Use this free scheduler to get an overview of all of the sessions available or to find specific sessions, speakers and special events for this year's conference.
By signing up for the Scheduler, you can add sessions to your "Favorites" and develop your own personalized schedule for Interop Las Vegas 2016. This personalized schedule will be synced with the official Interop Mobile App.
Please note: Registration accounts are separate from Session Scheduler. Even if you've registered, you will need to create a Scheduler account.
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, it has complicated and even compromised security.
A private cloud is nothing more than the virtualized components of a traditional data center, making it easier to provision, operate, and manage resources more efficiently. Hybrid clouds leverage larger scale public cloud environments to drive further efficiencies. Containers take this a step further, delivering greater micro-segmentation and isolation capabilities with much faster boot times. Security, of course, needs more than just perimeter defenses. Consistent policies, protections, and enforcement across your virtual infrastructure are now a reality, as the agility, ubiquity, and efficiency of software-defined security joins the rest of the software-defined infrastructure. This is true cloud security.
In this session, Jamie Tischart shares his unique perspective and expertise to provide attendees with actionable takeaways:
Where do control points for security need to reside?
Why the traditional perimeter security model is insufficient, how do you define a perimeter in an environment where any device goes through many networks to many services, both inside and outside the business, or many containers are operating in a single machine?
Why security in this "as-a-service" world must become more dynamic.
Title: Director, On-Board Applications Company: John Deere Intelligent Solutions Group
Welcome! You can use the Session Scheduler tool to browse sessions and build a custom event schedule. Once you've saved your personal schedule, you can access it from the free Interop Mobile app. Note: use the same login/password on the Mobile app that you set up on this web site.
Step 1. Create an account. Use the "Create Account" button at the top of the right-hand corner.
Step 2. Choose a view. Select either the "List" or the "Grid" icon. (It's the same data, just a different view of the sessions.)
Step 3. Choose your sessions. Click the "Add" or "Remove" button next to each session to add it to, or remove it from, your personalized schedule.
Step 4. Review your schedule. Push the "My Schedule" button in the left column to view your selected sessions.