About The Event
Don’t miss this opportunity to enhance your cybersecurity knowledge at the 2026 April Full Day Training hosted by the ISACA Research Triangle Chapter. Whether you attend in-person at Frontier RTP or virtually via Teams, this event promises an in-depth exploration of the latest in technology risk, AI, and cybersecurity strategies.
Featuring top industry experts like James Knight, Joe Perez, Joe Oringel, Joe Cosgriff, Kaali Dass, Dmitry Berger and Cory Sabol, this training offers crucial insights on navigating emerging threats, and securing AI and SaaS environments. This event is perfect for professionals looking to stay ahead of the curve. Register by March 31st to secure your spot!
Where
When
Wednesday
01 April, 2026
0800-1700
CPEs
Upto 8
Speakers
Joe Perez
CTO,CogniMind
Joe Oringel
CEO, VisualRiskIQ
Cory Sabol
Sr. Security Consultant
Dmitry Berger
Security Delivery Lead, NA, EPAM
Joe Cosgriff
Director of Security,NC Education Lottery
Kaali Dass
Vice President / Project Manager, Firts Citizens Bank
James Knight
Senior Principal, Digital Warfare
Event Schedule
The following is the tentative schedule for the day. If necessary, sessions might be moved around to accomodate speakers
Duration:20min
Breakfast
Arrive early and enjoy breakfast
Duration:10min
Welcome Address Scott Hanchett / Srinivas Saraswatula
Welcome address by the chapter president and program chair
Duration:50min
Igniting the Data Dance: A Framework for Data Governance
Joe Perez, CTO, CogniMind
In an age where data is the lifeblood of modern organizations, the need for robust data governance has never been more critical. Yet, as history has shown, adopting significant change can be quite challenging. This session draws compelling comparisons to the Meiji Restoration, which launched Japan into the modern era, urging participants to reevaluate their data management strategies. Just as the Meiji leaders enacted transformative reforms to advance their nation, contemporary business leaders must be prepared to evolve and innovate to fully leverage their data's strategic capabilities.
Duration:10min
Quick Break ,
Quick 10 minute break
Duration:50min
Supervised AI Agents as Co-Workers
Joe Oringel, CEO, VisualRiskIQ
Agentic AI is rapidly being deployed by leading audit, compliance, and cybersecurity teams. While AI agents are not yet replacing all of today’s knowledge workers like auditors, accountants, and cybersecurity professionals, these knowledge workers that effectively use Agentic AI may soon be replacing those knowledge workers who do not use these tools to drive high quality business growth and scale.
AI is moving beyond automation to become a true teammate, especially in the governance, risk, and compliance processes. This session will show how supervised AI agents can work alongside accountants, auditors and cybersecurity professionals to enhance efficiency, consistency, and assurance quality.
Of critical importance is training and supervision so that the AI agents accomplish their testing to quality standards that are intended. Attendees will leave with a practical view of how AI-powered testing can be applied to both internal and external assurance
Duration:10min
Quick Break ,
Quick 10 minute break
Duration:50min
Topic To Be Updated
Cory Sabol, Sr. Security Consultant
Session Synopsis To Be Updated
Duration:50min
AI Attack Vectors
James Knight, Senior Principal, Digital Warfare
The talk would be on AI attacks and it's use by hackers throughout the kill chain, AI defenses with the current and future uses, and AI Governance diving into current issues such as Open Claw security, and developing a company wide approach to dealing with AI.
Duration:60min
Lunch ,
Enjoy a catered lunch
Attend the professional development session
Network with your peers / speakers
Duration:50min
Insider Threat Lessons from the Eddie Tipton Lottery Fraud Case
Joe Cosgriff, Director of Security, NC Education Lottery
The Eddie Tipton lottery fraud case represents one of the most compelling modern examples of insider threat risk within a high-assurance environment. A trusted security professional exploited privileged access to manipulate a random number generation system, ultimately undermining the integrity of lottery drawings and exposing critical gaps in technical, procedural, and governance controls.
This session examines the case through the lens of cybersecurity, audit, and risk management professionals, focusing not on the sensational aspects of the crime, but on the systemic control failures that enabled it. The presentation will explore how traditional security models often overlook insiders as threat actors, how threat modeling must explicitly include trusted personnel, and how layered controls can reduce the likelihood and impact of similar events.
Duration:15min
Quick Break ,
Quick 15 minute break
Network with your peers / speakers
From Data Exposure to Data Resilience: AI-Driven Security for the Modern Enterprise
Kaali Dass,First Citizens Bank
As organizations expand across hybrid environments and cloud platforms, data has become both their most valuable asset and their greatest risk. While enterprises have strengthened infrastructure and perimeter defenses, sensitive data remains widely distributed across production, testing, analytics and third-party environments, creating increased exposure, regulatory pressure and reputational risk. The speaker will explain how organizations can move from reactive data protection to a proactive data resilience strategy. The session will highlight how data masking and AI-generated synthetic data can reduce risk by removing real sensitive information from non-production and analytical environments. By embedding these practices into governance and operations, organizations can lower regulatory exposure, strengthen trust, and support innovation without increasing risk.
Duration:50min
The Paradox of Complexity: Why "Effective" Security Fails
Dmitry Berger Security Delivery Lead, EPAM
According to recent industry reports, "Security System Complexity" is one of the primary factors that increase the cost of a data breach. Why does the addition of advanced security controls often lead to higher risk and operational paralysis?
In this session, I will demonstrate that a company is an Open System governed by the laws of thermodynamics. We will explore how security’s true role is to maintain the "Knowledge Gradient”, the internal order that creates competitive advantage.
Duration:10min
Quick Break ,
Quick 15 minute break
Network with your peers / speakers
Duration:50min
Panel Discussion
John Fehan RTC Board Member
Panel discussion on the day's topics and any other topics of interest to the audience
Duration:5min
Wrap Up Scott Hanchett / Srinivas Saraswatula
Wrap up by the chapter president and program chair
Adjourn at 0430 PM
Event Venue
Location Information
Frontier RTP - Frontier 800
Located on the Frontier RTP innovation campus, Frontier 800 complements a dynamic, diverse startup community with spaces designed to fit meetings of all shapes and sizes.
F.A.Q
-
Is this training session free?
No. ISACA RTC full day training sessions are not free. The chapter charges a nominal fee to cover some costs.
-
How do I pay for this training?
Payments are via Paypal. You don't have to have a PayPal account - you can check out as a guest using your credit/debit card.
-
How many CPEs are being offered?
You can earn upto 8 CPEs from this training. ISACA RTC is not NASBA certified.
-
How will I get my CPEs??
Your CPEs will be uploaded to your ISACA International profile using the ISACA Member ID you provide.
-
How can I help the chapter?
You can help by volunteering and/or becoming part of the board of directors. Please talk to one the board members for more information..
Register To Attend
Registration is on the ISACA RTC chapter website and payments are through PayPal
