Don't be shy, security practitioners. Share your best practices at our 2nd annual INsecurity Conference, to be held Oct. 23-25 in Chicago.

Sara Peters, Senior Editor

May 22, 2018

1 Min Read

Calling all security pros: the Call for Speakers for Dark Reading's second annual INsecurity Conference closes this Friday, May 25th.

We're moving to Chicago for INsecurity this year, Oct. 23-25, and we want to bring all the ideas for security best practices with us. Figured out some foolproof end-user awareness training program and chopped down your phishing problems? Lay it on us. Survived a massive identity management overhaul and want to save other people the pain you suffered? We'd appreciate your service. Have you got a big idea about cloud, appsec, incident response, mobile security, intelligence analysis, malware defense, risk management, compliance, endpoint security, or any other topic in security that you think your blue-team colleagues must hear? We want to know.

You can choose from two types of session formats: track session or hot topic. A track session is generally a more traditional podium-and-PowerPoint style. A hot topic session is a moderated discussion with attendees, where the speaker will provide a short introduction to the topic and then will act as moderator, guiding the discussion toward constructive, useful conclusions.

Proposals will be chosen on the basis of their usefulness to an audience of IT and security professionals and the ability of the speaker to show practical experience on the topic. No vendor product presentations will be accepted in this call for speakers, though there will be vendor presentations in the exhibit hall.

More information about the INsecurity program, as well as registration for the conference Oct. 23-25 at the Sheraton Chicago will be posted soon. Check out https://insecurity.com/2018-call-speakers to submit your abstracts now. 

About the Author(s)

Sara Peters

Senior Editor

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights