Skip to main content

 
Icon Legend
Additional Fee Required
Additional Fee Required
Pre-Registration Required
Pre-Registration Required
Online & Virtual
Online & Virtual
Onsite Only
Onsite Only
Earn CPE Credits
Earn CPE Credits
Livestreamed Session
Livestreamed Session
Included in Guest Pass
Included in Guest Pass
Invite Only
Invite Only
Session Recorded
Session Recorded
Student Experience
Student Experience

Full Schedule

Full Schedule

  • Tuesday, October 28, 2025
  • 8:00 AM - 8:45 AM CT
    ISC2 Security Congress Welcome & Opening Address
  • 8:45 AM - 9:35 AM CT
    Opening Keynote: Featuring Phil Venables
  • 10:20 AM - 11:20 AM CT
    A Firewall, a Backup, and a Zero-Day Walk Into a Bar… What Happens Next Defines Your Cyber Resilience
  • 10:20 AM - 11:20 AM CT
    Adapt or Be Breached: Why Outdated Third-Party Risk Models Are Failing SaaS Security
  • 10:20 AM - 11:20 AM CT
    Bright Ideas Roundtable: Mentors Wanted: Creating Impact and Shaping the Future of Cybersecurity
  • 10:20 AM - 11:20 AM CT
    Cybersecurity Maturity Model Certification: Tales from the Trenches
  • 10:20 AM - 11:20 AM CT
    Hacking Your Career: Navigating the Cybersecurity Landscape
  • 10:20 AM - 11:20 AM CT
    Harnessing AI for Revolutionizing Cyber Risk Management and Internal Audit Practices
  • 10:20 AM - 11:20 AM CT
    Leading Security into a Post-Quantum Future
  • 10:20 AM - 11:20 AM CT
    Plan for Chaos: Why Most Incident Response Plans Fail Big
  • 11:30 AM - 12:30 PM CT
    Bright Ideas Roundtable: The Art of Entra Conditional Access
  • 11:30 AM - 12:30 PM CT
    Do You Really Know What Your Application is Doing?
  • 11:30 AM - 12:30 PM CT
    Expanding the Cybersecurity Talent Pool: Bridging Industry Gaps with AI and Non-Traditional Talent
  • 11:30 AM - 12:30 PM CT
    From Overwhelmed to Optimized: Transforming a SOC to Deliver Real Security Impact
  • 11:30 AM - 12:30 PM CT
    ISC2 Code of Professional Conduct Presentation
  • 11:30 AM - 12:30 PM CT
    NIS2, DORA & Others: Navigating the Deep Sea of Cybersecurity Regulations
  • 11:30 AM - 12:30 PM CT
    Unlocking the Future: Embrace Passwordless Security
  • 1:45 PM - 2:45 PM CT
    Keynote: Featuring Alissa Knight + ISC2 Awards Announcement
  • 2:55 PM - 3:55 PM CT
    An Introduction to the Generative AI Security Scoping Matrix
  • 2:55 PM - 3:55 PM CT
    Bright Ideas Roundtable: Tracking performance metrics for building cyber resilient systems using NIST CSF and more
  • 2:55 PM - 3:55 PM CT
    Built-In, Not Bolt-On: Using LLMs to Achieve Secure by Design
  • 2:55 PM - 3:55 PM CT
    Cybersecurity: From Cost Center to Competitive Advantage
  • 2:55 PM - 3:55 PM CT
    DeepFakes and Corporate Cybersecurity
  • 2:55 PM - 3:55 PM CT
    Scaling Cloud Security: The Role of CSPM and Automation in Multi-Cloud Environments
  • 2:55 PM - 3:55 PM CT
    You Belong Here: Overcoming Imposter Syndrome and Owning Your Success
  • 4:40 PM - 5:40 PM CT
    AI vs. AI: When Hackers and Defenders Use the Same Tools
  • 4:40 PM - 5:40 PM CT
    Beyond Approvals: Automating IAM for Compliance, Security, and Business Agility
  • 4:40 PM - 5:40 PM CT
    Cyber Risk Reporting: turning cybersecurity risk into business metrics
  • 4:40 PM - 5:40 PM CT
    From Ethics to Enforcement – Operationalizing AI Governance and Compliance
  • 4:40 PM - 5:40 PM CT
    Threat Modeling AI: STRIDE Was a Good Start, But This Is Weirder
  • 4:40 PM - 5:40 PM CT
    Thriving Under Pressure: Three-Minute Tools to Combat Burnout in Cybersecurity
  • 6:30 PM - 8:30 PM CT
    Security Congress 2025 Networking Event