Skip to main content

 
Icon Legend
Additional Fee Required
Additional Fee Required
Pre-Registration Required
Pre-Registration Required
Online & Virtual
Online & Virtual
Onsite Only
Onsite Only
Earn CPE Credits
Earn CPE Credits
Livestreamed Session
Livestreamed Session
Included in Guest Pass
Included in Guest Pass
Invite Only
Invite Only
Session Recorded
Session Recorded
Student Experience
Student Experience

Full Schedule

Full Schedule

  • Wednesday, October 29, 2025
  • 8:00 AM - 9:00 AM CT
    Keynote: Featuring Dr. Mae Jemison + ISC2 Awards Announcements
  • 9:10 AM - 10:10 AM CT
    Breaking the Next Factor - Multi-factor authentication pwned live
  • 9:10 AM - 10:10 AM CT
    Bright Ideas Roundtable: Do You Know Your Vendor’s Partners? Healthcare’s Supply Chain is More Than Third-Party Risk
  • 9:10 AM - 10:10 AM CT
    Everyone Has a Plan Until They Are Punched in the Mouth - Stories from the Cybersecurity Ring
  • 9:10 AM - 10:10 AM CT
    Having Major Trust Issues With Your AI System? Learn To Cope By Leveraging System Theoretic Process Analysis
  • 9:10 AM - 10:10 AM CT
    Quantum Preparedness: Operationalizing NIST, ISO, and CISA Frameworks for Post-Quantum Cryptography Migration
  • 9:10 AM - 10:10 AM CT
    The A.I. 'Big Shift' & Cybersec Careers: What’s Coming, How To Navigate It
  • 10:55 AM - 11:55 AM CT
    Agentic AI: Navigating the Uncharted Waters of Non-Human Identity and Liability
  • 10:55 AM - 11:55 AM CT
    Agile, Traditional or Hybrid Project Management – Which works best for Cybersecurity teams?
  • 10:55 AM - 11:55 AM CT
    AI-Powered OT Security: Enhancing Cyber Defense with Large Language Models (LLMs)
  • 10:55 AM - 11:55 AM CT
    Bright Ideas Roundtable: Exponential Skills: The Future-Proof Framework for Cybersecurity Leaders
  • 10:55 AM - 11:55 AM CT
    Cybersecurity Roles on the Rise: Data-Backed Insights for 2025
  • 10:55 AM - 11:55 AM CT
    Drop-Shipping a New Security Department into a Multibillion-Dollar Company
  • 10:55 AM - 11:55 AM CT
    Securing Containerized LLMs on Kubernetes with Guardrails
  • 1:10 PM - 2:35 PM CT
    ISC2 Town Hall
  • 2:45 PM - 3:45 PM CT
    Applied Quantum Cybersecurity Research for All: Go Beyond the Hype with the Rensselaer Cybersecurity Collaboratory and the Students Doing the Real Work
  • 2:45 PM - 3:45 PM CT
    Bright Ideas Roundtable: A World of Pure (Mis)Imagination: Navigating the Next Wave of Deepfakes
  • 2:45 PM - 3:45 PM CT
    From Potential to Performance: An Apprenticeship Approach to Closing the Skills Gap
  • 2:45 PM - 3:45 PM CT
    Pentesting Evolved: Automation, Crowds, and Everything In Between
  • 2:45 PM - 3:45 PM CT
    Secure by Design: Are We Winning?
  • 2:45 PM - 3:45 PM CT
    The Fellowship of Compliance:  Conquering CMMC Together
  • 2:45 PM - 3:45 PM CT
    Unified Body of Knowledge Presentation
  • 4:30 PM - 5:30 PM CT
    A New Era in Cybersecurity: The Nearest Neighbor and Other Wireless Attacks
  • 4:30 PM - 5:30 PM CT
    Addressing GenAI Resilience and Security in Fully/GenAI Automated Cloud Environments
  • 4:30 PM - 5:30 PM CT
    Bright Ideas Roundtable: The Hateful Eight: Common 'Malwords' to Avoid in a Professional Services Agreement
  • 4:30 PM - 5:30 PM CT
    Building Robust Enterprise-wide Business Information Security Officer (BISO) Programs: Key Elements for Success
  • 4:30 PM - 5:30 PM CT
    From Zero to Cyber Hero: Building a Robust Cyber Organization from Scratch
  • 4:30 PM - 5:30 PM CT
    Managing Agentic Risk
  • 4:30 PM - 5:30 PM CT
    Root To CISO - Are You Prepared For Your next Career Step?
  • 4:30 PM - 5:30 PM CT
    Your API Is Probably Not Secure – Learn Techniques for Better Security Testing
  • 5:30 PM - 7:30 PM CT
    Congress Connections -- Expo Hall Reception