Use this free scheduler to get an overview of all of the sessions available or to find specific sessions, speakers and special events for this year's conference.
By signing up for the Scheduler, you can add sessions to your "Favorites" and develop your own personalized schedule for Interop Las Vegas 2016. This personalized schedule will be synced with the official Interop Mobile App.
Please note: Registration accounts are separate from Session Scheduler. Even if you've registered, you will need to create a Scheduler account.
DNS is a critical component of the Internet and many private networks. However, since standard security measures do not block DNS traffic, cybercriminals are able to infiltrate networks and gain access to proprietary data. In addition to launching attacks, cybercriminals can also exploit an organization's DNS to cause outages.
Today there are nearly one billion host names managed by the DNS system and nearly a quarter of a billion active websites. Some of the world's most highly trafficked media, Internet search and social networking sites have been disrupted by DNS attacks, with hackers seizing control of their websites by changing information in the DNS database.
Other global organizations, including global communications service providers, have fallen victims to DNS amplification attacks resulting in customer connectivity issues. Cybercriminals have also launched attacks to trick individuals into visiting malicious websites that attempted to change the DNS settings of their home routers, and their victims who tried to open banking sites found themselves redirected to phishing pages.
During this session, Cloudmark Engineering Director Angela Knox will examine DNS threats and their potential impact, including DNS ID hacking, DNS spoofing and cache poisoning. Other DNS threats to be discussed include:
Botnets: Cybercriminals are able to commandeer a system and hide command and control to launch malicious attacks.
Advanced Persistent Threats: Easy to hide and launch, APTs can be used as a launching pad for phishing, malware and other threats.
DNS Exfiltration and Tunneling: DNS can be used to tunnel through corporate protection systems, resulting in data and revenue loss.
DNS Amplification: Cybercriminals are able to launch distributed denial of service (DDoS) attacks leveraging publicly accessible open DNS servers to overwhelm a network, potentially creating outages.
Knox will also highlight best practices for identifying DNS vulnerabilities and for safeguarding an organization's DNS infrastructure.
Title: Director, On-Board Applications Company: John Deere Intelligent Solutions Group
Welcome! You can use the Session Scheduler tool to browse sessions and build a custom event schedule. Once you've saved your personal schedule, you can access it from the free Interop Mobile app. Note: use the same login/password on the Mobile app that you set up on this web site.
Step 1. Create an account. Use the "Create Account" button at the top of the right-hand corner.
Step 2. Choose a view. Select either the "List" or the "Grid" icon. (It's the same data, just a different view of the sessions.)
Step 3. Choose your sessions. Click the "Add" or "Remove" button next to each session to add it to, or remove it from, your personalized schedule.
Step 4. Review your schedule. Push the "My Schedule" button in the left column to view your selected sessions.