Interop is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cybersecurity's Changing Role in IT

The Critical Next Steps in IT’s Evolution – and How Cybersecurity Will Fit In

April 29, 2021 | 8:00AM - 2:00PM PT | FREE Admission | Earn CPE Credits

No matter how your enterprise’s IT organization is evolving, security will play a crucial role in your strategy. Whether you’re undergoing digital transformation, adding capabilities for remote workers, moving toward the cloud, implementing 5G networks, or taking a "Shift Left" approach to application development, you will need to make critical decisions about cybersecurity tools, techniques, and practices. In this unique event, you’ll have an opportunity to look at today’s most formative IT trends from a security point of view.

Whether you’re an IT professional who needs to understand the security implications of a new project or a security professional who needs to understand IT’s latest directions, this virtual event is for you. In a series of keynote presentations and expert panels, you’ll get insight on the latest trends in cybersecurity – and how they might affect the threat surface of your organization. You’ll get tips on how to minimize the cyber risk of next-generation applications and services. And you’ll get advice on how to harmonize the practices and processes used by both the IT team and the cybersecurity team.

Interop Digital | Why Attend "Cybersecurity's Changing Role in IT" April 29

Sponsored by

Why Attend

This event is a unique opportunity to learn about the security implications of today’s most important IT trends. You’ll learn how security considerations affect the way your enterprise works with cloud service providers, how to secure the huge base of remote endpoints, how to add security to the DevOps direction, just to name a few. Additionally, we've partnered with ISC(2) to offer attendees the ability to earn CPE credits.

Among the topics that will be covered at Cybersecurity's Changing Role in IT:

  • An overview of the changing role of cybersecurity in the IT department, and how security roles and IT roles are increasingly overlapping
  • A look at some of the most widely used cloud services, and how to ensure the security of your data while expanding your applications of cloud technology
  • Insight on some of the weakest security links in today’s enterprise networks, and how to build a stronger and more comprehensive network security strategy
  • A look at next-generation application development strategies, including DevOps and Shift Left, and their implications for cybersecurity
  • Insights on artificial intelligence and machine learning, and how these emerging technologies might be used both to attack your organization and to defend it
  • Tools and techniques for connecting and harmonizing the activities of IT operations and security operations, particularly in the discipline of incident response

If you want to know more about the latest trends and developments in IT – and how those trends and developments might affect your organization’s cybersecurity strategy -- then this free virtual event is for you. Register for Interop Digital's Cybersecurity event today!

Agenda

8:30AM - 9:00AM - Keynote | Baking Cybersecurity Into Enterprise IT
Years ago, the security team (if there was one) and the broader IT team often operated separately, sometimes at odds with each other. Today, cybersecurity has become a pervasive issue in almost every area of IT, from the network to the help desk to application development. What role should cybersecurity play in next-generation IT programs and practices? How can security become less of a silo and more directly integrated into all phases of IT? In this keynote, a top IT leader discusses new approaches and tools to help IT organizations and security teams work better together.

9:30AM - 10:05AM - Network Security for 2021 and Beyond
Even before COVID-19 struck, IT organizations were making huge strides in the implementation of next-generation network technology such as SASE, 5G and software-defined networking (SDN). Today, those organizations are faced with a whole new spectrum of challenges as many employees and trading partners continue a remotely operated computing model. In this panel, experts discuss the impact of emerging networking strategies on cybersecurity tools and processes, as well as the latest cyber threats to enterprise networks. You’ll also get recommendations on how to integrate and harmonize the elements of IT operations and security operations.

10:30AM - 11:05AM - The Future of Authentication
With the global pandemic continuing to keep employees, customers, and suppliers at home, the challenge of remote authentication has never been more critical. Yet, many enterprises are still relying on old, flawed password strategies to protect crucial data. In this panel, top experts discuss the latest tools and practices for multifactor authentication, and strategies for replacing outdated password schemes. Attendees will learn about emerging methods of ensuring that end users are who they say they are, as well as strategies for implementing authentication not only for individual applications, but for all applications across the enterprise.

11:30AM - 12:05PM - Building Security Into Enterprise Application Development Processes
Today's application development teams are implementing new strategies and processes every day, from DevOps to Shift Left approaches. How can your IT team bake security into the software development life cycle? In this panel discussions, experts from both the app dev side and the security side join to discuss the tools and processes enterprises can use to create secure applications in record time.

12:30PM - 1:05PM - AI and Machine Learning: Implications for Enterprise Security
The rapid growth of artificial intelligence and machine learning technologies is driving a sea change in enterprises’ approaches to IT. But how will these ground-breaking technologies affect cybersecurity policy and strategy? In this panel discussion, experts discuss the steps that organizations must take in order to secure the ongoing operations of AI and machine learning technologies. You’ll also get insight on how your team can use AI and ML to improve enterprise security – and how the bad guys might use these emerging technologies against you.

Who Attends

Interop Digital is truly a community event that brings together all levels of IT professionals working across diverse industries, at different points of their careers. 

Are you an IT noob?
Great, we have you covered — Interop provides education and training to help you feel confident in your role while helping to expand your professional network.

Are you a battle-scarred IT vet?
No problem — Interop helps you stay on top of emerging technologies and new approaches, gives you a better understanding of the wide-ranging implications of any technology decision, and lets you share war stories with peers.

Join all levels of IT and business professionals who are tasked with leveraging technology to drive their organizations forward:

  • CISO
  • Security Engineer
  • Security Architect
  • Security Consultant
  • CIO/CTO
  • VP IT/Engineering/Operations
  • IT Director
  • IT Manager
  • Infrastructure Manager/Staff
  • Network Engineer
  • Network Administrator
  • IT Operations/Services
  • IT/Network Architect
  • Software Developer/Engineer
  • Systems Engineer
  • Application Development Manager
  • IT/Network Analyst

Earn ISC(2) Continuing Professional Education (CPE) Credits

We partner with (ISC)2 to provide credits for Interop. 1 credit is awarded per one hour of security-themed sessions attended, with a maximum of 8 per day. CISSP certification is a globally recognized standard of achievement that confirms an individual's knowledge in the field of information security.

It’s simple: enter your (ISC)2 member number on the Interop registration profile page. If you have already registered for Interop you can log back in to your profile and add it. Following the event, we'll submit your security-themed session attendance to ISC(2) so the credits can be added directly to your account. All educational opportunities offered by the submitter as eligible for CPE credits shall be of the highest quality, directly related to at least one (1) domain of information security as recognized by (ISC)2.