Innovative Strategies, Best Practices, and Leading-Edge Technologies For Data Defense

INsecurity is a 2-day conference for learning, skill building and networking. It allows IT and security pros to share information about what works—and what doesn't—in cybersecurity defense. Most of the speakers in the sessions are themselves security practitioners, and some sessions are protected by the Chatham House Rule, which allows attendees to share the information they hear but not the identities of the speakers.

The conference offers sessions and discussions on the full range of enterprise data defense practices, including:

  • Cloud/mobile/endpoint/application security
  • Incident response
  • Identity/risk management
  • Intelligence analysis
  • Malware defense
  • Compliance practices
  • And other processes or disciplines commonly used for enterprise defense


Two tracks of in-depth presentations allow you to focus on both big picture and everyday challenges in security

Peer-based Sharing

Get practical insights to use in your own security practice from top enterprise security professionals

Hot Topics

Expert-led Hot Topics discussion groups allow you to talk with other security pros in a safe, closed-room setting

Real-World Demonstrations

Live demonstrations enable you to see how other enterprises handle security incidents

Learn About New Cybersecurity Threats and Challenges—and How To Deal with Them


Be on the offensive—hear and learn from real-world, like-minded security practitioners and get the latest insights on cybersecurity strategies, practices and solutions to combat today’s current and emerging trends. Hear from security leaders who will share their real-world experiences with cyber attacks, and how their IT teams dealt with the incidents. Have eye-opening, "closed-door" conversations with security practitioners and like-minded attendees about what they're doing to create a more secure enterprise.

INsecurity will feature two conference tracks:

Strategy Track

  • Covers the “big picture” of running the security effort, including architecture, risk measurement/management, orchestration, staffing/budgeting, security awareness, legal and insurance issues, and other overarching issues.
  • Advice and recommendations on how to build a holistic defense and a comprehensive strategy for defending enterprise data from experts.
  • Provides insight on the latest industry and regulatory trends affecting cybersecurity, such as GDPR compliance, cyber insurance, and legal liability. 

Operations and Practices Track

  • An in-depth look at best practices, tools, and techniques for maximizing your enterprise’s cybersecurity efforts.
  • Provides practical, peer-level instruction and discussion on core practices such as security administration, managing service providers, encryption, authentication, and data leak protection.

  • Recommendations on how to improve security operations and the day-to-day practices and technologies that make data defense work, including: incident response, user provisioning, cloud security, patch management, mobile security, identity and access management, threat intelligence analysis, security operations, and secure software development. 

SAVE $500 Today — Early Bird Ends August 31

Earn (ISC)² CPEs

INsecurity has partnered with (ISC)² to give attendees the ability to earn continuing professional education credits (CPEs) for their (ISC)² certification. (ISC)2 certification is a globally recognized standard of achievement that confirms an individual's knowledge in the field of information security. 1 credit is awarded for each Hot Topic or Track Session attended.

Enter your (ISC)member number in your profile during registration or provide it on-site. Following the event, we share badge scans for those who provided their member number to (ISC)2.

Who Should Attend

Whether you’re an IT manager looking to flesh out an enterprise-wide security operations program, a security staffer who needs to learn best practices for incident response or endpoint protection, or a risk manager seeking ways to measure potential cyber risk and insurance, you will find critical best practices, advice, and technology tips at INsecurity.

No matter your title or industry, if you’re looking for advice and insight on any of the following topics, you should be at INsecurity this October:

  • Defending against targeted and sophisticated cyber attacks
  • Measuring and reporting on cybersecurity threats and risk
  • Meeting the security and privacy requirements defined by GDPR and other regulatory/compliance mandates
  • Building a security awareness program to help prevent phishing and social engineering
  • Acquiring, implementing, and orchestrating technology from a wide range of security vendors
  • Building and maintaining an effective security policy, team, and program

The Dark Reading Advantage

INsecurity is produced by Dark Reading—a trusted, independent, unbiased community for IT and security professionals looking to learn about new cyber threats, and vulnerabilities, potential defenses against the latest attacks and key technologies and practices to help protect their enterprise’s data.

The conference leverages decades of Dark Reading’s market insight and expertise, as well as its proprietary user research which uncovers and pinpoints the most critical areas of information needed by the IT and security community.

INsecurity is designed to allow IT and security pros to gather, meet peers and have real-life discussion about security practices—in an environment that is conducive to discussion and conversation where attendees leave with practical and actionable information they can execute upon.

Tim Wilson
Co-Founder and Editor

Kelly Jackson Higgins
Executive Editor

Sara Peters
Senior Editor