INsecurity is for the defenders of enterprise security—those defending corporate networks—and will offer real-world case studies, peer sharing and practical, actionable content for IT professionals grappling with security concerns. To learn more about the event, see the conference overview.

Roundtables are not listed in this agenda; head to the Roundtable page to see the schedule and topics for those.

View, browse and sort the list of sessions by pass type, track, and format. With this Session Scheduler, you can build your schedule in advance and access it during the show via export or with the Mobile App. Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Check back as we add more sessions soon.

All SessionsSpeakersMy Schedule
View Sessions As:
  • Effective Methods For Security Information Sharing

    Location:  Baltimore 1
    Session Type: Hot Topic
    Vault Recording: TBD

    One of the great paradoxes of cybersecurity is that online criminals have become very good at sharing vulnerabilities and exploits – yet most enterprises are still defending against many of the same problems in silos that necessitate the constant reinvention of the wheel. Are there ways that security teams and first responders can share information without fear of a data leak? Beyond formal information sharing processes, are there informal processes that enable security practitioners to exchange information about new threats – and potentially find a solution faster? Attendees will discuss their own methods for sharing information, and how those methods might be used by other organizations.