Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

Dark Reading INsecurity Conference Registration Now Open

November event will focus on attendee interaction, "blue team" best practices.

To succeed, IT security professionals must find more - and better - ways to talk to each other. This simple maxim is behind a new event that Dark Reading is rolling out: INsecurity, a live conference for the defenders of enterprise data security. Registration for the Nov. 29-30 event is now open. 

INsecurity, which will take place at the Gaylord National Harbor, is a new type of conference that we believe will take the cybersecurity discussion to the next level. Instead of focusing on research and the revelation of new threats and vulnerabilities, INsecurity will focus on the everyday practices of the IT security department, and real-life methods that you can use to shore up your own enterprise defenses. It will be the "blue team" counterpart to the traditional "hacker con," and will concentrate on methods of defense, rather than exploits and attacks.

At INsecurity, you’ll have a chance to meet and talk with top security practitioners, including CISOs and top staff from a variety of well-known enterprises. You’ll hear their ideas on how to do key security functions such as budgeting, staffing, patch management, user provisioning, security metrics, incident response, and many other topics. And in our Business Hall, you’ll have a chance to see some of the latest cyber defense technologies in action, and learn more about technology trends and directions.

But the blue-team focus is not the only thing that will make INsecurity a different sort of security conference. While the event will feature traditional tracks and sessions led by top experts and practitioners, it will also offer more ways for you to interact with your peers. In fact, the event will offer large-group discussions led by security experts, roundtable discussions of eight or 10 security pros, and even opportunities for one-on-one conversations with like-minded colleagues. INsecurity recognizes that security pros have different methods for learning and talking – and we will provide the right environments to foster that conversation.

INsecurity will offer a fun, collegial environment for learning and conversation. Set at Washington, D.C.’s National Harbor, the conference will offer many sites and settings for social interaction and entertainment, in an east-coast location that’s easy to reach from almost anywhere in the U.S. While the broader-learning sessions will be open to all attendees, many of the smaller discussions will be held under Chatham House Rules, enabling attendees to safely discuss key security issues anonymously in a closed-door setting. The goal of the event is to not only educate attendees, but to provide the right environment to meet colleagues and discuss IT security issues in depth.

Want to know more about this new Dark Reading event? Check out the conference agenda and sign up and register. We look forward to seeing you in the Nation's Capital this November! 

Related Content: 

 

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
8/10/2017 | 9:16:18 AM
Re: Can someone please tell us the cost?
You can find more information about the conference -- including cost, programming and how to register  -- at https://insecurity.com/passes-prices.  Here are the prices: Early Bird (Through 9/29/17) $999;  On-Site $1499.
mistyh191
50%
50%
mistyh191,
User Rank: Apprentice
8/8/2017 | 6:11:30 PM
Can someone please tell us the cost?
I've been all over the site and can't find the cost anywhere, including the section for Pricing.
sec0pz
100%
0%
sec0pz,
User Rank: Apprentice
8/1/2017 | 10:30:31 AM
Cost
You wont tell me the cost of your conference, then I wont sign up. Keep it, I dont need it.
sec0pz
50%
50%
sec0pz,
User Rank: Apprentice
8/1/2017 | 10:30:17 AM
Cost
You wont tell me the cost of your conference, then I wont sign up. Keep it, I dont need it.
EldonS
50%
50%
EldonS,
User Rank: Author
6/30/2017 | 12:06:27 PM
Differentiation
I'm interested in seeing how this conference can distinguish itself from the dozens of others.
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
6/23/2017 | 10:25:15 AM
CTF Equivalent?
I think this is an excellent move - it will be great to see this body of professionals come together.  While not the same environment as other hacker cons, I know this one will have live demos but will there be some equivalent to the now essential "capture the flag" activity we've come to love?  The draw to other cons for many of us is the element of chaos and, frankly, danger they offer.  Again, even though this is a different audience, here's to seeing something a "little" dangerous and chaotic that will bring more people back to INsecurity and give it some sense of "legendary" status that will keep them coming back.
tony71
50%
50%
tony71,
User Rank: Apprentice
6/22/2017 | 1:48:26 PM
very good article
I am wondering what is the future of cyberdefense with the growing influence of Russia
Seanogee
100%
0%
Seanogee,
User Rank: Apprentice
6/22/2017 | 9:50:22 AM
INsecurity
It says to sign up, but gives no place to do so. Is it not up yet?

Sean
HackerOne Drops Mobile Voting App Vendor Voatz
Dark Reading Staff 3/30/2020
Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
Curtis Franklin Jr., Senior Editor at Dark Reading,  3/31/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11565
PUBLISHED: 2020-04-06
An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing, aka CID-aa9f7d5172fa.
CVE-2020-11558
PUBLISHED: 2020-04-05
An issue was discovered in libgpac.a in GPAC 0.8.0, as demonstrated by MP4Box. audio_sample_entry_Read in isomedia/box_code_base.c does not properly decide when to make gf_isom_box_del calls. This leads to various use-after-free outcomes involving mdia_Read, gf_isom_delete_movie, and gf_isom_parse_m...
CVE-2020-11547
PUBLISHED: 2020-04-05
PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.
CVE-2020-11548
PUBLISHED: 2020-04-05
The Search Meter plugin through 2.13.2 for WordPress allows user input introduced in the search bar to be any formula. The attacker could achieve remote code execution via CSV injection if a wp-admin/index.php?page=search-meter Export is performed.
CVE-2020-11542
PUBLISHED: 2020-04-04
3xLOGIC Infinias eIDC32 2.213 devices with Web 1.107 allow Authentication Bypass via CMD.HTM?CMD= because authentication depends on the client side's interpretation of the <KEY>MYKEY</KEY> substring.