Interop ITX 2017 Schedule Builder

Interop ITX 2017 Schedule Builder

View, browse and sort the Interop agenda by track, pass type, format, session day/time, and conference journey. With the Interop ITX Schedule Builder, you can build your schedule in advance and access it during the show via export or in your Interop ITX Mobile App.

In order to best utilize Schedule Builder, please use the login credentials you've set up on this page as your login credentials on the Interop ITX App. You can download the app on iTunes or Google Play.

All SessionsSpeakersMy Schedule
View Sessions As:
  • Risky Business: The Pros and Cons of Threat Intelligence Sharing

    • Jason Straight  |  Chief Privacy Officer/SVP Cyber Risk Solutions, UnitedLex
    Location:  Room 111
    Format: Conference Session
    Track: Security
    Pass Type: All Access, Conference - Get your pass now!
    Vault Recording: TBD

    With a multitude of cyber-related attacks occurring on an hourly basis, many organizations have bought into the notion of threat intelligence sharing as a means to stem the tide of cyber-related incidents. While the benefits of sharing attack vectors and compromised IP addresses are clear to security pros, the legal risks of possessing that information are not. In protecting your organization from perceived threats, you might actually be making it more vulnerable to attack -- and potentially to legal action as well.

    The reality is that, while threat intelligence sharing promises real-time detection and response, these solutions lack adequate filters and can quickly overwhelm users with more alerts and threat information than they can reasonably handle. Over time, organizations will either waste human and financial resources responding to false positives and preparing for threats that never materialize, or their security personnel will become so inured to the constant stream of alerts that they will skim over certain threats to focus on what they perceive to be the most important ones.

    When an organization suffers a security breach, investigators, regulators, legislators, lawyers and shareholders all ask the same questions: How did it happen, what did you know, when did you know it and what did you do to prevent it? If your organization is part of an intelligence-sharing network, and your security personnel either overlooked or failed to act upon critical intel that they possessed, your efforts to convince plaintiffs or regulators that your actions were reasonable and program defensible has become more complicated. The consequences to your organization can be substantial, ranging from increased legal penalties, fees and damages; irreparable harm to your brand; erosion of customer and shareholder trust; loss of revenue; and more.

    As a lawyer, privacy expert and strategic cyber security adviser, Jason Straight will discuss:
    • The legal implications of threat intelligence sharing.
    • How to maximize shared threat intelligence to avoid wasting resources.
    • Other security methods that are likely more effective than shared intelligence, such as encrypting sensitive data, tightening access controls and implementing advanced threat detection.
    • The government's role and vested interest in encouraging public/private threat intelligence sharing