Interop Las Vegas 2016

Build Your Conference Agenda

Use this free scheduler to get an overview of all of the sessions available or to find specific sessions, speakers and special events for this year's conference.

By signing up for the Scheduler, you can add sessions to your "Favorites" and develop your own personalized schedule for Interop Las Vegas 2016. This personalized schedule will be synced with the official Interop Mobile App.

Please note: Registration accounts are separate from Session Scheduler. Even if you've registered, you will need to create a Scheduler account.

All SessionsSpeakersMy Schedule
View Sessions As:
  • Seven Ways Malicious Code Enters Your Virtual World

    Cameron Camp  |  Security Researcher, ESET
    Location:  Lagoon K
    Session Type: Conference Session
    Track: Security
    Pass type: 3-Day Pass, 5-Day Pass - Get your pass now!
    Vault Recording: TBD

    In this talk Cameron Camp discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems. This session will also include vendor-neutral strategies for protecting virtual systems from malware, and tips for staying on top of this growing security challenge.

    Session Outline

    • The current climate of constant attack from cyber criminals will be touched on, but largely taken as read
    • The seven ways in which malware threatens virtual systems will be presented, in the context or real world scenarios
    • Topics include compromised server executables, unpatched virtual server images, neglected virtual networking connections, and vulnerable end points
    • The current and evolving capabilities of malicious code writers will be referenced
    • Vendor neutral strategies for protecting virtual systems from malware will be presented
    • Takeaways include tips for staying on top of this growing security challenge

    Key Takeaways
    1. Malicious code is a serious threat to virtual systems
    2. There are some non-obvious attack vectors in virtual systems
    3. You can mount strong defense against malware in the virtual world