The Cybersecurity Event For IT Pros Defending the Enterprise
Our Advance Rate Ends July 27 — Save $700
Announcing Our First Keynote Speaker
Pain and Fortune: Lessons From a Security Breach
Stephen Moore | VP and Chief Security Strategist, Exabeam
Join Stephen Moore, former member of the security team at Anthem, in a high candor discussion as he shares the human side of breach response and how it changed his thinking on life, leadership, and career. The keynote is influenced by his experiences during Anthem’s 2015 breach, where he led the technical response and subsequent creation of Cybersecurity Analytics group.
This keynote talk will help you understand what occurs when a breach happens, and how to get ahead of it. You’ll learn breach leadership principles and how to save and build your brand during a crisis – both inside and outside of your organization.
Featured Track Sessions
Leveraging Security Orchestration and Automation to Defend at Attacker Speed
Threat Hunting Lead & Senior Engineer
Featured Hot Topics
Non-Lethal Active Defense for Enterprises: A Better Alternative to "Hacking Back"
University of Pennsylvania
A Cybersecurity Conference Like No Other
"INsecurity was a safe haven to have discussions that are not had at other venues." (Attendee)
Be on the offensive—hear and learn from real-world, like-minded security practitioners and get the latest insights on cybersecurity strategies, practices and solutions to combat today’s current and emerging trends.
Have eye-opening, "closed-door" conversations with security practitioners and like-minded attendees about what they're doing to create a more secure enterprise.
Join us for two full days of sessions focused exclusively on the practice of cyber defense – the tasks and processes that you do every day – and how to improve on them.
Two Days Focused Exclusively on the Practice of Cyber Defense
Get the "big picture" of running the cybersecurity effort for your organization.
Track topics include:
- Risk measurement & management
- Staffing & budgeting
- Legal & insurance issues
Operations and Practices
Learn about the day-to-day practices and technologies that make data defense work.
Track topics include:
- Incident response
- Identity & access management
- Monitoring & event management
New This Year
Black Hat Trainings
Sheraton Grand Chicago—October 22-23, 2018
Kick-off your conference experience with Black Hat Trainings before INsecurity.
Black Hat Trainings offer attendees deeply technical, hands-on courses on topics ranging from broader offensive security to the latest in penetration testing, infrastructure hacking, mobile application security, and everything in between. Don't miss this opportunity to train with some of the top InfoSec professionals from around the world.
Earn (ISC)² CPEs at INsecurity
Have you met your (ISC)² continuing professional education credits (CPEs) requirements yet?
INsecurity has partnered with (ISC)² to give attendees the ability to earn continuing professional education credits (CPEs) for their (ISC)² certification. You can earn up to 12 hours of CPE credits at INsecurity.
Enter your (ISC)² member number in your profile during registration or provide it to our at the event. Following the event, we share badge scans for those who provided their member number to (ISC)².
Book Your Hotel
We are excited to host INsecurity and Black Hat Trainings at the Sheraton Grand Chicago. Make the most of your experience by staying at our host hotel and network with other attendees.
Located in the heart of Chicago, enjoy breathtaking views of the Chicago River, Lake Michigan and the city skyline.
Don't Miss INsecurity 2018
Last year's conference was revered by attendees as one of the best cybersecurity events. Check out highlights from 2017:
Join Dark Reading For Two Days of Practical Cyber Defense Discussions
INsecurity is produced by the highly respected Dark Reading editorial team. Dark Reading is the web’s most trusted, comprehensive, and timely online community for the exchange of information about cybersecurity issues. Join our team for invaluable discussions and networking.