Interop ITX 2017 Schedule Builder

Interop ITX 2017 Schedule Builder

View, browse and sort the Interop agenda by track, pass type, format, session day/time, and conference journey. With the Interop ITX Schedule Builder, you can build your schedule in advance and access it during the show via export or in your Interop ITX Mobile App.

In order to best utilize Schedule Builder, please use the login credentials you've set up on this page as your login credentials on the Interop ITX App. You can download the app on iTunes or Google Play.

All SessionsSpeakersMy Schedule
View Sessions As:
  
  • Dark Reading Cybersecurity Crash Course - Day 1

    Speakers:
    Location:  Room 121
    Format: Summit
    Track: Security
    Pass Type: All Access, Summits & Workshops - Get your pass now!
    Vault Recording: TBD

    Every day, your IT organization is abuzz with news of new hacks, breaches, and cybersecurity vulnerabilities and it's up to your IT organization to prevent them from affecting your business. In practice, however, many IT departments work in silos. You might know a great deal about IT, but do you really know everything you should about the current cybersecurity environment and emerging threats?

    In this two-day Interop ITX summit program, the Dark Reading editorial team and some of the industry's top cybersecurity experts will offer a crash course in what you need to know about data security and the dangers faced by your organization. You'll get "speed reads" on each key area of security, providing you with the essential elements your organization should know about cyber defense, as well as an overview of the latest exploits. You'll get insight on how to detect a compromise of your IT environment, and recommendations on how to respond. Best of all, you'll have an opportunity to ask the experts the key questions you must answer in your environment – in a supportive, collegial setting where there are no dumb questions.

    Who Should Attend
    • IT professionals who want to know more about security
    • CIOs/CTOs
    • Security professionals who want a fast, comprehensive update on the latest threats
    • Operations professionals who must answer questions about security posture
    • Business and IT people who want to contribute to the security conversation
    • Teams of IT professionals who are looking for ways to develop cross-system security strategy


    Day 1: Cyber Defender Crash Course

    9:00 - 9:45 AM: Opening Address: The State of the Enterprise Security Department (Sara Peters, Tim Wilson)

    Thanks to a plethora of major – and very public – data breaches, security has become one of the most critical issues in IT. What are the chief threats that security departments face, and what are they doing about them? What are today's top priorities for security professionals? This session will include data from two recent surveys of IT and security executives.

    9:45 - 10:00 AM: Overcoming Fear and Loathing About Security in the Enterprise (Michael Ferrell)
    Security professionals touch every group in the enterprise in their effort to provide cyber defense. In that effort, they must overcome fear, both their own and that of external teams. Past legacy of the security profession has some stakeholders not only failing to see the value of security efforts, but a general loathing of the security profession. This is a discussion of how this occurred, and how to turn opinions to see the business value of security through discussion of data and cybersecurity risk.

    10:00 - 10:45 AM: Securing Your Enterprise Infrastructure (Dawn-Marie Hutchinson)
    As the traditional IT infrastructure evolves to add new networking capabilities, SDN, and virtualized server environments, the risks they face are changing as well. In this informative session, a top expert on infrastructure security will discuss the latest threats to your corporate IT environment -- and how your organization can mitigate them.

    10:45 - 11:00 AM: Networking/Break

    11:00 - 11:45 AM: How to Talk to Management About Cybersecurity and Risk (John Pironti)
    As an IT professional, you've developed some ideas on how cyber attackers might compromise your enterprise data and how you can defend against them. Now you have another challenge: presenting those threats and strategies to business managers who know nothing about IT security technology. How can you convey the current state of your IT security posture to top management and make a business case for investing in additional IT security resources? In this informative session, you'll get advice and recommendations on how to present security issues to your management in language they can understand.

    11:45 AM - 1:00 PM: Networking/Lunch

    1:00 - 1:45 PM: Securing End User Identities (John Hawley)
    Not so long ago, the notion of "endpoint security" focused on the management of desktop devices. But today's end user employs a wide variety of devices in a wide variety of locations – many of which don't belong to your organization. How can enterprises build a security strategy that identifies the end user and applies the appropriate security – no matter what their location or device? This session provides new insights.

    1:45 - 2:30 PM: The Real Risks of Mobile Technology In the Enterprise (Andrew Blaich)
    Most companies today have embraced a bring-your-own-device policy that enables end users to use their own tools to access corporate data. But how can you enforce security in such a flexible technology environment? And what are the real threats faced by today's wireless devices? In this session, a top expert will debunk some of the myths about mobile security while raising some threats and vulnerabilities that may not be on your radar.

    2:30 - 3:15 PM: Insider Threats and Data Leaks: What You Don't Know CAN Hurt You (Dr. Jason Clark)
    Major data leaks such as Edward Snowden's release of NSA data and the dump of military data on WikiLeaks are only the tip of the insider threat iceberg. Every day, enterprises face the threat of losing valuable insider information – not only through malicious leaks but through unintentional, accidental violations of security rules that lead to exposure of critical information. How can organizations spot the signs of a data leak and stop it before it goes too far? How can IT help prevent accidental leaks of sensitive data? A top expert offers some essential advice on stopping data loss from within.

    3:15 - 3:30 PM: Lightning Talk #2 (Bob Adams)


    3:30 - 4:15 PM: Finding and Fixing Application Security Vulnerabilities (Matt Tesauro)
    Customer databases, enterprise applications, Big Data – the keys to your enterprise's kingdom lie in its applications. But application security is often overlooked, both by software manufacturers and by internal app development teams. What steps can your organization take to find and repair application vulnerabilities – before your attackers discover them? A top applications security expert discusses key practices for scanning and securing applications, as well as offering some insight on how to improve security in your software development organization.

    4:15 - 5:00 PM: Security For the Internet of Things: A Practical Approach (Daniel Miessler)
    Today's IT environment increasingly employs a variety of devices that are intelligent and Internet-connected – but are not computers or phones. What's the best strategy for securing these devices as they are added to your corporate computing environment? What can you do during the deployment phase to ensure that attackers don't use these devices as a means to compromise your corporate data? A top IoT security expert offers some insight.