13.07.2015 Views

Fundamentals of IT Audit – IT Audit, Governance and Security

Fundamentals of IT Audit – IT Audit, Governance and Security

Fundamentals of IT Audit – IT Audit, Governance and Security

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2013 Canadian Conference on <strong>IT</strong> <strong>Audit</strong>, <strong>Governance</strong> <strong>and</strong> <strong>Security</strong>March 26-27, 2013 (Optional Workshop March 28) • The Westin Harbour Castle – Toronto, ON12:15 pm LUNCH1:30 pm CONCURRENT SESSIONS – CHOOSE ONE OF THREEWhat Does It Take to Be an Effective <strong>IT</strong> <strong>Audit</strong>or –in the Brave New World?Marc Poirier <strong>and</strong> Michael Kostanecki, ProtivitiPractitioners need a combination <strong>of</strong> technical<strong>and</strong> people skills to forge a career in auditingtechnology. Organizations are investing substantialsums in their computer systems, databases <strong>and</strong>supply chains to compete <strong>and</strong> leverage customerrelationships. At the same time, they are beginningto recognize that <strong>IT</strong> auditors can assist them inunderst<strong>and</strong>ing the constantly shifting risks <strong>of</strong> theinformation age.<strong>IT</strong> auditors focus on the governance <strong>of</strong> <strong>IT</strong> systems<strong>and</strong> processes with audits ranging from businesscontinuity to development processes to informationsecurity. To be effective, <strong>IT</strong> auditors must acquirethe right hard <strong>and</strong> s<strong>of</strong>t skills.Most <strong>IT</strong> auditors know about the hard skills requiredto meet pr<strong>of</strong>essional requirements. This sessionwill focus on the key attributes that successful<strong>IT</strong> auditors must have in their repertoire to beeffective, that is, the s<strong>of</strong>t skills – in the brave newworld.OR How to Better Engage the CFO in <strong>IT</strong> Activities –Aligning CFO <strong>and</strong> CIO PrioritiesPeter A. Parsan, The Hospital For Sick ChildrenEnterprises today are facing unprecedenteduncertainty requiring a new level <strong>of</strong> agility to adaptquickly to changes in the business environment.Although <strong>IT</strong> cost savings are still a key focus forthe CFO, business agility requires a new focus,urgency <strong>and</strong> cooperation between the CFO <strong>and</strong>CIO for setting priorities <strong>and</strong> aligning <strong>IT</strong> strategiesto business strategies for achieving sustainablerevenue growth, pr<strong>of</strong>itability <strong>and</strong> competitiveness.This session will focus on how the CFO mustbecome more involved <strong>and</strong> work with the CIO on<strong>IT</strong> issues relating to: underst<strong>and</strong>ing <strong>IT</strong> cost drivers;improving business agility through <strong>IT</strong> solutions; <strong>and</strong>mitigating risk.ORNFC <strong>and</strong> RFID – Balancing Benefits <strong>and</strong> RisksBlake Lindsay, BCEHow <strong>and</strong> where are NFC <strong>and</strong> RFID used? What arethe benefits? What are some <strong>of</strong> the audit <strong>and</strong> riskconsiderations? NFC <strong>and</strong> RFID create a new way<strong>of</strong> looking at how to audit <strong>and</strong> control financial<strong>and</strong> shipping records, for example, how you audit apaperless trail. There are also risk, governance, <strong>and</strong>security considerations, such as: how to get youraudit information <strong>and</strong> how to ensure the security<strong>and</strong> integrity <strong>of</strong> the data. In this session, insightsinto the benefits <strong>and</strong> risks for using NFC <strong>and</strong> RFIDwill be discussed <strong>and</strong> explored.2:30 pm COFFEE BREAK – EXHIB<strong>IT</strong>S OPEN2:50 pm CONCURRENT SESSIONS – CHOOSE ONE OF THREEORLeveraging Continuous Monitoring to EnhanceOperational <strong>Audit</strong>ingCharan Kumar Bommireddipalli, Collins Barrow LLPRobert D. Crawford, Ministry <strong>of</strong> Finance, Ontario Internal<strong>Audit</strong> DivisionThe successful achievement <strong>of</strong> an enterprise’s goals<strong>and</strong> objectives is accomplished through the design<strong>and</strong> implementation <strong>of</strong> various business processesthroughout the organization. The effectiveness<strong>of</strong> these processes (desired outcomes) <strong>and</strong> theirefficiency (resources used economically) impactthe extent to which strategic goals are successfullyachieved.While operational auditing assists the enterprisein evaluating <strong>and</strong> improving the design <strong>of</strong> variousbusiness processes, continuous monitoring assists inensuring that the business processes are operatingas intended.This session will address: What is continuousmonitoring? How can it assist in operationalauditing? What is operational auditing <strong>and</strong> how canoperational auditing add value to your <strong>IT</strong> audit? Inaddition, this session will also provide a workingsolution for continuous monitoring in action.COB<strong>IT</strong> 5 – What’s New?Vishi Bindra, MNP LLPISACA recently released its COB<strong>IT</strong> 5 frameworkwith significant updates to its content <strong>and</strong> processes.Building on the previous versions, COB<strong>IT</strong> 5integrates several other components like VAL<strong>IT</strong> <strong>and</strong> RISK <strong>IT</strong>. This session will provide a highleveloverview <strong>of</strong> the major changes in COB<strong>IT</strong> 5compared to COB<strong>IT</strong> 4.1. Existing users will gaininsights into planning their transition <strong>and</strong> non-userswill receive an overview <strong>of</strong> this latest <strong>IT</strong> framework.For the most current information <strong>and</strong> to register, visit: www.cpd.cica.ca/<strong>IT</strong><strong>Audit</strong> 5


2013 Canadian Conference on <strong>IT</strong> <strong>Audit</strong>, <strong>Governance</strong> <strong>and</strong> <strong>Security</strong>March 26-27, 2013 (Optional Workshop March 28) • The Westin Harbour Castle – Toronto, ONORRise <strong>of</strong> the Cloud – Leveraging the Cloudfor ValueReza Kopaee, RiskView Inc.Richard Reiner, CC Stratus Capital Corp.Organizations are continuously under pressure tomake more efficient use <strong>of</strong> their <strong>IT</strong> resources whileenhancing their compliance with regulatory <strong>and</strong>legal requirements. Cloud computing <strong>and</strong> its variousflavours <strong>of</strong>fer an enormous opportunity; however,many organizations are reluctant to trust cloudservice providers with critical information.The purpose <strong>of</strong> this session is to underst<strong>and</strong>potential opportunities <strong>of</strong> cloud computing forenterprises <strong>of</strong> all sizes, in particular, small- <strong>and</strong>medium-size-organizations. We will explore goodpractices from business requirements gatheringto design, implementation, <strong>and</strong> security <strong>of</strong>cloud-based solutions.3:50 pm CHANGE BREAK4:00 pm Fraud – Social Engineering Attacks onSocial NetworksModerator:Charan Kumar Bommireddipalli, Collins Barrow LLPPanelists:Albert J. Marcella, Business Automation Consultants, LLCRonald E. Wretham, Investigative Solutions Network Inc.Lawyer TBDSocial networks have integrated into our sociallives <strong>and</strong> gained an influential role in society.More personal information is available for publicconsumption than ever before. Unfortunately, socialnetworks have increased our vulnerability to sociallyengineered attacks in which victims are tricked intodoing the attacker’s bidding.This session will address questions such as:What are the real risks to an organization? Whocan be victims? What is the technical anatomy <strong>of</strong>a social engineering attack? What are the legalrights <strong>and</strong> obligations?Our panel consists <strong>of</strong> experienced veteranswho will share their war stories, views <strong>and</strong>experiences <strong>and</strong> will provide an investigator <strong>and</strong>law enforcement perspective toward socialengineering risks.5:00 pm NETWORKING RECEPTION SPONSORED BYDay 2 • Wednesday, March 27, 20137:30 am CONTINENTAL BREAKFAST – EXHIB<strong>IT</strong>S OPEN8:30 am Knowing Your Cyber Risks/Threats <strong>and</strong>Mitigating ThemCraig Pattinson, BCESenior management <strong>and</strong> boards <strong>of</strong> directorshave a fiduciary responsibility to oversee all facets<strong>of</strong> risk, including cyber risk. Cyber risk, in additionto being an <strong>IT</strong> risk, can impact the business’srevenues, expenses, strategy, br<strong>and</strong> <strong>and</strong> reputation.At this session, you will learn how a leadingCanadian information technology service providertakes an enterprise-risk approach to obtain acomprehensive underst<strong>and</strong>ing <strong>of</strong> the relatedexposures, how risks are communicated to keystakeholders <strong>and</strong> how they are mitigated.9:30 am Managing the Complex World <strong>of</strong> CompliancePanel <strong>of</strong> industry leaders moderated by David Craig, PwCEnsuring sustainable compliance with the largenumber <strong>of</strong> current regulations is considered to beone <strong>of</strong> the major risks facing all organizations today.How can risks associated with non-compliance <strong>and</strong>sustainability be managed?In this session, a panel <strong>of</strong> leaders from a variety<strong>of</strong> industries will explore <strong>and</strong> discuss the commoncompliance issues that are currently being faced<strong>and</strong> the roles played by <strong>IT</strong> audit, governance <strong>and</strong>security in ensuring sustainable compliance isachieved. The panel will also discuss some <strong>of</strong> thechallenges you face along with suggestions forovercoming them.10:45 am COFFEE BREAK – EXHIB<strong>IT</strong>S OPEN11:15 am CONCURRENT SESSIONS – CHOOSE ONE OF THREEYou Can’t Do It All! Segregation <strong>of</strong> Non-Compatible<strong>IT</strong> Duties – What Every <strong>IT</strong> <strong>Audit</strong>or Should KnowScott Page <strong>and</strong> Kevin Pengelly, Wajax CorporationSegregation <strong>of</strong> Duties (SoD) in <strong>IT</strong> plays a major rolein reducing <strong>IT</strong> risk in the areas <strong>of</strong> fraud, undetectederrors, sabotage <strong>and</strong> programming inefficiencies.This session addresses some <strong>of</strong> the key roles <strong>and</strong>functions that need to be segregated including:<strong>IT</strong> duties versus user departments; databaseadministration versus the rest <strong>of</strong> <strong>IT</strong> functions;application development <strong>and</strong> maintenanceversus application operations; new applicationdevelopment versus application maintenance;information security versus <strong>IT</strong> functions; <strong>IT</strong>organizational structure for <strong>IT</strong> activities; <strong>and</strong>auditing for SoD.6For the most current information <strong>and</strong> to register, visit: www.cpd.cica.ca/<strong>IT</strong><strong>Audit</strong>


2013 Canadian Conference on <strong>IT</strong> <strong>Audit</strong>, <strong>Governance</strong> <strong>and</strong> <strong>Security</strong>March 26-27, 2013 (Optional Workshop March 28) • The Westin Harbour Castle – Toronto, ONORORDemystifying <strong>IT</strong>AFChris Anderson, Grant Thornton LLPThe Information Technology Assurance Framework(<strong>IT</strong>AF) is a roadmap for IS auditors to makeeffective use <strong>of</strong> ISACA (<strong>and</strong> other relevant st<strong>and</strong>ardsetting bodies) st<strong>and</strong>ards <strong>and</strong> guidelines inperforming <strong>IT</strong> audits in a consistent, high-qualitymanner.This session will review <strong>IT</strong>AF at a high level, showparticipants how it ‘plugs in conceptually’ to internal<strong>and</strong> external audits <strong>and</strong> briefly work through anexample <strong>of</strong> how to use <strong>IT</strong>AF in performing an auditon an important <strong>IT</strong> process.Strategies for Securing the CloudReza Kopaee, RiskView Inc.Service models including applications, platforms,<strong>and</strong> infrastructure are some <strong>of</strong> the areas where anorganization can leverage the benefits <strong>of</strong> the cloud.However, benefits come with their fair share <strong>of</strong>security risks. Network dependency, complexities<strong>of</strong> hybrid systems, reliability <strong>and</strong> cross border legalimplications increase the complexities <strong>of</strong> adaptingto the cloud. Infrastructure, security framework <strong>and</strong>the type <strong>of</strong> cloud configuration can significantlyinfluence security from a privacy, compliance <strong>and</strong>legal st<strong>and</strong> point. In addition, evolving risks, newthreats, financial budget constraints <strong>and</strong> a lack <strong>of</strong>skilled <strong>and</strong> experienced personnel create significantchallenges to mitigate these risks. Are you up to thechallenge?This session will explore current strategies <strong>and</strong> bestpractices on how to secure the “CLOUD”3:50 pm CHANGE BREAK4:00 pm <strong>Security</strong>, Risk <strong>and</strong> 21st Century Technology:A Tabletop ExerciseAlbert J. Marcella, Business Automation Consultants, LLCDo you ever wonder what the future <strong>of</strong> insiderthreats will look like? Will you or your organizationbe prepared? This closing session will challengeyour audit <strong>and</strong> control expertise, test your technical<strong>and</strong> economic judgment <strong>and</strong> place you squarely inthe comm<strong>and</strong> hot seat. Bring what you know. Usewhat you learned at the Conference. Don’t attendthis session if you wish to relax, wrap up yourday <strong>and</strong> expect to listen to an hour <strong>of</strong> summarycomments. You can’t be a passive attendee in thissession. You are the session!5:00 pm CONFERENCE CONCLUDESDay 3 • Thursday, March 28, 2013Optional Post-Conference Workshop7:30 am REGISTRATION AND CONTINENTAL BREAKFAST8:30 am Introduction to COB<strong>IT</strong> 5Workshop Leader: Barry Lewis, Cerberus ISC Inc.This one-day workshop provides an overview <strong>of</strong>COB<strong>IT</strong> 5, ISACA’s new governance framework. Theworkshop will provide existing practitioners <strong>and</strong>potential new COB<strong>IT</strong> users excellent insight into thenew framework <strong>and</strong> explain the differences betweenCOB<strong>IT</strong> 4.1 <strong>and</strong> COB<strong>IT</strong> 5.After completing this workshop, attendees will beable to:• discuss how <strong>IT</strong> management issues affectorganizations• underst<strong>and</strong> the principles <strong>of</strong> the <strong>Governance</strong><strong>of</strong> Enterprise <strong>IT</strong> <strong>and</strong> explain the differencesbetween management <strong>and</strong> governance• assess how the COB<strong>IT</strong> 5 Processes help guidethe creation <strong>of</strong> the five basic Principles <strong>and</strong> theseven <strong>Governance</strong> <strong>and</strong> Management Enablers• discuss the COB<strong>IT</strong> 5 Enabler Guide, includingthe Goals Cascade <strong>and</strong> the Process ReferenceModel.• describe the basics <strong>of</strong> how to implementCOB<strong>IT</strong> 5• underst<strong>and</strong> the differences between COB<strong>IT</strong> 4.1<strong>and</strong> COB<strong>IT</strong> 5 <strong>and</strong> what to consider whentransitioning• explain the benefits <strong>of</strong> using COB<strong>IT</strong> 5Who Should Attend?• current COB<strong>IT</strong> 4.1 users needing to decidewhether they want to adopt COB<strong>IT</strong> 5• new to COB<strong>IT</strong> <strong>and</strong> want to learn more aboutCOB<strong>IT</strong> 5• <strong>IT</strong> pr<strong>of</strong>essionals working in audit, assurance, risk,security <strong>and</strong> governanceBarry Lewis, CISM, CGE<strong>IT</strong>, CRISC, CISSP, Cerberus, isone <strong>of</strong> North America’s pre-eminent experts in theinformation security field. Since 1980 he has beeninvolved in the security field, designing, developing<strong>and</strong> implementing security measures from high-levelst<strong>and</strong>ards to detailed technical security controls.Barry received the prestigious John Kuyers BestSpeaker/Conference Contributor Award at theISACA 2008 International CACS Conference.8For the most current information <strong>and</strong> to register, visit: www.cpd.cica.ca/<strong>IT</strong><strong>Audit</strong>


<strong>Fundamentals</strong> <strong>of</strong> <strong>IT</strong> <strong>Audit</strong> – A Three-Day WorkshopMarch 26-28, 2013 • The Westin Harbour Castle – Toronto, ONWorkshop runs from 8:30 a.m. to 4:30 p.m., each day with continental breakfast available at 7:30 a.m.<strong>Fundamentals</strong> <strong>of</strong> <strong>IT</strong> <strong>Audit</strong> – A Three-Day WorkshopWorkshop Leader:Craig R. McGuffin, C.R. McGuffin Consulting ServicesThis three-day workshop is designed to provide new<strong>IT</strong> assurance-<strong>and</strong>-control pr<strong>of</strong>essionals with the coreskills needed by all information technology auditors.You will review <strong>and</strong> underst<strong>and</strong> key audit <strong>and</strong> controlprinciples, as well as many practical techniques, whichare all necessary to complete a wide range <strong>of</strong> <strong>IT</strong>audit assignments within today’s complex computingenvironments.Topics covered include overall <strong>IT</strong> audit planning <strong>and</strong>objectives, as well as audit risk assessment. We’llalso examine the wide range <strong>of</strong> controls neededfor managing the <strong>IT</strong> function, system development/acquisition <strong>and</strong> implementation, <strong>IT</strong> operations, logical<strong>and</strong> physical security <strong>and</strong> business resumption/disasterrecovery. Included are the vital business processcontrols found within specific financial tracking<strong>and</strong> reporting systems. In addition, we will considerimportant technology components <strong>IT</strong> auditors mustbe able to underst<strong>and</strong>, use <strong>and</strong> evaluate.Key topics include:• underst<strong>and</strong>ing <strong>IT</strong> audit risks <strong>and</strong> defining audit scope• internal control concepts <strong>and</strong> the role <strong>of</strong> computercontrol st<strong>and</strong>ards• general controls protecting the <strong>IT</strong> environment• business process controls covering specific financialsystems• communicating audit findingsYour underst<strong>and</strong>ing will be facilitated by demonstrations<strong>and</strong> discussions <strong>of</strong> current technology <strong>and</strong> audittechniques to help reinforce the key concepts. Aftercompleting the workshop, you will be able to takepart in many types <strong>of</strong> <strong>IT</strong> audit assignments <strong>and</strong> havea solid foundation on which to continue to build youraudit expertise.Attend this workshop <strong>and</strong> get a solid foundation tocontinue to build your <strong>IT</strong> audit expertise.Workshop Leader Craig McGuffin, CA, CISA, CISM, CGE<strong>IT</strong>, CRISC, Principal <strong>of</strong> C.R.McGuffin Consulting Services, has more than 25 years <strong>of</strong> experience in the field <strong>of</strong>computer <strong>and</strong> network controls <strong>and</strong> security. He has a background in computerscience <strong>and</strong> has worked as an information systems auditor, security consultant <strong>and</strong>security manager, obtaining experience in all major computing <strong>and</strong> networkingenvironments. He also is the co-author <strong>of</strong> two books on networking technology.Craig is an award-winning <strong>and</strong> extremely popular speaker on the use <strong>of</strong> computertechnology, controls <strong>and</strong> security, delivering core knowledge <strong>and</strong> practices throughuniversity courses, training seminars <strong>and</strong> conferences on six continents. He frequentlypresents on behalf <strong>of</strong> ISACA, IIA, <strong>and</strong> CICA.For the most current information <strong>and</strong> to register, visit: www.cpd.cica.ca/<strong>IT</strong><strong>Audit</strong> 9


2013 Canadian Conference on <strong>IT</strong> <strong>Audit</strong>, <strong>Governance</strong> <strong>and</strong> <strong>Security</strong>AND <strong>Fundamentals</strong> <strong>of</strong> <strong>IT</strong> <strong>Audit</strong> – A Three-Day WorkshopRegistration Information <strong>and</strong> Conditions:Hotel Information:The Westin Harbour CastleOne Harbour SquareToronto, ONPhone 416-869-1600, 1-888-625-5144www.westin.com/TorontoThe Westin Harbour Castle, Toronto is a CAA/AAA Four Diamond hotel located in the heart<strong>of</strong> downtown Toronto. Guests can easily access the city’s most thrilling destinations, from thebustling financial district to the lively Lake Ontario waterfront.Hotel reservations are the responsibility <strong>of</strong> the participant. Conference/<strong>Fundamentals</strong> <strong>of</strong><strong>IT</strong> <strong>Audit</strong> Workshop participants can enjoy a rate <strong>of</strong> $169.00 (plus applicable taxes). Earlyreservations are recommended. After February 28, or until our room block is full, reservationsare accepted on a space <strong>and</strong> rate availability basis.Contact Starwood Reservations at Tel: 1-888-625-5144. Identify yourself as a 2013 CanadianConference on <strong>IT</strong> <strong>Audit</strong>, <strong>Governance</strong> <strong>and</strong> <strong>Security</strong> participant to qualify for the specialconference rate.To make your reservations on-line go to the conference website at www.cpd.cica.ca/<strong>IT</strong><strong>Audit</strong><strong>and</strong> click on Venue.Program Disclaimer:The Conference/Workshop may be cancelled <strong>and</strong> all fees refunded if the required minimumenrolment is not obtained. The speakers, topics, program format <strong>and</strong> events are correct at thetime <strong>of</strong> printing. If unforeseen circumstances occur, CICA reserves the right to alter or deleteitems from the program, or cancel the Conference/Workshop.Cancellation Policy:If you are unable to attend an event for any reason, you may substitute, by arrangementwith the Participant Coordinator, someone else from your organization, or, you may cancelup to 14 calendar days prior to the event start date for a full refund. Cancellations receivedwithin 14 calendar days <strong>of</strong> the event start date will be subject to a $150 administration fee(plus applicable taxes). All cancellation requests must be received by 5:00 p.m. ET on theday prior to the event start date. Refunds are not available after that point.PLEASE NOTE: All cancellations must be received in writing, either by mail toCICA Continuing Education, 277 Wellington Street West, Toronto, ON M5V 3H2,Attn: Liliia Dubko, Participant Coordinator, or faxed to (416) 204-3415, or emailed toregistration@cica.ca.Earn the CPD hours you need with low-costflexible elearning from the CA Learning Centre.Hear the latest insights <strong>and</strong> technical updates from industry <strong>and</strong>pr<strong>of</strong>essional services leaders who are experts in their field.Go to www.calearningcentre.ca <strong>and</strong> choose “E-Learning”10For the most current information <strong>and</strong> to register, visit: www.cpd.cica.ca/<strong>IT</strong><strong>Audit</strong>


2013 Canadian Conference on <strong>IT</strong> <strong>Audit</strong>, <strong>Governance</strong> <strong>and</strong> <strong>Security</strong>AND <strong>Fundamentals</strong> <strong>of</strong> <strong>IT</strong> <strong>Audit</strong> – A Three-Day WorkshopRegistration FormPlease register me for the following:q Conference* ONLY (March 26-27) $1,295 $_______________q Conference* PLUS Post-Conference Workshop (March 26-28) $1,695 $_______________q Post-Conference Workshop ONLY (March 28) $645 $_______________*Conference registration includes online access to recorded presentations.(Online access will be available approximately 6-8 weeks post-event.)ORq <strong>Fundamentals</strong> <strong>of</strong> <strong>IT</strong> <strong>Audit</strong> – A Three-day Workshop (March 26-28) $1,495 $_______________(Conference or online access to conference sessions not included.)plus 13% HST $_______________GST/HST # R10686 1578 RT0001 QST #1010544323TQ0001SS TOTAL PAYMENT $_______________First Name (preferred)________________________________________________ Middle Initial(s)___________________Badge Name (if different from above)_____________________________________________________________________Surname_____________________________________________________________________________________________Designation(s) ________________________________________________________________________________________Title_________________________________________________________________________________________________Firm/Employer________________________________________________________________________________________Department___________________________________________________________________________________________Business Address______________________________________________________________________________________City_______________________________________ Province_________________ Postal Code______________________Business Phone_____________________________________ Business Fax_______________________________________Email________________________________________________________________________________________________Special dietary or other requirements (needs, not preferences):________________________________________________YOU MUST HAVE AN ACCOUNT TO REGISTER:I have an up-to-date account/pr<strong>of</strong>ile with CICAq YES q NOIf NO, visit the CA Store at www.castore.ca <strong>and</strong> click “my account”(top right-h<strong>and</strong> corner), <strong>and</strong> either Login <strong>and</strong> ensure your pr<strong>of</strong>ileinformation is current, or create a pr<strong>of</strong>ile if you do not have an account.PAYMENT OPTIONS:Credit Card: q Visa q MasterCard q AMEXCard No.____________________________________________Expiry Date__________________________________________Name <strong>of</strong> Cardholder___________________________________WAYS TOREGISTER:REGISTER ONLINE AT:www.cpd.cica.ca/<strong>IT</strong><strong>Audit</strong>REGISTER BY PHONE:416-651-5086 ortoll-free 1-888-651-5086MAIL REGISTRATION FORM AND PAYMENT TO:CICA Conference Officec/o aNd Logistix1345 St. Clair Ave. W., 3 rd floorToronto, ON M6E 1C311

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!