INsecurity is for the defenders of enterprise security—those defending corporate networks—and will offer real-world case studies, peer sharing and practical, actionable content for IT professionals grappling with security concerns. To learn more about the event, see the conference overview.

Roundtables are not listed in this agenda; head to the Roundtable page to see the schedule and topics for those.

View, browse and sort the list of sessions by pass type, track, and format. With this Session Scheduler, you can build your schedule in advance and access it during the show via export or with the Mobile App. Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Check back as we add more sessions soon.

All SessionsSpeakersMy Schedule
View Sessions As:
  • Preventing Lateral Movement In Your IT Environment

    Location:  Annapolis 3
    Session Type: Session
    Track: Technology
    Vault Recording: TBD

    Most enterprise defenses are built on the proverbial hard outer shell, which gives way to a soft, gooey center that is easy for attackers to navigate. In this session, a top security expert offers a look at tools and practices you can use to prevent or restrict the actions of an attacker who has penetrated your outer defenses and now plans to work into your most sensitive systems and data. You'll also get advice on how to detect and eliminate activity that appears to be the work of authorized users.