Top of Page

(ISC)² Releases Conference Program for its Sixth Annual Security Congress

The event offers over 80 educational sessions designed to transcend all industry sectors, focus on challenges facing cybersecurity leaders

      Clearwater, FL, May 25, 2016 – (ISC)²® (“ISC-squared”) today released the full education program and speaker line-up for its sixth annual Security Congress, taking place September 12-15, 2016 at the Orange County Convention Center in Orlando, FL. (ISC)² Security Congress will be co-located with the ASIS International 62nd Annual Seminar and Exhibits, joining together 20,000 professionals from around the world for four days of education, and networking. The complete co-located program can be viewed in the show planner.

“Continuing education is a key component of success for cybersecurity professionals today,” says (ISC)² CEO David Shearer. “Security Congress provides attendees with over 80 sessions, a members-only town hall meeting, Career Pavilion, casual networking events and more. We’ve introduced two new tracks this year to provide attendees with even more of the educational content they desire. I look forward to welcoming our members and international security professionals alike to our sixth annual event.”

This year’s conference tracks include: Application Security/Software Assurance; Cloud Security; Forensics; Governance, Regulation and Compliance; Incident Response; Malware; Mobile; People-Centric Security; Professional Development; Swiss Army Knife; Threats – Inside & Out; and Threat Intelligence.

Notable sessions and speakers include:

--Application Security – John Overbaugh, CISSP, chief information security officer, CyberVista: “Building a Secure Development Lifecycle on a Shoestring Budget”

--Cloud – Anthony Freed, director of corporate communications,; Dave Lewis, CISSP, global security advocate, Akamai Technologies; Adrian Sanabria, senior security analyst, 451 Research; Tim Prendergast, CISSP, CEO, “Securing Your Public Cloud Infrastructure”

--Forensics – Andrew Neal, director, Forensics Technology & Consulting, TransPerfect Legal Solutions; David Andriulli, digital forensics manager, TransPerfect Legal Solutions: “Internal Investigations - Finding the Digital Evidence” 

--Governance, Regulation and Compliance – James Dawson, director of forensic technology, KPMG: “Governance Risk – Where Privacy Fits within Data Lifecycle” 

--Incident Response – Lucie Hayward, CISSP, managing consultant, Cyber Investigations, Kroll; Michael Quinn, associate managing director, Cyber Investigations, Kroll: “It's Not if but When: Creating Your Incident Response Plan” 

--Malware – Timothy Slaybaugh, CISSP, senior forensics analyst, Harris Corp: “Your Money is My Money: Dynamics of a Banking Trojan” 

--Mobile – Kevin McNamee, CISSP, director, Threat Intelligence Lab, Nokia: “Malware Activity in Mobile Networks – an Insider View” 

--People-Centric Security – Bruce deGrazia, CISSP, program chair, Cybersecurity, The Graduate School, University of Maryland University College: “Your Next CISO Should be a Lawyer” 

--Professional Development – Kevin Flanagan, CISSP-ISSMP, director, RSA; David Shearer, CEO, (ISC)2; Deidre Diamond, founder & CEO, Cyber Security Network;  Anne Saita, editor, Infosecurity Professional Magazine: “Hiring, Building and Retaining Top Security Talent” 

--Swiss Army Knife –  Sandra Bittner, CISSP, senior engineer and cyber security specialist, PVNGS Cyber Security, Arizona Public Service/Palo Verde Nuclear Generating Station: “Defending Industrial Control Systems in Critical Infrastructure” 

--Threat Intelligence – Aamir Lakhani, CISSP, founder, Dr. Chaos: “Zero Touch Hacking – Exposing Data Using Open Source Intelligence” 

--Threats – Mike Landeck, CISSP, senior product security strategy consultant, CyberSecology: “Ripped from the Headlines: Demonstrations of the Year’s Top Breaches” 

(ISC)² members are eligible for special discounted pricing and will be able to attend any of the ASIS events, including keynotes, networking lunches and educational sessions. Early registration rates are available until July 31. More details are available at    

# # #

About (ISC)²® 
Formed in 1989, (ISC)² is the largest nonprofit membership body of certified cyber, information, software and infrastructure security professionals worldwide, with over 114,000 members in more than 160 countries. Globally recognized as the Gold Standard, (ISC)² issues the Certified Authorization Professional (CAP®), Certified Cyber Forensics Professional (CCFP®), Certified Cloud Security Professional (CCSP®), Certified Information Systems Security Professional (CISSP®) and related concentrations, Certified Secure Software Lifecycle Professional (CSSLP®), HealthCare Information Security and Privacy Practitioner (HCISPP®) and Systems Security Certified Practitioner (SSCP®) credentials to qualifying candidates. (ISC)²’s certifications are among the first information technology credentials to meet the stringent requirements of ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel. (ISC)² also offers education programs and services based on its CBK®, a compendium of information and software security topics. More information is available at 


© 2016, (ISC)² Inc., (ISC)², CAP, CCFP, CCSP, CISSP, CSSLP, HCISPP, SSCP and CBK are registered marks  of (ISC)², Inc.



Media Contact

Amanda D'Alessandro
Manager, Global Communications