Passes & Prices

Please join us!

We have five different passes offering an option for every budget, schedule and training objective, leaving you no excuse to miss Interop ITX this year!

 

 All AccessConferenceSummits & WorkshopsOne Day ConferenceBusiness Hall
Early Bird
Through March 31
$2,899$2,099$1,799$999$249
Regular
April 1-May 13
$3,099$2,299$1,999$1,149$299
On-site
May 14-19
$3,299$2,499$2,199$1,299$349
Benefits include:     
Summits & Workshops
(includes breakfast & lunch) Mon & Tues
Yes Yes  
Conference Track Sessions
(includes breakfast & lunch) Wed - Fri
YesYes Yes
Selected Day Only
One session
Keynotes
Wed & Thurs
YesYesYesYesYes
Business Hall
Tues - Thurs
YesYesYesYesYes
Vendor Tech Sessions
Wed & Thurs
YesYesYesYesYes
Official Interop ITX Party
Wed
YesYesYesYesYes

Special Discounts

Take 30% off the on-site rate when you register a group of three or more. 

These discounts apply to All Access and Conference passes only and must be paid in full by March 31, 2017. All group discount registrations must be submitted from the same company at the same time (within 24 hours). Group discounts cannot be combined with any other offers. Groups must register via phone for this special offer: call 866-535-8992 or 415-947-6916 for more information and to register.

Save 25% off the on-site rate when you register as a Government, Education, or Nonprofit professional.  

These discounts apply to All Access and Conference passes only and must be paid in full by March 31, 2017. These discounts cannot be combined with any other offers. You must register via phone for this special offer: call 866-535-8992 or 415-947-6916 for more information and to register.

 

More Ways to Register

Email

Download the registration form, complete it, and email it to interopitxregistration@ubm.com.

 

 

Phone

For registration assistance, please call 866-535-8992 or 415-947-6916, Monday – Friday, from 9:00 AM – 4:00 PM PT, or email interopitxregistration@ubm.com.

 

 

Interop Las Vegas 2016

Build Your Conference Agenda

Use this free scheduler to get an overview of all of the sessions available or to find specific sessions, speakers and special events for this year's conference.

By signing up for the Scheduler, you can add sessions to your "Favorites" and develop your own personalized schedule for Interop Las Vegas 2016. This personalized schedule will be synced with the official Interop Mobile App.

Please note: Registration accounts are separate from Session Scheduler. Even if you've registered, you will need to create a Scheduler account.

All SessionsSpeakersMy Schedule
View Sessions As:
  
  • Dark Reading Cyber Security Summit - Day 1

    Tim Wilson  |  Editor in Chief, Dark Reading
    Rafal Los  |  Managing Director, Solutions Research and Development, Optiv
    Chris Eng  |  VP Research, Veracode
    Andrew Blaich  |  Security Researcher, Lookout
    Drew Vanover  |  Director of Technical Solutions, Blue Coat
    Randy Trzeciak  |  Director, Insider Threat Center, CERT
    Marc Laliberte  |  Information Security Analyst, Watchguard Technologies
    Michele Fincher  |  COO and Chief Influencing Agent, Social-Engineer
    Rich Mogull  |  Analyst & CEO, Securosis
    Sara Peters  |  Senior Editor, Dark Reading
    Location:  Lagoon K
    Session Type: Summit
    Track: Security
    Pass type: 2-Day Pass, 5-Day Pass - Get your pass now!
    Vault Recording: TBD

    Everything you need to know about today's IT security challenges but were afraid to ask

    Anthem. OPM. LastPass. The list goes on - every day, your IT organization is abuzz with news of new hacks, breaches, and vulnerabilities that are coming to light in the media. And every day, your top executives worry that your organization might be next. It's up to you, the IT professional, to participate in these discussions and answer key questions about today's threats.

    But do you really know everything you should about the current cyber security environment? Can you intelligently discuss the latest breaches, vulnerabilities, and emerging threats? Do you know about the most critical dangers in specific areas of IT, such as cloud environments and mobile systems? Most importantly, do you know what to do when your organization is compromised?

    In this two-day Interop event, the Dark Reading team and a group of top cyber security experts will offer a crash course in what you need to know about data security and the dangers faced by your organization. You'll get "speed reads" on each key area of security that address the essential elements your organization should know about cyber defense, as well as an overview of the latest exploits. You'll get insight on how to detect a compromise of your IT environment, and recommendations on how to respond. Best of all, you'll have an opportunity to ask the experts the key questions you must answer in your environment - in a supportive, collegial setting where there are no dumb questions.

    What You'll Learn

    • What are the chief cyber threats that your organization should focus on?
    • How can you measure your security posture and the risk you currently face?
    • How can you minimize the security impact of mobile devices in the enterprise?
    • Are cloud services safe?
    • What are the best ways to prevent insiders from leaking critical information?
    • What should you do if you suspect a major compromise of your data?
    • Who are the cyber bad guys and why do they want to attack your organization?
    • And much more!


    Who Should Attend

    • IT professionals who want to know more about security
    • CIOs / CTOs
    • Security professionals who want a fast, comprehensive update on the latest threats
    • IT and operations professionals who must answer questions about security posture
    • Business and IT people who want to contribute to the security conversation


    Agenda
    Day 1: Cyber Defender Crash Course

    7:30-8:30am | Networking Breakfast

    8:30-9:15am | Opening Address: The State of the Enterprise Security Department (Tim Wilson & Sara Peters, Dark Reading)
    Thanks to a plethora of major - and very public - data breaches, security has become one of the most critical issues in IT. What are the chief threats that security departments face, and what are they doing about them? What are today's top priorities for security professionals? This session will include data from two recent surveys of IT and security executives.

    9:15-9:30am | Lightning Talk 1

    9:30-10:15am | Securing Your Enterprise Infrastructure (Drew Vanover, Blue Coat)
    As enterprises add new networking capabilities, SDN, and virtualized server environments, the risks they face are changing as well. In this informative session, a top expert on infrastructure security will discuss the latest threats to networks and servers and how your organization can mitigate them.

    10:15-10:30am | Coffee Break

    10:30-11:15am | Protecting Your Data In the Cloud (Rich Mogull, Securosis)
    Cloud computing services and technology offer a level of efficiency and cost savings that most enterprises simply can't pass up. But does the growing use of cloud technology create a growing threat to enterprise data? How can IT organizations track and secure data as it travels through the cloud? In this session, a cloud security expert will discuss the key danger points in cloud computing and the latest technologies and practices for cloud security.

    11:15am-12:00pm | Endpoints and End Users Strengthening Your Weakest Links (Michele Fincher, Social-Engineer)
    Most major data breaches start with the compromise of a single endpoint - a PC, a mobile device, a user who unwittingly gives up credentials. What can your organization to protect its endpoints? How can you create and enforce end user policies that protect your corporate data? In this session, a top expert discusses how endpoints and end users are most frequently compromised - and how to keep your end users from falling victim.

    12:00-1:15pm | Networking Lunch

    1:15-2:00pm | The Real Risks of Mobile Technology In the Enterprise (Andrew Blaich, Lookout)
    Everyone is saying that the introduction of mobile devices and bring-your-own-device (BYOD) policies is a security risk to the enterprise. But exactly where do those risks come from? In this session, a top expert will debunk some of the myths about mobile security while raising up some threats and vulnerabilities you may not know about.

    2:00-2:15pm | Coffee Break

    2:15-3:00pm | Insider Threats and Preventing Data Leaks (Randy Trzeciak, CERT)
    Major data leaks such as Edward Snowden's release of NSA data and the dump of military data on WikiLeaks are only the tip of the insider threat iceberg. Every day, enterprises face the threat of losing valuable insider information - not only through malicious leaks but through unintentional, accidental violations of security rules that lead to exposure of critical information. How can organizations spot the signs of a data leak and stop it before it goes too far? How can IT help prevent accidental leaks of sensitive data? A top expert offers some essential advice on stopping data loss from within.

    3:00-3:15pm | Lightning Talk: Cyber Kill Chain in Practice by Watchguard (Marc Laliberte, Watchguard)
    Have you ever wondered how you easily a computer can become infected by malware or completely taken over by a cybercriminal? In this live hack, an information security professional will use a Cross-Site Scripting (CSS) attack to gain remote access to a vulnerable client. This session will finish with practical examples showing how your network perimeter can stop this type of attack at different stages of the Cyber Kill Chain model.


    3:15-4:00pm | Finding and Fixing Application Security Vulnerabilities (Chris Eng, Veracode)
    Customer databases, enterprise applications, Big Data - the keys to your enterprise's kingdom lie in its applications. But application security is often overlooked, both by software manufacturers and by internal development teams. What steps can your organization take to find and repair application vulnerabilities - before your attackers discover them? A top applications security expert discusses key practices for scanning and securing applications, as well as offering some insight on how to improve security in your software development organization.

    4:00-4:45pm | Monitoring and Measuring Enterprise Security Posture (Rafal Los, Optiv)
    Over the years, most enterprises have acquired a plethora of tools to detect and/or block security threats. But how can organizations monitor these tools to detect potential threats and measure the security posture of the enterprise? In this session, a top expert on security monitoring will offer some advice on how to monitor and report on an enterprise's security posture, and how to use the data from multiple security systems to track down sophisticated threats.

    4:45-6:00pm | Cocktail Reception