Interop is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

2019 Schedule Builder | 2020 Coming Soon

View, browse, and sort the ever-growing list of sessions by pass type, track, and format. With this Schedule Builder, you can build your schedule in advance and access it during the show via export or with the mobile app, once live. For your schedule to sync properly with the mobile app, be sure to login to Schedule Builder with the same email address you used to register for Interop 2019.

Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Please note that adding a session into your agenda does NOT guarantee you a seat to the session.

Achieving "Reasonable" Security You Can Defend Against Public and Legal Scrutiny

John Pironti (President, IP Architects)

Location: Grand Ballroom E

Date: Wednesday, May 22

Time: 1:30pm - 2:20pm

Pass type: All Access, Conference - Get your pass now!

Track/Topic: Security

Format: Conference Session

Vault Recording: TBD

For your organization to survive the legal ramifications and reputational blowback of a data breach, you must be able to defend your security practices. Can you prove your business upheld a standard of “due care” and followed “reasonable security procedures and practices”? How do you know for sure?

In this session, learn how to use a “defensible” approach to information risk and security that ensures an organization can justify its strategy, actions, approach, and security posture to interested and required parties. This can often be a path to greater success for the professionals who are tasked with identifying information-related risks and ensuring they are properly managed. By adjusting approach and communications to promote the concept of defensible information risk and security, leaders and professionals who support these efforts are likely to find more success and support within their organizations.

This session will discuss five key components of this approach in detail and will include case studies and use cases to support the use of this concept.

Presentation File