2018 Dates Announced: October 23-25 at the Sheraton Grand Chicago
Be The First To Know When Registration Opens
What is the INsecurity Conference?
INsecurity is for the defenders of enterprise security—the IT team members tasked with protecting critical data from cyber threats—and will offer real-world case studies, peer sharing and practical, actionable content for IT teams and professionals seeking better, more effective practices for defending enterprise data.
Learn From Top CISOs - See Our 2017 Keynote Lineup
Out of 32 sessions, 20 will be led by speakers who have been CISOs of major corporations or government agencies.
A Practical Conference For IT Professionals Who Defend Enterprise Data
The need to protect your critical information from cyber threats has never been greater than it is today. INsecurity is a conference that gives IT and security professionals a unique opportunity to learn and interact with top cyber professionals and learn about new defense practices and strategies via real-world case studies, peer sharing and practical, actionable content.
- INsecurity keynotes and sessions are led by CISOs from companies you know, as well as top experts in the security field, and will offer extraordinary insight on the IT security practices that work – and those that don’t.
- You’ll have a chance to meet other IT and security colleagues to discuss the everyday challenges you face in protecting enterprise data.
- Get in-depth insights on how other organizations perform security best practices, and how they manage their IT teams.
A Conference For The Blue Team
INsecurity focuses on the everyday practices of the IT security department, and real-life methods that you can use to shore up your own enterprise defenses. The "blue team" counterpart to the traditional "hacker con," INsecurity concentrates on methods of defense, rather than exploits and attacks. Here's a sampling of our topics:
Live Incident Response Simulation – In this eye-opening exercise, attendees will each play a role in a simulated cyber security incident, gaining real experience in recognizing new threats and the processes used to investigate, evaluate, and remediate after a major compromise occurs.
Ten Free or Low-Cost Tools Every Defender Should Have – This session offers a look at ten tools that your team can employ to improve your defenses – without taking a huge chunk out of your security budget.
Building and Maintaining an Effective Cybersecurity Architecture – A top security architect offers insights on how to build an effective, practical security architecture that is flexible enough to adapt to new threats.
Legal Issues in Cybersecurity: Keeping Your Company Out of Court – What is your organization's liability in the event of a security breach? How can you prove that your team did its due diligence in maintaining proper security in the event of a lawsuit? How can you ensure that a cyber insurance company will pay off if you file a claim? Attendees will discuss these questions, and many others, in this special Hot Topics discussion session.
Tips and Tricks For Cloud Security – Security practitioners share their best practices for cloud security, and methods for making security even better through the use of cloud-based services.
Want to attend and need help convincing your boss? Personalize our justification toolkit!
Join Dark Reading For Two Days of Practical Cyber Defense Discussions
INsecurity is produced by the highly respected Dark Reading editorial team. Dark Reading is the web’s most trusted, comprehensive, and timely online community for the exchange of information about cybersecurity issues. Join our team for invaluable discussions and networking.
Co-Founder and Editor
Kelly Jackson Higgins