Become a Guest Speaker with ISC2 Annapolis Junction
Share your expertise. Elevate the profession. Inspire the next generation of cybersecurity leaders.
Our chapter is proud to host engaging speakers who bring fresh insight, real-world experience, and thought leadership to our events. Whether you're a seasoned professional, researcher, or rising voice in the cybersecurity space, your perspective could be exactly what our members need.
By volunteering as a guest speaker, you'll have the opportunity to connect with a vibrant community of security professionals, give back to the industry, and earn Continuing Professional Education (CPE) credits if you're an ISC2 certification holder.
Why Speak with Us?
- Position yourself as a thought leader in the cybersecurity community
- Educate and empower professionals across roles and industries
- Grow your network through real-time interaction and visibility
- Earn CPE credits for eligible presentations (as per ISC2 guidelines)
- Contribute to knowledge-sharing in areas like cloud security, compliance, AI/ML, risk management, and more
Topics of Interest
We're especially interested in speakers who can address:
- Security and Risk Management
- Building an Enterprise Risk Management Program
- Privacy Laws Around the World: GDPR, HIPAA, CCPA
- Ethics in Cybersecurity: Navigating the Gray Areas
- Security Policies That Drive Action (Not Just Compliance)
- Governance in the Public Sector: Balancing Mission and Risk
- Asset Security
- Data Classification and Handling in Multi-Cloud Environments
- Secure File Sharing and Collaboration: Risks and Controls
- Student Data Protection: FERPA, PII, and School Systems
- What Happens to Your Data? Retention, Destruction & Legal Risk
- Security Architecture and Engineering
- Zero Trust Architecture: Real-World Implementation Lessons
- Cryptography That Works: What's Still Relevant in the years ahead
- Secure Software Architecture for Banking and Finance
- Cloud Architecture Security: Misconfigurations and Prevention
- Smart IOT City and Campus Architecture: Where Innovation Meets Risk
- Communication and Network Security
- Network Segmentation in School Districts and Testing Platforms
- TLS, VPNs and IPSec: Securing Communications in Transit
- DNS and BGP Attacks: Internet Backbone Threats
- Wireless Network Security
- Network Security in Banking Infrastructures: Payment Systems, ATMs and Core Platforms
- Identity and Access Management (IAM)
- Federated Identity: OAuth, SAML, and OpenID in Large Institutions
- MFA Fatigue and Adaptive Access Control
- Identity Management in Schools and EdTech Platforms
- Social Media Authentication & Privacy Controls
- Privileged Access Management in Financial Systems
- Security Assessment and Testing
- Vulnerability Management
- Red Team/ Blue Team Exercises
- Pen Testing
- Secure Code Testing
- Security Operations
- Incident Response
- Threat Monitoring
- SOCs
- Ransomware Attacks: Lessons and Prevention
- Payment Fraud Detection and Anti-Money Laundering Tools
- Software Development Security
- DevSecOps in Regulated Environments
- OWASP Top 10
- Supply Chain Security
- API Protection
- Emerging and Industry Specific Topics
- Automotive Cybersecurity & Connected Vehicle Threats
- Industrial Control Systems and SCADA Risk Management
- Social Media Security
- Human Behavior & Social Engineering
- Social Engineering
- Phishing
- Insider Threats
- Security Awareness
- Psychology of Fraud and Digital Deception
- Current Threat Landscape & Strategic Topics
- Deepfakes and AI
- Geopolitics and Global Cyber Threats
- Cybercrime-as-a-Service
- Public-Private Partnerships in Cybersecurity Preparedness
- Email Compromise
- Leadership and Career
- Cybersecurity Careers
- Public Speaking for Cyber Leaders
- Mentorship as a Cyber Strategy
- ISC2 Testing
- Certification Exam Preparation
- Building a Personal Study Plan
- Understanding the CAT Format: How Computerized Adaptive Testing Works
- Time Management and Test-Taking Strategies for ISC2 Exams
- Demystifying the CISSP Exam
- Choosing the Right Certification for Your Career Path
Who Can Apply
We welcome:
- Certified ISC2 members and non-members
- Security leaders, practitioners, educators and researchers
- Professionals from public and private sectors, academia, nonprofits
- Authors, CEOs, Managers, Students
Opportunities to Speak
- Monthly and ad-hoc chapter meetings (virtual or in-person)
- Special events and panels
- Workshops and study group sessions