Interop ITX 2017 Schedule Builder

Interop ITX 2017 Schedule Builder

View, browse and sort the Interop agenda by track, pass type, format, session day/time, and conference journey. With the Interop ITX Schedule Builder, you can build your schedule in advance and access it during the show via export or in your Interop ITX Mobile App.

In order to best utilize Schedule Builder, please use the login credentials you've set up on this page as your login credentials on the Interop ITX App. You can download the app on iTunes or Google Play.

All SessionsSpeakersMy Schedule
View Sessions As:
  
  • Andy JordanSenior Security AssociateBishop Fox

    Andy Jordan (CISSP, CISM, ITIL v3, LeanIT, MCSA - S, MCP, Security+, Network+) is a Senior Security Associate at Bishop Fox, a security consulting firm providing services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on resolving IT security and risk gaps in enterprise environments as well as creating and spearheading security programs.

    He has built and managed multiple security programs throughout the duration of his 10-year career. These included asset, patching, configuration, hardening, vulnerability, threat, risk management, and SIEM programs. Andy has successfully implemented enhanced processes and tools for better tracking and visibility. He has closely worked and coordinated with IT teams on multiple occasions. Andy is also an active figure in the information security community, having presented at several venues as well as contributing to SC Magazine.

    Prior to joining Bishop Fox, Andy was heavily involved with compliance, risk, and project management. Andy was a security and risk practice leader at a Fortune 500 manufacturing organization. During this time, he was responsible for numerous vulnerability management programs, each capable of addressing hundreds of thousands of vulnerabilities per year. The core of these activities involved OS and middleware patching processes, vulnerability scanning processes, and security monitoring. He also collaborated with clients on how to best deploy the security and risk management practices for their environments.


    Presenting: