Interop ITX 2017 Schedule Builder

Interop ITX 2017 Schedule Builder

View, browse and sort the Interop agenda by track, pass type, format, session day/time, and conference journey. With the Interop ITX Schedule Builder, you can build your schedule in advance and access it during the show via export or in your Interop ITX Mobile App.

In order to best utilize Schedule Builder, please use the login credentials you've set up on this page as your login credentials on the Interop ITX App. You can download the app on iTunes or Google Play.

All SessionsSpeakersMy Schedule
View Sessions As:
  • Five Ways To Prepare Your Organization to Address The Security of the Internet of Things

    Location:  Room 111
    Format: Conference Session
    Track: Security
    Pass Type: All Access, Conference, Wednesday Conference - Get your pass now!
    Vault Recording: TBD

    The Internet of Things (IoT) exponentially expands the threat and vulnerability landscape that an organization or individual who uses them must contend with. The notion of "You are only as strong as your weakest link" takes new meaning with the introduction of IoT devices. Risk and security professionals now must include devices and items that were once considered out scope such as door locks, thermostats, digital video recorders, and appliances in their high likelihood of attack source and probable targets of attack as they perform threat their threat and vulnerability analysis activities. As with any risk and security conversation, with their will be tradeoffs that may risk based decisions at every step of development, deployment, operation, monitoring, and response for the emerging IoT world. This session will discuss five ways to prepare your organization to address this new and evolving threat vector.

    • What is the Internet of Things (IoT)?
    • How IoT increases the risk and security challenge
    • Five key risk and security considerations for IoT
    • Final Thoughts

    Key Takeaways
    • Why information IoT presents new risk and security challenges
    • Five Information Risk Management and Security considerations that should be accounted for when incorporating IoT solutions into a business and/or IT environment
    • Insights from case studies and operational experiences on how these capabilities greatly enhance the capabilities of organizations without enhancing their budget requirements or technology spend.

    Who Should Attend
    • Individuals who would like to understand how to effectively develop and implement information security and risk management capabilities for IoT enabled environments
    • Individuals who are seeking new approaches to information security and risk management for their IoT strategy.
    • Business leaders who are responsible for information Security and Risk Management within their organizations.
    • Information security auditors and professionals who are responsible for providing oversight to Information Risk Management and Security solutions within an organization.
    • IT Governance professionals who are developing and maturing their organizations capabilities to account for cloud computing implementations.