Careers & People

5/21/2018
02:00 PM
Sara Peters
Sara Peters
Quick Hits
Connect Directly
Twitter
RSS
E-Mail
100%
0%

Dark Reading Conference Call for Speakers Closes Friday

Don't be shy, security practitioners. Share your best practices at our 2nd annual INsecurity Conference, to be held Oct. 23-25 in Chicago.

Calling all security pros: the Call for Speakers for Dark Reading's second annual INsecurity Conference closes this Friday, May 25th.

We're moving to Chicago for INsecurity this year, Oct. 23-25, and we want to bring all the ideas for security best practices with us. Figured out some foolproof end-user awareness training program and chopped down your phishing problems? Lay it on us. Survived a massive identity management overhaul and want to save other people the pain you suffered? We'd appreciate your service. Have you got a big idea about cloud, appsec, incident response, mobile security, intelligence analysis, malware defense, risk management, compliance, endpoint security, or any other topic in security that you think your blue-team colleagues must hear? We want to know.

You can choose from two types of session formats: track session or hot topic. A track session is generally a more traditional podium-and-PowerPoint style. A hot topic session is a moderated discussion with attendees, where the speaker will provide a short introduction to the topic and then will act as moderator, guiding the discussion toward constructive, useful conclusions.

Proposals will be chosen on the basis of their usefulness to an audience of IT and security professionals and the ability of the speaker to show practical experience on the topic. No vendor product presentations will be accepted in this call for speakers, though there will be vendor presentations in the exhibit hall.

More information about the INsecurity program, as well as registration for the conference Oct. 23-25 at the Sheraton Chicago will be posted soon. Check out https://insecurity.com/2018-call-speakers to submit your abstracts now. 

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Google Engineering Lead on Lessons Learned From Chrome's HTTPS Push
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
Election Websites, Backend Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Surviving the IT Security Skills Shortage
Surviving the IT Security Skills Shortage
Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10510
PUBLISHED: 2018-08-15
A Directory Traversal Remote Code Execution vulnerability in Trend Micro Control Manager (versions 6.0 and 7.0) could allow an attacker to execute arbitrary code on vulnerable installations.
CVE-2018-10511
PUBLISHED: 2018-08-15
A vulnerability in Trend Micro Control Manager (versions 6.0 and 7.0) could allow an attacker to conduct a server-side request forgery (SSRF) attack on vulnerable installations.
CVE-2018-10512
PUBLISHED: 2018-08-15
A vulnerability in Trend Micro Control Manager (versions 6.0 and 7.0) could allow an attacker to manipulate a reverse proxy .dll on vulnerable installations, which may lead to a denial of server (DoS).
CVE-2018-8753
PUBLISHED: 2018-08-15
The IKEv1 implementation in Clavister cOS Core before 11.00.11, 11.20.xx before 11.20.06, and 12.00.xx before 12.00.09 allows remote attackers to decrypt RSA-encrypted nonces by leveraging a Bleichenbacher attack.
CVE-2018-9129
PUBLISHED: 2018-08-15
ZyXEL ZyWALL/USG series devices have a Bleichenbacher vulnerability in their Internet Key Exchange (IKE) handshake implementation used for IPsec based VPN connections.