top of page

Cybersecurity Practitioners Event
"CPE"

Welcome.  With you support and attendance, this event will be one not to miss.

Register and take advantage of the Early Bird deal.

​

PLEASE DO NOT CALL THE VENUE. 

THEY WILL NOT HAVE INFORMATION TO PROVIDE YOU.

​

FOR INFORMATION CONTACT US AT EVENTS@ISC2CT.ORG

Agenda and Timeline
Subject to Change

eggs breakfast buffet_edited_edited.jpg
BlankImage1.png

Session 1

Risk Management

Discover strategies for building a robust Cyber Risk Management Program, integrating Third-Party Risk Management (TPRM) to address evolving threats. Topics include risk assessment frameworks, vendor security, compliance, and embedding risk insights into decision-making. Gain actionable solutions to protect assets, ensure regulatory alignment, and strengthen resilience against modern cyber challenges.

10 AM CTF Open

Get your FLAG on!

BlankImage1.png

Session 2

AI & Security

Exploring the intersection of AI and cybersecurity, this conference delves into leveraging AI for threat detection, risk management, and automated response. Topics include combating AI-driven attacks, ethical considerations, and integrating AI into secure systems, offering actionable insights for safeguarding digital landscapes in an era of advanced technological challenges.

Morning Break

Save room for lunch!

BlankImage1.png

Session 3

Resiliency

Learn to create a comprehensive Resiliency Program combining an Incident Response Plan (IRP) with Business Continuity and Disaster Recovery (BC/DR) strategies. Topics cover crisis management, operational recovery, and minimizing downtime. Equip your organization to withstand disruptions, safeguard critical assets, and maintain seamless operations in today’s unpredictable threat landscape.

Lunch

Enjoy Lunch   :)

BlankImage1.png

Session 4

Data Protection & Privacy

Explore building an effective Data Protection and Privacy Program to safeguard sensitive information and ensure compliance. Topics include GDPR, CCPA, data classification, encryption, breach response, and fostering a privacy-first culture. Gain insights into aligning security and privacy practices to protect assets, build trust, and navigate complex regulatory landscapes.

BlankImage1.png

Session 5

Compliance

Delve into developing a robust Audit and Compliance Program to meet regulatory requirements and industry standards. Topics include internal audits, risk assessments, control frameworks, and maintaining compliance with PCI, ISO, SOC, and other standards. Learn best practices to enhance accountability, mitigate risks, and build confidence with stakeholders and regulators.

Afternoon Break

More Great Food!

BlankImage1.png

Session 6

Endpoint, Cloud, Network Security

Explore strategies for securing endpoints, cloud environments, and networks in a rapidly evolving threat landscape. Topics include endpoint detection and response (EDR), cloud security posture management (CSPM), zero trust architecture, and advanced network defenses. Gain actionable insights to fortify critical infrastructure and protect against sophisticated cyber threats.

TBD (Pending) Happy Hour

Pending Vendor Sponsor

©2024 by ISC2 Connecticut Chapter and ISC2 Eastern Massachusetts Chapter.  (ISC)² Inc., All Rights Reserved. (ISC)², CISSP, SSCP, CCSP, CAP, CSSLP, HCISPP, CCFP, CISSP-ISSAP, CISSP-ISSEP, CISSP-ISSMP and CBK are registered marks of (ISC)², Inc.

Disclaimer: (ISC)² does not own, operate, or moderate this website or material. All content of this site and material, exclusive of licensed trademarks, trade dress, required website format, is the property of (ISC)2 Connecticut Chapter and ISC2 Eastern Massachusetts Chapter, which is not owned, managed, or controlled by (ISC)² and operates independent of (ISC)².

bottom of page