Passes & Prices

Please join us!

We have five different passes offering an option for every budget, schedule and training objective, leaving you no excuse to miss Interop ITX this year!

 

 All AccessConferenceSummits & WorkshopsOne Day ConferenceBusiness Hall
Early Bird
Through March 31
$2,899$2,099$1,799$999$249
Regular
April 1-May 13
$3,099$2,299$1,999$1,149$299
On-site
May 14-19
$3,299$2,499$2,199$1,299$349
Benefits include:     
Summits & Workshops
(includes breakfast & lunch) Mon & Tues
Yes Yes  
Conference Track Sessions
(includes breakfast & lunch) Wed - Fri
YesYes Yes
Selected Day Only
One session
(does not include breakfast and lunch) 
Keynotes
Wed & Thurs
YesYesYesYesYes
Business Hall
Tues - Thurs
YesYesYesYesYes
Vendor Tech Sessions
Wed & Thurs
YesYesYesYesYes
Official Interop ITX Party
Wed
YesYesYesYesYes

Special Discounts

Take 30% off the on-site rate when you register a group of three or more. 

These discounts apply to All Access and Conference passes only and must be paid in full by March 31, 2017. All group discount registrations must be submitted from the same company at the same time (within 24 hours). Group discounts cannot be combined with any other offers. Groups must register via phone for this special offer: call 866-535-8992 or 415-947-6916 for more information and to register.

Save 25% off the on-site rate when you register as a Government, Education, or Nonprofit professional.  

These discounts apply to All Access and Conference passes only and must be paid in full by March 31, 2017. These discounts cannot be combined with any other offers. You must register via phone for this special offer: call 866-535-8992 or 415-947-6916 for more information and to register.

 

More Ways to Register

Email

Download the registration form, complete it, and email it to interopitxregistration@ubm.com.

 

 

Phone

For registration assistance, please call 866-535-8992 or 415-947-6916, Monday – Friday, from 9:00 AM – 4:00 PM PT, or email interopitxregistration@ubm.com.

 

 

Interop Las Vegas 2016

Build Your Conference Agenda

Use this free scheduler to get an overview of all of the sessions available or to find specific sessions, speakers and special events for this year's conference.

By signing up for the Scheduler, you can add sessions to your "Favorites" and develop your own personalized schedule for Interop Las Vegas 2016. This personalized schedule will be synced with the official Interop Mobile App.

Please note: Registration accounts are separate from Session Scheduler. Even if you've registered, you will need to create a Scheduler account.

All SessionsSpeakersMy Schedule
View Sessions As:
  
  • Avoiding Legal Landmines Surrounding Your IT Infrastructure: Policies and Protocols

    Jason Straight  |  SVP, Credit Risk Solutions and Chief Privacy Officer, UnitedLex
    Location:  Lagoon K
    Session Type: Conference Session
    Track: Security
    Pass type: 3-Day Pass, 5-Day Pass - Get your pass now!
    Vault Recording: TBD

    Balancing employee privacy, business interests, third-party risk and employee/vendor access is a challenge for any CISO on a good day -- but watch your step! In today's business and IT environment, there are legal and regulatory "landmines" surrounding your business and IT initiatives that either were not there a few short years ago, or that have recently surfaced after several years of mega-breaches.

    Navigating these landmines can be a nightmare -- especially for those who are unaware of their existence. This presentation will illuminate some of these legal landmines, and provide steps on how to avoid or diffuse them to protect yourself and your organization. It will also reveal one of the IT organization's biggest allies and most under-utilized resources: your legal team.

    The presentation will be organized into the following four themes:

    1. Learning the legal landscape: Understanding your IT organization's current legal exposure and risk, meeting the expectations of regulatory bodies such as the SEC, FTC or Congress, and preparing for the future. It will also provide an overview of potential regulatory actions that could be taken by these bodies, as well as litigation risks and the business impact of such litigation.
    2. The legal implications of incident response and recovery operations: Identifying common errors made by information security personnel during the incident response process that may increase legal exposure and prompt more aggressive regulatory actions. Such errors include careless email communications, failure to preserve log and event information, failure to preserve end-point evidence prior to wiping and reimaging, and more.
    3. Leaning on legal throughout the cybersecurity lifecycle to protect yourself and your organization: Partnering with legal will help you navigate the legal and regulatory landmines that they know well. The more familiar they are about your IT systems, processes and protocols, the better they will be able to identify short-comings prior to a breach and shield your organization in the aftermath.
    4. "Speaking legal" when communicating risk to executive stakeholders: In order to facilitate budget approval and buy-in or to accurately represent the full extent of a breach, including legal ramifications. By establishing a solid legal precedent for future IT purchases, you are much more likely to receive approval from top execs and the board, who can be held personally accountable for any organizational failures leading to a breach. And by simultaneously presenting both the IT and legal outcomes of a breach, you can help the C-suite or Board avoid premature conclusions or make uninformed decisions.

    It will conclude with best practices for preemptive risk management, collaborative incident response and how to successfully protect against business exposure, legal liabilities and regulatory action all while training IT and information security staff to approach their role while "thinking legal."