INsecurity is for the defenders of enterprise security—those defending corporate networks—and will offer real-world case studies, peer sharing and practical, actionable content for IT professionals grappling with security concerns. To learn more about the event, see the conference overview.

Roundtables are not listed in this agenda; head to the Roundtable page to see the schedule and topics for those.

View, browse and sort the list of sessions by pass type, track, and format. With this Session Scheduler, you can build your schedule in advance and access it during the show via export or with the Mobile App. Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Check back as we add more sessions soon.

All SessionsSpeakersMy Schedule
View Sessions As:
  
  • Why Orchestration and Threat Intelligence are a Perfect Match - Presented by ThreatConnect

    Speaker:
    • Dan Cole  |  Director of Product Management, ThreatConnect
    Location:  Business Hall Theater
    Session Type: Business Hall Theater Session
    Vault Recording: TBD

    Today's adversaries are moving faster than ever before, and for organizations trying to protect themselves against advanced and evolving threats, speed is essential. But the reality is that security teams don't necessarily have the time to manage and evaluate every single alert they receive while also completing their everyday tasks -- and even the most skilled teams are struggling to keep up. Because the cybersecurity landscape changes quickly, organizations are often left wondering if the task they automated yesterday will still be relevant tomorrow. What if there is new information or intelligence that could affect how it should run? Are they really doing the most efficient thing at any given time? This very concern is what threat intelligence driven orchestration addresses.