INsecurity - For The Defenders of Enterprise Security

INsecurity is for the defenders of enterprise security—those defending corporate networks—and will offer real-world case studies, peer sharing and practical, actionable content for IT professionals grappling with security concerns. 

While “red team” conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense—INsecurity is a conference for the “blue team.”

Security practitioners will have a place to connect with peers, showcase their hard work, and offer insight on the latest innovations and practices of defense against threats. Sessions will feature practical, actionable learnings, technologies, and tools and practices for enterprise data protection. 

Central to INsecurity will be interaction and peer learning:

  • Opportunities for discussion: large group discussions and smaller roundtables under Chatham House Rules (participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed)
  • Speakers and sponsors will interact with attendees as colleagues

  • Format and flow designed not to just educate, but to facilitate conversation

INsecurity is a production of Dark Reading—the Web’s most trusted, comprehensive and timely online community for the exchange of information about cybersecurity issues.

Read Tim Wilson's Blog about INsecurity.

Session Types

Hot Topics - Hot Topics discussions provide an opportunity for large groups of IT security professionals to discuss emerging cybersecurity issues and challenges in a safe, closed-door environment that is moderated by a topic expert and protected by Chatham House Rules. The moderator will help guide the discussion with constructive questions for the participants, and key points will be recorded and shared with participants in a subsequent, participants-only report. The identities of the participants will not be shared, nor will the comments/discussion be published broadly in any form. View the list of Hot Topics here. 

Roundtables - These smaller discussions allow seven or eight attendees to get together on a focused topic, or to discuss challenges in a particular industry. Like Hot Topics, these are held under Chatham House Rules. See the schedule of Roundtables here. 

Conference Sessions - These classroom-style sessions are divided into four tracks. View the line-up here.

People and Resources

The People and Resources Track focuses on the human and financial resources required to defend enterprise data. Sessions in the track provide insight on staffing, team-building, budgeting, and spending to support information security.


The Technology Track offers a deeper look at emerging technologies and trends that can help you provide a more effective defense of your enterprise data – and automate defensive practices to help optimize staff productivity. In this track, you’ll not only learn about new technologies, but ways to use existing technology more effectively for enterprise defense.


Too often, cyber defense focuses on short-term “firefighting” against new threats, without giving enough thought to a holistic strategy for defending corporate data. The Strategy Track offers sessions and insights around security architecture and defense in depth, giving attendees a deeper understanding of their overall strategy for protecting corporate data – not just for the coming weeks, but for future years.


Enterprise data defense isn’t always about technologies or people. Sometimes it’s about the way the security team organizes and practices its defense, and developing new methods to use defensive tools and staff to mitigate online attacks. The Process Track covers new methods of practicing cybersecurity, helping attendees to organize and optimize those practices to improve the protection of critical information.

Want to attend and need help convincing your boss? Personalize our justification toolkit!