INsecurity is for the defenders of enterprise security—those defending corporate networks—and will offer real-world case studies, peer sharing and practical, actionable content for IT professionals grappling with security concerns. To learn more about the event, see the conference overview.

Roundtables are not listed in this agenda; head to the Roundtable page to see the schedule and topics for those.

View, browse and sort the list of sessions by pass type, track, and format. With this Session Scheduler, you can build your schedule in advance and access it during the show via export or with the Mobile App. Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Check back as we add more sessions soon.

All SessionsSpeakersMy Schedule
View Sessions As:
  • Evaluating and Auditing Security In Your Supply Chain

    • Suzie Squier  |  Executive Director, Retail Cyber Intelligence Sharing Center
    Location:  Baltimore 1
    Session Type: Hot Topic
    Vault Recording: TBD

    You've spent years developing tools and strategies for protecting your critical business data. But what about the companies you do business with? How can you evaluate the security tools and practices used by your suppliers and customers, and how can you be certain that a third-party contractor is not opening your organization up for a potential attack? Attendees will discuss methods for gauging the security readiness of business partners, methods for enforcing minimum security practices, and practices for auditing the security of potential new partners when business requirements change.