INsecurity is for the defenders of enterprise security—those defending corporate networks—and will offer real-world case studies, peer sharing and practical, actionable content for IT professionals grappling with security concerns. To learn more about the event, see the conference overview.

Roundtables are not listed in this agenda; head to the Roundtable page to see the schedule and topics for those.

View, browse and sort the list of sessions by pass type, track, and format. With this Session Scheduler, you can build your schedule in advance and access it during the show via export or with the Mobile App. Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Check back as we add more sessions soon.

All SessionsSpeakersMy Schedule
View Sessions As:
  
  • Deploying Zero-Trust Network Security Using the Software-Defined Perimeter - Presented by Cyxtera

    Speaker:
    Location:  Business Hall Theater
    Session Type: Business Hall Theater Session
    Vault Recording: TBD

    TCP/IP has failed us. Its "implicit trust" philosophy permits anyone to connect to a system before authentication or authorization is applied. We must change the way we approach network security, and adopt a fundamentally more secure, "zero trust" model.

    This session introduces the Software-Defined Perimeter (SDP). This security architecture, published by the Cloud Security Alliance, provides a "zero trust" model built with a distributed, scalable, architecture comprising SDP Controller and network Gateways.

    We will conclude with a reference architecture for SDP in cloud environments, showing how this security approach provides fine-grained and consistent security across hybrid environments.