• New Training Session Sign In Process

    We will be beta testing a barcode based sign in process (replacing the physical sign-in sheets) for our monthly training sessions. The barcode that will be used for the sign-in is at the bottom of the registration confirmation email. You can use your cell phone or a paper print out of the registration confirmation email to sign in. This will enable us to track attendance better and also enable uploading of session CPEs directly to ISACA International.

Volunteer for Fall GRITSS

The ISACA Research Triangle Chapter 2019 Fall Governance, Risk & Information Technology Security Summit is a two-day event scheduled for September 4-5, 2019.  If you would like to volunteer your time and help us make this event a success, please fill out the form below with your information, and our volunteer coordinator will get back to you with more information. Thank you for your interest.

 

Powered by BreezingForms

2019 Fall GRITSS Sign-Up is Open!

Governance, Risk and IT Security Summit (GRITTS)

When: September 4-5, 2019, 8:00 AM - 4:00 PM
Where: Wake Tech Community College RTP Campus

The ISACA Research Triangle Chapter 2019 Fall Governance, Risk & Information Technology Security Summit (GRITTS) is a two-day event scheduled for September 4-5, 2019.

See more information and register in our Training Sessions!

2019 October Training Session

When: October 02, 2019, 1300-1630
Where: RTP HQ
Registration: Website
Cost
ISACA-RTC Members: Free (Log in to register to ensure discounted fee)
Affiliated organizations (IIA, ISSA, Other ISACA Chapters):  $25
All Others: $40
CPEs: Up to 3
Handouts: Will be uploaded when available

Session I:  Cyber Physical Security - Addressing IoT Risks

IoT is introducing devices and networks that are both on the network and off the network. The challenge is most people believe these off network risks are not a threat. Our research has exposed that WiFi thermostats can be hacked to impact data centers, Smart TVs can be used to eavesdrop on board meetings, and wireless thumb drives can be low hanging fruit for data breaches.

In this session we’ll explore the Cyber Physical Security spectrum to uncover these beyond-the-network IoT risks. Real-world examples proven out with packet captures, deep packet analysis, and attack methods will reviewed. In addition, countermeasures and an overall methodology will be covered to provide attendees with a framework for addressing IoT risks both on the network and off the network.

Michael Raggo

Speaker: Mike Raggo

 Michael T. Raggo, Chief Security Officer, 802 Secure (CISSP, NSA-IAM, CSI) has over 20 years of security research experience. His current focus is wireless IoT threats impacting the enterprise. Michael is the author of “Mobile Data Loss: Threats & Countermeasures” and “Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols” for Syngress Books, and contributing author for “Information Security the Complete Reference 2 nd Edition”. His Data Hiding book is also included at the NSA’s National Cryptologic Museum at Ft. Meade.

Data Hiding  Mobile Data Loss  The Complete Reference Information Security


A former security trainer, Michael has briefed international defense agencies including the FBI, Pentagon, and Queensland Police; is a frequent presenter at security conferences including Black Hat, DEF CON, Gartner, RSA, DoD Cyber Crime, OWASP, HackCon, and SANS; and has been featured on CNN Tech, TIME, Bloomberg, Forbes, and numerous other television and media outlets. He was also awarded the Pentagon’s Certificate of Appreciation.

On Summer Break!

There will be no training sessions in July and August. We will start again in September.

Have a great summer!

2019 November Training Session

When: November 06, 2019, 1300-1630
Where: RTP HQ
Registration: Website
Cost
ISACA-RTC Members:  Free (Log in to register to ensure discounted fee)
Affiliated organizations (IIA, ISSA, Other ISACA Chapters):  $25
All others: $40
CPEs: Up to 3
Handouts: Will be uploaded when available

Session I:  Cybersecurity and Blockchain

debra baker

Speaker: Debra Baker

Debra Baker has over 20 years of experience in cybersecurity beginning with her time in the USAF. She founded a new authoritative cryptographic knowledge base called Crypto Done Right which began as a collaboration between Cisco and Johns Hopkins University. Debra was recently named as one of the top 100 Women in Cybersecurity in the Women Know Cyber: 100 Fascinating Females Fighting Cybercrime. She also is a contributor to the Language of Cybersecurity book. She frequently speaks at conferences and her latest talk was at the ISC2 Security Congress titled "Busting the Blockchain Myths". She is currently a Technical Program Manager at RedSeal.