About The Event
Don’t miss this opportunity to enhance your cybersecurity knowledge at the 2025 April Full Day Training hosted by the ISACA Research Triangle Chapter. Whether you attend in-person at the Courtyard Raleigh Cary or virtually via Zoom, this event promises an in-depth exploration of the latest in technology risk, AI, and cybersecurity strategies.
Featuring top industry experts like Adam Leigh, Jim Wiggins, Vishal Chawla, and Cory Sabol, this training offers crucial insights on navigating emerging threats, building a defensible cybersecurity budget, and securing AI and SaaS environments. With up to 8 CPEs available, this event is perfect for professionals looking to stay ahead of the curve. Register by March 31st to secure your spot!
Where
Courtyard Raleigh/Cary, Cary, NC
When
Wednesday
02 April
0730-1630
Speakers

Adam Leigh
Director, Technology Risk Management, Align Technology, Inc.

Jim Wiggins
CEO, Securible

Vishal Chawla
Founder & CEO, BluOcean Cyber

Cory Sabol
Sr. Security Consultant, Secure Ideas

Dr. Thomas Lee
CEO, VivoSecurity

Christine Dewhurst
Partner, NSC Tech
Event Schedule
The following is the tentative schedule for the day. If necessary, sessions might be moved around to accomodate speakers
Duration:30min
Breakfast
Arrive early and enjoy breakfast
Duration:10min

Welcome Address Scott Hanchett / Srinivas Saraswatula
Welcome address by the chapter president and program chair
Duration:55min

Risk in Real Life
Adam Leigh,Director, Technology Risk Management, Align Technology, Inc.
Prussian Marshall Helmuth von Moltke famously said “No plan of operations extends with any certainty beyond the first encounter with the main enemy forces.” Frameworks, guidelines, roadmaps, and plans are all essential things to have on hand, but when theory turns into practice disappointment can set in. In this session we’ll discuss some of the challenges of implementing a meaningful technology risk management program, the reasons why some controls never seem to stay working, and some thoughts on how to stay agile enough to meet your goals even when facing down the whole of the Second French Empire army.
Duration:10min

Quick Break ,
Quick 10 minute break
Duration:55min

Generative AI in Cybersecurity
Jim Wiggins,CEO, Securible
In the ever-evolving landscape of digital security, "Using Generative Artificial Intelligence in Cybersecurity" offers a cutting-edge exploration into the nexus of AI and cybersecurity. This session delves deep into the potentials and challenges of harnessing Generative AI to bolster cybersecurity measures. Participants will gain insights into the foundational elements of AI, the intricacies of generative models, and their practical applications in crafting cybersecurity policies, proofing documentation, and anticipating digital threats. Furthermore, the session highlights the importance of maintaining a balance between AI-powered solutions and human oversight, ensuring that security protocols remain robust, dynamic, and resilient in the face of emerging challenges. Ideal for cybersecurity professionals, AI enthusiasts, and tech strategists, this session focuses on an understanding of how the future of cybersecurity is being shaped by artificial intelligence.
Duration:10min

Quick Break ,
Quick 10 minute break
Duration:55min

Navigating the Risks of AI and LLMs: An End Users Guide
Jim Wiggins,CEO, Securible
As AI-powered language models become increasingly integrated into our daily lives, understanding their potential risks is crucial for every user. This talk explores the challenges posed by Artificial Intelligence (AI) and Large Language Models (LLMs), including misinformation, privacy concerns, biased outputs, and overreliance on AI-generated content. Attendees will gain insights into how these AI technologies work, the types of risks they present, and practical strategies to mitigate these risks while leveraging the benefits of AI advancements.
Duration:55min

Adapt or Be Breached: Why Outdated Third-Party Risk Models Are Failing SaaS Security
Vishal Chawla,CEO & Founder, BluOcean Cyber
A deep dive into why traditional third-party risk management is struggling to keep up with SaaS and how organizations can modernize their approach.
Duration:75min

Lunch ,
Enjoy a catered lunch
Network with your peers / speakers
Duration:55min

Taming the Enterprise AI Beast: Security Guidelines for Leaders Integrating AI
Cory Sabol,Sr. Security COnsultant, SecureIdeas
As artificial intelligence (AI) becomes a cornerstone of enterprise innovation, understanding its security challenges is paramount. This talk, Taming the Enterprise AI Beast, is tailored for security leaders and technology professionals tasked with deploying and securing AI in business environments. We’ll delve into the critical security and compliance issues surrounding AI, such as data misuse, governance, and the risks associated with generative models. Participants will gain insights into actionable strategies for mitigating these risks and ensuring safe AI adoption. Attendees will walk away with a clear roadmap for integrating AI into their enterprise securely, keeping pace with innovation while safeguarding organizational integrity and compliance.
Duration:15min

Quick Break ,
Quick 15 minute break
Network with your peers / speakers
Duration:55min

Put Your Money Where Your Risk Is: Build a Defensible Cybersecurity Budget
Vishal Chawla,CEO & Founder, BluOcean Cyber
Focused on aligning cybersecurity investments with real business risks, ensuring security leaders can justify budgets and maximize impact.
Duration:55min


People-Centric Approach to Determining an Organization's Exposure to a Third-Party Data Breach
Dr. Thomas Lee, CEO VivoSecurity
Christine Dewhurst,Partner, NSC Tech
In this data-driven talk, we will make sense of third-party data breach risk using regression analysis. We will show that the largest component of this risk arises simply from the sheer number of vendors that can potentially expose your company's data. We will identify which elements of current Third-Party Risk Management (TPRM), do effectively manage this cumulative-risk and we will also analyze why questionnaires, SOC 2 reports and risk-scores, do not.
Finally, we will introduce a new approach that empowers organizations to take control, enhance transparency, and effectively manage cumulative third-party data breach risk through:
- Assessing organization structure and capability through certifications.
- Determining the cumulative probability of a data breach – think Principle of least privilege.
- Identifying and actioning Tail vendors.
- Managing risk appetite by applying the fungibility Principle.
This innovative approach will bring clarity on the risk posed by third-party data breach and enable your company to fully benefit from the value that third-party partnerships bring.
Duration:5min

Wrap UpScott Hanchett / Srinivas Saraswatula
Wrap up by the chapter president and program chair
Adjourn at 0430 PM
Event Venue
Location Information
Courtyard Raleigh Cary / Parkside Commons
Feel at home in Cary, NC, at Courtyard Raleigh Cary. We boast familiar, home-like comforts that help you relax in North Carolina. Enjoy easy access to some of the area's most popular attractions, including Koka Booth Amphitheatre, McGregor Village Shopping Center, WakeMed Soccer Park and PNC Arena.
F.A.Q
-
Is this training session free?
No. ISACA RTC full day training sessions are not free. The chapter charges a nominal fee to cover some costs.
-
How do I pay for this training?
Payments are via Paypal. You don't have to have a PayPal account - you can check out as a guest using your credit/debit card.
-
How many CPEs are being offered?
You can earn upto 8 CPEs from this training. ISACA RTC is not NASBA certified.
-
How will I get my CPEs??
Your CPE certificate will be emailed to the address you provided during registration - one to to two weeks after the session.
-
How can I help the chapter?
You can help by volunteering and/or becoming part of the board of directors. Please talk to one the board members for more information..
Register To Attend
Registration is on the ISACA RTC chapter website and payments are through PayPal