Interop ITX 2017 Schedule Builder

Interop ITX 2017 Schedule Builder

View, browse and sort the Interop agenda by track, pass type, format, session day/time, and conference journey. With the Interop ITX Schedule Builder, you can build your schedule in advance and access it during the show via export or in your Interop ITX Mobile App.

In order to best utilize Schedule Builder, please use the login credentials you've set up on this page as your login credentials on the Interop ITX App. You can download the app on iTunes or Google Play.

All SessionsSpeakersMy Schedule
View Sessions As:
  • Anatomy of a Hack - Hands-on

    • John Sawyer  |  Senior Security Analyst, InGuardians
    Location:  Room 101
    Format: Workshop
    Track: Security
    Pass Type: All Access, Summits & Workshops - Get your pass now!
    Vault Recording: TBD

    As attackers adapt their methods and become more sophisticated, security teams are discovering that traditional, passive methods of detecting bad actors don't work as well as they once did. Breaches are going days, months, and years without being noticed. To address the gap between compromise and detection, many enterprises are finding they need to actively seek out indicators of compromise to find undetected threats. This half-day workshop will look at multiple attack scenarios identifying where the Cyber Kill Chain could be used to identify and/or stop the attack, provide an overview of deception technologies, and introduce participants to the "threat hunting" process and tools.

    Attendees who want to participate in the hands-on exercises will need a laptop running Windows 7 with full administrative access and Powershell 5.0. Students are recommended to have Windows running within VMware or similar virtualization software for ease of testing. Additional software recommendations will be sent prior to class.

    Note: Because this workshop is hands-on, attendance is capped at 100 people. Please RSVP using your registration login and selecting the workshop.