INsecurity is for the defenders of enterprise security—those defending corporate networks—and will offer real-world case studies, peer sharing and practical, actionable content for IT professionals grappling with security concerns. To learn more about the event, see the conference overview.

Roundtables are not listed in this agenda; head to the Roundtable page to see the schedule and topics for those.

View, browse and sort the list of sessions by pass type, track, and format. With this Session Scheduler, you can build your schedule in advance and access it during the show via export or with the Mobile App. Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Check back as we add more sessions soon.

All SessionsSpeakersMy Schedule
View Sessions As:
  
  • Writing and Enforcing an Effective Mobile Security Policy

    Speaker:
    Location:  Baltimore 2
    Session Type: Hot Topic
    Vault Recording: TBD

    Most enterprises have a clearly-written policy for guiding and controlling the use of personal mobile devices in the enterprise – but no effective way to monitor or enforce that policy. How can enterprises minimize the risk created by the use of mobile devices connecting to the corporate network? How can they enforce the policies they have laid out for end users? In this discussion, led by a mobile security expert, attendees will discuss best practices they have found for securing mobile devices, and how to prevent those devices from becoming the source of a data compromise.