Kick Off Your Interop ITX Experience With Our Summits and Workshops

Held on Monday and Tuesday, these long-form programs are designed to provide you with additional opportunities for immersive and in-depth education. View detailed schedules and more info about each Summit and Workshop in the conference agenda. 


Nearly half of large enterprises are already experimenting with artificial intelligence applications, and there’s increasing pressure to do more. But even with all the hype, you're probably underestimating the value that AI can potentially offer to your company in the decades to come. The AI Summit at Interop ITX will explore how AI and machine learning have the potential to transform the way we interact with our existing and future enterprise systems. AI-enabled technologies are surprisingly easy to integrate into your own enterprise, and can unlock how and why systems operate, providing insight into what elements should be measured and monitored to achieve optimal performance or improvement.  

You'll learn about the practical applications of AI, deep learning, and machine learning for traditional businesses and find out how to move from theorizing about what you might do with AI to integrating it as part of day-to-day business. You'll hear from businesses that are already making a successful leap into this exciting new world and come away with concrete advice on how you can begin to implement a successful AI strategy at your own company.

View details for Day 1 and Day 2.

An intensive, two-day event for IT pros who need bone up on information security essentialsIf you are an IT pro who needs a fast, comprehensive, and authoritative course that will catch you up on all of the latest developments and thinking about data security, then Dark Reading’s Cybersecurity Crash Course is for you. Taught by recognized experts in their respective areas of security specialty, the Cybersecurity Crash Course offers two days of education that will give you the fundamental concepts you need to understand today’s security challenges, as well as an overview of the latest attacks, threats, and vulnerabilities that put enterprises at risk. You’ll get insights on the key steps every organization should take to protect critical data, as well as a detailed look at how to respond when your systems have been compromised. Our goal is to make you “security savvy” by giving you the basics you need to understand the threats and responses, while at the same time catching you up on the latest exploits being perpetrated by computer criminals, nation-states, and hacktivists. Best of all, uou’ll have an opportunity to ask the experts questions about specific threats to your environment – in a supportive, safe, and intimate setting where there are no dumb questions. Check out the agenda for Day 1 and Day 2

Interop ITX is pleased to announce a partnership with the DevOps Institute to offer a certification course for our attendees. This two-day program will allow attendees to earn a DevOps Foundation Certification while at the event, at no additional cost. This sixteen hour course provides an introduction to DevOps, the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals. Improved workflows will result in an improved ability to design, develop, deploy and operate software and services faster.

At the end of the course, students will receive a code allowing them to take the online test free of charge, on their own time. Please note that you must attend both full days of the course in order to be eligible to take the test. See more info here

There has never been a better time to be an IT leader. However, the leadership philosophies and skills that got you here are not going to allow you to be successful in a world of increased complexity, rising expectations, and accelerating change. In this two-day event, you'll hear from successful IT executives about practical, real world strategies they have used to create business value. You'll also learn about frameworks, tools and best practices for leading your organization up the IT maturity curve. See the agenda for Day 1 and Day 2.

As enterprises build out their digital transformation strategies, IT infrastructure is rapidly evolving to keep up. Businesses are focusing on modernizing their networks to support skyrocketing connectivity demands while improving agility and service levels. This ushers in a new breed of software-defined, service-based, and open source network infrastructure that allows flexibility, automation, and integration with cloud models and applications.

This two-day program, emceed by IDC senior analyst Brandon Butler, will explore how today's enterprise networks must adapt to meet the needs of today's technology-centric businesses and will explore how those who build these networks need to prepare for challenges on the horizon.

The Role of the Modern Network
Radia Perlman (Fellow, Dell EMC)

The Open Source Perfect Storm
Arpit Joshipura (General Manager, Networking & Orchestration, Linux Foundation)

Realizing Security and Speed at Scale
Lori MacVittie (Principal Technical Evangelist, F5 Networks)

What's Next for Networking
Martin Casado (General Partner, Andreessen Horowitz)

The Enterprise Network Is Dead...Or Is It?
Peyton Maynard-Koran (Senior Director - Worldwide Infrastructure, Whole Foods/Amazon)

Keeping the 'Inter' in 'Internet'
Leslie Daigle (Principal, ThinkingCat Enterprises)

Demise of the Network Perimeter
Charlie Gero (CTO, Enterprise Division, Akamai)

This is a preliminary listing. Check back for additional speakers and scheduling.

View Day 1 and Day 2 in the agenda. 

A full-day event for IT security professionals to learn and share about the latest threats and data defense practices: Produced by the editors of Dark Reading and led by some of the cybersecurity industry’s top experts and speakers, the Security Pro Summit is an opportunity for IT security professionals to take a deeper dive into cybersecurity threats and defense, learning and sharing on the latest methods for detecting and responding to new threats. At the Security Pro Summit, attendees will go beyond cybersecurity basics to learn about emerging vulnerabilities and exploits, as well as practical, usable methods for detecting and responding to online attacks in an enterprise. Attendees will not only gain insight from top experts on the latest threats and potential security flaws, but also will get insight on how security teams can handle these critical issues, and the tools and best practices they need to mitigate them. See the day's agenda here.


Just when we started to get some progress towards IT moving into a valuable, trusted provider of IT services…the goalposts have moved. In this session we will discuss at a macro level how the world has changed, and what the future of IT may look like in terms of Business Alignment, Strategic IT Relationships, and the role and value of IT as a function. This workshop will cover the topics of Business Alignment and the newer goal of IT Convergence. 

View this workshop in the agenda here.

IoT and predictive analytics are complementary and increasingly integrated in a solution. Both are complex subjects and may also appear overwhelming for some. There are indeed many moving parts with a noticeable amount of information to digest. The amount of time and effort needed to invest to become proficient with the two subjects can be significant. That however need not be the case. As this workshop takes a direct and accelerated approach to maximize the learning with a relatively small amount of time. That is to learn by analyzing, architecting and constructing an IoT solution with predictive analytics with a hands-on approach. Specifically, this workshop takes you through the process of constructing a solution from defining problems, developing concepts, composing an architecture, building components, integrating with Machine Learning, visualizing data, to packaging and publishing the solution.

View this workshop in the agenda here.

Companies everywhere are moving applications to the cloud, but the possibilities are endless. That can make it difficult to select the right architecture for your applications and business needs. This workshop will provide an overview by defining the most common application requirements and mapping them to the available options in today's cloud ecosystem. Our speaker will cover popular cloud platforms and introduce emerging technologies such as containers, microservices and serverless computing.

View this workshop in the agenda here.

Every day, companies struggle with finger pointing when it comes to resolving application performance and security issues. Time after time, it comes down to digging through the data packets traveling across the network to find out exactly what is happening. This hands-on workshop will focus on how to capture the right packets using the free and open source packet analyzer Wireshark, and what to do with those packets once they are captured. 

View this workshop in the agenda here.

In this workshop, we'll walk through the basics of creating a serverless application using AWS Lambda and other AWS services. We'll start by going over what a serverless function is (and isn't!), what tools we'll need, and start coding. Before you know it, you'll have your own working, callable serverless functions. We'll round out the session by working through deployment and observability tools and talking about how serverless architectures can be used in many existing applications.

View this workshop in the agenda here.

You've heard the term "infrastructure as code", but what is it? How does one get started? What are some of the tools involved? This session aims to help you get started with "infrastructure as code" by giving you the basics you need. In this hands-on session, you'll first learn some fundamentals of Git, the powerful and widely-used distributed version control system, and how to collaborate with others using Git and GitHub. Then you'll move on to 3 different examples of "infrastructure as code" tools: Ansible, AWS CloudFormation, and Terraform. You'll also see how these tools might be used in conjunction with each other or with similar tools. When the session is done, you'll walk away with a better understanding of what "infrastructure as code" means and how you might put it to work in your own career.

View this session in the agenda here.

Design thinking, also called human-centered design, is a problem-solving approach that leverages the diversity of thinking in a team to create breakthrough innovations. Design thinking is applied in all fields including healthcare, education, technology, academia, and more. It includes both a set of mindsets and a collection of tools that empower teams to move quickly, build early, and learn through many cycles of iteration. In this session, we will explore the principles and practices of design thinking and apply them to an IT-related challenge. No previous experience with design thinking required.

View this workshop in the agenda here.

As attackers adapt their methods and become more sophisticated, security teams are discovering that traditional, passive methods of detecting bad actors don't work as well as they once did. Breaches are going days, months, and years without being noticed. To address the gap between compromise and detection, many enterprises are finding they need to actively seek out indicators of compromise to find undetected threats. This half-day workshop will introduce the attendees to free and open source incident response and threat hunting tools for performing quick triage to hunting for indicators of compromise throughout the network.

View this session in the agenda here.

Machine learning is one of the hottest topics in tech today. It is a must-have organizational competency in the data-driven era of digital transformation. Despite the unprecedented speed and ease of creating predictive models today, the human mind is still essential for generating good machine learning models. In this fast-paced introductory class, participants will be introduced to fundamental concepts and walk-through the entire machine learning lifecycle with optional hands-on exercises using open source tools. From selecting the right problem to solve to preventing algorithm bias, machine learning is still an art and a science. Participants will learn how machine learning works, how to prevent common mistakes and learn how to build and use machine learning models.

View this workshop in the agenda here.

Without creativity, we are faced solving tomorrow's problems with yesterday's solutions…and that just won't work. We need to clarify our role in driving creativity and change to successfully produce continued growth and profitability. This workshop offers the perfect mix of techniques and learning activities to influence employees at all levels to understand and embrace the process of continued innovation. Participants will identify strategies to generate new possibilities, evaluate and develop ideas showing promise, and take responsibility for considering how to communicate the need for change.

View this workshop in the agenda here. 

More and more companies are relying on red teams and penetration tests to identify gaps in their security controls, monitoring capabilities, and response process. While these events are extremely useful, they typically occur on a semi-annual, often irregular schedule that provides a snapshot in time of an organization’s security posture. The accessibility of offensive tools makes it so that defenders don’t have to wait for the next pen test. They can utilize some of the same tools and techniques to identify weaknesses, validate vulnerability scans, and harden their networks. This half-day workshop introduces participants to the penetration testing process, tools used during red team operations, and how these can be used to identify gaps in existing security controls.

View this workshop in the agenda here.

Wireless is changing how individuals interact with technology and how IT organizations deliver applications, products and services to their employees and customers. This session will provide an overview of some of the latest wireless technology and services available, or coming soon, to the marketplace. We will identify these technologies and services while giving you real-world scenarios on how the advancements can benefit you. From AI for Wi-Fi, LoRA radios, multi-gig point-to-point, IoT, SDR and sensors, this overview will help give you a glimpse of how you can leverage wireless technology to solve problems, save money, and build reliable wireless networks that are easily managed. 

View this workshop in the agenda here.