North Texas ISSA's 12th Annual Cybersecurity Conference

Friday, September 6th, 2024
From 8:00 am - 4:30 pm

Plano Events Center

Artificial Intelligence
Opportunities, Risks, and Challenges

This track explores artificial intelligence in cybersecurity, examining its opportunities, risks, and challenges to provide a comprehensive understanding of AI's broad impact.

Securing the Digital Frontier
Data Protection and Privacy Strategies 

This track delves into data protection and privacy strategies, focusing on innovative approaches to safeguarding information in an increasingly digital world.

Leading the Change
Strategies for Effective Leadership

This track explores effective leadership strategies, offering insights and tools for dynamic and impactful leadership in various organizational contexts.

Beyond Boundaries
Securing the Edge in a Borderless Network

This track investigates the challenges and solutions for securing edge computing within borderless networks, emphasizing the need for robust, adaptable security frameworks.

Mentorship Matters Cultivating
Leadership and Growth & Student Track

This track  explores innovative strategies for integrating security seamlessly into the development process, enhancing protection without sacrificing speed or agility.

Securing the Core
Fortifying Assets in a Connected World 

This track focuses on cutting-edge strategies for safeguarding IoT and OT assets, navigating through the complexities of a threat-rich environment to enhance system resilience and security.

Protecting & Expanding Access
Remote Work & Supply Chain Security

This track focuses on cutting-edge strategies for safeguarding IoT and OT assets, navigating through the complexities of a threat-rich environment to enhance system resilience and security.

Mastering Cloud Security
Strategies for Securing the Cloud

This track examines topics such as advanced threat detection, cloud compliance best practices, securing hybrid cloud environments, cloud identity management,  and incident response strategies tailored to cloud infrastructures

Hacker's Haven
By Phillip Wylie

"Hackers' Haven" offers a dynamic, hands-on environment where cybersecurity enthusiasts can test their skills, explore vulnerability exploitation, and collaborate on real-world security solutions.