• New Training Session Sign In Process

    We will be beta testing a barcode based sign in process (replacing the physical sign-in sheets) for our monthly training sessions. The barcode that will be used for the sign-in is at the bottom of the registration confirmation email. You can use your cell phone or a paper print out of the registration confirmation email to sign in. This will enable us to track attendance better and also enable uploading of session CPEs directly to ISACA International.

2019 April Training Session

2019 April Training Session

When: April 3, 2019 - 1:00 PM - 4:00 PM EST
Where: RTP HQ
Registration: Website
Cost
ISACA-RTC Members - Free (Log in to register to ensure discounted fee)
Affiliated Organizations (IIA, ISSA, Othe ISACA Chapters) - $35
All Others: $50
CPEs: Upto 3
Handouts: Will Be Uploaded When available

Session 1: Evolving Defense - Keep Pace with New Cyber Threats

Threat Intelligence, evolving threats and emerging technology can steal a lot of the limelight and publicity within the cybersecurity field. Emphasis on the evolution of cyber defenses can be glossed over or left out, but it is equally important. This session explores new cybersecurity threats and how organizations must continually evolve their cyber defense strategies and implementations to protect their data. The presenter will elaborate on why success is dependent on effective support and engagement at all levels of the organizations - Leadership, Governance, Operations, and each and every employee. The importance of establishing an organization’s risk profile, conducting threat modeling exercises, and recurring reviews are key elements for effective cybersecurity management and technology implementation. The session will dive into each of these topics to give the audience a comprehensive perspective of what it takes to continually adapt and evolve cyber defense.

Session 2: Access AND Management Case Study

Part 1: A Deep Dive into Implementing Microsoft’s Active Directory Administrative Tier Model

Part 2: Effective Management of Understaffed Cybersecurity Teams

Microsoft Active Directory is a foundational component of nearly every organization’s technology infrastructure. Chances are when it was originally designed and built, functionality was often the main objective, leaving comprehensive security controls to be applied later. This session takes the audience through the transition and transformation needed to implement Microsoft’s Active Directory Administrative Tier Model to enforce stronger access controls organization wide. Real world examples and experiences are detailed to uncover pain points and highlight successes. The challenges associated with the extensive nature of the project and the importance of effective management along the way is emphasized to dovetail into the second part of the session.

The cybersecurity skills and workforce shortage is becoming more pronounced every day. Organizations are forced to make do with less. Cybersecurity teams often go through prolonged periods of time understaffed or under resourced. These challenges make effective and supportive management even more important to successful projects, business goals, and preventing future attrition. The second half of this session focuses on effective and creative management techniques to maintain positive morale, support employees, and accomplish organizational goals.

Jason Yakencheck, Senior Manager in IBM’s Global Business Services’ Cybersecurity and Biometrics Practice. 

Jason Yakencheck is a Senior Manager in IBM’s Global Business Services’ Cybersecurity and Biometrics Practice. Jason has extensive experience managing complex solution implementation. His strong background in project management enables clients to identify optimal approaches to increase security posture through secure architecture, workflow automation, and alignment of cybersecurity with core business processes. He's led security operations teams and guided many clients successfully through successful transformation efforts and external audits. Jason currently serves as the President of ISACA’s Greater Washington, D.C. Chapter. He is a featured writer for Govloop, an ISACA Expert Speaker, and is an active contributor to CISA and CISM review course material. Jason holds the following certifications: CISSP-ISSAP, CISA, CISM, and PMP.

For more information and to register for the training session, please visit the ISACA RTC website.