ISC2 Security Congress 2024, now available for on-demand replay, brought together thousands of information security leaders to network, share ideas and receive the best cybersecurity education from the brightest minds in the industry.

This annual event is one of the top cybersecurity conferences of the year, with impactful sessions provided by subject matter experts, professionals on the frontline and leaders in the industry, all providing real-world and relatable knowledge to practitioners. Here is all our 2024 ISC2 Security Congress coverage across keynote and main conference sessions:

Keynote Sessions

Building a Trustworthy Company after the Tech Calamities of 2024 – Alex Stamos

The failings that lead to hacks are not hard to find – technology monoculture, the assumption that making networks easier to manage has no effect on security, and an unwillingness to be paternalistic about security. Read more.

Lessons from the Lighter Side of Artificial Intelligence – Janelle Shane

At ISC2 Security Congress 2024 in Las Vegas, attendees learned that AI still gets a lot wrong, sometimes amusingly. However, the underlying weaknesses of the technology need to be factored into the next generation of applications or risk a backlash against its use. Read more.

Cyber Under Stress – Dan Harris

Stress is a given across all IT cybersecurity jobs. Journalist and author Dan Harris explored with attendees at ISC2 Security Congress 2024 whether this is natural and inevitable or if it should be approached like any other problem? Read more.

Surviving the Most Complex Cyber Threat Landscape of Our Times – Nicole Perlroth

As threats multiply, defenders need to adopt the lateral thinking of attackers and adopt an ‘everything everywhere all at once’ mindset. Read more.

Conference Sessions

Is Open Source Software Too Open to Vulnerabilities? – Andrew Boyle, CISSP

At ISC2 Security Congress 2024, delegates explored the cybersecurity considerations attached to the growing use of open source technology and asked whether complete access to the code base tempers benefits with increased security risk. Read more.

Deepfake Technology Getting Better at Blurring Reality – Kyle Hinterberg, CISSP

Today, we find ourselves dealing with an advanced landscape of artificial intelligence (AI) and with it the creation and detection of equally advanced and convincing deepfakes. In response, we are also having to address the sophisticated methodologies that produce and identify these digital deceptions. Read more.

Quantum Computing & Its Security Implications – Glendon Schmitz, CISSP and Angus Chen, CISSP, CCSP

Far from being science fiction, quantum is not only inevitable but is already upon us and cybersecurity professionals need to react now to its disruptive effects. Read more.

Addressing Weak Incident Response Plans – John Hollenberger, CISSP

Key to an organization’s resilience is its ability to respond to an incident. As delegates at ISC2 Security Congress 2024 leaned, weak incident response plans can undermine recovery and other cybersecurity actions. Read more.

Insights from a Cybersecurity Career Transitioner – Samantha Snellen, CC

Changing careers may seem daunting, especially if it seems like a complete field change. However, transitioning into a cybersecurity career from another profession has been the choice for many in our sector. Read more.

Cloudy with a Chance of Breaches – Anton Abaya and Chris Bullock, CISSP

The growth of the cloud has brought with it challenges in tracking the status of key digital assets – or indeed knowing where they actually are – as well as ensuring they are appropriately secured when sitting on or being accessed by a cloud service. Read more.

API Security – A Pentester’s Perspective – Jennifer Shannon

Application Programmer Interfaces – APIs – are everywhere we turn and are the technology that underpins much of the interconnected state of the applications and services we rely on every day. By their very nature, they present a security challenge for both developers and cybersecurity teams alike. Read more.

Benefits and Limitations of Generative AI for Cybersecurity Awareness Training – Shoshana Sugerman and Brian Callahan, PhD, ISSMP, CISSP, CCSP, SSCP, CC

Delivering cybersecurity awareness training for organizations can be enhanced with the thoughtful use of Generative AI tools. However, best practices for this particular use of Generative AI has not been well codified, creating challenges for its effective and reliable use. Read more.

Jack of More Trades – Natalia Semenova, PhD, CISSP, CCSP

As organizations increasingly rely on machine learning for critical decision-making, ensuring the security of ML systems becomes paramount. MLSecOps is a vital discipline that integrates SecOps with ML operations to protect models, data and the ML infrastructure. Read more.

Related Articles and Links