaningful, we would like to publish
articles of interest to the membership. We need your help!!! Have
you written a paper, article, whitepaper, etc., for your company
newsletter, website, etc., that you can share? If so please submit it
to Mike Forrest at m_forrest@wowway.com for publication in a
future Databyte.
DATABYTE
DETROIT CHAPTER ISACA – YOUR ‘YEAR-ROUND’ PARTNER FOR PROFESSIONAL GROWTH
Academic Relations
Manish Zaveri (Chair)
Michele Haroon
Robert Okopny
Greg Boehmer
Ryan Hodges
Raj Patel
Certification
Brenda Karl (Chair)
Michael Forrest
Brad Barton
Michele Haroon
Jason Sist
Facilities
Carrie Schrader (Chair)
Siobhan Jordan
Linda Kearney
Ryan Hodges
Internet
Brandy Pfeiffer (Chair)
Bhaskar Kakulavarapu (Webmaster)
Ryan Hodges
Membership Michael Forrest (Chair)
Brenda Karl
Doug Wahr
Nominating & Audit Siobhan Jordan (Chair)
Michele Haroon
Program
Juman Doleh-Alomary (Chair)
Michele Haroon
Raj Patel
Greg Boehmer
Spring Conference
Siobhan Jordan (Chair)
Robert Okopny
Jason Sist
Juman Doleh-Alomary
Seminars
Brad Barton (Chair)
Susan Yamin
Carrie Schrader
Manish Zaveri
Bylaws, Policies and Procedures
Brad Barton (Chair)
Doug Wahr
Michael Forrest
Linda Kearney
Michele Haroon
Social Committee
Jason Sist (Chair)
Siobhan Jordan
Susan Yamin
Ryan Hodges
Ad Hoc Committees
Sandbox Scholarship-Sajay Rai
Social Media-Ryan Hodges
Webcast-Linda Kearney
Member Enhancement-Michael
Forrest and Juman Doleh-Alomary
Executive Participation-Brad Barton
Attend the Michigan Cyber Summit!!
The 2014 Michigan Cybersecurity Industry Summit will be held on
May 20, 2014, at the Ann Arbor Marriott Ypsilanti at Eagle Crest,
from about 3:00-8:00 p.m. The summit will feature prominent
industry leaders, important updates about cybersecurity activities
in Michigan, demonstrations of the Michigan Cyber Range, and a daylong Capture the Flag contest held on the Range. It's sure to be a
great event that you don't want to miss! http://www.merit.edu/
learning/mcis2014/
Registration is only $50.00 for members! We are offering $25 off!
Code: DISC-GNFN
Begin the registration process by using the "Register" link at:
http://www.merit.edu/learning/mcis2014/
In the first step of registration you'll see one or more registration
options. Select the first option:
"2014 Michigan Cyber Security Industry Summit", with a price
of $75. Proceed through the next steps to enter your contact infor-mation. On the "Review and Submit Order/Registration" page, un-
der the heading "Do you have a discount code?," enter the follow-
ing 8-character code (DISC-GNFN) and click the "apply this code"
button.
The total price for the transaction will drop to $50, which is $25 off
the regular price. Then select a payment method and click the
"continue" button on the bottom of the page to complete the trans-action. If you have questions about this process, please contact
registration@merit.edu.
8
Dinner Menu April 16, 2014
Salads: Caesar Salad and Pasta Salad
Entrees: Baked Salmon, Italian Sausage with Rotini, Chicken Park Place
Side Dishes: Whole Kernel Corn, Buttered Parsley Potatoes
Optional Vegetarian Selection: Pasta Primavera
(available only with pre-registration)
Dessert: Walnut Torte
All dinners include rolls, butter, relish tray and coffee. Two alcoholic drinks limit (beer and wine only);
no other liquor available.
The Chapter must provide the number of reservations by 8:00 a.m. on
the Monday before the meeting. To ensure that we can accommo-
date those who wish to attend and the facility can provide the best
service possible, please make your reservations prior to midnight
Saturday, April 12, 2014. If you have made a reservation and cannot
attend, please contact Geralyn Jarmoluk at Administrator@isaca-
det.org, or 248-762-7421 prior to the above noted deadline for re-
funds. Your cooperation is greatly appreciated.
We are very sorry, but reservations not cancelled prior to the above
noted deadline (midnight Saturday prior to the meeting) cannot be
refunded as we are committed to the caterer for the meals ordered.
DATABYTE Geralyn Jarmoluk, Editor
P.O. Box 99385
Troy, MI 48099-9938
DATABYTE
DETROIT CHAPTER ISACA – YOUR ‘YEAR-ROUND’ PARTNER FOR PROFESSIONAL GROWTH
Directions to University of Michigan – Dearborn Fairlane Center North
Located at 19000 Hubbard, Dearborn MI 48126
From the West Take I-94 East to Southfield (M-39) North. Follow Southfield (North) to the Michigan Ave. (U.S. 12) exit. Stay on the Southfield Service Drive to Hub-bard Drive and turn left. Follow Hubbard Drive and turn right into the Southern entrance of the U-M Dearborn/Fairlane Center (the marquis will reflect the following: The University of Michigan-Dearborn/Fairlane Center). Follow the entrance road to the back and turn left at the stop sign; the North Build-ing will be located on your left hand side. Parking is directly across from the North Building.
From the East Take I-94 West to Southfield (M-39) North. Follow Southfield (North) to the Michigan Ave. (U.S. 12) exit. Stay on the Southfield Service Drive to Hub-bard Drive and turn left. Follow Hubbard Drive and turn right into the Southern entrance of the U-M Dearborn/Fairlane Center (the marquis will reflect
the following: The University of Michigan-Dearborn/Fairlane Center). Follow the entrance road to the back and turn left at the stop sign; the North Building will be located on your left hand side. Parking is directly across from the North Building.
From the South Take Southfield (M-39) North to the Michigan Avenue exit. Stay on the Southfield Service Drive to Hubbard Drive and turn left. Follow Hubbard Drive and turn right into the Southern entrance of the U-M Dearborn/Fairlane Center (the marquis will reflect the Following: The University of Michigan-Dearborn/Fairlane Center). Follow the entrance road to the back and turn left at the stop sign; the North Building will be located on your left hand side. Parking is directly across from the North Building.
From the North Take Southfield (M-39) South to the Ford Road exit. Stay on the Ford Road Service Drive to Hubbard Drive and turn right. Follow Hubbard Drive and turn right into the Southern entrance of the U-M Dearborn/Fairlane Center (the marquis will reflect the following: The Univer-sity of Michigan-Dearborn/Fairlane Center). Follow the entrance road to the back and turn left at the stop sign; the North Building will be located on your left hand side. Parking is directly across from the North Building.
top related