Skip to main content

 
Icon Legend
Additional Fee Required
Additional Fee Required
Pre-Registration Required
Pre-Registration Required
Online & Virtual
Online & Virtual
Onsite Only
Onsite Only
Earn CPE Credits
Earn CPE Credits
Livestreamed Session
Livestreamed Session
Included in Guest Pass
Included in Guest Pass
Invite Only
Invite Only
Session Recorded
Session Recorded
Student Experience
Student Experience

Full Schedule

Full Schedule

  • Sunday, October 26, 2025
  • 8:00 AM - 5:00 PM CT
    Pre-Conference Workshop: CCSP Essentials for Certification and Practice (2-Day, Part 1)
  • 8:00 AM - 5:00 PM CT
    Pre-Conference Workshop: CGRC Essentials for Certification and Practice (2-Day, Part 1)
  • 8:00 AM - 5:00 PM CT
    Pre-Conference Workshop: CISSP Essentials for Certification and Practice (2-Day, Part 1)
  • 8:00 AM - 5:00 PM CT
    Pre-Conference Workshop: From Technologist to Manager: Navigating Your Next Cybersecurity Career Move (2-Day, Part 1)
  • 8:00 AM - 5:00 PM CT
    Pre-Conference Workshop: Securing AI: Cybersecurity Strategy (2-Day, Part 1)
  • 8:00 AM - 5:00 PM CT
    Pre-Conference Workshop: Threat Modeling AI Systems (1-Day)
  • 8:00 AM - 5:00 PM CT
    Pre-Conference Workshop: Transforming Cyber Leadership (2-Day, Part 1)
  • 8:00 AM - 5:00 PM CT
    Pre-Conference Workshop: Vendor Contract Reviews: Managing Privacy, Cybersecurity and AI Risks (1-Day)
  • Monday, October 27, 2025
  • 8:00 AM - 5:00 PM CT
    Pre-Conference Workshop: CCSP Essentials for Certification and Practice (2-Day, Part 2)
  • 8:00 AM - 5:00 PM CT
    Pre-Conference Workshop: CGRC Essentials for Certification and Practice (2-Day, Part 2)
  • 8:00 AM - 5:00 PM CT
    Pre-Conference Workshop: CISSP Essentials for Certification and Practice (2-Day, Part 2)
  • 8:00 AM - 5:00 PM CT
    Pre-Conference Workshop: From Technologist to Manager: Navigating Your Next Cybersecurity Career Move (2-Day, Part 2)
  • 8:00 AM - 5:00 PM CT
    Pre-Conference Workshop: Securing AI: Cybersecurity Strategy (2-Day, Part 2)
  • 8:00 AM - 5:00 PM CT
    Pre-Conference Workshop: Threat Modeling AI Systems (1-Day)
  • 8:00 AM - 5:00 PM CT
    Pre-Conference Workshop: Transforming Cyber Leadership (2-Day, Part 2)
  • 8:00 AM - 5:00 PM CT
    Pre-Conference Workshop: Vendor Contract Reviews: Managing Privacy, Cybersecurity and AI Risks (1-Day)
  • 4:00 PM - 7:00 PM CT
    Meet, Mix and Mingle Networking Reception
  • Tuesday, October 28, 2025
  • 8:00 AM - 8:45 AM CT
    ISC2 Security Congress Welcome & Opening Address
  • 8:45 AM - 9:35 AM CT
    Opening Keynote: Featuring Phil Venables
  • 10:20 AM - 11:20 AM CT
    A Firewall, a Backup, and a Zero-Day Walk Into a Bar… What Happens Next Defines Your Cyber Resilience
  • 10:20 AM - 11:20 AM CT
    Adapt or Be Breached: Why Outdated Third-Party Risk Models Are Failing SaaS Security
  • 10:20 AM - 11:20 AM CT
    Bright Ideas Roundtable: Mentors Wanted: Creating Impact and Shaping the Future of Cybersecurity
  • 10:20 AM - 11:20 AM CT
    Cybersecurity Maturity Model Certification: Tales from the Trenches
  • 10:20 AM - 11:20 AM CT
    Hacking Your Career: Navigating the Cybersecurity Landscape
  • 10:20 AM - 11:20 AM CT
    Harnessing AI for Revolutionizing Cyber Risk Management and Internal Audit Practices
  • 10:20 AM - 11:20 AM CT
    Leading Security into a Post-Quantum Future
  • 10:20 AM - 11:20 AM CT
    Plan for Chaos: Why Most Incident Response Plans Fail Big
  • 11:30 AM - 12:30 PM CT
    Bright Ideas Roundtable: The Art of Entra Conditional Access
  • 11:30 AM - 12:30 PM CT
    Do You Really Know What Your Application is Doing?
  • 11:30 AM - 12:30 PM CT
    Expanding the Cybersecurity Talent Pool: Bridging Industry Gaps with AI and Non-Traditional Talent
  • 11:30 AM - 12:30 PM CT
    From Overwhelmed to Optimized: Transforming a SOC to Deliver Real Security Impact
  • 11:30 AM - 12:30 PM CT
    ISC2 Code of Professional Conduct Presentation
  • 11:30 AM - 12:30 PM CT
    NIS2, DORA & Others: Navigating the Deep Sea of Cybersecurity Regulations
  • 11:30 AM - 12:30 PM CT
    Unlocking the Future: Embrace Passwordless Security
  • 1:45 PM - 2:45 PM CT
    Keynote: Featuring Alissa Knight + ISC2 Awards Announcement
  • 2:55 PM - 3:55 PM CT
    An Introduction to the Generative AI Security Scoping Matrix
  • 2:55 PM - 3:55 PM CT
    Bright Ideas Roundtable: Tracking performance metrics for building cyber resilient systems using NIST CSF and more
  • 2:55 PM - 3:55 PM CT
    Built-In, Not Bolt-On: Using LLMs to Achieve Secure by Design
  • 2:55 PM - 3:55 PM CT
    Cybersecurity: From Cost Center to Competitive Advantage
  • 2:55 PM - 3:55 PM CT
    DeepFakes and Corporate Cybersecurity
  • 2:55 PM - 3:55 PM CT
    Scaling Cloud Security: The Role of CSPM and Automation in Multi-Cloud Environments
  • 2:55 PM - 3:55 PM CT
    You Belong Here: Overcoming Imposter Syndrome and Owning Your Success
  • 4:40 PM - 5:40 PM CT
    AI vs. AI: When Hackers and Defenders Use the Same Tools
  • 4:40 PM - 5:40 PM CT
    Beyond Approvals: Automating IAM for Compliance, Security, and Business Agility
  • 4:40 PM - 5:40 PM CT
    Cyber Risk Reporting: turning cybersecurity risk into business metrics
  • 4:40 PM - 5:40 PM CT
    From Ethics to Enforcement – Operationalizing AI Governance and Compliance
  • 4:40 PM - 5:40 PM CT
    Threat Modeling AI: STRIDE Was a Good Start, But This Is Weirder
  • 4:40 PM - 5:40 PM CT
    Thriving Under Pressure: Three-Minute Tools to Combat Burnout in Cybersecurity
  • 6:30 PM - 8:30 PM CT
    Security Congress 2025 Networking Event
  • Wednesday, October 29, 2025
  • 8:00 AM - 9:00 AM CT
    Keynote: Featuring Dr. Mae Jemison + ISC2 Awards Announcements
  • 9:10 AM - 10:10 AM CT
    Breaking the Next Factor - Multi-factor authentication pwned live
  • 9:10 AM - 10:10 AM CT
    Bright Ideas Roundtable: Do You Know Your Vendor’s Partners? Healthcare’s Supply Chain is More Than Third-Party Risk
  • 9:10 AM - 10:10 AM CT
    Everyone Has a Plan Until They Are Punched in the Mouth - Stories from the Cybersecurity Ring
  • 9:10 AM - 10:10 AM CT
    Having Major Trust Issues With Your AI System? Learn To Cope By Leveraging System Theoretic Process Analysis
  • 9:10 AM - 10:10 AM CT
    Quantum Preparedness: Operationalizing NIST, ISO, and CISA Frameworks for Post-Quantum Cryptography Migration
  • 9:10 AM - 10:10 AM CT
    The A.I. 'Big Shift' & Cybersec Careers: What’s Coming, How To Navigate It
  • 10:55 AM - 11:55 AM CT
    Agentic AI: Navigating the Uncharted Waters of Non-Human Identity and Liability
  • 10:55 AM - 11:55 AM CT
    Agile, Traditional or Hybrid Project Management – Which works best for Cybersecurity teams?
  • 10:55 AM - 11:55 AM CT
    AI-Powered OT Security: Enhancing Cyber Defense with Large Language Models (LLMs)
  • 10:55 AM - 11:55 AM CT
    Bright Ideas Roundtable: Exponential Skills: The Future-Proof Framework for Cybersecurity Leaders
  • 10:55 AM - 11:55 AM CT
    Cybersecurity Roles on the Rise: Data-Backed Insights for 2025
  • 10:55 AM - 11:55 AM CT
    Drop-Shipping a New Security Department into a Multibillion-Dollar Company
  • 10:55 AM - 11:55 AM CT
    Securing Containerized LLMs on Kubernetes with Guardrails
  • 1:10 PM - 2:35 PM CT
    ISC2 Town Hall
  • 2:45 PM - 3:45 PM CT
    Applied Quantum Cybersecurity Research for All: Go Beyond the Hype with the Rensselaer Cybersecurity Collaboratory and the Students Doing the Real Work
  • 2:45 PM - 3:45 PM CT
    Bright Ideas Roundtable: A World of Pure (Mis)Imagination: Navigating the Next Wave of Deepfakes
  • 2:45 PM - 3:45 PM CT
    From Potential to Performance: An Apprenticeship Approach to Closing the Skills Gap
  • 2:45 PM - 3:45 PM CT
    Pentesting Evolved: Automation, Crowds, and Everything In Between
  • 2:45 PM - 3:45 PM CT
    Secure by Design: Are We Winning?
  • 2:45 PM - 3:45 PM CT
    The Fellowship of Compliance:  Conquering CMMC Together
  • 2:45 PM - 3:45 PM CT
    Unified Body of Knowledge Presentation
  • 4:30 PM - 5:30 PM CT
    A New Era in Cybersecurity: The Nearest Neighbor and Other Wireless Attacks
  • 4:30 PM - 5:30 PM CT
    Addressing GenAI Resilience and Security in Fully/GenAI Automated Cloud Environments
  • 4:30 PM - 5:30 PM CT
    Bright Ideas Roundtable: The Hateful Eight: Common 'Malwords' to Avoid in a Professional Services Agreement
  • 4:30 PM - 5:30 PM CT
    Building Robust Enterprise-wide Business Information Security Officer (BISO) Programs: Key Elements for Success
  • 4:30 PM - 5:30 PM CT
    From Zero to Cyber Hero: Building a Robust Cyber Organization from Scratch
  • 4:30 PM - 5:30 PM CT
    Managing Agentic Risk
  • 4:30 PM - 5:30 PM CT
    Root To CISO - Are You Prepared For Your next Career Step?
  • 4:30 PM - 5:30 PM CT
    Your API Is Probably Not Secure – Learn Techniques for Better Security Testing
  • 5:30 PM - 7:30 PM CT
    Congress Connections -- Expo Hall Reception
  • Thursday, October 30, 2025
  • 8:00 AM - 9:10 AM CT
    Closing Keynote: Featuring Brian Krebs + ISC2 Awards Announcement
  • 9:20 AM - 10:20 AM CT
    Advanced Persistent Threats: The Ongoing Challenge of State-Sponsored Cyber Espionage
  • 9:20 AM - 10:20 AM CT
    Bright Ideas Roundtable: AED for ISC2 Chapters - Shocking Life Into Your Membership
  • 9:20 AM - 10:20 AM CT
    GPS Your Cyber Career: A Roadmap to Career Success
  • 9:20 AM - 10:20 AM CT
    How AI Will Shape the Shift-Left Approach in AppSec
  • 9:20 AM - 10:20 AM CT
    Humor: An Unconventional Tool Your Cybersecurity Programs
  • 9:20 AM - 10:20 AM CT
    Identify and Reduce Risk with Three Simple and Effective Cybersecurity Tabletop Exercises
  • 9:20 AM - 10:20 AM CT
    Securing IoMT: Mitigating Cyber Threats in Healthcare
  • 9:20 AM - 10:20 AM CT
    Securing the Skies: The Cybersecurity Challenges of Advanced Air Mobility
  • 10:30 AM - 11:30 AM CT
    Automating SBOM and OSS Governance: A Developer-Centric Approach
  • 10:30 AM - 11:30 AM CT
    Bright Ideas Roundtable: Impact of Generative AI on Audit/Compliance and SOC Operations
  • 10:30 AM - 11:30 AM CT
    Bring Home the Bacon! The first-timers guide to funding your InfoSec Program
  • 10:30 AM - 11:30 AM CT
    License to Secure: A People-Centric Approach to Managing Cumulative Third-Party Data Breach Risk
  • 10:30 AM - 11:30 AM CT
    Securing Our Mission: A Non-Profit’s Journey to Zero Trust
  • 10:30 AM - 11:30 AM CT
    Thriving Together: Empowering a Neurodivergent Cybersecurity Workforce
  • 10:30 AM - 11:30 AM CT
    Twin Gatekeeper LLM: A Dual-Model Approach for Privacy and Security Compliance in Regulated Environments