Skip to main content

 
Icon Legend
Additional Fee Required
Additional Fee Required
Pre-Registration Required
Pre-Registration Required
Online & Virtual
Online & Virtual
Onsite Only
Onsite Only
Earn CPE Credits
Earn CPE Credits
Livestreamed Session
Livestreamed Session
Included in Guest Pass
Included in Guest Pass
Invite Only
Invite Only
Session Recorded
Session Recorded
Student Experience
Student Experience

Full Schedule

Full Schedule

  • Thursday, October 30, 2025
  • 8:00 AM - 9:10 AM CT
    Closing Keynote: Featuring Brian Krebs + ISC2 Awards Announcement
  • 9:20 AM - 10:20 AM CT
    Advanced Persistent Threats: The Ongoing Challenge of State-Sponsored Cyber Espionage
  • 9:20 AM - 10:20 AM CT
    Bright Ideas Roundtable: AED for ISC2 Chapters - Shocking Life Into Your Membership
  • 9:20 AM - 10:20 AM CT
    GPS Your Cyber Career: A Roadmap to Career Success
  • 9:20 AM - 10:20 AM CT
    How AI Will Shape the Shift-Left Approach in AppSec
  • 9:20 AM - 10:20 AM CT
    Humor: An Unconventional Tool Your Cybersecurity Programs
  • 9:20 AM - 10:20 AM CT
    Identify and Reduce Risk with Three Simple and Effective Cybersecurity Tabletop Exercises
  • 9:20 AM - 10:20 AM CT
    Securing IoMT: Mitigating Cyber Threats in Healthcare
  • 9:20 AM - 10:20 AM CT
    Securing the Skies: The Cybersecurity Challenges of Advanced Air Mobility
  • 10:30 AM - 11:30 AM CT
    Automating SBOM and OSS Governance: A Developer-Centric Approach
  • 10:30 AM - 11:30 AM CT
    Bright Ideas Roundtable: Impact of Generative AI on Audit/Compliance and SOC Operations
  • 10:30 AM - 11:30 AM CT
    Bring Home the Bacon! The first-timers guide to funding your InfoSec Program
  • 10:30 AM - 11:30 AM CT
    License to Secure: A People-Centric Approach to Managing Cumulative Third-Party Data Breach Risk
  • 10:30 AM - 11:30 AM CT
    Securing Our Mission: A Non-Profit’s Journey to Zero Trust
  • 10:30 AM - 11:30 AM CT
    Thriving Together: Empowering a Neurodivergent Cybersecurity Workforce
  • 10:30 AM - 11:30 AM CT
    Twin Gatekeeper LLM: A Dual-Model Approach for Privacy and Security Compliance in Regulated Environments