Interop ITX 2017 Schedule Viewer

Interop ITX 2017 Schedule Viewer

View, browse and sort the Interop agenda by track, pass type, format, session day/time, and conference journey. With the Interop ITX Schedule Builder, you can build your schedule in advance and access it during the show via export or in your Interop ITX Mobile App.

In order to best utilize Schedule Builder, please use the login credentials you've set up on this page as your login credentials on the Interop ITX App. You can download the app on iTunes or Google Play.

All SessionsSpeakersMy Schedule
View Sessions As:
  
  • Dark Reading Cyber Security Crash Course - Day 1

    Speakers:
    Location:  TBD
    Format: Summit
    Track: Security
    Pass Type: All Access, Summits & Workshops - Get your pass now!
    Vault Recording: TBD

    Every day, your IT organization is abuzz with news of new hacks, breaches, and cybersecurity vulnerabilities and it's up to your IT organization to prevent them from affecting your business. In practice, however, many IT departments work in silos. You might know a great deal about IT, but do you really know everything you should about the current cybersecurity environment and emerging threats?

    In this two-day Interop ITX summit program, the Dark Reading editorial team and some of the industry's top cybersecurity experts will offer a crash course in what you need to know about data security and the dangers faced by your organization. You'll get "speed reads" on each key area of security, providing you with the essential elements your organization should know about cyber defense, as well as an overview of the latest exploits. You'll get insight on how to detect a compromise of your IT environment, and recommendations on how to respond. Best of all, you'll have an opportunity to ask the experts the key questions you must answer in your environment – in a supportive, collegial setting where there are no dumb questions.

    Who Should Attend
    • IT professionals who want to know more about security
    • CIOs/CTOs
    • Security professionals who want a fast, comprehensive update on the latest threats
    • Operations professionals who must answer questions about security posture
    • Business and IT people who want to contribute to the security conversation
    • Teams of IT professionals who are looking for ways to develop cross-system security strategy


    Day 1: Cyber Defender Crash Course

    Opening Address: The State of the Enterprise Security Department

    Thanks to a plethora of major – and very public – data breaches, security has become one of the most critical issues in IT. What are the chief threats that security departments face, and what are they doing about them? What are today's top priorities for security professionals? This session will include data from two recent surveys of IT and security executives.

    Lightning Talk #1

    Securing Your Enterprise Infrastructure
    As the traditional IT infrastructure evolves to add new networking capabilities, SDN, and virtualized server environments, the risks they face are changing as well. In this informative session, a top expert on infrastructure security will discuss the latest threats to your corporate IT environment -- and how your organization can mitigate them.

    Networking Break

    Protecting Your Data In the Cloud
    Cloud computing services and technology offer a level of efficiency and cost savings that most enterprises simply can't pass up. But does the growing use of cloud technology create a growing threat to enterprise data? How can IT organizations track and secure data as it travels through the cloud? Do you need on-premises security tools to help secure an increasing number of cloud applications and service providers? In this session, a cloud security expert will discuss the key danger points in cloud computing and the latest technologies and practices for cloud security.

    Securing End User Identities
    Not so long ago, the notion of "endpoint security" focused on the management of desktop devices. But today's end user employs a wide variety of devices in a wide variety of locations – many of which don't belong to your organization. How can enterprises build a security strategy that identifies the end user and applies the appropriate security – no matter what their location or device? This session provides new insights.

    Lunch

    The Real Risks of Mobile Technology In the Enterprise
    Most companies today have embraced a bring-your-own-device policy that enables end users to use their own tools to access corporate data. But how can you enforce security in such a flexible technology environment? And what are the real threats faced by today's wireless devices? In this session, a top expert will debunk some of the myths about mobile security while raising some threats and vulnerabilities that may not be on your radar.

    Networking Break

    Insider Threats and Data Leaks: What You Don't Know CAN Hurt You
    Major data leaks such as Edward Snowden's release of NSA data and the dump of military data on WikiLeaks are only the tip of the insider threat iceberg. Every day, enterprises face the threat of losing valuable insider information – not only through malicious leaks but through unintentional, accidental violations of security rules that lead to exposure of critical information. How can organizations spot the signs of a data leak and stop it before it goes too far? How can IT help prevent accidental leaks of sensitive data? A top expert offers some essential advice on stopping data loss from within.

    Lightning Talk #2


    Finding and Fixing Application Security Vulnerabilities
    Customer databases, enterprise applications, Big Data – the keys to your enterprise's kingdom lie in its applications. But application security is often overlooked, both by software manufacturers and by internal app development teams. What steps can your organization take to find and repair application vulnerabilities – before your attackers discover them? A top applications security expert discusses key practices for scanning and securing applications, as well as offering some insight on how to improve security in your software development organization.

    Security For the Internet of Things: A Practical Approach
    Today's IT environment increasingly employs a variety of devices that are intelligent and Internet-connected – but are not computers or phones. What's the best strategy for securing these devices as they are added to your corporate computing environment? What can you do during the deployment phase to ensure that attackers don't use these devices as a means to compromise your corporate data? A top IoT security expert offers some insight.