INsecurity is for the defenders of enterprise security—those defending corporate networks—and will offer real-world case studies, peer sharing and practical, actionable content for IT professionals grappling with security concerns. To learn more about the event, see the conference overview.

Roundtables are not listed in this agenda; head to the Roundtable page to see the schedule and topics for those.

View, browse and sort the list of sessions by pass type, track, and format. With this Session Scheduler, you can build your schedule in advance and access it during the show via export or with the Mobile App. Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Check back as we add more sessions soon.

All SessionsSpeakersMy Schedule
View Sessions As:
  • Targeted Attacks: How to Recognize Them From the Defender's Point of View

    • Sam McLane  |  Head of Security Engineering, Arctic Wolf
    Location:  Annapolis 3
    Session Type: Session
    Track: Process
    Vault Recording: TBD

    We've seen re-creations and online exploits presented from the attacker's point of view. But what do these attacks look like on the defender's side? In this session, a top security operations center expert will show attendees, step by step, how an attack appeared in an enterprise, and the steps they took to correlate information about the attack and develop an effective mitigation strategy. Attendees will also get insight on how a SOC can identify sophisticated attacks sooner in their evolution, to help minimize the damage they might cause.