ISC2 Security Congress 2024, now available for on-demand replay, brought together thousands of information security leaders to network, share ideas and receive the best cybersecurity education from the brightest minds in the industry.
This annual event is one of the top cybersecurity conferences of the year, with impactful sessions provided by subject matter experts, professionals on the frontline and leaders in the industry, all providing real-world and relatable knowledge to practitioners. Here is all our 2024 ISC2 Security Congress coverage across keynote and main conference sessions:
Keynote Sessions
Building a Trustworthy Company after the Tech Calamities of 2024 – Alex Stamos
The failings that lead to hacks are not hard to find – technology monoculture, the assumption that making networks easier to manage has no effect on security, and an unwillingness to be paternalistic about security. Read more.
Lessons from the Lighter Side of Artificial Intelligence – Janelle Shane
At ISC2 Security Congress 2024 in Las Vegas, attendees learned that AI still gets a lot wrong, sometimes amusingly. However, the underlying weaknesses of the technology need to be factored into the next generation of applications or risk a backlash against its use. Read more.
Cyber Under Stress – Dan Harris
Stress is a given across all IT cybersecurity jobs. Journalist and author Dan Harris explored with attendees at ISC2 Security Congress 2024 whether this is natural and inevitable or if it should be approached like any other problem? Read more.
Surviving the Most Complex Cyber Threat Landscape of Our Times – Nicole Perlroth
As threats multiply, defenders need to adopt the lateral thinking of attackers and adopt an ‘everything everywhere all at once’ mindset. Read more.
Conference Sessions
Is Open Source Software Too Open to Vulnerabilities? – Andrew Boyle, CISSP
At ISC2 Security Congress 2024, delegates explored the cybersecurity considerations attached to the growing use of open source technology and asked whether complete access to the code base tempers benefits with increased security risk. Read more.
Deepfake Technology Getting Better at Blurring Reality – Kyle Hinterberg, CISSP
Today, we find ourselves dealing with an advanced landscape of artificial intelligence (AI) and with it the creation and detection of equally advanced and convincing deepfakes. In response, we are also having to address the sophisticated methodologies that produce and identify these digital deceptions. Read more.
Quantum Computing & Its Security Implications – Glendon Schmitz, CISSP and Angus Chen, CISSP, CCSP
Far from being science fiction, quantum is not only inevitable but is already upon us and cybersecurity professionals need to react now to its disruptive effects. Read more.
Addressing Weak Incident Response Plans – John Hollenberger, CISSP
Key to an organization’s resilience is its ability to respond to an incident. As delegates at ISC2 Security Congress 2024 leaned, weak incident response plans can undermine recovery and other cybersecurity actions. Read more.
Insights from a Cybersecurity Career Transitioner – Samantha Snellen, CC
Changing careers may seem daunting, especially if it seems like a complete field change. However, transitioning into a cybersecurity career from another profession has been the choice for many in our sector. Read more.
Cloudy with a Chance of Breaches – Anton Abaya and Chris Bullock, CISSP
The growth of the cloud has brought with it challenges in tracking the status of key digital assets – or indeed knowing where they actually are – as well as ensuring they are appropriately secured when sitting on or being accessed by a cloud service. Read more.
API Security – A Pentester’s Perspective – Jennifer Shannon
Application Programmer Interfaces – APIs – are everywhere we turn and are the technology that underpins much of the interconnected state of the applications and services we rely on every day. By their very nature, they present a security challenge for both developers and cybersecurity teams alike. Read more.
Benefits and Limitations of Generative AI for Cybersecurity Awareness Training – Shoshana Sugerman and Brian Callahan, PhD, ISSMP, CISSP, CCSP, SSCP, CC
Delivering cybersecurity awareness training for organizations can be enhanced with the thoughtful use of Generative AI tools. However, best practices for this particular use of Generative AI has not been well codified, creating challenges for its effective and reliable use. Read more.
Jack of More Trades – Natalia Semenova, PhD, CISSP, CCSP
As organizations increasingly rely on machine learning for critical decision-making, ensuring the security of ML systems becomes paramount. MLSecOps is a vital discipline that integrates SecOps with ML operations to protect models, data and the ML infrastructure. Read more.
Related Articles and Links
- Register now for ISC2 Security Congress 2025 in Nashville
- Employers Must Act as Cybersecurity Workforce Growth Stalls and Skills Gaps Widen
- The Crucial Role of Leadership in Information Security
- Will AI replace the CISO?
- ISC2 Securing AI Workshops
- Eliminating Stigma Around Mental Health
- Safeguarding Elections from Cyber Threats
- Supply Chain Security
- Supply Chain Risk Management (SCRM) through Governance, Risk, and Compliance (GRC)
- Quantum-Leaping Quantum Computers? Not So Fast!
- How 2024 Changed the Future of Cybersecurity
- ISC2 Incident Management: Preparation and Response Certificate
- Continuous Monitoring and Incident Response for Zero Trust
- API Security Best Practices in the Hybrid Multi-Cloud Digital World
- The Ultimate Guide to Certified in Cybersecurity: The Entry-Level Certification for Tomorrow’s Cybersecurity Leaders
- The Ultimate Guide to CCSP
- The Ultimate Guide to CSSLP
- Cybersecurity Career Paths
- Cloud Security Skill-Builders
- ISSAP certification
- CCSP certification
- CSSLP certification
- Certified in Cybersecurity
- One Million Certified in Cybersecurity