Á¤º¸¾È³»°øÁö»çÇ×
¸ñ·Ï 2013³âµµ Á¤º¸½Ã½ºÅÛ °¨¸® ½ÉÆ÷Áö¾ö - 6¿ù 18ÀÏ(È­)
¸ñ·Ï ISACA Knowledge Concert ÃÊ´ëÀå - 6¿ù 17ÀÏ(¿ù)
¸ñ·Ï Á¦6±â ISACA Áö½Ä ¿¬±¸È¸¿ø ¸ðÁý ¾È³»
¸ñ·Ï 2013³â 6¿ù CISA/CISM/CGEIT½ÃÇè ÀÀ½ÃÀÚ ½ÃÇèÀå ÀԽǾȳ»
¸ñ·Ï 2013³â 6¿ù CISA/CISM/CGEIT ½ÃÇè ÀÚ¿øºÀ»çÀÚ ¸ðÁý ¾È³»
¸ñ·Ï ISACA Knowledge Concert ÃÊ´ëÀå - 5¿ù 27ÀÏ(¿ù)
¸ñ·Ï Á¤º¸½Ã½ºÅÛ °¨¸®¿Í ÀÚü °¨»ç½Ç¹«·ÎÀÇ ÃÊ´ë - 5¿ù 4ÀÏ(Åä)
¸ñ·Ï 2013³â 9¿ù CISA/CISM ½ÃÇè ÀÏÁ¤ ¾È³»
¸ñ·Ï 2013³â 6¿ù ½ÃÇè µî·Ï±â°£ ¿¬Àå ¾È³»(4¿ù 23ÀϱîÁö) - CISA/CISM/CGEIT/CRISC
¸ñ·Ï Evening talk : Cloud Computing Security - 4¿ù 24ÀÏ(¼ö)
¸ñ·Ï ISACA ÃÊû °­¿¬ - 3¿ù 11ÀÏ(¿ù), UN³­¹Î±â±¸(UNHCR) ÃÖ¿îÈ£ ¹Ú»ç
¸ñ·Ï ISACA, APT °ø°Ý ÀνĿ¡ °üÇÑ »çÀ̹ö º¸¾È ¼³¹® °á°ú ¹ßÇ¥ - ÇÑ±Û ¹ø¿ª ÀÚ·á
¸ñ·Ï 2013 Çѱ¹Á¤º¸½Ã½ºÅÛ°¨»çÅëÁ¦Çùȸ ÀÓ¿ø ¸ðÁý
¸ñ·Ï Çѱ¹Á¤º¸½Ã½ºÅÛ°¨»çÅëÁ¦Çùȸ Á¤±âÃÑȸ °³ÃÖ °á°ú ¾È³»
¸ñ·Ï 2013³â 6¿ù CISA/CISM/CGEIT/CRISC ½ÃÇè ÀÏÁ¤ ¾È³»
¸ñ·Ï 2013³â CISA/CISM 9¿ù ½ÃÇè Ãß°¡ °³¼³(2013³â 6¿ù, 12¿ù ½ÃÇè ½Ç½ÃµÊ)
¸ñ·Ï Á¦19ȸ Çѱ¹Á¤º¸½Ã½ºÅÛ°¨»çÅëÁ¦Çùȸ ´º½º·¹ÅÍ
¸ñ·Ï 2013³âµµ »ç´Ü¹ýÀÎ Çѱ¹Á¤º¸½Ã½ºÅÛ°¨»çÅëÁ¦Çùȸ ȸÀå Ãßõ ¾È³»¹®
¸ñ·Ï 2012³â Á¤º¸½Ã½ºÅÛ°¨»çÅëÁ¦Çùȸ Á¤±âÃÑȸ °³ÃÖ ¾È³»(2013³â 1¿ù 17ÀÏ)
¸ñ·Ï ¾ÆÄ«µ¥¹ÌºÎ¹® ¿¬±¸È¸ ¼¼¹Ì³ª ¾È³»(11¿ù 17ÀÏ/Åä)
26/48page