How is IT changing? What are the new technologies? How is my job changing?
At Interop, we nurture every aspect of your career by offering content across all key technologies and stages of your career. Experience collaboration and innovation with the industry’s most thought after leaders. Be sure to check back often as we’re adding sessions and speakers weekly!
Please note, Interop Trainings sell out! If you’re interested in participating in Trainings, we suggest registering early.
Date: Monday, September 21
Time: 9:00am - 5:00pm
Pass Type: All Access, Trainings - Get your pass now!
Event Type: Trainings
Vault Recording: TBD
Today’s cyber attackers are developing new tactics and exploits at light speed. With so many other responsibilities to manage, it’s difficult for many IT professionals to keep up with the latest threats – and even tougher to learn the latest tools and processes for enterprise defense. The Cybersecurity Crash Course is designed to help you catch up with the latest developments in cybersecurity attacks, emerging threats, and methods for protecting your enterprise data. In a two-day series of sessions – each taught by a top expert in the topic – you’ll learn the latest developments in key areas of security operations. You'll get insights into the key steps every organization should take to protect critical data, as well as a detailed look at how to respond when your systems have been compromised. Our goal is to make you "security savvy" by giving you the basics you need to understand the threats and exploits, while at the same time updating you on the latest thinking around enterprise defense.
Some of the takeaways offered by the Cybersecurity Crash Course:
Detailed, expert sessions that offer key principles of defense, as well as updates on the latest threats, in areas such as cloud security, endpoint defense, application security, and insider threats
Insight on the latest tools and processes for protecting enterprise data and preventing attacks before they happen
Advice and recommendations on incident response, including key steps to take when a critical data breach occurs
Day 1 agenda to be announced.