Vendor-Neutral Conference Program

Explore Security

The growing cybersecurity threat landscape is one of the biggest concerns – if not the biggest – of Interop ITX attendees. Risk factors and chances of a breach are constantly increasing, requiring IT leaders to keep up with the latest vulnerabilities and ways to stop them. In addition, they must ensure security is integrated into practices and technologies across the organization and keep peace with multiple stakeholders who may have differing priorities.

Interop ITX's Security track, led by the editors of Dark Reading, provides IT and security pros with the tools to succeed. Speakers include industry experts and specialized consultants with decades of experience. Attendees will learn how to mitigate risk with content on new attack vectors and how to detect them, developing security architectures, building an effective security organization, compliance and legal issues, ransomware, incident response, and network, application, and cloud security challenges.

Security Track Chair: Sara Peters

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure. View Sara’s security archive at Dark Reading.

Security Review Board

Andrew Froehlich, President and Lead Network Engineer, West Gate Networks
Juliet Okafor, Chairwoman and Strategic Advisory Board Member, International Consortium of Minority Cybersecurity Professionals

Don't miss these hot sessions:

Tips and Tricks for Easier Enterprise Encryption

Date: Wednesday, May 2
Time: 2:00pm - 2:50pm
Pass Type: All Access, Conference
Format: Conference Session
Encrypt, encrypt, encrypt! The risk from breaches today can be a seven to eight figure risk. Encryption protocols, encryption key strengths, encryption choices across mobile devices, e-mail and more may all seem confusing and overwhelming. Understand how to simplify the use of encryption in your organization, and do so consistently.

Ali Pabrai
CEO, ecfirst

Tracking Ransomware: Using Behavior to Find New Threats

Date: Thursday, May 3
Time: 3:00pm - 4:30pm
Pass Type: All Access, Conference
Format: Hands-On Session

This hands-on lab (bring your own laptop) will be an interactive session on the latest ransomware trends, as well as how to defend your enterprise against this threat. Attendees will understand how ransomware operates, what are the attack vectors and what are the commonalities between variants. They will learn the skills to find and track new ransomware with dynamic analysis of behavior, and what is the sophistication of the perpetrators.

This session will explore traits of highly effective strains of self-propagating malware, as well as advances in tools to facilitate lateral movement. Ransomware as we know it today has a sort of "spray and pray" mentality; they hit as many individual targets as they can as quickly as possible. Typically, payloads are delivered via exploit kits or mass phishing campaigns. With few notable exceptions, data loss was mostly a side effect of malware campaigns. Most actors were concerned with sustained access to data or the resources a system provided to meet their objectives. Ransomware is a change to this paradigm from subversion of systems to outright extortion; actors are denying access to data and demanding money to restore access to that data.

This session is limited to 100 attendees, so an RSVP is required. Please RSVP here.

Jessica Bair
Senior Manager, Advanced Threat Solutions, Cisco

The Procrastinator’s Guide to GDPR Compliance

Date: Wednesday, May 2
Time: 3:00pm - 3:50pm
Pass Type: All Access, Conference
Format: Conference Session

Enforcement for the EU’s General Data Protection Regulation begins May 25, it entirely alters the way European Union citizen data must be collected and processed, it drops in a 72-hour breach notification requirement, fines of 20 million Euros or 4% of global annual turnover (whichever is higher) are just an amuse-bouche of the penalties authorities can issue for non-compliance…and you’re not ready. Need some help? In this session, learn how to organize, prioritize and accelerate your GDPR efforts. Get all your questions answered about the legislation. (Do I need a data protection officer, what are these records of processing activities about and how am I supposed to secure those, what’s ‘this right to be forgotten’ nonsense?) Leave this session feeling confident in what steps to take next, and how to turn GDPR from a security pro’s worst enemy into your best friend.

Lorne Joseph
Managing ConsultanteGRC.COM