If the handout download links from within past event articles are broken, please navigate to Chapter->Downloads to obtain the document.

2019 October Training Session

When: October 02, 2019, 1300-1630
Where: RTP HQ
Registration: Website
ISACA-RTC Members: Free (Log in to register to ensure discounted fee)
Affiliated organizations (IIA, ISSA, Other ISACA Chapters):  $35
All Others: $50
CPEs: Up to 3
Handouts: Will be uploaded when available

Food Bank Drive!  We will be collecting non-perishable food items to benefit the Food Bank of Central and Eastern North Carolina at the October and November chapter meetings. A container will be available to deposit any food items members care to donate.

Session I:  Cyber Physical Security - Addressing IoT Risks

IoT is introducing devices and networks that are both on the network and off the network. The challenge is most people believe these off network risks are not a threat. Our research has exposed that WiFi thermostats can be hacked to impact data centers, Smart TVs can be used to eavesdrop on board meetings, and wireless thumb drives can be low hanging fruit for data breaches.

In this session we’ll explore the Cyber Physical Security spectrum to uncover these beyond-the-network IoT risks. Real-world examples proven out with packet captures, deep packet analysis, and attack methods will reviewed. In addition, countermeasures and an overall methodology will be covered to provide attendees with a framework for addressing IoT risks both on the network and off the network.

Michael Raggo

Speaker: Mike Raggo

 Michael T. Raggo, Chief Security Officer, 802 Secure (CISSP, NSA-IAM, CSI) has over 20 years of security research experience. His current focus is wireless IoT threats impacting the enterprise. Michael is the author of “Mobile Data Loss: Threats & Countermeasures” and “Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols” for Syngress Books, and contributing author for “Information Security the Complete Reference 2 nd Edition”. His Data Hiding book is also included at the NSA’s National Cryptologic Museum at Ft. Meade.

Data Hiding  Mobile Data Loss  The Complete Reference Information Security

A former security trainer, Michael has briefed international defense agencies including the FBI, Pentagon, and Queensland Police; is a frequent presenter at security conferences including Black Hat, DEF CON, Gartner, RSA, DoD Cyber Crime, OWASP, HackCon, and SANS; and has been featured on CNN Tech, TIME, Bloomberg, Forbes, and numerous other television and media outlets. He was also awarded the Pentagon’s Certificate of Appreciation.