Skip to main content

 
Icon Legend
Additional Fee Required
Additional Fee Required
Pre-Registration Required
Pre-Registration Required
Onsite & Virtual
Onsite & Virtual
Onsite Only
Onsite Only
Earn CPE Credits
Earn CPE Credits
Livestreamed Session
Livestreamed Session
Included in Guest Pass
Included in Guest Pass
Session Recorded
Session Recorded
Student Experience
Student Experience

Full Schedule

Full Schedule

  • Sunday, October 26, 2025
  • 6:30 AM - 8:00 AM CT
    Pre-Conference Workshop Breakfast
  • 8:00 AM - 5:00 PM CT
    SC25PCW1A - Pre-Conference Workshop: CCSP Essentials for Certification and Practice (2-Day, Part 1)
  • 8:00 AM - 5:00 PM CT
    SC25PCW2A - Pre-Conference Workshop: CGRC Essentials for Certification and Practice (2-Day, Part 1)
  • 8:00 AM - 5:00 PM CT
    SC25PCW3A - Pre-Conference Workshop: CISSP Essentials for Certification and Practice (2-Day, Part 1)
  • 8:00 AM - 5:00 PM CT
    SC25PCW4A - Pre-Conference Workshop: Securing AI: Cybersecurity Strategy (2-Day, Part 1)
  • 8:00 AM - 5:00 PM CT
    SC25PCW6A - Pre-Conference Workshop: Threat Modeling AI Systems (1-Day)
  • 8:00 AM - 5:00 PM CT
    SC25PCW7A - Pre-Conference Workshop: Transforming Cyber Leadership (2-Day, Part 1)
  • Monday, October 27, 2025
  • 6:30 AM - 8:00 AM CT
    Pre-Conference Workshop Breakfast
  • 8:00 AM - 5:00 PM CT
    SC25PCW1B - Pre-Conference Workshop: CCSP Essentials for Certification and Practice (2-Day, Part 2)
  • 8:00 AM - 5:00 PM CT
    SC25PCW2B - Pre-Conference Workshop: CGRC Essentials for Certification and Practice (2-Day, Part 2)
  • 8:00 AM - 5:00 PM CT
    SC25PCW3B - Pre-Conference Workshop: CISSP Essentials for Certification and Practice (2-Day, Part 2)
  • 8:00 AM - 5:00 PM CT
    SC25PCW4B - Pre-Conference Workshop: Securing AI: Cybersecurity Strategy (2-Day, Part 2)
  • 8:00 AM - 5:00 PM CT
    SC25PCW6B - Pre-Conference Workshop: Threat Modeling AI Systems (1-Day)
  • 8:00 AM - 5:00 PM CT
    SC25PCW7B - Pre-Conference Workshop: Transforming Cyber Leadership (2-Day, Part 2)
  • 8:00 AM - 5:00 PM CT
    SC25PCW8B - Pre-Conference Workshop: Vendor Contract Reviews: Managing Privacy, Cybersecurity and AI Risks (1-Day)
  • 4:00 PM - 5:00 PM CT
    SC25NS2 - Women Cyber Leaders Networking Reception
  • 4:00 PM - 7:00 PM CT
    Swag Bag Space
  • 4:00 PM - 7:00 PM CT
    SC24NS1 - Meet, Mix & Mingle Networking Reception
  • 4:00 PM - 7:00 PM CT
    SC25N01 - On-Site Registration
  • 4:30 PM - 5:30 PM CT
    SC25NS3 - Chapter Members Reception
  • Tuesday, October 28, 2025
  • 6:30 AM - 8:00 AM CT
    SC25NS4 - Breakfast
  • 6:30 AM - 6:30 PM CT
    Swag Bag Space
  • 6:30 AM - 6:30 PM CT
    SC25N02 - On-Site Registration
  • 8:00 AM - 8:45 AM CT
    SC2501 - ISC2 Security Congress Welcome & Opening Address
  • 8:00 AM - 5:00 PM CT
    Quiet Lounge
  • 8:00 AM - 6:00 PM CT
    Men's Multi-Faith Room
  • 8:00 AM - 6:00 PM CT
    Mothers' Room
  • 8:00 AM - 6:00 PM CT
    Women's Multi-Faith Room
  • 8:15 AM - 8:30 AM CT
    ISC2 Quickfire: Sponsor & Exhibitor Orientation
  • 8:45 AM - 9:35 AM CT
    SC2501A - Opening Keynote: From Artisanal to Industrial: Delivering Security at Scale for Business and Technology Agility
  • 9:00 AM - 5:00 PM CT
    Emerging Professionals Lounge
  • 9:00 AM - 6:00 PM CT
    Expo Hall Hours
  • 9:00 AM - 6:00 PM CT
    Recharge Station
  • 9:35 AM - 10:20 AM CT
    SC25NS5 - Expo Hall Break
  • 9:40 AM - 10:10 AM CT
    SC25CC1 - Career Center Forum: Redundant but Resilient: Turning Career Disruption into a Cyber Advantage
  • 9:45 AM - 9:55 AM CT
    ISC2 Quickfire: ISC2 Volunteer Opportunities
  • 9:45 AM - 10:10 AM CT
    SC25LB01 - Learning Bytes: The Passwordless Pivot: Passkeys, Phishing Resistance, and What Comes Next (Sponsored by Dashlane)
  • 9:45 AM - 10:10 AM CT
    SC25LB02 - Learning Bytes: Contextualizing Risk in the AI Era (Sponsored by Black Duck Software)
  • 9:45 AM - 10:10 AM CT
    SC25PD01 - Product Demo: The Improved ROI of FedRAMP in 2025 (Sponsored by Paramify)
  • 10:00 AM - 10:10 AM CT
    ISC2 Quickfire: Lifecycle of an Item
  • 10:20 AM - 11:20 AM CT
    SC2502 - A Firewall, a Backup, and a Zero-Day Walk Into a Bar… What Happens Next Defines Your Cyber Resilience
  • 10:20 AM - 11:20 AM CT
    SC2503 - Beyond the Snowflake Breach: Why Scattered Spider Loves Your Broken TPRM for SaaS Applications (And How to Break Their Grip)
  • 10:20 AM - 11:20 AM CT
    SC2504 - Bright Ideas Roundtable: Mentors Wanted: Creating Impact and Shaping the Future of Cybersecurity
  • 10:20 AM - 11:20 AM CT
    SC2505 - Cybersecurity Maturity Model Certification: Tales from the Trenches
  • 10:20 AM - 11:20 AM CT
    SC2506 - Hacking Your Career: Navigating the Cybersecurity Landscape
  • 10:20 AM - 11:20 AM CT
    SC2507 - Harnessing AI for Revolutionizing Cyber Risk Management and Internal Audit Practices
  • 10:20 AM - 11:20 AM CT
    SC2508 - Leading Security into a Post-Quantum Future
  • 10:20 AM - 11:20 AM CT
    SC2509 - Plan for Chaos: Why Most Incident Response Plans Fail Big
  • 11:30 AM - 12:30 PM CT
    SC2510 - Bright Ideas Roundtable: The Art of Entra Conditional Access
  • 11:30 AM - 12:30 PM CT
    SC2511 - Do You Really Know What Your Application is Doing?
  • 11:30 AM - 12:30 PM CT
    SC2512 - Expanding the Cybersecurity Talent Pool: Bridging Industry Gaps with AI and Non-Traditional Talent
  • 11:30 AM - 12:30 PM CT
    SC2513 - From Overwhelmed to Optimized: Transforming a SOC to Deliver Real Security Impact
  • 11:30 AM - 12:30 PM CT
    SC2514 - Integrity in Action, Security in Practice: The New Code of Professional Conduct
  • 11:30 AM - 12:30 PM CT
    SC2515 - Striking the Right Chord: Managing Fourth, Fifth, and Nth-Party Cyber Risks
  • 11:30 AM - 12:30 PM CT
    SC2516 - Digital Disaster Day: Will Q-Day Be Apocalyptic, or Can QRNG Technology Using Quantum Mechanics Help Contain the Quantum Computer Hacking Revolution? (Sponsored by Quantum eMotion)
  • 11:30 AM - 12:30 PM CT
    SC2517 - Unlocking the Future: Embrace Passwordless Security
  • 12:30 PM - 1:45 PM CT
    SC25NS6 - Expo Hall Break
  • 12:30 PM - 1:45 PM CT
    SC25NS6A - Lunch
  • 12:45 PM - 12:55 PM CT
    ISC2 Quickfire: Keeping Your Certification in Good Standing
  • 12:45 PM - 1:10 PM CT
    SCQA1 - Behind the Mic: From Overwhelmed to Optimized: Transforming a SOC to Deliver Real Security Impact
  • 12:45 PM - 1:10 PM CT
    SCQA2 - Behind the Mic: Unlocking the Future: Embrace Passwordless Security
  • 1:05 PM - 1:15 PM CT
    ISC2 Quickfire: ISC2 Enterprise Solutions
  • 1:10 PM - 1:35 PM CT
    SC25LB06 - Learning Bytes: World Premiere: Shaping the Future of Cyber Together
  • 1:25 PM - 1:35 PM CT
    ISC2 Quickfire: Become a Safe and Secure Online Program Volunteer
  • 1:45 PM - 2:45 PM CT
    SC2518 - Keynote: Exploits & Epics: A Director's Cut on 25 Years of Hacking and the Future of Cyber Warfare + ISC2 Awards Announcement
  • 2:55 PM - 3:55 PM CT
    SC2519 - Strategic Cyber Investments in the AI Age: Harnessing Organizational Agility, Architecture, Posture, and Risk Management
  • 2:55 PM - 3:55 PM CT
    SC2520 - Bright Ideas Roundtable: Tracking Performance Metrics for Building Cyber Resilient Systems Using NIST CSF and More
  • 2:55 PM - 3:55 PM CT
    SC2521 - Built-In, Not Bolt-On: Using Agentic IDE to Achieve Secure by Design
  • 2:55 PM - 3:55 PM CT
    SC2522 - Cybersecurity: From Cost Center to Competitive Advantage
  • 2:55 PM - 3:55 PM CT
    SC2523 - Deepfakes and Corporate Cybersecurity
  • 2:55 PM - 3:55 PM CT
    SC2524 - Scaling Cloud Security: The Role of CSPM and Automation in Multi-Cloud Environments
  • 2:55 PM - 3:55 PM CT
    SC2525 - You Belong Here: Overcoming Imposter Syndrome and Owning Your Success
  • 2:55 PM - 3:55 PM CT
    SC2581 - How AI Is Changing the GRC Game (Sponsored by Hyperproof)
  • 3:55 PM - 4:40 PM CT
    SC25NS7 - Expo Hall Break
  • 4:00 PM - 4:10 PM CT
    ISC2 Quickfire: Professional Development
  • 4:00 PM - 4:30 PM CT
    SC25CC2 - Career Center Forum: From Setback to Comeback: Positive Approaches to Layoff Preparedness and Future-Proofing Our Cybersecurity Careers
  • 4:05 PM - 4:30 PM CT
    SCQA3 - Behind the Mic: Deepfakes and Corporate Cybersecurity
  • 4:05 PM - 4:30 PM CT
    SCQA4 - Behind the Mic: Scaling Cloud Security: The Role of CSPM and Automation in Multi-Cloud Environments
  • 4:05 PM - 4:30 PM CT
    SC25LB03 - Learning Bytes: Is 2029 the Year Certificates Break the Internet? (Sponsored by Keyfactor)
  • 4:05 PM - 4:30 PM CT
    SC25PD02 - Product Demo: Understanding Birthright Access: How Attribute-Based Access Control Saves Time, Money and Our Jobs in 2 Minutes Flat (Sponsored by Clarity Security)
  • 4:05 PM - 4:30 PM CT
    SC25PD06 - Product Demo (Sponsored by Compyl)
  • 4:20 PM - 4:30 PM CT
    ISC2 Quickfire: Item Writing Best Practices
  • 4:30 PM - 5:30 PM CT
    SC25NS99 - Emerging Professionals Mixer
  • 4:40 PM - 5:40 PM CT
    SC2526 - Beyond Approvals: Automating IAM for Compliance, Security, and Business Agility
  • 4:40 PM - 5:40 PM CT
    SC2527 - Bright Ideas Roundtable: The Hateful Eight: Common 'Malwords' to Avoid in a Professional Services Agreement
  • 4:40 PM - 5:40 PM CT
    SC2528 - Cyber Risk Reporting: Turning Cybersecurity Risk into Business Metrics
  • 4:40 PM - 5:40 PM CT
    SC2529 - AI vs. AI: The Future of Automated and Autonomous Cybersecurity
  • 4:40 PM - 5:40 PM CT
    SC2530 - From Zero to Cyber Hero: Building a Robust Cyber Organization from Scratch
  • 4:40 PM - 5:40 PM CT
    SC2531 - Threat Modeling AI: STRIDE Was a Good Start, But This Is Weirder
  • 4:40 PM - 5:40 PM CT
    SC2532 - Thriving Under Pressure: Three-Minute Tools to Combat Burnout in Cybersecurity
  • 4:40 PM - 5:40 PM CT
    SC2582 - Simplifying Cybersecurity (Sponsored by ThreatLocker)
  • 6:30 PM - 8:30 PM CT
    SC25NS8 - Taste of Nashville Reception
  • Wednesday, October 29, 2025
  • 6:30 AM - 8:00 AM CT
    SC25NS9 - Breakfast
  • 6:30 AM - 6:30 PM CT
    Swag Bag Space
  • 6:30 AM - 6:30 PM CT
    SC25N03 - On-Site Registration
  • 8:00 AM - 9:00 AM CT
    SC2533 - Keynote: The Certainty Of Encountering Uncertainty + ISC2 Awards Announcement
  • 8:00 AM - 5:00 PM CT
    Quiet Lounge
  • 8:00 AM - 6:00 PM CT
    Men's Multi-Faith Room
  • 8:00 AM - 6:00 PM CT
    Mothers' Room
  • 8:00 AM - 6:00 PM CT
    Women's Multi-Faith Room
  • 9:00 AM - 5:00 PM CT
    Emerging Professionals Lounge
  • 9:00 AM - 7:30 PM CT
    Expo Hall Hours
  • 9:00 AM - 7:30 PM CT
    Recharge Station
  • 9:10 AM - 10:10 AM CT
    SC2534 - Breaking the Next Factor: Live Multi-factor Authentication Hacking
  • 9:10 AM - 10:10 AM CT
    SC2535 - Bright Ideas Roundtable: Do You Know Your Vendor’s Partners? Healthcare’s Supply Chain is More Than Third-Party Risk
  • 9:10 AM - 10:10 AM CT
    SC2536 - Everyone Has a Plan Until They Are Punched in the Mouth: Stories from the Cybersecurity Ring
  • 9:10 AM - 10:10 AM CT
    SC2537 - Having Major Trust Issues with Your AI System? Learn to Cope by Leveraging System Theoretic Process Analysis
  • 9:10 AM - 10:10 AM CT
    SC2538 - Live Ransomware Takedown: Can You Stop the Breach in Time?
  • 9:10 AM - 10:10 AM CT
    SC2539 - Quantum Preparedness: Operationalizing NIST, ISO, and CISA Frameworks for Post-Quantum Cryptography Migration
  • 9:10 AM - 10:10 AM CT
    SC2540 - 100 Questions, Zero Weekends: How AI Is Revolutionizing Compliance and Risk Management (Sponsored by RegScale)
  • 9:10 AM - 10:10 AM CT
    SC2541 - The A.I. 'Big Shift' & Cybersec Careers: What’s Coming, How To Navigate It
  • 10:10 AM - 10:55 AM CT
    SC25Book - Book Signing: Mae Jemison, "Find Where the Wind Goes: Moments from My Life"
  • 10:10 AM - 10:55 AM CT
    SC25NS10 - Expo Hall Break
  • 10:15 AM - 10:25 AM CT
    ISC2 Quickfire: Chapters2gether Update
  • 10:15 AM - 10:45 AM CT
    SC25CC3 - Career Center Forum: Root To CISO - The Workshop
  • 10:20 AM - 10:45 AM CT
    SCQA5 - Behind the Mic: The A.I. 'Big Shift' & Cybersec Careers: What’s Coming, How To Navigate It
  • 10:20 AM - 10:45 AM CT
    SCQA6 - Behind the Mic: Having Major Trust Issues with Your AI System? Learn to Cope by Leveraging System Theoretic Process Analysis
  • 10:20 AM - 10:45 AM CT
    SC25LB04 - Learning Bytes: Proving ROI in GRC (Sponsored by Sprinto)
  • 10:20 AM - 10:45 AM CT
    SC25PD03 - Product Demo: Biometrics and the Zero Trust Frontier: A Live Discussion (Sponsored by BIO-Key)
  • 10:20 AM - 10:45 AM CT
    SC25PD05 - Product Demo: Richer Datasets, Zero Leaks: The Future of AI Data Security (Sponsored by Confidencial)
  • 10:35 AM - 10:45 AM CT
    ISC2 Quickfire: Make an Impact with the Center for Cyber Safety and Education
  • 10:55 AM - 11:55 AM CT
    SC2542 - Agentic AI: Navigating the Uncharted Waters of Non-Human Identity and Liability
  • 10:55 AM - 11:55 AM CT
    SC2543 - Agile, Traditional or Hybrid Project Management – Which Works Best for Cybersecurity Teams?
  • 10:55 AM - 11:55 AM CT
    SC2544 - AI-Powered Threats Meet Zero Trust: Building Resilient Defenses
  • 10:55 AM - 11:55 AM CT
    SC2545 - Bright Ideas Roundtable: Exponential Skills: The Future-Proof Framework for Cybersecurity Leaders
  • 10:55 AM - 11:55 AM CT
    SC2546 - Cybersecurity Roles on the Rise: Data-Backed Insights for 2025
  • 10:55 AM - 11:55 AM CT
    SC2547 - Drop-Shipping a New Security Department into a Multibillion-Dollar Company
  • 10:55 AM - 11:55 AM CT
    SC2548 - Objection! AI Security Mistakes on Trial with Kubernetes and Confidential Computing
  • 10:55 AM - 11:55 AM CT
    SC2585 - One Framework to Rule Them All: Mastering Multi-Regulatory Compliance on AWS (Sponsored by Amazon Web Services)
  • 11:55 AM - 1:10 PM CT
    SC25NS11 - Expo Hall Break
  • 11:55 AM - 1:10 PM CT
    SC25NS11A - Lunch
  • 12:10 PM - 12:20 PM CT
    ISC2 Quickfire: Exam Content Workshop Inclusion, Involvement and Experiences
  • 12:10 PM - 12:35 PM CT
    SCQA7 - Behind the Mic: Agile, Traditional or Hybrid Project Management – Which Works Best for Cybersecurity Teams?
  • 12:10 PM - 12:35 PM CT
    SCQA8 - Behind the Mic: Cybersecurity Roles on the Rise: Data-Backed Insights for 2025
  • 12:30 PM - 12:40 PM CT
    ISC2 Quickfire: Unified Body of Knowledge Project
  • 12:35 PM - 1:00 PM CT
    SC25LB07 - Learning Bytes: Volunteering with the Center for Cyber Safety and Education
  • 12:50 PM - 1:00 PM CT
    ISC2 Quickfire: Scheduling Your Future
  • 1:10 PM - 2:35 PM CT
    SC2549 - ISC2 Town Hall
  • 2:45 PM - 3:45 PM CT
    SC2550 - Applied Quantum Cybersecurity Research for All: Go Beyond the Hype with the Rensselaer Cybersecurity Collaboratory and the Students Doing the Real Work
  • 2:45 PM - 3:45 PM CT
    SC2551 - Augmenting Offensive Security Operations with AI
  • 2:45 PM - 3:45 PM CT
    SC2552 - Bright Ideas Roundtable: The Great Leak: Safeguarding Data and Thriving in the Age of Generative AI
  • 2:45 PM - 3:45 PM CT
    SC2553 - From Potential to Performance: An Apprenticeship Approach to Closing the Skills Gap
  • 2:45 PM - 3:45 PM CT
    SC2554 - Secure by Design: Are We Winning?
  • 2:45 PM - 3:45 PM CT
    SC2555 - The Fellowship of Compliance: Conquering CMMC Together
  • 2:45 PM - 3:45 PM CT
    SC2556 - ISC2 Unified Body of Knowledge Presentation
  • 2:45 PM - 3:45 PM CT
    SC2583 - Mastering Risk and Compliance in the AI Era: The Five Cs Framework (Sponsored by LevelBlue)
  • 3:45 PM - 4:30 PM CT
    SC25NS12 - Expo Hall Break
  • 3:50 PM - 4:00 PM CT
    ISC2 Quickfire: Lifecycle of an Exam
  • 3:50 PM - 4:20 PM CT
    SC25CC4 - Career Center Forum: Things I Wish I Knew Earlier: Four Lessons from the IT/Cybersecurity Trenches
  • 3:55 PM - 4:20 PM CT
    SCQA9 - Behind the Mic: The Fellowship of Compliance: Conquering CMMC Together
  • 3:55 PM - 4:20 PM CT
    SCQA10 - Behind the Mic: Secure by Design: Are We Winning?
  • 3:55 PM - 4:20 PM CT
    SC25PD04 - Product Demo: Achieving Meaningful ROI Through ASPM (Sponsored by Black Duck Software)
  • 3:55 PM - 4:20 PM CT
    SC25PD07 - Product Demo: Cyber Co-Pilot: Why AI Agents Won’t Replace Us, They’ll Supercharge Us (Sponsored by Qubika)
  • 3:55 PM - 4:20 PM CT
    SC25PD08 - Product Demo: The Importance of Cybersecurity Knowledge for Business Resilience (Sponsored by Check Point Software)
  • 4:10 PM - 4:20 PM CT
    ISC2 Quickfire: Code of Professional Conduct
  • 4:30 PM - 5:30 PM CT
    SC2557 - A New Era in Cybersecurity: The Nearest Neighbor and Other Wireless Attacks
  • 4:30 PM - 5:30 PM CT
    SC2558 - Addressing GenAI Resilience and Security in Fully/GenAI Automated Cloud Environments
  • 4:30 PM - 5:30 PM CT
    SC2559 - Bright Ideas Roundtable: A World of Pure (Mis)Imagination: Navigating the Next Wave of Deepfakes
  • 4:30 PM - 5:30 PM CT
    SC2560 - Building Robust Enterprise-wide Business Information Security Officer (BISO) Programs: Key Elements for Success
  • 4:30 PM - 5:30 PM CT
    SC2561 - Managing Agentic Risk
  • 4:30 PM - 5:30 PM CT
    SC2562 - Root to CISO: Are You Prepared for Your Next Career Step?
  • 4:30 PM - 5:30 PM CT
    SC2563 - Your API Is Probably Not Secure – Learn Techniques for Better Security Testing
  • 4:30 PM - 5:30 PM CT
    SC2584 - Pioneering Cyber Defense: Lessons from Building a Global Fusion Center Journey
  • 5:30 PM - 7:30 PM CT
    SC25NS13 - Congress Connections Expo Hall Reception
  • 5:45 PM - 5:55 PM CT
    ISC2 Quickfire: Trivia Game -- Win Prizes
  • 6:10 PM - 6:20 PM CT
    ISC2 Quickfire: Trivia Game -- Win Prizes
  • Thursday, October 30, 2025
  • 6:30 AM - 8:00 AM CT
    SC25NS14 - Breakfast
  • 6:30 AM - 11:30 AM CT
    Swag Bag Space
  • 6:30 AM - 11:30 AM CT
    SC25N04 - On-Site Registration
  • 8:00 AM - 9:10 AM CT
    SC2564 - Keynote: Taking the AI Shortcut to Security? Get Your House in Order First + ISC2 Awards Announcement
  • 8:00 AM - 11:00 AM CT
    Quiet Lounge
  • 8:00 AM - 12:00 PM CT
    Men's Multi-Faith Room
  • 8:00 AM - 12:00 PM CT
    Mothers' Room
  • 8:00 AM - 12:00 PM CT
    Women's Multi-Faith Room
  • 9:00 AM - 11:00 AM CT
    Emerging Professionals Lounge
  • 9:20 AM - 10:20 AM CT
    SC2565 - Advanced Persistent Threats: The Ongoing Challenge of State-Sponsored Cyber Espionage
  • 9:20 AM - 10:20 AM CT
    SC2566 - Bright Ideas Roundtable: AED for ISC2 Chapters - Shocking Life Into Your Membership
  • 9:20 AM - 10:20 AM CT
    SC2567 - GPS Your Cyber Career: A Roadmap to Career Success
  • 9:20 AM - 10:20 AM CT
    SC2568 - How AI Will Shape the Shift-Left Approach in AppSec
  • 9:20 AM - 10:20 AM CT
    SC2570 - Identify and Reduce Risk with Three Simple and Effective Cybersecurity Tabletop Exercises
  • 9:20 AM - 10:20 AM CT
    SC2571 - Securing IoMT: Mitigating Cyber Threats in Healthcare
  • 9:20 AM - 10:20 AM CT
    SC2572 - Securing the Skies: The Cybersecurity Challenges of Advanced Air Mobility
  • 9:20 AM - 10:20 AM CT
    SC25PD08 - Humor: An Unconventional Tool for Your Cybersecurity Programs
  • 10:30 AM - 11:30 AM CT
    SC2573 - Automating SBOM and OSS Governance: A Developer-Centric Approach
  • 10:30 AM - 11:30 AM CT
    SC2574 - Bright Ideas Roundtable: Changing the Game on Vulnerability: Increase Visibility, Reduce Scanning, Reduce Risk
  • 10:30 AM - 11:30 AM CT
    SC2575 - Bring Home the Bacon! The First-Timer's Guide to Funding Your Infosec Program
  • 10:30 AM - 11:30 AM CT
    SC2576 - Beyond Playbooks: AI and Automation in Modern Incident Response
  • 10:30 AM - 11:30 AM CT
    SC2577 - License to Secure: A People-Centric Approach to Managing Cumulative Third-Party Data Breach Risk
  • 10:30 AM - 11:30 AM CT
    SC2578 - Securing Our Mission: A Non-Profit’s Journey to Zero Trust
  • 10:30 AM - 11:30 AM CT
    SC2580 - Twin Gatekeeper Framework: Real-Time Dual-Model Vetting to Secure LLMs