Interop ITX 2017 Schedule Builder

Interop ITX 2017 Schedule Builder

View, browse and sort the Interop agenda by track, pass type, format, session day/time, and conference journey. With the Interop ITX Schedule Builder, you can build your schedule in advance and access it during the show via export or in your Interop ITX Mobile App.

In order to best utilize Schedule Builder, please use the login credentials you've set up on this page as your login credentials on the Interop ITX App. You can download the app on iTunes or Google Play.

All SessionsSpeakersMy Schedule
View Sessions As:
  
  • Dark Reading Cybersecurity Crash Course - Day 2

    Speakers:
    Location:  Room 121
    Format: Summit
    Track: Security
    Pass Type: All Access, Summits & Workshops - Get your pass now!
    Vault Recording: TBD

    Every day, your IT organization is abuzz with news of new hacks, breaches, and cybersecurity vulnerabilities and it's up to your IT organization to prevent them from affecting your business. In practice, however, many IT departments work in silos. You might know a great deal about IT, but do you really know everything you should about the current cybersecurity environment and emerging threats?

    In this two-day Interop ITX summit program, the Dark Reading editorial team and some of the industry's top cybersecurity experts will offer a crash course in what you need to know about data security and the dangers faced by your organization. You'll get "speed reads" on each key area of security, providing you with the essential elements your organization should know about cyber defense, as well as an overview of the latest exploits. You'll get insight on how to detect a compromise of your IT environment, and recommendations on how to respond. Best of all, you'll have an opportunity to ask the experts the key questions you must answer in your environment – in a supportive, collegial setting where there are no dumb questions.

    Who Should Attend
    • IT professionals who want to know more about security
    • CIOs/CTOs
    • Security professionals who want a fast, comprehensive update on the latest threats
    • Operations professionals who must answer questions about security posture
    • Business and IT people who want to contribute to the security conversation
    • Teams of IT professionals who are looking for ways to develop cross-system security strategy

    Day 2: You've Been Breached!

    9:00 - 9:45 AM: The Impact of a Data Breach
    To understand the cyber risk your organization faces, you need to understand the likelihood of a breach – and its potential cost. In this session, a top expert discusses the many – and sometimes hidden – costs of a data breach, including its impact on customers and end users. You'll also get insight on the frequency of data breaches and a better understanding of how likely it is to happen to your organization.

    9:45 - 10:00 AM: The TIP-Ping Point (Teddy Powers)
    The presentation will be about the maturation process of companies who are looking to leverage threat intelligence effectively. Organizations often begin by leveraging multiple OSINT feeds but there comes a day when teams realize it would be beneficial to have these feeds in one place with things like false positives and duplicates removed. Other challenges with leveraging threat intelligence include prioritizing threats and managing the flow of intelligence into existing security tools for matching and identifying malicious activity. The presentation will describe the transition from this existing set of challenges and how to address them using a threat intelligence platform.

    10:00 - 10:45 AM: Who Are the Bad Guys? Cyber Criminals and Their Motivations (Paul Kurtz)
    Today's cyber attackers range from financially motivated criminals to politically motivated hacktivists to state-sponsored hacker units. What are the motives and methods of these disparate adversaries? This session offers a look at the different types of cyber attackers and offers advice about how you can build a cyber defense strategy that extends across a wide variety of threats.

    10:45 - 11:00 AM: Networking/Break

    11:00 - 11:45 AM: Developing and Testing an Effective Incident Response Program (Andy Jordan)
    If your organization doesn't have a plan for handling a major data breach, you're already in trouble. In order to swiftly and effectively respond to a cyber compromise, you must develop a program for first response in the data center as well as downstream response in the business units and in the public eye. This session offers some guidance on how to build an incident response plan that can identify and repair compromises as quickly as possible -- and how to test and practice that plan so that you're ready for the real thing.

    11:45 AM - 1:00 PM: Networking/Lunch

    1:00 - 1:45 PM: Detecting and Mitigating Ransomware and Other Sophisticated Attacks (Gal Shpantzer)
    In the past, most cyber attack campaigns were primarily random, and they simply exploited the most vulnerable systems they could find. Today, however, there is an increasing number of sophisticated attacks – in particular, ransomware -- that target specific companies, data, or even employees. These attacks are often extremely well disguised and may escape the security tools that most enterprises use to screen out more random attacks. What tools and defenses are there to prevent targeted attacks on your organization? In this session, you will hear about the latest types of targeted attacks and what your enterprise can do to stop them.

    1:45 - 2:30 PM: Collecting and Using Threat Intelligence Data
    The good news in IT security is that there is a growing list of resources and services that can inform you on the latest threats in cyber space and the criticality of each. The bad news is that with so many sources and so much data, using threat intelligence to improve your cyber defenses can be a bewildering process. This session will look at some of the different types and sources of threat intelligence data and provide advice on how to choose the right ones and use them to improve your defenses.

    2:30 - 3:00: Break

    3:00 - 3:15 PM: Lightning Talk #4 (Chris Martin)

    3:15 - 4:00 PM: Protecting Your Data In the Cloud (Rich Mogull)
    Cloud computing services and technology offer a level of efficiency and cost savings that most enterprises simply can't pass up. But does the growing use of cloud technology create a growing threat to enterprise data? How can IT organizations track and secure data as it travels through the cloud? Do you need on-premises security tools to help secure an increasing number of cloud applications and service providers? In this session, a cloud security expert will discuss the key danger points in cloud computing and the latest technologies and practices for cloud security.

    4:15 - 5:00 PM: Understanding the Legal Side of Cybersecurity (Jason Straight)
    A major data breach may not only present technical problems and interrupt your business, it may land you in court. What are your organization's legal responsibilities when it comes to cybersecurity, and what can you do to minimize legal risks? A top legal expert will discuss some of the issues and liabilities associated with cybersecurity, including the strengths and weaknesses of cyber insurance policies – and the hidden costs that they may not cover.