INsecurity—For The Defenders of Enterprise Security

INsecurity is for the defenders of enterprise security—the IT team members tasked with protecting critical data from cyber threats—and will offer real-world case studies, peer sharing and practical, actionable content for IT teams and professionals seeking better, more effective practices for defending enterprise data. 

While “red team” conferences focus primarily on new vulnerabilities and security research, INsecurity gives IT professionals a chance to learn how other enterprises and security teams create and enforce data protection policies and strategies. INsecurity features CISOs and security leaders from companies that you know, speaking on problems and challenges you face every day. It is a conference for the “blue team.”

IT and security people tasked with defending enterprise data will have a place to connect with peers, share insights on what works and what doesn’t, and learn about the latest cyber defense practices and technologies. Sessions will feature practical, actionable recommendations, and the opportunity to share information with IT and security colleagues in large and small-group discussions protected by Chatham House Rules. 

Extraordinary Speakers You Want to Hear and Learn From

In keynote sessions, attendees will hear from Greg Touhill, the first Federal CISO, as well as Sallie Mae CISO Jerry Archer and Gene Fredriksen, author of the new book, “The CISO Journey.” Out of 32 sessions, 20 will be led by speakers who have been CISOs of major corporations or government agencies. You’ll have the opportunity to engage in a live, incident response exercise led by Dmitri Alperovitch, one of the world’s foremost experts on nation-state threats. And you’ll have a chance to hear about new directions from some of cybersecurity’s top technology vendors in industry-focused presentations in the Business Hall.

Central to INsecurity will be interaction and peer learning:

  • Opportunities for discussion: large group discussions and smaller roundtables under Chatham House Rules (participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed)
  • Speakers and sponsors will interact with attendees as colleagues
  • Format and flow designed not to just educate, but to facilitate conversation

INsecurity is a production of Dark Reading—the Web’s most trusted, comprehensive and timely online community for the exchange of information about cybersecurity issues.

Read Tim Wilson's Blog about INsecurity.

Session Types

Hot Topics - Hot Topics discussions provide an opportunity for large groups of IT security professionals to discuss emerging cybersecurity issues and challenges in a safe, closed-door environment that is moderated by a topic expert and protected by Chatham House Rules. The moderator will help guide the discussion with constructive questions for the participants, and key points will be recorded and shared with participants in a subsequent, participants-only report. The identities of the participants will not be shared, nor will the comments/discussion be published broadly in any form. View the list of Hot Topics here. 

Roundtables - These smaller discussions allow seven or eight attendees to get together on a focused topic, or to discuss challenges in a particular industry. Like Hot Topics, these are held under Chatham House Rules. See the schedule of Roundtables here.

Conference Sessions - These classroom-style sessions are divided into four tracks. View the line-up here.

People and Resources

The People and Resources Track focuses on the human and financial resources required to defend enterprise data. Sessions in the track provide insight on staffing, team-building, budgeting, and spending to support information security.

Technology

The Technology Track offers a deeper look at emerging technologies and trends that can help you provide a more effective defense of your enterprise data – and automate defensive practices to help optimize staff productivity. In this track, you’ll not only learn about new technologies, but ways to use existing technology more effectively for enterprise defense.

Strategy

Too often, cyber defense focuses on short-term “firefighting” against new threats, without giving enough thought to a holistic strategy for defending corporate data. The Strategy Track offers sessions and insights around security architecture and defense in depth, giving attendees a deeper understanding of their overall strategy for protecting corporate data – not just for the coming weeks, but for future years.

Process

Enterprise data defense isn’t always about technologies or people. Sometimes it’s about the way the security team organizes and practices its defense, and developing new methods to use defensive tools and staff to mitigate online attacks. The Process Track covers new methods of practicing cybersecurity, helping attendees to organize and optimize those practices to improve the protection of critical information.

Want to attend and need help convincing your boss? Personalize our justification toolkit!