Careers & People
6/21/2017
08:00 AM
100%
0%

Dark Reading INsecurity Conference Registration Now Open

November event will focus on attendee interaction, "blue team" best practices.

To succeed, IT security professionals must find more - and better - ways to talk to each other. This simple maxim is behind a new event that Dark Reading is rolling out: INsecurity, a live conference for the defenders of enterprise data security. Registration for the Nov. 29-30 event is now open. 

INsecurity, which will take place at the Gaylord National Harbor, is a new type of conference that we believe will take the cybersecurity discussion to the next level. Instead of focusing on research and the revelation of new threats and vulnerabilities, INsecurity will focus on the everyday practices of the IT security department, and real-life methods that you can use to shore up your own enterprise defenses. It will be the "blue team" counterpart to the traditional "hacker con," and will concentrate on methods of defense, rather than exploits and attacks.

At INsecurity, you’ll have a chance to meet and talk with top security practitioners, including CISOs and top staff from a variety of well-known enterprises. You’ll hear their ideas on how to do key security functions such as budgeting, staffing, patch management, user provisioning, security metrics, incident response, and many other topics. And in our Business Hall, you’ll have a chance to see some of the latest cyber defense technologies in action, and learn more about technology trends and directions.

But the blue-team focus is not the only thing that will make INsecurity a different sort of security conference. While the event will feature traditional tracks and sessions led by top experts and practitioners, it will also offer more ways for you to interact with your peers. In fact, the event will offer large-group discussions led by security experts, roundtable discussions of eight or 10 security pros, and even opportunities for one-on-one conversations with like-minded colleagues. INsecurity recognizes that security pros have different methods for learning and talking – and we will provide the right environments to foster that conversation.

INsecurity will offer a fun, collegial environment for learning and conversation. Set at Washington, D.C.’s National Harbor, the conference will offer many sites and settings for social interaction and entertainment, in an east-coast location that’s easy to reach from almost anywhere in the U.S. While the broader-learning sessions will be open to all attendees, many of the smaller discussions will be held under Chatham House Rules, enabling attendees to safely discuss key security issues anonymously in a closed-door setting. The goal of the event is to not only educate attendees, but to provide the right environment to meet colleagues and discuss IT security issues in depth.

Want to know more about this new Dark Reading event? Check out the conference agenda and sign up and register. We look forward to seeing you in the Nation's Capital this November! 

Related Content: 

 

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
8/10/2017 | 9:16:18 AM
Re: Can someone please tell us the cost?
You can find more information about the conference -- including cost, programming and how to register  -- at https://insecurity.com/passes-prices.  Here are the prices: Early Bird (Through 9/29/17) $999;  On-Site $1499.
mistyh191
50%
50%
mistyh191,
User Rank: Apprentice
8/8/2017 | 6:11:30 PM
Can someone please tell us the cost?
I've been all over the site and can't find the cost anywhere, including the section for Pricing.
sec0pz
100%
0%
sec0pz,
User Rank: Apprentice
8/1/2017 | 10:30:31 AM
Cost
You wont tell me the cost of your conference, then I wont sign up. Keep it, I dont need it.
sec0pz
50%
50%
sec0pz,
User Rank: Apprentice
8/1/2017 | 10:30:17 AM
Cost
You wont tell me the cost of your conference, then I wont sign up. Keep it, I dont need it.
EldonS
50%
50%
EldonS,
User Rank: Author
6/30/2017 | 12:06:27 PM
Differentiation
I'm interested in seeing how this conference can distinguish itself from the dozens of others.
Christian Bryant
50%
50%
Christian Bryant,
User Rank: Ninja
6/23/2017 | 10:25:15 AM
CTF Equivalent?
I think this is an excellent move - it will be great to see this body of professionals come together.  While not the same environment as other hacker cons, I know this one will have live demos but will there be some equivalent to the now essential "capture the flag" activity we've come to love?  The draw to other cons for many of us is the element of chaos and, frankly, danger they offer.  Again, even though this is a different audience, here's to seeing something a "little" dangerous and chaotic that will bring more people back to INsecurity and give it some sense of "legendary" status that will keep them coming back.
tony71
50%
50%
tony71,
User Rank: Apprentice
6/22/2017 | 1:48:26 PM
very good article
I am wondering what is the future of cyberdefense with the growing influence of Russia
seangrad
100%
0%
seangrad,
User Rank: Apprentice
6/22/2017 | 9:50:22 AM
INsecurity
It says to sign up, but gives no place to do so. Is it not up yet?

Sean
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: No, no, no! Have a Unix CRON do the pop-up reminders!
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.