Interop ITX 2017 Schedule Viewer

Interop ITX 2017 Schedule Viewer

View, browse and sort the Interop agenda by track, pass type, format, session day/time, and conference journey. With the Interop ITX Schedule Builder, you can build your schedule in advance and access it during the show via export or in your Interop ITX Mobile App.

In order to best utilize Schedule Builder, please use the login credentials you've set up on this page as your login credentials on the Interop ITX App. You can download the app on iTunes or Google Play.

All SessionsSpeakersMy Schedule
View Sessions As:
  
  • Malicious Insider Threats: Finding Them and Rooting Them Out

    Speaker:
    • Paul Brager Jr  |  Lead Associate / Cybersecurity Architect, ICS/SCADA, Booz Allen Hamilton
    Location:  TBD
    Format: Conference Session
    Track: Security
    Pass Type: All Access, Conference - Get your pass now!
    Vault Recording: TBD

    Malicious or disgruntled employees, especially highly privileged ones like executives and IT pros, can cause serious damage ‚Äď stealing IP, leaking secrets, destroying essential infrastructure. How do you identify these threats without being Big Brother? How do you squash these attacks before they happen? In this session, learn techniques for balancing trust with preparedness and for protecting your organization from becoming the next Sony.