Passes & Prices

Please join us!

We have five different passes offering an option for every budget, schedule and training objective, leaving you no excuse to miss Interop ITX this year!

 

 All AccessConferenceSummits & WorkshopsOne Day ConferenceBusiness Hall
Early Bird
Through March 31
$2,899$2,099$1,799$999$249
Regular
April 1-May 13
$3,099$2,299$1,999$1,149$299
On-site
May 14-19
$3,299$2,499$2,199$1,299$349
Benefits include:     
Summits & Workshops
(includes breakfast & lunch) Mon & Tues
Yes Yes  
Conference Track Sessions
(includes breakfast & lunch) Wed - Fri
YesYes Yes
Selected Day Only
One session
Keynotes
Wed & Thurs
YesYesYesYesYes
Business Hall
Tues - Thurs
YesYesYesYesYes
Vendor Tech Sessions
Wed & Thurs
YesYesYesYesYes
Official Interop ITX Party
Wed
YesYesYesYesYes

Special Discounts

Take 30% off the on-site rate when you register a group of three or more. 

These discounts apply to All Access and Conference passes only and must be paid in full by March 31, 2017. All group discount registrations must be submitted from the same company at the same time (within 24 hours). Group discounts cannot be combined with any other offers. Groups must register via phone for this special offer: call 866-535-8992 or 415-947-6916 for more information and to register.

Save 25% off the on-site rate when you register as a Government, Education, or Nonprofit professional.  

These discounts apply to All Access and Conference passes only and must be paid in full by March 31, 2017. These discounts cannot be combined with any other offers. You must register via phone for this special offer: call 866-535-8992 or 415-947-6916 for more information and to register.

 

More Ways to Register

Email

Download the registration form, complete it, and email it to interopitxregistration@ubm.com.

 

 

Phone

For registration assistance, please call 866-535-8992 or 415-947-6916, Monday – Friday, from 9:00 AM – 4:00 PM PT, or email interopitxregistration@ubm.com.

 

 

Interop Las Vegas 2016

Build Your Conference Agenda

Use this free scheduler to get an overview of all of the sessions available or to find specific sessions, speakers and special events for this year's conference.

By signing up for the Scheduler, you can add sessions to your "Favorites" and develop your own personalized schedule for Interop Las Vegas 2016. This personalized schedule will be synced with the official Interop Mobile App.

Please note: Registration accounts are separate from Session Scheduler. Even if you've registered, you will need to create a Scheduler account.

All SessionsSpeakersMy Schedule
View Sessions As:
  
  • Seven Ways Malicious Code Enters Your Virtual World

    Cameron Camp  |  Security Researcher, ESET
    Location:  Lagoon K
    Session Type: Conference Session
    Track: Security
    Pass type: 3-Day Pass, 5-Day Pass - Get your pass now!
    Vault Recording: TBD

    In this talk Cameron Camp discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems. This session will also include vendor-neutral strategies for protecting virtual systems from malware, and tips for staying on top of this growing security challenge.

    Session Outline

    • The current climate of constant attack from cyber criminals will be touched on, but largely taken as read
    • The seven ways in which malware threatens virtual systems will be presented, in the context or real world scenarios
    • Topics include compromised server executables, unpatched virtual server images, neglected virtual networking connections, and vulnerable end points
    • The current and evolving capabilities of malicious code writers will be referenced
    • Vendor neutral strategies for protecting virtual systems from malware will be presented
    • Takeaways include tips for staying on top of this growing security challenge

    Key Takeaways
    1. Malicious code is a serious threat to virtual systems
    2. There are some non-obvious attack vectors in virtual systems
    3. You can mount strong defense against malware in the virtual world