Interop Las Vegas 2016

Build Your Conference Agenda

Use this free scheduler to get an overview of all of the sessions available or to find specific sessions, speakers and special events for this year's conference.

By signing up for the Scheduler, you can add sessions to your "Favorites" and develop your own personalized schedule for Interop Las Vegas 2016. This personalized schedule will be synced with the official Interop Mobile App.

Please note: Registration accounts are separate from Session Scheduler. Even if you've registered, you will need to create a Scheduler account.

All SessionsSpeakersMy Schedule
View Sessions As:
  
  • True Cloud Security in the As-a-Service World

    Jamie Tischart  |  CTO for Cloud/SaaS, Intel Security
    Location:  Lagoon J
    Session Type: Conference Session
    Track: Cloud Connect
    Pass type: 3-Day Pass, 5-Day Pass - Get your pass now!
    Vault Recording: TBD

    As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, it has complicated and even compromised security.

    A private cloud is nothing more than the virtualized components of a traditional data center, making it easier to provision, operate, and manage resources more efficiently. Hybrid clouds leverage larger scale public cloud environments to drive further efficiencies. Containers take this a step further, delivering greater micro-segmentation and isolation capabilities with much faster boot times.
    Security, of course, needs more than just perimeter defenses. Consistent policies, protections, and enforcement across your virtual infrastructure are now a reality, as the agility, ubiquity, and efficiency of software-defined security joins the rest of the software-defined infrastructure. This is true cloud security.

    In this session, Jamie Tischart shares his unique perspective and expertise to provide attendees with actionable takeaways:

    • Where do control points for security need to reside?
    • Why the traditional perimeter security model is insufficient, how do you define a perimeter in an environment where any device goes through many networks to many services, both inside and outside the business, or many containers are operating in a single machine?
    • Why security in this "as-a-service" world must become more dynamic.