2017 September Training Session - PAID FULL DAY SESSION

When: Wednesday, 6th of September – FULL DAY SESSION - 8am – 4:30pm (Doors open at 6:45am because breakfast will be served)

Where: **Attention: new meeting location **

Brier Creek Country Club - 9400 Club Hill Drive Raleigh, NC 27617

Cost:

RTC Members: $50

Affiliated Orgs (IIA, ISSA, Other ISACA Chapters): $75

Non-Members: $100

CPEs: Upto 8

 


Lunch

if you cannot leave the site over lunch due to work responsibilities, etc. - you can buy a a box lunch at the door in the morning for $10. Lunch will be available at noon time to eat at their seats. This service is offered By Brier Creek country club. You can pay  (cash or charge) at the door when you arrive in the morning


 

Session I - Building an Effective Cyber Security Strategy

This presentation provides leading practices to articulate to executives the case for action and appropriate practical approaches to crafting an effective cyber-security strategic program.

This presentation enables you to make the case that cyber-security should be an integral part of your corporate risk management program. Examples demonstrate how to adequately communicate to senior leaders the expanding risk and threat landscape plus the increasing burden of stakeholder oversight. A step by step approach using practical techniques guides you through the complex process of building an effective, tailored cyber-security strategy and communicating the appropriate solutions to executive management. This strategic, programmatic approach allows you to make better investment decisions in order to reduce the chances of a cyber-security incident and the impact when one occurs.

Learning Objectives:

Effectively communicate the cyber risks, threats and burdens of increasing stakeholder oversight to senior executives.

Systematically develop an effective cyber security strategy tailored to your business by following a practical step by step approach.

Convincingly demonstrate due diligence in making better cyber security investment decisions.

Speakers:

Brian WrozekManaging Executive Director, Executive Advsisory, Office of the CISO, Optiv 

Brian Wrozek is a managing executive director, executive advisory in the Office of the CISO at Optiv. In this role, Wrozek works closely with security executives to provide C-suite advisory services to define cyber strategy, roadmaps and solutions to meet clients’ security objectives.

Wrozek is the former chief security officer (CSO) for Alliance Data where he had enterprise responsibility for information security and physical security. Prior to Alliance Data, he was the IT security and privacy director at Texas Instruments where he managed all facets of electronic data and system security worldwide.

Wrozek earned his Bachelor of Science in computer science from Michigan Technological University. He earned his MBA and Cybersecurity Certification from the University of Dallas. Wrozek is an adjunct professor at the University of Dallas teaching graduate-level cyber security courses in the Satish & Yasmin Gupta College of Business.

Wrozek received the 2008 Central Region Information Security Executive of the Year award from Tech Exec Networks and the 2010 Information Security Executive of the Year award at the Texas Regional Infrastructure Security Conference.

John Turner, Senior Director, Cloud Security, Optiv

John Turner is an accomplished IT executive with more than 20 years of leadership and operational IT experience. As senior director of cloud security enablement at Optiv, Turner’s team of cloud architects are responsible for helping to ensure the successful integrated delivery of cloud security solutions. Turner plays a key part in bringing different areas of Optiv’s team together to deliver seamless cross practice wins. Turner also works as part of the cloud leadership team to define Optiv’s strategy and product portfolio.

Turner’s extensive operational background brings a unique client first perspective to the execution of Optiv’s cloud security practice. An early cloud veteran, Turner has first-hand experience moving his previous organizations to the cloud, as well as experience managing app-dev and dev-ops teams. His background also includes extensive experience with infrastructure, WLAN, performance management, analytics, data center builds, enterprise resource planning implementations, identity and access management development, firewall and identity-based networking.

Prior to joining Optiv in 2016, Turner was the vice president of product strategy at Adaptive Communications. He previously served as general manager of unified communications solutions at Aruba Networks. Turner got his start at Brandeis University building identity solutions and eventually leading the network and systems group as its director. Turner’s passion as a technologist has always fueled his interest and desire to make transformative changes with technology.

Turner has authored articles and papers on the use of technology as a change agent, and as a subject matter expert on wireless LAN and unified communications. Turner has appeared in many technology magazines, been a featured presenter and delivered key note addresses at several national conferences. Turner holds a bachelor’s degree from the College of Wooster in Wooster, Ohio.

2017 June Training Session

2017 June Training Session / Chapter Officer Elections

When: June 7, 2017 - 1300-1630
Where: RTP HQ
Registration: Website
Cost
ISACA-RTC Members - Free (Log in to register to ensure discounted fee)
Affiliated Organizations (IIA, ISSA, Othe ISACA Chapters) - $25
All Others: $40
CPEs: Upto 3
Handouts: Will Be Uploaded When available

Session I Chapter Elections - 1 PM - 1:20 (or so)

Session II It's All About the Data 1:20 - 4:30 PM

GRC is one of the hottest IT topics at the “C” level. Combine with the leap into cloud implementations, increased reliance on 3rd party vendors and the expansion of IoT, organizations are faced with compliance challenges for 2017 and beyond.
 
Attendees will be able to ….

  • Understand the 2017 security threats and challenges based on expert opinions and industry best practices.
  • Have a better understanding of what's on the horizon from a regulatory and standards perspective.  What are the auditors looking for?
  • Go back to the basics for implementing security - "Protect what's important and valuable!" Introduction to the concept of "protected data" and controls necessary to ensure compliance across major frameworks.
  • Walk away with an understanding of "Governance for your trusted access". Introduce a new perspective on access most organizations are not aware of or even addressing.

A best practice approach to governing all trusted access is also provided.

Speaker: Fouad Khalil, VP Of Compliance, SSH Communications Security

Fouad Khalil is the VP of Compliance at SSH Communication Security with extensive experience in the technology space with more than 25 years spanning disciplines in software development, IT support, program and project management and most recently IT Security and Compliance management. Mr. Khalil has held a number of positions within the technology sector during his career including; network, system and database administration, software programming, system, software and GUI design, project and product development, solution implementation and much more.
 
His most recent focus specializes in data security, security investigations, security training and awareness and most of all Security Compliance. He is a “one stop shop” for all Information Technology audit and compliance needs. Key areas of compliance and IT security focus include: Information Technology, National Institute of Standards and Technology, Internal Controls over financial reporting, Sarbanes-Oxley, PCI DSS, HIPAA and HITECH and the Monetary Authority of Singapore compliance to name a few.  Fouad is experienced in security training and awareness as part of corporate governance and regulatory compliance.
 
Active member in ISACA, IIA and Infragard groups. Active contributor to ISSA and ISC2 regionally and nationwide. CISA and ITIL Foundations certified.

 

For more information and to register for the training session, please visit the ISACA RTC website.

 

 

2017 Spring CISA / CISM Review Courses

Spring 2017 - CISA Review Course

Dates: April 8, April 22, May 6 and May 13 (Saturdays) 8:00 a.m. to 3:00 p.m. (Lunch to be provided.)

Location: MetLife Offices - 201 Metlife Way, Cary, NC

Material: Handouts to participants

Registration: ISACA RTC Website

Fees:

ISACA Member - $50
ISACA Partners(IIA, ISSA, Infragard etc.,) - $75
Non-Members - $100
Students - $25

CPEs: Up to 26

 

Spring 2017 - CISM Review Course

Dates: April 8, April 22, May 6 and May 13 (Saturdays) 8:00 a.m. to 3:00 p.m. (Lunch to be provided.)

Location: MetLife Offices - 201 Metlife Way, Cary, NC

Material: Handouts to participants

Registration: ISACA RTC Website

Fees:

ISACA Member - $50
ISACA Partners(IIA, ISSA, Infragard etc.,) - $75
Non-Members - $100
Students - $25

CPEs: Up to 26

For additional information and to register, please visit our website at www.isaca-rtc.org and navigate to Event Registration.