Interop ITX 2017 Schedule Builder

Interop ITX 2017 Schedule Builder

View, browse and sort the Interop agenda by track, pass type, format, session day/time, and conference journey. With the Interop ITX Schedule Builder, you can build your schedule in advance and access it during the show via export or in your Interop ITX Mobile App.

In order to best utilize Schedule Builder, please use the login credentials you've set up on this page as your login credentials on the Interop ITX App. You can download the app on iTunes or Google Play.

All SessionsSpeakersMy Schedule
View Sessions As:
  • The Art of Performing Risk Assessments

    Location:  Room 114
    Format: Conference Session
    Track: Security
    Pass Type: All Access, Conference - Get your pass now!
    Vault Recording: TBD

    Compliance mandates & information security standards always require that a risk analysis exercise be performed on a regular schedule. This brief describes the remediation actions that must be performed to mitigate risk to the enterprise – this risk assessment reports provide the input for an enterprise risk management program. in this brief, you will step through compliance mandates & standards for risk assessment, examine core components for a comprehensive and thorough risk assessment exercise while walking thru a sample risk assessment report to understand key sections such as a Corrective Action Plan (CAP), and will understand how to integrate a technical vulnerability assessment & penetration test within the scope of a risk assessment.