Interop is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

2019 Schedule Builder | 2020 Coming Soon

View, browse, and sort the ever-growing list of sessions by pass type, track, and format. With this Schedule Builder, you can build your schedule in advance and access it during the show via export or with the mobile app, once live. For your schedule to sync properly with the mobile app, be sure to login to Schedule Builder with the same email address you used to register for Interop 2019.

Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Please note that adding a session into your agenda does NOT guarantee you a seat to the session.

No CISO, No SOC, No Problem: Blocking Bigger Threats with Smaller Teams

Ryan Berg (Engineering Fellow, Alert Logic)

Jason Thomas (Chief Information Officer , Cole, Scott & Kissane)

Location: Grand Ballroom E

Date: Thursday, May 23

Time: 9:00am - 9:45am

Pass type: All Access, Conference - Get your pass now!

Track/Topic: Security, IT Strategy

Format: Conference Session

Vault Recording: TBD

CASE STUDY: In this presentation, two 20-year security veterans share successful real-world strategies implemented by one of the nation's largest law firms to achieve readiness for ransomware and zero-day attacks.

Within weeks of implementing their new strategies and endpoint defenses, the team members at Cole, Scott & Kissane (CSK) blocked the costly, destructive Emotet malware. They stopped Emotet before it could execute ransomware or damage data and systems, saving their organization money and reputation costs.

In this session, learn the strategies that worked: how the CSK team evaluated threats; strengthened endpoint defense while minimizing the security team's workload; integrated other IT resources into the security effort; and struck the right balance of protection, detection, and response.

Presentation File