Use this free scheduler to get an overview of all of the sessions available or to find specific sessions, speakers and special events for this year's conference.
By signing up for the Scheduler, you can add sessions to your "Favorites" and develop your own personalized schedule for Interop Las Vegas 2016. This personalized schedule will be synced with the official Interop Mobile App.
Please note: Registration accounts are separate from Session Scheduler. Even if you've registered, you will need to create a Scheduler account.
The adoption of public cloud applications continues to accelerate for both organizations and individuals at an exponential rate, evidenced across the massive growth in the volume of accounts, files, collaboration, and connected third-party cloud applications. For example, we recently discovered that organizations have an average of 1.2 million files stored in the cloud - 10 times the volume of files stored in public cloud applications compared to last year. However, the rapid surge of accounts, file and applications presents increased risk in the form of an extended data perimeter. The adoption of cloud applications has significantly increased the threat surface for cyber attacks, including those that target sensitive data, be it credit card information from a retailer, intellectual property from a manufacturer, M&A information from a publicly traded company, or other critical information.
While many of us are all too familiar with data breaches, few have gotten up close and personal to deconstruct the who, what, why, when, and how of a breach -- particularly cloud-based data breaches. In this session, CloudLock CTO and co-founder, Ron Zalkind, and Akamai CSO, Andy Ellis, will break down several cloud data breaches, highlighting the differences between cloud-based and traditional breaches, as well as providing ways security professionals can enable their organization to embrace and leverage the benefits of cloud technologies while remaining secure and compliant. Through examples, attendees will learn about the rising concern over cloud breaches and how to protect sensitive data either on-premises or in cloud applications, as well as how to keep up with the increased security demand of the cloud and align security with the business strategy of their organizations.
Title: Director, On-Board Applications Company: John Deere Intelligent Solutions Group
Welcome! You can use the Session Scheduler tool to browse sessions and build a custom event schedule. Once you've saved your personal schedule, you can access it from the free Interop Mobile app. Note: use the same login/password on the Mobile app that you set up on this web site.
Step 1. Create an account. Use the "Create Account" button at the top of the right-hand corner.
Step 2. Choose a view. Select either the "List" or the "Grid" icon. (It's the same data, just a different view of the sessions.)
Step 3. Choose your sessions. Click the "Add" or "Remove" button next to each session to add it to, or remove it from, your personalized schedule.
Step 4. Review your schedule. Push the "My Schedule" button in the left column to view your selected sessions.