• New Training Session Sign In Process

    We will be beta testing a barcode based sign in process (replacing the physical sign-in sheets) for our monthly training sessions. The barcode that will be used for the sign-in is at the bottom of the registration confirmation email. You can use your cell phone or a paper print out of the registration confirmation email to sign in. This will enable us to track attendance better and also enable uploading of session CPEs directly to ISACA International.

Registration Extended!--Fall 2019 CISA and CISM Review Courses

Registration has been extended to Wednesday, September 25, 2019!  Sign up for either the CISA or the CISM Review Course below.

When: September 28, October 19 and 26, and November 9 (Saturdays) 8:30 a.m. to 4:00 p.m.
Where: Metlife Offices - 201 Metlife Way, Cary NC
Registration: Website
Cost
ISACA-RTC Members - $75
Affiliated Organizations (IIA, ISSA, Othe ISACA Chapters) - $100
All Others: $125
CPEs: Up to 28
Handouts: Handouts to participants

Lunch will be provided

The last date for registration is September 25, 2019 due to venue requirements. Walk in registrations are not permitted.

Note: Classes subject to cancellation if there are fewer than 6 enrollees.

For more information please contact the chapter Certification Coordinator

2019 October Training Session

When: October 02, 2019, 1300-1630
Where: RTP HQ
Registration: Website
Cost
ISACA-RTC Members: Free (Log in to register to ensure discounted fee)
Affiliated organizations (IIA, ISSA, Other ISACA Chapters):  $35
All Others: $50
CPEs: Up to 3
Handouts: Will be uploaded when available

Session I:  Cyber Physical Security - Addressing IoT Risks

IoT is introducing devices and networks that are both on the network and off the network. The challenge is most people believe these off network risks are not a threat. Our research has exposed that WiFi thermostats can be hacked to impact data centers, Smart TVs can be used to eavesdrop on board meetings, and wireless thumb drives can be low hanging fruit for data breaches.

In this session we’ll explore the Cyber Physical Security spectrum to uncover these beyond-the-network IoT risks. Real-world examples proven out with packet captures, deep packet analysis, and attack methods will reviewed. In addition, countermeasures and an overall methodology will be covered to provide attendees with a framework for addressing IoT risks both on the network and off the network.

Michael Raggo

Speaker: Mike Raggo

 Michael T. Raggo, Chief Security Officer, 802 Secure (CISSP, NSA-IAM, CSI) has over 20 years of security research experience. His current focus is wireless IoT threats impacting the enterprise. Michael is the author of “Mobile Data Loss: Threats & Countermeasures” and “Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols” for Syngress Books, and contributing author for “Information Security the Complete Reference 2 nd Edition”. His Data Hiding book is also included at the NSA’s National Cryptologic Museum at Ft. Meade.

Data Hiding  Mobile Data Loss  The Complete Reference Information Security


A former security trainer, Michael has briefed international defense agencies including the FBI, Pentagon, and Queensland Police; is a frequent presenter at security conferences including Black Hat, DEF CON, Gartner, RSA, DoD Cyber Crime, OWASP, HackCon, and SANS; and has been featured on CNN Tech, TIME, Bloomberg, Forbes, and numerous other television and media outlets. He was also awarded the Pentagon’s Certificate of Appreciation.

2019 November Training Session

When: November 06, 2019, 1300-1630
Where: RTP HQ
Registration: Website
Cost
ISACA-RTC Members:  Free (Log in to register to ensure discounted fee)
Affiliated organizations (IIA, ISSA, Other ISACA Chapters):  $35
All others: $50
CPEs: Up to 3
Handouts: Will be uploaded when available

Session I:  Cybersecurity and Blockchain

debra baker

Speaker: Debra Baker

Debra Baker has over 20 years of experience in cybersecurity beginning with her time in the USAF. She founded a new authoritative cryptographic knowledge base called Crypto Done Right which began as a collaboration between Cisco and Johns Hopkins University. Debra was recently named as one of the top 100 Women in Cybersecurity in the Women Know Cyber: 100 Fascinating Females Fighting Cybercrime. She also is a contributor to the Language of Cybersecurity book. She frequently speaks at conferences and her latest talk was at the ISC2 Security Congress titled "Busting the Blockchain Myths". She is currently a Technical Program Manager at RedSeal.