CSX North America 2017 


Got something to share?
Know how to present it?

Industry experts, thought-leaders and passionate professionals willing to share their experiences and knowledge with their colleagues and peers sought for this year's CSX Conference.

Get creative. Create change.
Get recognized.

Click Here for Details




See Video Highlights from the CSX 2016 North America Conference! Watch Now

Attend the Cyber Security Event Designed for You

Be a part of the dynamic and collaborative learning atmosphere at CSX 2017 North America. Interacting with attendees from around the world offers you the unique ability increase your expertise and gain hands-on knowledge in this fast-moving profession. Show your passion and dedication to this field and register today for this innovative event!

Why Should I Attend CSX 2017?

CSX 2017 will help you stay on top of the latest cyber security trends, further your cyber career, and make new connections with professionals across the continent.

  • Cyber security doesn’t take holidays and it doesn’t sleep. You need to be aware of the latest tactics, tools and insights. CSX 2017 offers keynote speakers and sessions that dive deep into what you need to know now.
  • There is a critical shortage of skilled cybersecurity workers. At CSX 2017, you can gain skills to take back and add value to your enterprise immediately.
  • Sharing experience and knowledge is vital for effective cyber protection. Enjoy the many opportunities to network and share experiences with global colleagues at CSX 2017.

Make plans now to join the thought (and action) leaders in cyber security from 2-4 October 2017 in Washington DC, the hub of business and government. This is a great opportunity to amplify your knowledge and earn up to 32 CPE hours!

Brought to you by ISACA’s globally respected Cybersecurity Nexus™ (CSX), which is dedicated to helping professionals like you build timely knowledge and effective cyber skills. #CSXNA

Register Now

The first 200 professionals to register save $200!

Be part of this one-of-a-kind experience:

“Great opportunity to network…will attend again!”
“Relevant info with practical examples”
“Great value…top notch keynotes!”


Countdown to
CSX 2017 North America



Earn up to 32 CPE hours by attending this conference.


Marriott Wardman Park Hotel

Stay in the Heart of the
Conference Action at the
Marriott Wardman Park Hotel

See the Event Destination tab for more information.

 Marriott Wardman Park Hotel

Follow @ISACANews and join the CSX 2017 North America conversation by using the hashtag #CSXNA.
Like ISACA on Facebook to stay informed.
Follow @ISACANews on Instagram to see behind the scenes photos of the conference.
Follow ISACA’s Company page on LinkedIn for updates.

View 2106 CSX North America Presentations

Join us for high-impact sessions uniquely built around a multitude of cyber tracks. CSX sessions provide unique opportunities to learn from top experts in the field. Each track is offered in 2 levels of complexity: Essential and Advanced. At CSX 2017 North America you will find an unparalleled degree of customization for your conference education experience.

  • Identify
  • Protect
  • Detect
  • Respond
  • Recover
  • Defend
  • Explore

  CSX 2016 North America Program

  CSX 2016 North America Conference Report

As the program is developed, we will continue to add information to this page – check back frequently for updates!



Continuing Professional Education Credits

To maintain ISACA certifications, certification holders are required to earn 120 CPE credit hours over a three-year period in accordance with ISACA’s continuing professional education (CPE) policy. Attendees can earn up to 32 CPE credits; 18 by attending CSX 2017 North America, 14 for the pre-conference and an additional 7 CPE credits for attending post-conference events. ISACA conferences are Group Live and do not require any advanced preparation.

ISACA is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site:  www.learningmarket.org.

Please note that the session scanners at the Conference do not track CPE credit hours. You will still need to allocate your CPE hours in “My ISACA” following the conference. Certificates of Attendance will be accessible via your MyISACA account. To view your certificate, log into your account and navigate to the “myDOWNLOADS & CERTIFICATES” tab. There you will find a “MY CPE CERTIFICATES” section where all of your ISACA event CPE Certificates will live.

Your Certificate of Attendance details the maximum number of CPE hours you could have earned by attending this event. CPE policies for each ISACA certification, as well as details on how to report your CPE hours, are available here on ISACA’s website. Reporting can also be done by submitting information on the annual renewal invoice.

Conference Registration Fees

Act quickly and take advantage of our $200 for 200 promotion!*

The first 200 people to register and pay in full for the conference will automatically receive $200 off of the standard registration rate. Don’t delay – this offer won’t last long!

Register and pay before 11:59 PM CT (midnight) on Monday, 25 September 2017
Member US $1,750 Non-member US $1,950

Register and pay after 12:00PM CT (noon) on Monday, 2 October 2017
Member US $1,950 Non-member US $2,150

Cybersecurity Fundamentals Workshop
Member: US $850 Non-Member: US $1,050

Two-day Workshops
Member: US $1,150 Non-Member: US $1,350

Cancellation Deadline:

1 September 2017


Registration and Payment Policy

Registration submissions for this conference and any additional workshops are not processed, and a seat is not confirmed or reserved, until full payment is received. All submissions not paid in full will be placed on a waitlist and priority will be given to paid registrants in a payment first-come, first-serve basis. Space is limited, so it is highly recommended that payment is provided at the time of submission to guarantee a seat within the conference and all related events.

Registration rate is determined based on the date payment is received by ISACA HQ and current membership status. Please plan accordingly, as it may take 10 or more business days for a wire transfer or mailed check to reach ISACA. Should we receive payment after a registration rate deadline, your account will be adjusted to reflect the current due amount. Entrance to the conference and all related events is contingent upon full payment.

Discounts for the CSX Conference are available, detailed below. In order to verify eligibility for any of these discounts, please contact https://support.isaca.org or +1.847.660.5670. Note that discounts cannot be credited to you after the transaction has been completed.

Group Discounts

ISACA offers discounts to organizations sending 4 or more employees to a single conference. Please contact the ISACA Conference department for more details at +1.847.660.5670 or https://support.isaca.org.

Government Discounts

ISACA offers a $350 conference registration discount to government employees. The discount applies to the main conference registration rates and can be used in conjunction with any early-bird registration discounts available. Please contact the ISACA Conference department for more details at +1.847.660.5670 or https://support.isaca.org.

Academic and Student Discounts

ISACA offers a $350 discount to academic institution employees and students. This discount can be applied to the main conference registration only, and is not applicable toward any pre- or post-conference workshops. Please note that you must be an ISACA Student member in order to receive the student discount; additional membership and qualification details can be found here. For additional registration details, please contact ISACA’s Conference Department at +1.847.660.5670 or https://support.isaca.org.

Cancellation Policy

All cancellations must be received by the published deadline to receive a refund of registration fees. A cancellation charge of US $100 will be subtracted from conference refunds, and US $50 per workshop from workshop refunds. No refunds can be given after the date specified. Attendee substitution is permitted at any time until the conference. If a nonmember is substituting a member, then there will be additional nonmember fees.

NOTE: Registration is contingent upon full payment of the registration fee. To guarantee registration, conference fees must be received by the published deadline. It may take 10 or more business days for a wire transfer or mailed check to reach ISACA, so please plan accordingly. If, for any reason, ISACA must cancel a course or event, liability is limited solely to the registration fees paid. ISACA is not responsible for other expenses incurred, including travel and accommodation fees. For more information regarding administrative policies, please contact the ISACA conference department.
Phone: +1.847.660.5670
Fax: +1.847.253.1443
E-mail: https://support.isaca.org


Payment Methods

  1. Pay online at www.isaca.org/invoices
  2. Mail your payment to:
    1055 Paysphere Circle
    Chicago, IL 60674 USA
  3. Bank Wires—send electronic payments in US dollars to:
    Bank of America
    135 S. LaSalle St.
    Chicago, IL 60603
    ABA #0260-0959-3
    ISACA Account #22-71578
    S.W.I.F.T. code BOFAUS3N
    * Please include attendees name on the Advice of Transfer.


ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to ISACA as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.

Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.

Not a member of ISACA? Join today!

When you register for the conference as a nonmember, the difference between member and nonmember conference fees can be applied towards ISACA membership. This means you can become a member at the international and chapter level for little to no additional cost; it just depends on your local chapter dues. To take advantage of this great offer, check the box on the registration form. For more information about ISACA membership, visit the web site at www.isaca.org/membership or contact the membership department at membership@isaca.org.

NOTE: This offer expires 30 days after completion of the event. Nonmembers pay the nonmember conference fee when registering.

Permission to be Photographed

By attending this event, the registrant grants permission to be photographed and videotaped during the event. The resultant photographs and videos may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site, in social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs and videos will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs or videos now or in the future.


Business casual is appropriate for this and all ISACA conference events.

Conference Venue

Marriott Wardman Park Hotel

2660 Woodley Road NW
Washington, District Of Columbia 20008
Phone: +1.202.328.2000
Website: www.marriott.com

An uptown Washington DC hotel at the Woodley Park Metro

Don’t Delay!

Guest rooms include:

  • CSX 2017 North America room rate $255 + Tax
  • Complimentary Wi-Fi ($14.95/day value)
  • Complimentary use of the Fitness Center

Take advantage of specially discounted CSX Cybersecurity Nexus housing rates at the Marriott Wardman Park by clicking HERE or calling Hotel reservations and referencing ISACA’s 2017 North America CSX Conference.

Special Hotel Information
Guest room reservation deadline for these discounted rates is Monday, 11 September 2017, subject to availability. Reservation requests received after the cut-off date will be honored on a space-available and first-request basis at time of reservation.

These special hotel rates are available three days prior to and three days following the main conference dates, subject to availability at time of reservation.

Please note that all guest room reservations are guaranteed by deposit of one night's guest room charges. Cancellations with full refund will be allowed up until 72 hours prior to arrival date.

Why book in the block?

For the best possible experience, ISACA strongly encourages all conference delegates to stay at the host hotel. It is the most convenient location for attendees to be able to participate in all conference activities at a reasonable price. Also, every reservation made for those attending ISACA events will help us to fulfill our commitment to the hotel, which in turn allows ISACA to continue to keep the cost of the conference fees and membership dues as low as possible.

Thank you to our 2016 sponsors!


InteliSecure is the first and only Managed Security Service Provider (MSSP) to challenge the status quo in cybersecurity by delivering a hybrid application of expert human intelligence with a proven Critical Asset Protection Program™ methodology. These innovative Managed services are supported by Consulting, Technical, Incident Response and Security Assessment services that prevent data loss, protect privacy and safeguard critical assets. www.intelisecure.com


Modulo, now a part of the SAI Global family, is and has been a leader in providing IT Risk Management solutions, offering flexible and affordable methods for managing risk, compliance, and business continuity across the enterprise and extended enterprise of vendors. 1,000+ customers leverage our tool to automate workflow; report compliance against regulations, standards, policies; prioritize risk through analytics and business metrics; secure cloud environments; remediate vulnerabilities; and more. www.modulo.com


Vanguard Integrity Professionals provides enterprise security software and services that solve complex security and regulatory compliance challenges for financial, insurance, healthcare, education, transportation and government agencies around the world. Vanguard provides automated solutions for Audit and Compliance, Operational Security, and Intrusion Management. The world’s largest Financial, Insurance, Government Agencies and Retailers entrust their security to Vanguard Integrity Professionals. Vanguard is committed to protecting and securing the Cloud, zOS Security Server and Enterprise environments. Vanguard provides 24/7/365 live customer support from the United States of America. www.go2vanguard.com



Adobe is changing the world through digital experiences. Our creative, marketing and document solutions empower everyone — from emerging artists to global brands — to bring digital creations to life and deliver them to the right person at the right moment for the best results. www.adobe.com


Deloitte Advisory helps clients manage strategic, financial, operational, technological, and regulatory risk to maximize enterprise value, while our experience in mergers and acquisitions, fraud, litigation, and reorganizations helps clients move forward with confidence. www.deloitte.com



For over 30 years, Boldon James has been a leader in data classification and secure messaging solutions, helping organisations of all sizes manage sensitive information securely and in compliance with legislation and standards, in some of the most demanding messaging environments in the world. Boldon James is a wholly-owned subsidiary of QinetiQ plc, a FTSE 250 company, with offices worldwide. www.boldonjames.com


With the award winning Maclear eGRC Suite™, Maclear provides one of the most comprehensive threat and incident management solutions available in the market today. Utilizing powerful analytics and trending, Maclear's methodology helps customers rapidly consume large volumes of threat data from multiple sources. The data is then quickly analyzed and normalized against the customer's risk tolerances and then mapped to specific assets and prioritized for remediation activities. www.maclear-grc.com


RSA provides more than 30,000 customers around the world with the essential security capabilities to protect their most valuable assets from cyber threats. With RSA’s award-winning products, organizations effectively detect, investigate, and respond to advanced attacks; confirm and manage identities; and ultimately, reduce IP theft, fraud, and cybercrime. For more information, go to www.rsa.com.


SolarWinds Risk Intelligence assigns a real dollar value to potential data breaches, and provides ongoing monitoring capabilities, helping to build a strong business case for security. www.solarwinds.com


SSH Communications Security is a leading provider of enterprise cybersecurity solutions that monitor, control, and automate trusted access to critical data. We invented the Secure Shell (SSH) - one of the world’s most widely used network security protocols. Our technology secures the infrastructure of our digital world and runs in over 90 percent of data centers across the world. Demanding customers worldwide trust our flagship Universal SSH Key Manager® and other solutions to manage access, while greatly reducing costs, time, and compliance risks. The Company sells direct through offices in North America, Europe and Asia and through a network of certified partners. www.ssh.com


Trustwave helps businesses fight cybercrime, protect data and reduce security risks. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs. www.trustwave.com



eSentire® is the leader in Active Threat Protection solutions and services, the most comprehensive way to defend enterprises from advanced and never-before-seen cyber threats. www.esentire.com


EventTracker is more than just a technology-only solution; we provide expertise and dedicated staff to support enterprises whose IT teams are focused on other security and operational tasks. Our proven, award-winning technology, combined with our security specialists, ensure success and a positive return on investment for your SIEM deployment. www.eventtracker.com


Invincea’s endpoint protection minimizes the trade-off executives are forced to make between security and business performance. Over 25,000 customers rely on Invincea to prevent and detect threats while enabling their workforces to conduct business—in the office or on the road. Invincea protects endpoints by blocking known and unknown malware without signatures, including threats that originate from Weaponized Office docs and spear phishing emails. With Invincea, your workforce won’t know it’s there, but you will.SM www.invincea.com


LogRhythm, a leader in security intelligence and analytics empowers organizations around the glove to rapidly detect, respond to, and neutralize damaging cyber threats. The company’s award-winning platform unifies next-generation SEIM, log management, network and endpoint forensics, and advanced security analytics. www.logrhythm.com


Qualys (www.qualys.com) is a pioneer and leading provider of cloud-based security and compliance solutions with over 8,000 customers in more than 100 countries. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance, delivering critical security intelligence on demand. www.qualys.com


RES, the leader in digital workspace technology, helps organizations achieve better business results with reduced risks in security and compliance — while making enterprise technology easier and less disruptive for workers to access. RES takes a people-centric approach to making technology access secure, even in complex multi-device/multi-location scenarios. www.res.com


Rsam is the only platform you need for IT GRC, security and vendor risk initiatives. Get enterprise features plus the ease of drag and drop configuration. Baselines are operational in 30 days or customize and grow as you go. Enjoy streamlined workflows and a centralized critical data repository. www.rsam.com


Veriato provides User Behavior Analytics and User Activity Monitoring solutions. Over 36,000 organizations worldwide trust Veriato to gain insight into human activity on their network. Veriato's award-winning solutions include Veriato Recon (behavioral analytics based insider threat detection), Veriato 360 (enterprise-grade User Activity Monitoring), and Veriato Investigator (employee investigation tool). www.veriato.com


Supporting Sponsors


For Exhibitor and Sponsorship Opportunities

Please contact: 

Sean Stringer
Director of Sponsorship
Phone: +1.847.660.5729
Fax: +1.847.253.1443


If you are not already signed in, sign in below to register for this Conference.

If the login does not appear below or the form does not function as expected please use this form.





Contact ISACA's Training & Education Department:
Tel: +1.847.660.5670
Fax: +1.847.253.1443
Click here to submit a question.

Media Inquiries

Contact the ISACA Communications Department:
Tel: +1.847.660.5512 or

Please address Sponsorship questions to: sstringer@isaca.org