Interop ITX 2017 Schedule Builder

Interop ITX 2017 Schedule Builder

View, browse and sort the Interop agenda by track, pass type, format, session day/time, and conference journey. With the Interop ITX Schedule Builder, you can build your schedule in advance and access it during the show via export or in your Interop ITX Mobile App.

In order to best utilize Schedule Builder, please use the login credentials you've set up on this page as your login credentials on the Interop ITX App. You can download the app on iTunes or Google Play.

All SessionsSpeakersMy Schedule
View Sessions As:
  
  • Collecting, Correlating & Analyzing Security Data

    Speakers:
    Location:  Room 115
    Format: Conference Session
    Conference Journeys: Business/Data Analyst
    Track: Security
    Pass Type: All Access, Conference, Wednesday Conference - Get your pass now!
    Vault Recording: TBD
    Audience Level: Business/Data Analyst

    Organizations have a wide variety of threat intelligence available to them: threat feeds, internal security event information, CERT, news media, and bosses knocking on the door saying "should we be worried about this." The amount of data can be overwhelming, and it's only effective if you know how to use it. How do you correlate this information to identify the cyberattacks that are most important to yourorganization right now? The key is in the context, and seeing the data at hand in terms of the bigger picture.

    "Threat Intel" isn't a buzzword - it's how your organization finds the relevance in its threat data and then puts strategy in action to stop increasingly complex exploits before they result in a data breach or worse. In this session, you'll obtain tips and best practices for collecting, correlating, and analyzing threat information and learn how to recognize and respond to the most important threats with time on your side.