INsecurity is for the defenders of enterprise security—those defending corporate networks—and will offer real-world case studies, peer sharing and practical, actionable content for IT professionals grappling with security concerns. To learn more about the event, see the conference overview.

Roundtables are not listed in this agenda; head to the Roundtable page to see the schedule and topics for those.

View, browse and sort the list of sessions by pass type, track, and format. With this Session Scheduler, you can build your schedule in advance and access it during the show via export or with the Mobile App. Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Check back as we add more sessions soon.

All SessionsSpeakersMy Schedule
View Sessions As:
  • Building and Running an Effective Security Operations Center

    Location:  Baltimore 2
    Session Type: Hot Topic
    Vault Recording: TBD

    While some enterprises have maintained security operations centers (SOCs) for years, others are only just building an environment for monitoring security and responding to new threats. What are the key building blocks of an effective SOC? What are the pitfalls, and what are the critical skills required to make SOCs work? In this discussion, led by a security practitioner who has built and managed more than one SOC, attendees will discuss what tools, people, and practices make a SOC work – and why some SOCs fail to catch even the most basic compromises.