As cloud adoption continues to accelerate, so too does the complexity of securing modern digital environments. Multi‑cloud architectures, evolving regulatory requirements, and the rapid integration of artificial intelligence are reshaping how organizations must think about risk, governance and resilience.

To help cybersecurity professionals stay ahead of these challenges, ISC2 is hosting a Spotlight on Cloud Security, a free, two‑day virtual experience designed to deliver strategic insight and actionable guidance for organizations.

ISC2 members can earn up to 5.5 CPE credits for free at this two-day virtual event, ISC2 Spotlight on Cloud Security, on April 28-29 starting at 10:00 a.m. ET, register now.

Join your fellow ISC2 Members, Associates and Candidates for an exclusive event that brings together industry leaders, practitioners and solution experts to explore how cloud security strategies must evolve in response to AI‑driven threats, growing identity complexity and an increasingly borderless enterprise.

Why Cloud Security Demands a New Approach

Traditional perimeter‑based security models are no longer sufficient in environments where cloud services dynamically scale, identities outnumber people and attack speeds exceed human response times. Today’s cybersecurity leaders must assume breach, design for resilience and embed trust principles at every layer of the cloud stack.

Throughout the event, speakers will address the strategic shift required to secure cloud environments, not just through better tools, but through adaptive governance models, zero trust principles and human‑led decision‑making supported by automation. Sponsored sessions led by industry partners will explore practical approaches to securing cloud environments at scale. These sessions are designed to bridge strategy and execution, offering insight into modern tooling, governance frameworks and operational best practices aligned with today’s shared responsibility models.

Event Agenda Highlights

The Imperative of Resilience: Governing the AI‑Cloud Nexus

The event opens with a session examining how artificial intelligence is fundamentally altering the cybersecurity landscape. Drawing from leadership experience at the FBI and Google Cloud, this session reframes security as a technical condition and resilience as a strategic mandate. Attendees will explore why cloud security can no longer rely on “fortress” thinking and how assumed breach and elastic defense models are becoming essential for survival in an AI‑driven environment.

M.K. Palmore, CISSP, Founder and Principal Advisor, Apogee Global RMS

Securing Data in the Age of AI with DSPM – Sponsored by Netwirx

Artificial intelligence (AI) is rapidly reshaping how organizations create, access and share data, but it also amplifies long-standing risks around oversharing, misconfigured permissions and shadow data. This session will examine how Data Security Posture Management (DSPM) provides a structured approach to mitigating these risks by delivering visibility, classification, monitoring and automated remediation across cloud and hybrid IT environments.

Martin Cannard, Field CTO, Netwirx

Converging Cloud Security into the Modern SOC – Sponsored by Palo Alto Networks

As organizations increasingly migrate critical assets to the cloud, the need for a unified platform combining cloud security and SOC operations becomes essential. This session will discuss how integrating these functions not only enhances operational efficiency and effectiveness, but also significantly improves security across your entire digital footprint.

Join this session to explore:

  • The evolving threat landscape and the current demands on security leaders regarding cloud security
  • Identifying and understanding the key obstacles hindering effective security and why organizations struggle to overcome them
  • Strategies for breaking down the silos between DevOps, cloud security and the SOC
  • A glimpse into the daily life of a security engineer addressing cloud-focused vulnerabilities and attacks

Matthias Maier, Manager, Domain Consultants – Security Operations Transformation, Palo Alto Networks

Securing AI Applications: Understanding the New Attack Surface – Sponsored by Wiz

AI hasn’t just changed how we build; it’s fundamentally reshaped the attack surface. Today’s AI applications are dynamic, interconnected systems spanning models, data pipelines, agents and cloud infrastructure - introducing new and often invisible paths for risk. 
 
In this session, we’ll break down where risk exists across modern AI applications and why traditional security approaches fall short. You’ll learn how leading teams are evolving their approach to gain end-to-end visibility, prioritize real risk, and protect AI systems across code, cloud and runtime. We’ll also explore how to move beyond fragmented tooling to better understand attack paths, reduce noise and secure AI at the speed it’s built.

Snegha Ramnarayanan, Manager, Product Marketing, Wiz

Who Should Attend?

This free virtual event is open to cybersecurity professionals at every career stage who are ISC2 members, candidates and associates. Whether you are responsible for governance, architecture, identity, risk or operations, the sessions are designed to deliver insights you can apply immediately within your organization.

Not yet a member? Cybersecurity professionals can register as an ISC2 Candidate to gain complimentary access to the event and its on‑demand recordings.

Earn CPEs and Engage with the Community

In addition to expert education, attendees will have the opportunity to engage with peers from around the world, exchange lessons learned and earn up to 5.5 ISC2 CPE credits. Credits are automatically added to member profiles within two weeks following the event.

Register Today

Cloud security is no longer about preventing every breach—it’s about preparing for disruption, responding with speed and building systems that adapt under pressure. Join ISC2 for the Spotlight on Cloud Security and gain the insight you need to strengthen resilience across your cloud environment.

Pre‑registration is required. Secure your spot and stay ahead of the evolving cloud threat landscape.

Register now for the two-day virtual event.

Related Insights