Call For Speakers

If you’re able to deliver value to our members and guests in one or more of the following areas, please contact us.

Our intention for speakers is to educate everyone from expert to novice while keeping it entertaining and interesting for everyone.

1. Networking opportunities

2. Staying abreast of trends in information security:

  • insight into cloud
  • seeing abreast of threats
  • threat vectors
  • how threats change
  • staying in front of different threats
  • getting a handle on how to control or understand the kill chain

3. Enabling consultants to tell clients:

  • what they should be looking for
  • so they can make the best choice of where to put their available information security funds
  • what they should be protecting against
  • how to protect themselves
  • How to assess third-party risk

4. Enabling security analysts to know:

  • Where to be looking out
  • Where to go threat hunting
  • What you’ve learned from different threats in the past
  • What kind of technology investment or training is most valuable
  • What 3rd party tools are worth more consideration
© Copyright 2024, (ISC)² Austin Chapter. All Rights Reserved. (ISC)², CISSP, SSCP, CAP, ISSAP, ISSEP, ISSMP, CSSLP, HCISPP and CBK are registered certification, service, and trademarks of International Information System Security Certification Consortium, Inc.

Disclaimer: (ISC)² does not own, operate, or moderate this website. All content of this site, exclusive of licensed trademarks and trade dress is the property of (ISC)² Austin Chapter, which is not owned, managed, or controlled by (ISC)² and operates independent of (ISC)².”