If the handout download links from within past event articles are broken, please navigate to Chapter->Downloads to obtain the document.

2017 September Training Session

 When: Wednesday, 6th of September – FULL DAY SESSION - 8am – 4:30pm (Doors open at 6:45am because breakfast will be served)

Where: **Attention: new meeting location **

Brier Creek Country Club - 9400 Club Hill Drive Raleigh, NC 27617


RTC Members: $50

Affiliated Orgs (IIA, ISSA, Other ISACA Chapters): $75

Non-Members: $100

CPEs: Upto 8



If you cannot leave the site over lunch due to work responsibilities, etc. - you can buy a a box lunch at the door in the morning for $10. Lunch will be available at noon time to eat at their seats. This service is offered By Brier Creek country club. You can pay  (cash or charge) at the door when you arrive in the morning.



7:00am Breakfast

8:00am – 11:30am Morning session - Building an Effective Cyber Security Strategy (20 mins break)

11:30am to 1:00pm Lunch time

1:00pm to 4:30pm (approx.). – Afternoon sessions – (20 mins break)

Session II - Bringing Order into Chaos – A Structured Framework for Cloud Workload Security

Session III - Have Your Cake and Eat It Too….. Running a Cloud-Powered Business With Greater Security

Session & Speaker Details

Session I - Building an Effective Cyber Security Strategy

This presentation provides leading practices to articulate to executives the case for action and appropriate practical approaches to crafting an effective cyber-security strategic program.

This presentation enables you to make the case that cyber-security should be an integral part of your corporate risk management program. Examples demonstrate how to adequately communicate to senior leaders the expanding risk and threat landscape plus the increasing burden of stakeholder oversight. A step by step approach using practical techniques guides you through the complex process of building an effective, tailored cyber-security strategy and communicating the appropriate solutions to executive management. This strategic, programmatic approach allows you to make better investment decisions in order to reduce the chances of a cyber-security incident and the impact when one occurs.

Learning Objectives:

Effectively communicate the cyber risks, threats and burdens of increasing stakeholder oversight to senior executives.

Systematically develop an effective cyber security strategy tailored to your business by following a practical step by step approach.

Convincingly demonstrate due diligence in making better cyber security investment decisions.

Session II - Bringing Order into Chaos – A Structured Framework for Cloud Workload Security

In a majority of enterprises, cloud consumption is being driven by the business, while cloud security is being driven by security. This has, unfortunately, led to the same usual disconnects and problems with integration as in on-premise infrastructure. But CISOs generally aren’t cloud experts and providing a holistic approach to IaaS, PaaS and SaaS cloud models has proven to be a challenge. While NIST 800-144 provides a list of things CISOs should think about, a more structured, operationally-focused approach is needed. This conversation presents a peer-reviewed model Optiv uses to help drive business value, adoption, and consistency in cloud security programs in the enterprise.

Session III - Have Your Cake and Eat It Too….. Running a Cloud-Powered Business With Greater Security

While cloud is now the dominant mode of delivery for new applications, few organizations are able to migrate all their apps. The reality is that most companies aren’t starting from scratch, they must support legacy on-premises and colocation models as well as public and private cloud.


Brian WrozekManaging Executive Director, Executive Advisory, Office of the CISO, Optiv 

Brian Wrozek is a managing executive director, executive advisory in the Office of the CISO at Optiv. In this role, Wrozek works closely with security executives to provide C-suite advisory services to define cyber strategy, roadmaps and solutions to meet clients’ security objectives.

Wrozek is the former chief security officer (CSO) for Alliance Data where he had enterprise responsibility for information security and physical security. Prior to Alliance Data, he was the IT security and privacy director at Texas Instruments where he managed all facets of electronic data and system security worldwide.

Wrozek earned his Bachelor of Science in computer science from Michigan Technological University. He earned his MBA and Cybersecurity Certification from the University of Dallas. Wrozek is an adjunct professor at the University of Dallas teaching graduate-level cyber security courses in the Satish & Yasmin Gupta College of Business.

Wrozek received the 2008 Central Region Information Security Executive of the Year award from Tech Exec Networks and the 2010 Information Security Executive of the Year award at the Texas Regional Infrastructure Security Conference.

Rafel Los’, Managing Director of Research and Development, Optiv

Rafal Los brings a blend of pragmatism and thought leadership in his approach to enterprise information security. As managing director, solutions research and development at Optiv, Los helps organizations build mature, defensible and operationally efficient security programs. Leveraging over 15 years of technical, consulting and management skills his team researches, develops and delivers program strategy frameworks, maturity models, and provides operational guidance from across industry verticals and varying maturity levels.
Los previously worked at Acccuvant. Prior to that, he served as principal, strategic security services at HP Enterprise Security Services. Los developed a methodology for refocusing enterprise security programs through an assessment and threat-centric approach, directly aligning security to business value. While there, he developed new services-based offerings from concept through prototype and launch stages, and spearheaded a cross-business task team to develop new use cases for products and service offerings within the existing portfolio. Previously at HP, Los served several diverse roles including security strategist in enterprise security products where he advised customers on implementing practical solutions. He also wrote and maintained the top blog in HP Software, “Following the White Rabbit.” Prior to HP, Los held various positions at GE Energy, Enter Edge Technology and Envestnet PMC.
Los is an advocate for focus on sound security fundamentals and for the principles of “proportional, common sense security.” He has been contributor to open standards and various organizations such asthe Open Web Application Security Project (OWASP) and the Cloud Security Alliance. He has served as a speaker at conferences such as Black Hat, ISSA International, InfoSec World and many others. In addition, he maintains a regular column in SecurityWeek and contributes to other community forums. Los received his bachelor’s degree in computer information systems from Concordia University.

John Turner, Senior Director, Cloud Security, Optiv

John Turner is an accomplished IT executive with more than 20 years of leadership and operational IT experience. As senior director of cloud security enablement at Optiv, Turner’s team of cloud architects are responsible for helping to ensure the successful integrated delivery of cloud security solutions. Turner plays a key part in bringing different areas of Optiv’s team together to deliver seamless cross practice wins. Turner also works as part of the cloud leadership team to define Optiv’s strategy and product portfolio.

Turner’s extensive operational background brings a unique client first perspective to the execution of Optiv’s cloud security practice. An early cloud veteran, Turner has first-hand experience moving his previous organizations to the cloud, as well as experience managing app-dev and dev-ops teams. His background also includes extensive experience with infrastructure, WLAN, performance management, analytics, data center builds, enterprise resource planning implementations, identity and access management development, firewall and identity-based networking.

Prior to joining Optiv in 2016, Turner was the vice president of product strategy at Adaptive Communications. He previously served as general manager of unified communications solutions at Aruba Networks. Turner got his start at Brandeis University building identity solutions and eventually leading the network and systems group as its director. Turner’s passion as a technologist has always fueled his interest and desire to make transformative changes with technology.

Turner has authored articles and papers on the use of technology as a change agent, and as a subject matter expert on wireless LAN and unified communications. Turner has appeared in many technology magazines, been a featured presenter and delivered key note addresses at several national conferences. Turner holds a bachelor’s degree from the College of Wooster in Wooster, Ohio.