
Cybersecurity Practitioners Event
"CPE"
Welcome. With you support and attendance, this event will be one not to miss.
Register and take advantage of the Early Bird deal.
​
PLEASE DO NOT CALL THE VENUE.
THEY WILL NOT HAVE INFORMATION TO PROVIDE YOU.
​
FOR INFORMATION CONTACT US AT EVENTS@ISC2CT.ORG
Agenda and Timeline
Subject to Change


Session 1
Risk Management
Discover strategies for building a robust Cyber Risk Management Program, integrating Third-Party Risk Management (TPRM) to address evolving threats. Topics include risk assessment frameworks, vendor security, compliance, and embedding risk insights into decision-making. Gain actionable solutions to protect assets, ensure regulatory alignment, and strengthen resilience against modern cyber challenges.
10 AM CTF Open
Get your FLAG on!

Session 2
AI & Security
Exploring the intersection of AI and cybersecurity, this conference delves into leveraging AI for threat detection, risk management, and automated response. Topics include combating AI-driven attacks, ethical considerations, and integrating AI into secure systems, offering actionable insights for safeguarding digital landscapes in an era of advanced technological challenges.
Morning Break
Save room for lunch!

Session 3
Resiliency
Learn to create a comprehensive Resiliency Program combining an Incident Response Plan (IRP) with Business Continuity and Disaster Recovery (BC/DR) strategies. Topics cover crisis management, operational recovery, and minimizing downtime. Equip your organization to withstand disruptions, safeguard critical assets, and maintain seamless operations in today’s unpredictable threat landscape.
Lunch
Enjoy Lunch :)

Session 4
Data Protection & Privacy
Explore building an effective Data Protection and Privacy Program to safeguard sensitive information and ensure compliance. Topics include GDPR, CCPA, data classification, encryption, breach response, and fostering a privacy-first culture. Gain insights into aligning security and privacy practices to protect assets, build trust, and navigate complex regulatory landscapes.

Session 5
Compliance
Delve into developing a robust Audit and Compliance Program to meet regulatory requirements and industry standards. Topics include internal audits, risk assessments, control frameworks, and maintaining compliance with PCI, ISO, SOC, and other standards. Learn best practices to enhance accountability, mitigate risks, and build confidence with stakeholders and regulators.
Afternoon Break
More Great Food!

Session 6
Endpoint, Cloud, Network Security
Explore strategies for securing endpoints, cloud environments, and networks in a rapidly evolving threat landscape. Topics include endpoint detection and response (EDR), cloud security posture management (CSPM), zero trust architecture, and advanced network defenses. Gain actionable insights to fortify critical infrastructure and protect against sophisticated cyber threats.
TBD (Pending) Happy Hour
Pending Vendor Sponsor