Interop ITX 2017 Schedule Builder

Interop ITX 2017 Schedule Builder

View, browse and sort the Interop agenda by track, pass type, format, session day/time, and conference journey. With the Interop ITX Schedule Builder, you can build your schedule in advance and access it during the show via export or in your Interop ITX Mobile App.

In order to best utilize Schedule Builder, please use the login credentials you've set up on this page as your login credentials on the Interop ITX App. You can download the app on iTunes or Google Play.

All SessionsSpeakersMy Schedule
View Sessions As:
  • Managing Risks to Reap Rewards: How to Use Security As a Growth Advantage

    Location:  Room 111
    Format: Conference Session
    Conference Journeys: CIO/CTO, IT Manager/Director
    Track: Security
    Pass Type: All Access, Conference, Wednesday Conference - Get your pass now!
    Vault Recording: TBD
    Audience Level: CIO/CTO

    We know companies today face unprecedented cyber-attacks, as well as overarching and unmanageable global regulatory demands – but for the first time, they must also simultaneously share technology, data, and business platforms. This dichotomy has left businesses vulnerable, and as a result, cybersecurity, risk, and privacy have become top concerns for boards and executives around the world. When left unchecked, cybersecurity issues can spiral out of control into strategy impacting catastrophes. Companies that aren't prepared can fall victim to knee-jerk reactions to vulnerabilities or real-time incidents. Even worse, these issues can result in unnecessary and costly budgetary impacts, improperly tagged under the umbrella of security and compliance. However, cybersecurity can be a business enabler. Roland Cloutier, SVP and Global Chief Security Officer for ADP, will discuss examples of how companies are balancing the necessities of cyber operations defense and risk management with driving innovation and business success. Audience members will learn how to:
    • Run operations more efficiently by using secure business processes, such as when making the shift to the cloud
    • Implement new technology with security at the core from the start
    • Integrate technology ecosystems across the enterprise