Safeguarding the connected infrastructure that allows data to flow effectively between systems, services and users is a critical function in protecting organizations from data breaches, malware infections and more.

ISC2 Security Congress 2024 dives into the latest trends and technologies shaping network security, providing attendees with strategies and insights to strengthen their network defenses.

Key Trends in Network Security

As the digital landscape evolves, cybersecurity professionals face a dynamic set of challenges and opportunities in network security. Emerging technologies, sophisticated threat vectors and the growing interconnectedness of devices require a proactive approach to safeguarding digital assets. Some of the trends shaping network security include:

  • Artificial Intelligence (AI): AI is revolutionizing network security by enabling faster threat detection and response. AI-powered tools can analyze vast amounts of network traffic in near-real-time, identifying patterns indicative of attacks. This allows for swift action and minimizes potential damage. Additionally, AI can automate routine security tasks, freeing human analysts to focus on more complex threats.
  • Quantum Computing: While still nascent, quantum computing has profound implications for network security. Its computational power could potentially break current encryption algorithms, jeopardizing sensitive data. However, quantum computing also offers the promise of unbreakable encryption methods through quantum cryptography. ISC2 Security Congress will explore both the challenges and opportunities presented by this emerging technology.
  • Zero Trust Architecture (ZTA): The traditional network security model, which relies on a trusted perimeter, is increasingly ineffective against modern threats. ZTA offers a more robust approach by eliminating the concept of inherent trust. Instead, every user and device, regardless of location, must be continuously challenged, authenticated and authorized. This approach significantly reduces the risk of lateral movement within a network, even if an attacker gains initial access.

Sessions and Speakers at ISC2 Security Congress 2024

ISC2 Security Congress 2024 will feature an array of expert speakers and in-depth sessions that will delve into the evolving network security landscape.

Jason O'Dell
Jason O'Dell

BS Global VP, Security Operations Walmart, United States

Beyond Red vs. Blue: The Power of Collaborative Security Testing with Purple Teaming

Many organizations struggle to unlock the full potential of purple teaming: a collaborative approach to security testing. This session will share how a Fortune 100 company has integrated red and blue teams into a unified purple team, enhancing their security posture. Learn how to break down silos, foster communication, and establish a successful purple team program.

Vincent C. Romney
Vincent C. Romney, CISSP, CCSP, CSSLP

Deputy CISO, Nu Skin Enterprises, United States

Zero Trust Architecture: Is Real World Implementation Even Possible?

Implementing ZTA in an existing enterprise environment is a complex undertaking. Drawing from real-world experiences, this session will delve into the challenges and key considerations of ZTA implementation. You will learn how to assess their IT ecosystem, prioritize ZTA implementation areas, and evaluate solutions to move towards a Zero Trust model.

Kyle Hinterberg
Kyle Hinterberg, CISSP

Senior Manager LBMC, PC, United States

Decoding Deepfakes: AI's Dual Role in Digital Deception and Detection

Explore the dual role of AI in the creation and detection of deepfakes. You will gain insights into the latest AI techniques used in deepfake technology, the ethical implications of deepfakes, and proactive cybersecurity strategies to combat them. Providing a critical analysis of AI's impact on digital integrity, this session will highlight the need for ethical vigilance in the digital age.

Glendon Schmitz
Glendon Schmitz, CISSP

Chief Information Security Officer Virginia Department of Behavioral Health and Development Services, United States Co-Speaker(s)

Glendon Schmitz
Angus Chen, MBA, M.S.

Director of Cybersecurity Data Science Binary Defense, United States

Quantum: What's the Big Deal? Quantum Computing & Its Security Implications

The rapid advancement of quantum computing presents a looming threat to current encryption methods, ushering in the era of "Steal Now, Decrypt Later." This session will equip you with an understanding of quantum computing's impact on cybersecurity and the immediate actions needed to safeguard their organizations against future threats. Learn how to develop a post-quantum roadmap, identify quantum-safe encryption algorithms, and build crypto agility.

View all the sessions on software security at ISC2 Security Congress here.

Stay Ahead of the Curve

Network security is an ever-evolving field, demanding vigilance and adaptation to contend with both changing threats and new technology. ISC2 Security Congress 2024 offers you a unique opportunity to stay ahead of the curve and protect your organization from the threats of today and tomorrow.

Enhance your network security skillset at ISC2 Security Congress 2024.