Interop is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Schedule Builder

View, browse, and sort the ever-growing list of sessions by pass type, track, and format. With this Schedule Builder, you can build your schedule in advance and access it during the show via export or with the mobile app, once live. For your schedule to sync properly with the mobile app, be sure to login to Schedule Builder with the same email address you used to register for Interop 2019.

Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Please note that adding a session into your agenda does NOT guarantee you a seat to the session.

Cybersecurity Crash Course - Day 1

Tim Wilson (Co-Founder and Editor-in-Chief, Dark Reading)

Shawn Anderson (Executive Security Advisor, Microsoft)

Katie Burnell (Global Insider Threat Specialist, Dtex Systems)

Robert LaMagna-Reiter (Chief Information Security Officer, First National Technology Solutions)

Maxine Holt (Research Director, Ovum)

Kelly Jackson Higgins (Executive Editor, Dark Reading)

Aurora Morales (Search Outreach Specialist, Google)

Emily Miller (Director of National Security and Critical Infrastructure Program, Mocana)

Josh Pearl (Mimecast Commercial Solutions Engineer Team, Mimecast)

Bryan Van Den Heuvel (Principal Systems Engineer, Arctic wolf)

Mark Adams (Practice Director, Optiv)

Location: Grand Ballroom E

Date: Monday, May 20

Time: 9:00am - 5:00pm

Pass type: All Access, Summits & Workshops - Get your pass now!

Track/Topic: Security

Format: Summit

Vault Recording: TBD

Mimecast
Arctic Wolf Networks

See Day 2

If you are an IT pro who needs an introduction to information security, then Dark Reading's Cybersecurity Crash Course is for you. Taught by recognized experts in security, the Crash Course offers two days of education in a supportive, safe, and intimate setting where there are no dumb questions. We'll cover the fundamental concepts you need to understand today's security challenges and the attack landscape. You'll get insights into the key steps every organization should take to protect critical data, as well as a detailed look at how to respond when your systems have been compromised. Our goal is to make you "security savvy" by giving you the basics you need to understand the threats and responses, while at the same time updating you on the latest threats.

The State of the Enterprise Security Department
Tim Wilson (Editor-in-Chief, Dark Reading) & Kelly Jackson Higgins (Executive Editor, Dark Reading)
Cybersecurity has become one of the most significant – and least predictable – risks faced by today's enterprises. What keeps IT security professionals awake at night, and how are they addressing those challenges? How are security teams spending their resources, and why do data breaches keep happening? This session will include data from several recent Dark Reading surveys of IT and security executives, as well as an overview of the major incidents and vulnerability news of recent months.

Cybersecurity: Lessons From the CISO's Office
Mark Adams (Practice Director, Optiv)
No matter what the size of your organization, cybersecurity breaches can have a devastating impact on your business. To avoid them, you need the right tools, the right skills, and the right processes to ensure the security of your data as the organization grows and changes. In this session, Mark Adams – a longtime chief security officer who now advises enterprises on how to build their IT security programs – offers a look at some of the key components behind a successful enterprise security program. You’ll get insights on how to hire – or outsource – the skills you need, how to acquire tools, and how to build IT processes and corporate culture that foster effective cybersecurity. You’ll also hear some real-life stories about what works – and what doesn’t – when building a enterprise security program.

Networking/ Break

Lightning Talk 1: Improving Cyber Resilience for Email in the Cloud (Presented by Mimecast)
Josh Pearl (Mimecast Commercial Solutions Engineer Team, Mimecast)
As today’s attacks have become more sophisticated, we are focused on helping organizations to improve their Cyber Resilience for Email in the Cloud by providing a comprehensive solution that goes beyond a defense-only strategy. In this session, we will discuss how to upgrade your human firewall by engaging them and supporting them with the most advanced technology available.

Principles of Endpoint Defense
Shawn Anderson (Executive Security Advisor, Microsoft)
Many IT security experts agree: the endpoint is often the weakest link in enterprise cyber defense. In this session, attendees will learn about current threats to the endpoint, as well as basic principles and practices surrounding endpoint protection. The session will cover such key issues as user authentication, malware defense, and how to train end users to protect their own systems and data against potential attacks.

Insider Threats: How to Create and Maintain an Effective Program
Katie Burnell (Global Insider Threat Specialist, Dtex Systems)
Using real-world examples, a top expert on insider threats will offer advice on how to determine if insider risk exists; how to understand its potential causes; how to enlist employees to support the security cause; and how to overcome the pitfalls of an insider threat program. Attendees will learn how to develop an effective strategy for reducing insider threat risk and how to justify its costs.

Best Practices for Securing Your Website
Aurora Morales (Search Outreach Specialist, Google)
With new threats constantly emerging, how can website owners protect themselves and their business? Aurora Morales, a specialist at Google, will cover this crucial topic and share several demos of website threats, as well as how they can be prevented. Find out what Google is seeing in hacking trends, what HTTPS does (and doesn't) do, and how to best address a hacked site. Attendees will learn how to protect against SQL injection attacks, sanitize user-generated input, and come away with other practical tips that can immediately be implemented to secure their sites.

Building a Cloud Security and Operating Model
Robert LaMagna-Reiter (Chief Information Security Officer, First National Technology Solutions)
In a cloud-first era, enterprises are continually enhancing technology to keep up with customer demands. With new, faster, and more functional technology come expanded information security and risk management complexities. In order to bring order to chaos, it's critical to understand how to secure a multi-cloud model, build a repeatable operation model and leverage efficiencies. Learn how to fine-tune your cloud security initiatives to effectively cover your most important assets. Put your existing security processes and solutions to work protecting your data from multi-cloud environments and digital initiatives to container and application development platforms. Understand the gaps between public cloud base packages and what's required to maintain the same level of security and granularity as your on-premises infrastructure.

Lightning Talk 2: Optimizing Your Security Center (Presented by Arctic Wolf Networks)
Bryan Van Den Heuvel (Principal Systems Engineer, Arctic Wolf)
Cyberthreats are always evolving, and the number of people who target a specific environment is growing by the minute. Recent ransomware strains demonstrate how business can be brought to a grinding halt by encrypting business critical data. In this talk, Bryan will highlight an industry perspective and importance of risk-based vulnerability management and share details on how a SOC prevents, detects and responds to the most advanced targeted threats.

Securing the Enterprise of Things

Emily Miller (Director of National Security and Critical Infrastructure Programs, Mocana)
Enterprises are experiencing an influx of unmanaged, smart devices more massive in scale than the PC and mobile revolutions combined. Gartner estimates over eight billion connected devices are in use today, a number it expects will increase to over 25 billion in the next three years. How will enterprises secure these devices, most of which have little or no built-in security, and no support for traditional security agents? In this session, an IoT technology manufacturer and a large enterprise user discuss practical methods for implementing IoT security.

Evaluating and Choosing Security Vendors and Technology
Maxine Holt (Research Director, Ovum)
With some 2,500 vendors offering technology for enterprise security, choosing the right product – or even the right vendor – can be an overwhelming task. In this session industry analyst Maxine Holt of Ovum Research explains how to define your requirements, select the criteria for evaluating security vendors, and how to write an RFP for technology that meets your organization's specific security needs.



See Day 2


Presentation Files

KBurnellFinal.pptx
Holt_Evaluating_and_Choosing_Security_Vendors_and_Technology.pptx
INT19_PPT_Presentation_ADAMS.pptx
Anderson_Principles_of_Endpoint_Defense.pdf
20190520_INT19_MillerEnterpriseOfThings.pptx
Best_practices_of_website_security__Interop__May_2019.pdf