February 2020 Training Session

When: February 05, 2020 - 1300-1630
Where: RTP HQ
Registration: Website
ISACA-RTC Members - Free (Log in to register to ensure discounted fee)
Affiliated Organizations (IIA, ISSA, Other ISACA Chapters) - $25
All Others: $50
CPEs: Up to 3
Handouts: Will be uploaded when available

This training session is part of the ISACA "She Leads Tech" initiative.

Session I "Networking: The Most Important Thing Women Should Do for Their Careers -- But Aren't" (1:10 PM to 1:45PM)

For many professionals, the causes of their success have largely been contributed to the strong networking channels they have created over time. Through storytelling and humor, this presentation will persuade you why networking is an essential part of your job, whether you know it (or like it).
Main topics: • Learning how to stand out • Setting networking goals • Gaining confidence • Becoming a resource • Learning your value • Developing long-lasting relationships

As professional women, we have a responsibility to the younger generations of women who are struggling with the same issues we are. We must pay it forward.

Speaker: Gina Yacone, AGIO, Cybersecurity Consultant

Gina Yacone is a cybersecurity consultant with Agio’s Morrisville, NC, office. Gina is experienced in developing, implementing and evaluating health information security compliance programs for both government and private sector organizations. Gina focuses on the healthcare space wherein she looks deep into the efficiency and effectiveness of technical, physical and administrative control structures. Gina’s experience includes virtual CISO (vCISO) responsibilities for clients concentrated in healthcare, pharmaceuticals, technology and local government. She has conducted numerous HIPAA-focused security risk assessments of hospitals and healthcare organizations, as well performed HITRUST assessments. Gina has built an extensive track record of success delivering the vision, key leadership, and strategies to take IT performance and security to new levels of performance.
Gina is a designated CompTIA Subject Matter Expert and holds certifications from ISC2 as a Systems Security. Certified Practitioner, CompTIA in Security Plus (Sec+), as well as the Health Information Trust Alliance (HITRUST) as a Certified CSF Practitioner (CCSFP) and a Certified HITRUST Quality Professional (CHQP). Gina is a Rotarian and an active member in the local NC chapters of the Information Systems Security Association (ISSA), InfraGard, and North Carolina Healthcare Information and Communications Alliance (NCHICA) and regularly participates in DEFCON and other local hacker meetups. Gina sits on the board for Women in Cybersecurity (WiCyS) North Carolina, Tweens & Technology, BsidesRDU as well as the Information Services Advisory Board for the Town of Cary.

Session II Will be Updated (1:45 PM to 2:30 PM)

When opportunity strikes! It’s often said opportunity knocks only once. You never know if you’ll get another opportunity. My journey into security has been due to opportunities I have seized along the way. I would like to share my journey as a motivational speech to inspire other females in this industry of Cybersecurity.

Speaker: Noureen Njoroge, Cisco, Security Threat Intel Engineer

Noureen Njoroge is a passionate Cybersecurity specialist, a global keynote speaker and listed among the Top 30 Most Admired Minority Professionals in Cybersecurity by https://sequre.world/diversity-matters-the-case-for-inclusivity-in-cybersecurity/. She currently works at Cisco Systems as a Cybersecurity consulting engineer. Noureen is a people’s leader and very passionate in mentoring others. She is the owner of the "Mentor & Mentee Women in Cybersecurity"  LinkedIn Group and the president of North Carolina Women in Cybersecurity (WiCyS) Affiliate chapter. Noureen Njoroge has continued to be an advocate for many women in the IT industry. She volunteers in both local and international speaking engagements advocating for women. Her voice can be heard on several podcasts advocating for women in this industry. Noureen is very passionate about mentoring others and being the voice for many. Noureen sets an example for others to follow in her hard work to keep ahead of the pack in a rapidly changing industry, her commitment to generously share insights on an ongoing basis, and her desire to help clients protect their business and their data in a complex and uncertain world. She holds a bachelor’s degree in Information Technology from the University of Massachusetts Lowell (UML) and is a graduate of the cybersecurity program at Massachusetts Institute of Technology (MIT).

Session III "A Career is a Bucket of Like Things" (2:45 PM to 3:15 PM)

Speaker: Anna Kirkland Smith, MetLife, Security Analyst

Anna Kirkland Smith enjoys blending data science and cybersecurity. She currently works at MetLife on the Cyber Fraud team. She is not only interested in protecting companies, but also growing communities. She is the founding president of the Data Scientista Society, a local group for women enthusiastic about data. She is also recruiting for www.dorotheadixdigital.org, a stack of volunteer-driven IOT “cyberscape architecture” projects for Dorothea Dix Park.

Session IV "Seven Things I Have Learned about Security"

Speaker: Deb Romeo, Security Journey, Co-Founder / COO

Co-Founder at Security Journey along with her husband, Chris Romeo. COO responsible for day-to-day operations and finances for the company.

For more information and to register for the training session, please visit the ISACA RTC website.



March 2020 Full Day Session

When: March 4, 2020 - 8:30AM - 4:30PM
Where: RTP HQ
Registration: Click Here
   ISACA-RTC Members - $75 (Log in to register to ensure discounted fee)
   Affiliated Organizations (IIA, ISSA, Other ISACA Chapters) - $100
   All Others: $125
CPEs: Up to 7
Handouts: Will be uploaded when available


1.  “The Management of Security Tool Usage and How SOAR can Improve Workload Efficiencies”, Anthony Tanzi  | Partner Architect, Optiv

Anthony Tanzi

Anthony Tanzi has more than 20 years’ experience in the networking and network security space. As a Partner Architect focused on Palo Alto Networks, Tanzi is responsible for Optiv’s pre-sales enablement and support to accelerate growth between Palo Alto Networks and Optiv in existing and new markets across the U.S. and Canada. He is also focused on supporting Optiv’s post sale implementation team and working with marketing on Palo Alto specific campaigns.  Tanzi came to Optiv as part of the acquisition of the Philadelphia based integrator Comm Solutions in 2017. While at Comm Solutions for 10 years, Tanzi lead the Palo Alto Networks practice as a pre-sales engineer, post-sale implementation engineer, certified Palo Alto instructor as well as holding his own Palo Alto user groups and other marketing functions and support.  Tanzi is a member of Palo Alto Networks Cyberforce and was the first partner engineer to reach the highest level of “Cyberforce Hero” in the United States as well as being the first worldwide to be awarded “Ultimate Cyberforce Hero”. 

2.  “Get Attention and Budget: How to Effectively Communicate Important Audit Findings to Your Executives”, Craig LaCava | Global Executive Services Director, Optiv

Craig LaCava

Craig LaCava is an accomplished, visionary, and passionate client partner with a proven record of transforming IT managed and hosted services for global organizations. Craig is an IT Service Management specialist who aligns business roadmaps with IT capabilities, including Information Security and Cloud Services. With over 16 years of consulting experience and eight years of general management experience, Craig has enabled customers to successfully implement cyber operations, risk management and BC/DR strategies as well as cloud-based firewall, secure remote access and web proxy services globally.
Prior to joining Optiv, Craig was Senior Business Director and Client Partner for a top-tier, global telecommunications company where he helped multinational customers transform their IT infrastructure and business operations with secure, managed cloud services.
Craig earned a bachelor’s degree in Computer Science (with honor) from the GA Institute of Technology and is the co-author of the book The Secrets of Service Level Management: A Process Owner’s Guide.
Expertise/Skills: Cloud Services Transformation, IT Service Management (ITIL), Business Continuity / Disaster Recovery, IT Strategy and Planning, Risk Assessment, Passionate Story Teller and Presenter, Zscaler Cloud Proxy and Firewall, Cisco Systems Networking (WAN / LAN), Pulse Secure Remote Access, Skybox Firewall Management, Ethical Hacking Engagement Management

Notable Accomplishments

  • Assessed Business Continuity/Disaster Recovery for a major outsource contact center customer and provided their COO with a strategic roadmap to improve their maturity and reduce risk. Most of the recommendations were implemented the following year.
  • Produced a comprehensive Risk Assessment for the CIO/COO for a financial services customer in order to enable the Board of Directors to understand their biggest risks. Made recommendations on what projects were the most important for the following year to improve their risk profile.
  • Transformed a global manufacturing company from an on-premise web proxy solution to a new Zscaler cloud proxy managed service. Successfully managed the migration of over 5,000 users.
  • Scoped and directed multiple Ethical Hacking engagements for several global customers including network and application penetration tests as well as social engineering.
  • Coached high-performing teams to numerous individual and team accolades including mentoring the Program Management Lead during a major customer transition, resulting in the program manager winning an outstanding performance award from the customer.

Certifications: IT Security and Audit Certification (GIAC), SSCP (ISC2), ITIL v3 Expert (Service Manager)

3.  "Managing Risk through Digital Transformation”, Jim Tiller | DVP, Security Services Operations, Optiv

Jim Tiller

Jim Tiller is a dynamic information security executive with over two and a half decades of cyber security experience, leadership, and global recognition for innovation in security strategies and execution. A published author on information security technologies and strategy; internationally recognized expert in the development of solutions combining excellence in risk management, technology and operations.  Before joining Optiv, Jim was the Director of Security Consulting Services for the Americas at Hewlett-Packard (HP). While at British Telecom (BT) he was the VP of Global Security Consulting, VP of Security Services North America, VP of Security Sales and Engineering for US&C, and the VP of Ethical Hacking. Prior to BT, Jim was the Global Security Practice Leader for International Network Services (INS). And during his time at Lucent Technologies, he was the Managing Director for Advanced Security Solutions at Bell Labs.

Cyber security highlights include:

  • Authored 4 books on security and contributed to 18 other globally recognized security publications, such as ISC2 CBK and Information Security Management Handbook
  • Obtained multiple patents for innovative security, encompassing GRC, technical network assessment tools and methods, and one evolved into communications security standards (ITU-x805)
  • Attained #1 ranking from the U.S. National Security Agency (NSA-IATRP), achieving an unprecedented “4 of 5” in security services
  • Subject matter expert presenting for InfoSec World, NATO, Army, Air Force, Cisco and Microsoft events throughout Europe, Asia, and North America
  • Interviewed by Microsoft Security 360, NetworkWorld, SC Magazine, Dallas Morning News, Information Security Magazine, CISO Magazine, IT Business Edge, IDC, Gartner, and Forrester


4.  “A Zero Trust Journey: What are the Building Blocks?”, Jerry W. Chapman | Technical Director – Digital Identity and Data Management, Optiv

Zero Trust can transform your companies security as organizations migrate to a universal platform - a result of digital transformation and the cloud. Knowing where to start, however, and how to get to the top of the Zero Trust mountain and its maturity levels can be challenging. Join Optiv's Jerry W. Chapman to discuss what are the key building blocks to methodically achieve full Zero Trust and optimal security while adapting to an evolving infrastructure.

Jerry Chapman

Jerry Chapman has been with Optiv Security for 14+ years working to deliver Identity and Access Management Solutions with 18+ years in Identity.  While at Optiv, Jerry has worked with several Identity and Access Management solutions and has performed several different duties, including Architecture, Engineering, Software Development and Support.  Jerry continues to work with partners to strategically enhance solutions and integrations to support Identity Centric Security Architectures.