Interop Las Vegas 2016

Build Your Conference Agenda

Use this free scheduler to get an overview of all of the sessions available or to find specific sessions, speakers and special events for this year's conference.

By signing up for the Scheduler, you can add sessions to your "Favorites" and develop your own personalized schedule for Interop Las Vegas 2016. This personalized schedule will be synced with the official Interop Mobile App.

Please note: Registration accounts are separate from Session Scheduler. Even if you've registered, you will need to create a Scheduler account.

All SessionsSpeakersMy Schedule
View Sessions As:
  • Enterprise Wireless Security in the Mobile Era

    Blake Krone  |  Managing Director, mobiadroit
    Jennifer Huber  |  Mobility Solutions Architect, World Wide Technology
    Location:  Breakers F
    Session Type: Workshop
    Track: Wireless & Mobility
    Pass type: 2-Day Pass, 5-Day Pass - Get your pass now!
    Vault Recording: TBD

    The overwhelming abundance of mobile devices has changed how IT teams historically responded to advancements in the consumer device market. Consumer devices have been driving the necessity for wireless infrastructure hardware upgrades, software updates and configuration changes to maintain secure connections to devices, applications and information. Each end-user device has its own vulnerabilities, as does each technology vertical. There is no "one security method fits all" for wireless infrastructures, but there are foundational best practices that can be applied. In this workshop, your instructors will address those best practices, based on their combined 20+ years experience securing and troubleshooting wireless networks.

    After attending this session, attendees will have a better understanding of:

    • Common security issues with wireless and mobile devices
    • Addressing security issues in wireless infrastructures
    • Wireless security for IoT implementations
    • How to discover compromised networks
    • Methods to protect your networks from obvious exploits