Below are upcoming chapter conferences, seminars, review courses, and other events. Prior chapter events can also be viewed.
For information on our event policies, see https://isaca-gwdc.org/event-policies/.
In this comprehensive two-day course, participants will delve into the transformative power of Generative AI, with a special emphasis on popular platforms like ChatGPT, Bard, DALLE-2, and Midjourney. Beginning with a brief overview of Artificial Intelligence and Machine Learning, the course will lead you through the fascinating world of Generative AI and its role in reshaping industries. Through a mix of theoretical understanding and practical hands-on sessions, you will master the operational use of these platforms to solve real-world problems and drive innovation in your organization. The course will cover potential challenges, ethical considerations, and practical applications of Generative AI, preparing you for a future-oriented, AI-driven operational landscape.
Please take a moment to hear from the instructor, Jim Wiggins, about the course and how it will help you understand the Generative AI landscape more fully. Jim has over 26 years of cybersecurity experience.
Registration closes on October 18 @ 3 pm.
Course Materials, Format, and Schedule
This course blends expert lectures, interactive discussions, and practical sessions. It fosters a collaborative learning environment and provides access to online resources for self-paced study.
The course spans two days, 7 hours each day, inclusive of breaks. Specific scheduling will be provided closer to the course date.
Participants will gain access to a range of course materials including online resources, a comprehensive slide deck, and popular AI platforms like ChatGPT, Bard, DALLE-2, and Midjourney. Additional recommended readings and supplementary materials will be provided during the course.
Founder and Principal @ Securible, LLC
CISSP, ISSEP, CISM, CISA, CRISC, CySA+, SCNA, SCNP, CAP, IAM, IEM, SSCP, CEH, ECSA, CHFI, LPT, TICSA, CIWSA, Security+, and MCSE: Security, FITSP-M
Jim has over 26 years of direct experience in the design, operation, management, and auditing of information technology systems, with the past 21 years focused on information systems security. He has an extensive background in technical education and specializes in security certification courses aimed at federal and government contracting clients.
Today, Jim is the Founder and Principal of Securible, LLC. Securible is an information security service provider offering cyber training programs to organizations of all sizes. At Securible, Jim has taught IT security certification courses such as CISSP, CISM, CISA, Ethical Hacking, RMF, Security+, and other courses requested by Securible’s clients. Currently, he provides education and training support for the National Risk Management Center (NRMC) at the Cybersecurity and Infrastructure Security Agency (CISA) within the Department of Homeland Security (DHS ). More information on Securible can be found at: http://www.securible.com.
Jim is also the Founder and Chief Executive Officer (CEO) of the Federal IT Security Institute (FITSI). FITSI is a 501(c)(6) non-profit certification body accredited by the ANSI National Accreditation Board (ANAB) under ISO 17024:2012. FITSI offers a role-based IT security certification program targeted at the federal workforce. More information on FITSI can be found at: http://www.fitsi.org.
Additionally, Jim is the Founder and Executive Director of the FITSI Foundation. The FITSI Foundation is a 501(c)(3) public charity that focuses on cyber education and serves as the philanthropic sister organization of the Federal IT Security Institute. The FITSI Foundation operates the Wounded Warrior Cyber Combat Academy (W2CCA). More information on the FITSI Foundation can be found at: https://www.fitsifoundation.org.
In 2020, Jim launched a TV show on cybersecurity called “Cybersecurity Today,” which can be viewed in the Washington, DC area. Episodes can also be streamed online at the following website: http://www.cybersecuritytoday.org.
In 2019, FCW named Jim to the “Federal 100” for his tireless efforts to promote cybersecurity education across all branches of the federal government.
In 2011, the Federal Information Systems Security Educators’ Association (FISSEA) named him “Educator of the Year” for the impact he continues to make on the federal workforce.
Jim holds the following IA/IT security certifications: CISSP, ISSEP, CISM, CISA, CRISC, CySA+, SCNA, SCNP, CAP, IAM, IEM, SSCP, CEH, ECSA, CHFI, LPT, TICSA, CIWSA, Security+, and MCSE: Security and FITSP-M.
Virtual Meeting Information
Event Questions and Policies
If you have any registration questions about this event, please contact the chapter using the Registration Contact Form.
If you have CPE questions after the event has concluded, please contact the chapter using the CPE Contact Form.
Cancellation and Refund Policy
Cancellation and refund for advance registrations is allowed if cancellations are submitted through the registration system. Refunds vary depending on the date of cancellation. See ISACA GWDC Event Policies for details.
If ISACA GWDC cancels the event, all registrants will be notified as soon as possible through email at the email address provided during registration. Full refunds will be provided.
The GWDC welcomes your comments, complaints, suggestions, questions, and other feedback concerning our website information and services. All complaints should be submitted through the Registration Contact Form.
Earn up to 14 Continuing Professional Education (CPE) credit in the area of Information Technology. The ISACA® Greater Washington, D.C. Chapter is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.NASBARegistry.org
CPE Distribution and Evaluation Survey
CPEs will be distributed via e-mail along with the event evaluation survey after the completion of the event. Attendees must be present for the full event and respond to polling questions to receive full CPE credit.
By the end of this course, participants will:
Upon completion of the course, participants will be able to: