2023 December Member Giveaway

Please fill out and submit the form below for a chance to win the 2023 December Session Giveaway. You will be notifed via the email used if you win.

Eligibiility & Conditions:

  1. You have to be a current ISACA RTC (059) member in good standing
  2. One (1) entry per member allowed.
  3. Only entries submiitted from 12/6/2023 to 12/13/2023 will be considered.


Enter your ISACA International Member ID
Enter your first and last names
Email address to be used for notification

2023 December Training Session

When: December 06, 2023 - 1300-1630
Where: In Person at Paramount Venue and Online
Registration: Zoom Registration [Use this to register even if you are planning on attending in person]
Cost: Free
CPEs: Upto 3
Handouts: Will Be Uploaded When available

Session I Not Another A.I. Presentation!

Yes, we have all been through what feels like thousands of AI talks, speeches, presentations, etc. Artificial Intelligence is the next wave of future technology and so we need to stay on top of it. During this speech we will address ISACA‘s new certification, the Certified in Emerging Technologies – Artificial Intelligence Foundations, and will be giving you a crash course to help pass the exam. We will also talk about some of the new trends that AI is being used for and some potential risks to your organization. It will be the best AI talk you will hear on Dec 6th!

Speaker: Brett Obringer, BISO, SECU

Brett Obringer is a Business Information Security Officer at State Employees Credit Union. Brett specializes in Governance, Risk, and Controls(GRC), process improvement, as well as emerging technologies. He has over a decade of experience within the financial sector as well as experience in Healthcare and independent security contracting. Brett is an alumni of UNC-Greensboro, Pfeiffer University, and the Duke University Cybersecurity Leadership Program.




2024 January Training Session

When: January 03, 2024 - 1300-1630
Where: In Person at the Paramount Venue or Online
Registration: Zoom Registration Link [Use even if attending in person]
Cost: Free
CPEs: Upto 3
Handouts: Will Be Uploaded When available

Session I Network Detection and Response (NDR): From A to Zeek! 

This event will be relevant for analysts that are engaging in SOC, Incident Response/Handling, Threat Hunting and CSI: Cyber Security Investigations. Starting with NDR Foundations, we will discuss: Why NTA? Why NDR? Why NSM? Why Zeek & Suricata? Following that, participants will be able to do a deep dive to cover the top 4, tier A Zeek level logs - specifically, conn, http, dns and notice. We'll also cover how real world incidents/intrusions & compromises of the past would have looked with NDR/Network Detection & Response data & protocol logging vs. packet analysis. For the remaining time, attendees are encouraged to bring their own laptops for a non-competitive CTF style round of tasks to work through questions & answers to practice filtering, analysis, observations & analytics with Zeek logs.

Speaker: Robert Henry, CoreLight

Bob began his career in cybersecurity during the pre-Internet days of 1993. Since then he has been working on enterprise networking and cybersecurity systems engineering in both small and large IT enterprises. He also dedicated almost 20 years to supporting DoD and USG systems, including 8 years supporting the Office of the DoD CIO for Cybersecurity, Chief Security Engineer to modernize and improve the security posture of all COCOMs, Services and Agencies across the Department. As a network and data security subject matter expert, he has a proven success record in defining security requirements, implementing new technologies, providing technical consultation, and articulating technical topics at all levels. Bob has a Bachelor of Science degree in International Security and Diplomacy from Georgetown University. In addition to numerous industry certifications earned during his career, he obtained the Certified Information Systems Security Professional (CISSP) designation in January 2002. For fun, Bob enjoys traveling with his spouse, engaging in numerous outdoor activities, and as a certificated flight instructor (CFI), teaching others how to fly.


2024 March Training Session

When: March 06, 2024 - 1300-1630
Where: In Persion at the Paramount Venue and Online
Registration: Zoom Registration Link [Use this even if you are planning on attending in person]
Cost:  Free
CPEs: Upto 3
Handouts: Will Be Uploaded When available

Session I Orchestrating Security Policies: a CISO and an Auditor Discussion

A CISO and an auditor discuss what a well-formed policy should look like. How is it structured? How is it best used by the organization? How to ensure it won't become an audit nightmare--for the auditor or the organization?

Speakers: John Fehan

John is a Principal with CREO, Inc., a management consulting firm serving life science and healthcare clients. John specializes in matters of privacy, cybersecurity, and IT infrastructure. John’s experience ranges from hands-on technical positions across multiple disciplines to leadership roles on global technology programs. He has deep knowledge and firsthand experience in a wide variety of areas, including as an information security officer, risk management, project management, IT infrastructure, global telecom services, cloud architectures, and contract management. John has worked with telecom service providers leading global telecom outsource contracts. He has served as technical architect for consumer-packaged goods and financial services firms. Early in his career, John worked as a network engineer earning his CCIE and served in the U.S. Army. John earned his Bachelor of Science in Electrical Engineering from Duke University, and he holds a Certified Information Systems Manager (CISM) certification.

Speaker: Sasha Bottolfson

Session II Security Policy in Practice: Implementation and Automation

Larry Stewart will share his experience and insights into policy effectiveness through the definitions of policy control points and automated monitoring. Through examples, he will highlight choices available, specific controls, and the benefits automation may offer.

Speaker: Larry Stewart


ISACA Volunteer Opportunities

Please take a look at the ISACA Internattional global volunteer opportunities page and apply and share new opportunities to get involved. ISACA is seeking a wide variety of volunteers. The application close dates all differ so apply ASAP. 

Some opportunities are only visible to members or certification-holders, so please be sure to log in to view all opportunities for you. Here is a sample of what we're currently seeking to fill:

  • Risk Scenarios Development Task Force
  • EU Advocacy Task Force
  • Journal Readership Feedback Interviews
  • CISM Questions, Answers, Explanations Manual (QAE) Item Writer (CISM required)
  • Chapter Award Reviewer (2022 Awards)
  • Journal Article Reviewer (membership required)
  • ISACA Global Achievement & Hall of Fame nomination reviewer
  • CISM QAE Manual Quality Assurance Team (CISM required)
  • Internal Control Objectives for Sarbanes-Oxley Book & Figure Reviewers
  • Open Source Video Bites
  • SheLeadsTech Ambassadors
  • EVOLVE: Emerging Tech Conference Speaker Submissions (due 11 June)