Join Our Mailing List Here

The Cybersecurity Event For IT Pros Defending the Enterprise

Early Bird Ends August 31 — Register Now & Save $500

Announcing Our First Keynote Speaker

Pain and Fortune: Lessons From a Security Breach

Stephen Moore | VP and Chief Security Strategist, Exabeam

Join Stephen Moore, former member of the security team at Anthem, in a high candor discussion as he shares the human side of breach response and how it changed his thinking on life, leadership, and career.  The keynote is influenced by his experiences during Anthem’s 2015 breach, where he led the technical response and subsequent creation of Cybersecurity Analytics group.    

This keynote talk will help you understand what occurs when a breach happens, and how to get ahead of it. You’ll learn breach leadership principles and how to save and build your brand during a crisis – both inside and outside of your organization. 

Featured Track Sessions

 Cover Your aaS with DevSecOps

Cindi Carter
Deputy CISO
Blue Cross Blue Shield of Kansas City

Security on a Global Scale

Richard Rushing
Motorola Mobility

Understanding, Detecting, and Mitigating the Insider Threat

Katie Burnell
Insider Threat Analyst
Dtex Systems


Tracking Ransomware:
Using Behavior to Find New Threats

Jessica Bair
Senior Manager
Cisco Systems

 Live Incident Response Simulation

Justin Weissert
Director, Professional Services

Hacked! Managing U.S. Critical Infrastructure In the Event of a Cyber Crisis

Emilian Papadopoulos
Good Harbor

Featured Hot Topics

Building a Security Culture in Your Organization

Dawn-Marie Hutchinson 
Executive Director

Boon or Boondoggle?

Zulfikar Ramzan 

Preparing & Getting the Most Out of Penetration Testing and Red Teaming

John Sawyer
Associate Director of Services

A Cybersecurity Conference Like No Other

"INsecurity was a safe haven to have discussions that are not had at other venues." (Attendee)

Be on the offensive—hear and learn from real-world, like-minded security practitioners and get the latest insights on cybersecurity strategies, practices and solutions to combat today’s current and emerging trends.

Have eye-opening, "closed-door" conversations with security practitioners and like-minded attendees about what they're doing to create a more secure enterprise.

Join us for two full days of sessions focused exclusively on the practice of cyber defense – the tasks and processes that you do every day – and how to improve on them.

Two Days Focused Exclusively on the Practice of Cyber Defense

Cybersecurity Strategy

Get the "big picture" of running the cybersecurity effort for your organization.

Track topics include:

  • Architecture
  • Risk measurement & management
  • Staffing & budgeting
  • Legal & insurance issues

Operations and Practices

Learn about the day-to-day practices and technologies that make data defense work.

Track topics include:

  • Incident response
  • Identity & access management
  • Firewalls
  • Monitoring & event management

Hot Topics

Unique to INsecurity!

Popular "closed-door" discussions allow you to safely talk to peers about real problems and solutions under the Chatham House Rule—where participants are free to share the information discussed, but not the identities of the speakers.

New This Year

Black Hat Trainings

Sheraton Grand Chicago—October 22-23, 2018

Kick-off your conference experience with Black Hat Trainings before INsecurity.

Black Hat Trainings offer attendees deeply technical, hands-on courses on topics ranging from broader offensive security to the latest in penetration testing, infrastructure hacking, mobile application security, and everything in between. Don't miss this opportunity to train with some of the top InfoSec professionals from around the world.

Earn (ISC)² CPEs at INsecurity

Have you met your (ISC)² continuing professional education credits (CPEs) requirements yet?

INsecurity has partnered with (ISC)² to give attendees the ability to earn continuing professional education credits (CPEs) for their (ISC)² certification. You can earn up to 12 hours of CPE credits at INsecurity.

Enter your (ISC)² member number in your profile during registration or provide it to our at the event. Following the event, we share badge scans for those who provided their member number to (ISC)².

Book Your Hotel

We are excited to host INsecurity and Black Hat Trainings at the Sheraton Grand Chicago. Make the most of your experience by staying at our host hotel and network with other attendees.

Located in the heart of Chicago, enjoy breathtaking views of the Chicago River, Lake Michigan and the city skyline.

Don't Miss INsecurity 2018

Last year's conference was revered by attendees as one of the best cybersecurity events. Check out highlights from 2017:

Join Dark Reading For Two Days of Practical Cyber Defense Discussions

INsecurity is produced by the highly respected Dark Reading editorial team. Dark Reading is the web’s most trusted, comprehensive, and timely online community for the exchange of information about cybersecurity issues. Join our team for invaluable discussions and networking.