Skip to main content
Toggle navigation
Home
Icon Legend
Additional Fee Required
Pre-Registration Required
Online & Virtual
Onsite Only
Earn CPE Credits
Livestreamed Session
Included in Guest Pass
Invite Only
Session Recorded
Student Experience
Full Schedule
Security Congress 2025 Agenda
*All Times US Central Time
Home
Full Schedule
Print Schedule
All Days
Sun, Oct 26
Mon, Oct 27
Tue, Oct 28
Wed, Oct 29
Thu, Oct 30
Full Schedule
Type here to filter the list
Tuesday, October 28, 2025
8:00 AM - 8:45 AM
CT
ISC2 Security Congress Welcome & Opening Address
8:00 AM - 8:45 AM
CT
ISC2 Security Congress Welcome & Opening Address
Host:
Brandon Dunlap
– ISC2 Security Congress
Speaker:
Debra Taylor
– ISC2
8:45 AM - 9:35 AM
CT
Opening Keynote: Featuring Phil Venables
8:45 AM - 9:35 AM
CT
Opening Keynote: Featuring Phil Venables
Keynote Speaker:
Phil Venables
– Google
CPE Credits 1
10:20 AM - 11:20 AM
CT
A Firewall, a Backup, and a Zero-Day Walk Into a Bar… What Happens Next Defines Your Cyber Resilience
10:20 AM - 11:20 AM
CT
A Firewall, a Backup, and a Zero-Day Walk Into a Bar… What Happens Next Defines Your Cyber Resilience
Speaker:
Debra Baker
– TrustedCISO
Software Security
CPE Credits 1
10:20 AM - 11:20 AM
CT
Adapt or Be Breached: Why Outdated Third-Party Risk Models Are Failing SaaS Security
10:20 AM - 11:20 AM
CT
Adapt or Be Breached: Why Outdated Third-Party Risk Models Are Failing SaaS Security
Speaker:
Vishal Chawla, BTech (Electronics & Communication), CISSP
– BluOcean Cyber
Cloud Security
CPE Credits 1
10:20 AM - 11:20 AM
CT
Bright Ideas Roundtable: Mentors Wanted: Creating Impact and Shaping the Future of Cybersecurity
10:20 AM - 11:20 AM
CT
Bright Ideas Roundtable: Mentors Wanted: Creating Impact and Shaping the Future of Cybersecurity
Speaker:
Elizabeth Houser, CISSP CCSP MLIS MS
– Advanced Digital Learning (ADL)
Cyber Leadership and Ethics
CPE Credits 1
10:20 AM - 11:20 AM
CT
Cybersecurity Maturity Model Certification: Tales from the Trenches
10:20 AM - 11:20 AM
CT
Cybersecurity Maturity Model Certification: Tales from the Trenches
Speaker:
Thomas Graham, CISSP, CCSP, Lead CCA
– East Carolina University
Co-Speaker:
Stephanie Kincaid, CISSP, Lead CCA
– Redspin
Frameworks, Standards and Guidelines
CPE Credits 1
10:20 AM - 11:20 AM
CT
Hacking Your Career: Navigating the Cybersecurity Landscape
10:20 AM - 11:20 AM
CT
Hacking Your Career: Navigating the Cybersecurity Landscape
Speaker:
Christopher D. Mendoza, MScIA, CISSP, Associate CCISO, AWS CCP, LSS
– Intel Corporation
Careers
CPE Credits 1
10:20 AM - 11:20 AM
CT
Harnessing AI for Revolutionizing Cyber Risk Management and Internal Audit Practices
10:20 AM - 11:20 AM
CT
Harnessing AI for Revolutionizing Cyber Risk Management and Internal Audit Practices
Speaker:
Luca LUMINI, MEng
– AXA Group Operations
Cyber Leadership and Ethics
CPE Credits 1
10:20 AM - 11:20 AM
CT
Leading Security into a Post-Quantum Future
10:20 AM - 11:20 AM
CT
Leading Security into a Post-Quantum Future
Speaker:
Christopher G. Pope, MBA, CISSP, CCSP, CEH
– ExxonMobil
Cyber Leadership and Ethics
CPE Credits 1
10:20 AM - 11:20 AM
CT
Plan for Chaos: Why Most Incident Response Plans Fail Big
10:20 AM - 11:20 AM
CT
Plan for Chaos: Why Most Incident Response Plans Fail Big
Speaker:
Lora Vaughn, CISSP
– Vaughn Cyber Group
SecOps and Threat Response
CPE Credits 1
11:30 AM - 12:30 PM
CT
Bright Ideas Roundtable: The Art of Entra Conditional Access
11:30 AM - 12:30 PM
CT
Bright Ideas Roundtable: The Art of Entra Conditional Access
Speaker:
Eric Woodruff
– Semperis
Cloud Security
CPE Credits 1
11:30 AM - 12:30 PM
CT
Do You Really Know What Your Application is Doing?
11:30 AM - 12:30 PM
CT
Do You Really Know What Your Application is Doing?
Speaker:
Vanessa Jackson, Security+
– Software Engineering Institute
Co-Speaker:
Lyndsi Hughes, CISSP
– Software Engineering Institute
Co-Speaker:
Joseph C. Sible
– Software Engineering Institute
Software Security
CPE Credits 1
11:30 AM - 12:30 PM
CT
Expanding the Cybersecurity Talent Pool: Bridging Industry Gaps with AI and Non-Traditional Talent
11:30 AM - 12:30 PM
CT
Expanding the Cybersecurity Talent Pool: Bridging Industry Gaps with AI and Non-Traditional Talent
Speaker:
Victor Aldana, MBA, MSC, PMP
– Microsoft
Careers
CPE Credits 1
11:30 AM - 12:30 PM
CT
From Overwhelmed to Optimized: Transforming a SOC to Deliver Real Security Impact
11:30 AM - 12:30 PM
CT
From Overwhelmed to Optimized: Transforming a SOC to Deliver Real Security Impact
Speaker:
Jason O'Dell, BS, CISSP, CISA, CISM, GMOB, GCIH
– Walmart
SecOps and Threat Response
CPE Credits 1
11:30 AM - 12:30 PM
CT
ISC2 Code of Professional Conduct Presentation
11:30 AM - 12:30 PM
CT
ISC2 Code of Professional Conduct Presentation
Speaker:
Rachel Williams
Cyber Leadership and Ethics
CPE Credits 1
11:30 AM - 12:30 PM
CT
NIS2, DORA & Others: Navigating the Deep Sea of Cybersecurity Regulations
11:30 AM - 12:30 PM
CT
NIS2, DORA & Others: Navigating the Deep Sea of Cybersecurity Regulations
Speaker:
Claudio Cilli, PhD
– University Of Rome
Governance, Risk and Compliance (GRC)
CPE Credits 1
11:30 AM - 12:30 PM
CT
Unlocking the Future: Embrace Passwordless Security
11:30 AM - 12:30 PM
CT
Unlocking the Future: Embrace Passwordless Security
Speaker:
Anna Cotter, MS
– Highmark Health
Cloud Security
CPE Credits 1
1:45 PM - 2:45 PM
CT
Keynote: Featuring Alissa Knight + ISC2 Awards Announcement
1:45 PM - 2:45 PM
CT
Keynote: Featuring Alissa Knight + ISC2 Awards Announcement
Keynote Speaker:
Alissa Knight
CPE Credits 1
2:55 PM - 3:55 PM
CT
An Introduction to the Generative AI Security Scoping Matrix
2:55 PM - 3:55 PM
CT
An Introduction to the Generative AI Security Scoping Matrix
Speaker:
Anshu Bathla
– Amazon Web Services
Governance, Risk and Compliance (GRC)
CPE Credits 1
2:55 PM - 3:55 PM
CT
Bright Ideas Roundtable: Tracking performance metrics for building cyber resilient systems using NIST CSF and more
2:55 PM - 3:55 PM
CT
Bright Ideas Roundtable: Tracking performance metrics for building cyber resilient systems using NIST CSF and more
Panelist:
Kelly Huttelmaier, MS
– Google
Panelist:
Kaveri Gupta, MSc, MBA
– Google LLC
Panel Moderator:
Nandini Singh
– Google LLC
Frameworks, Standards and Guidelines
CPE Credits 1
2:55 PM - 3:55 PM
CT
Built-In, Not Bolt-On: Using LLMs to Achieve Secure by Design
2:55 PM - 3:55 PM
CT
Built-In, Not Bolt-On: Using LLMs to Achieve Secure by Design
Speaker:
Swati Babbar
– Amazon.com Services LLC
Speaker:
Daphne Gerstner, CISSP
– Amazon.com
Software Security
CPE Credits 1
2:55 PM - 3:55 PM
CT
Cybersecurity: From Cost Center to Competitive Advantage
2:55 PM - 3:55 PM
CT
Cybersecurity: From Cost Center to Competitive Advantage
Speaker:
Bryan Willett, CISSP
– Lexmark International, Inc.
Cyber Leadership and Ethics
CPE Credits 1
2:55 PM - 3:55 PM
CT
DeepFakes and Corporate Cybersecurity
2:55 PM - 3:55 PM
CT
DeepFakes and Corporate Cybersecurity
Speaker:
Felix Hernandez, CISSP, CCSP, CISM, CEH
– All American Technology Solutions Group/Strategic Sentinels
SecOps and Threat Response
CPE Credits 1
2:55 PM - 3:55 PM
CT
Scaling Cloud Security: The Role of CSPM and Automation in Multi-Cloud Environments
2:55 PM - 3:55 PM
CT
Scaling Cloud Security: The Role of CSPM and Automation in Multi-Cloud Environments
Speaker:
Parul Khanna, CISSP, ISSAP, CCSP, CSSLP, CISA, CISM, CRISC, CDPSE, CCSK
– Manulife
Cloud Security
CPE Credits 1
2:55 PM - 3:55 PM
CT
You Belong Here: Overcoming Imposter Syndrome and Owning Your Success
2:55 PM - 3:55 PM
CT
You Belong Here: Overcoming Imposter Syndrome and Owning Your Success
Speaker:
Tammy Moskites
CPE Credits 1
4:40 PM - 5:40 PM
CT
AI vs. AI: When Hackers and Defenders Use the Same Tools
4:40 PM - 5:40 PM
CT
AI vs. AI: When Hackers and Defenders Use the Same Tools
Speaker:
Daniel Eberhorn
– Bechtle AG
Cyber Leadership and Ethics
CPE Credits 1
4:40 PM - 5:40 PM
CT
Beyond Approvals: Automating IAM for Compliance, Security, and Business Agility
4:40 PM - 5:40 PM
CT
Beyond Approvals: Automating IAM for Compliance, Security, and Business Agility
Co-Speaker:
Vatsal Gupta, MS
– Apple
Co-Speaker:
Nandini Singh
– Google LLC
Co-Speaker:
Alex Olivier
– Cerbos
Governance, Risk and Compliance (GRC)
CPE Credits 1
4:40 PM - 5:40 PM
CT
Cyber Risk Reporting: turning cybersecurity risk into business metrics
4:40 PM - 5:40 PM
CT
Cyber Risk Reporting: turning cybersecurity risk into business metrics
Speaker:
Laurie-Anne Bourdain, CISSP, FIP, CIPP/E, CIPM, CDPSE, DPO
– ISC2
Governance, Risk and Compliance (GRC)
CPE Credits 1
4:40 PM - 5:40 PM
CT
From Ethics to Enforcement – Operationalizing AI Governance and Compliance
4:40 PM - 5:40 PM
CT
From Ethics to Enforcement – Operationalizing AI Governance and Compliance
Speaker:
Vikram Kulothungan
– Microsoft
Frameworks, Standards and Guidelines
CPE Credits 1
4:40 PM - 5:40 PM
CT
Threat Modeling AI: STRIDE Was a Good Start, But This Is Weirder
4:40 PM - 5:40 PM
CT
Threat Modeling AI: STRIDE Was a Good Start, But This Is Weirder
Speaker:
Vincent C. Romney, CISSP, CCSP, CSSLP
– Nu Skin Enterprises
Software Security
CPE Credits 1
4:40 PM - 5:40 PM
CT
Thriving Under Pressure: Three-Minute Tools to Combat Burnout in Cybersecurity
4:40 PM - 5:40 PM
CT
Thriving Under Pressure: Three-Minute Tools to Combat Burnout in Cybersecurity
Speaker:
Jen Szkatulski
– Immersive
Speaker:
Sudesh Kannan, PhD, CISSP, CISM, CCSP, CGRC,CIPP(US)
– University of Maryland Global Campus
Careers
CPE Credits 1
6:30 PM - 8:30 PM
CT
Security Congress 2025 Networking Event
6:30 PM - 8:30 PM
CT
Security Congress 2025 Networking Event