What to expect from (ISC)2 Security Congress

Disney World Florida plays host to one of the year's biggest cyber security conferences

When thinking about the end of October, most people's minds turn to a light-hearted dose of fear topped off with an unreasonable amount of sweets. But, preceding the pumpkins, face paint and the inevitable sugar crashes, I've signed up for three days of talks on the real threats out there at the annual (ISC)2 Security Congress, held this year at Disney World Florida.

While I'm not expecting to learn much from Donald and Mickey (although I absolutely will track them down for a selfie), with more than 175 sessions on the cards I'm banking on hearing some interesting talks.

Opening the proceedings is Captain "Sully" Sullenberger, the American aviator best known for "the miracle on the Hudson" when he safely crash-landed a plane on the Hudson River after an engine failure in 2009 , saving the lives of all 155 passengers. What he can tell me about cyber security remains a mystery, but it's quite a headline act, nonetheless.

What I'm excited to get my teeth stuck into are the thought leadership sessions, in which I'm hoping to learn more about the challenges facing cyber security professionals and what tomorrow's cyber attacks might look like. For example, one session on the opening day, shortly after Sully's keynote, is focused on how security teams should be implementing honeypots and machine learning to automate the search for attacks.

One aspect of the topic-rich show I'm especially looking forward to is the focus on human factors and how attackers can exploit behaviours of businesses and their employees. One talk I'm eager to catch is based on how security awareness professionals can learn from the behavioural principles used to explain Fortnite's supremacy in the gaming sector and build enterprise-ready awareness programs based on these.

Elsewhere, the security of Internet of Things (IoT) devices seems to still be a hot topic, there are so many talks about securing endpoints and smart devices. Smatterings of 5G and all-things Industry 4.0 naturally follow suit but there are also sessions for those interested in cloud, cyber crime, legislation and many more.

Away from the seriousness, there's also some grown-up playtime too. (ISC)2 has put on some cyber security-themed escape rooms for attendees to test their infosec mettle. With two different scenarios on offer, I'll certainly try to find the time to give my problem-solving skills a workout while the other, more adept attendees take part in Panoply a risk-free red/blue team exercise.

Fun and games aside, you can think of (ISC)2 as the grown-up version of Black Hat; an industry-leading event that always attracts top speakers and fascinating talks just without all the attendees trying to hack each others' FitBits. The congress is definitely a must-attend for cyber security professionals and even more so for budding infosec specialists. For those of you who can't make it this year, though, be sure to check back regularly for all the news and insights I can bring you from the show.

Featured Resources

Four cyber security essentials that your board of directors wants to know

The insights to help you deliver what they need

Download now

Data: A resource much too valuable to leave unprotected

Protect your data to protect your company

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

Recommended

What is cloud-to-cloud backup?
cloud backup

What is cloud-to-cloud backup?

25 Nov 2020
What is phishing?
phishing

What is phishing?

25 Nov 2020
NCSC urges firms to patch against MobileIron vulnerability
Security

NCSC urges firms to patch against MobileIron vulnerability

25 Nov 2020
2FA bypass flaw on cPanel threatens the security of 70 million domains
Security

2FA bypass flaw on cPanel threatens the security of 70 million domains

25 Nov 2020

Most Popular

46 million Animal Jam accounts leaked after comms software breach
Security

46 million Animal Jam accounts leaked after comms software breach

13 Nov 2020
macOS Big Sur is bricking some older MacBooks
operating systems

macOS Big Sur is bricking some older MacBooks

16 Nov 2020
How computing has revolutionised Formula 1
Sponsored

How computing has revolutionised Formula 1

11 Nov 2020