Interop is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

2019 Schedule Builder | 2020 Coming Soon

View, browse, and sort the ever-growing list of sessions by pass type, track, and format. With this Schedule Builder, you can build your schedule in advance and access it during the show via export or with the mobile app, once live. For your schedule to sync properly with the mobile app, be sure to login to Schedule Builder with the same email address you used to register for Interop 2019.

Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Please note that adding a session into your agenda does NOT guarantee you a seat to the session.

Statistical Analysis of Network Exposure

John O'Neil (Chief Data Scientist, Edgewise Networks)

Location: Grand Ballroom G

Date: Wednesday, May 22

Time: 2:30pm - 3:20pm

Pass type: All Access, Conference - Get your pass now!

Track/Topic: Security, Infrastructure

Format: Conference Session

Vault Recording: TBD

CASE STUDY: Running a network that is both powerful and secure is a challenge, and today's increasingly complex network infrastructures just make it more difficult. This session will provide an analysis of the network traffic and topology of real-world networks to show how today's computing environments leave critical business applications vastly overexposed to breaches and compromise.

Analysis will cover a variety of verticals and topologies (both physical and virtual). The data will be broken down by running services, frequency of communication, rate of change within the applications, and allowable versus required pathways.

Attend this session and you'll take away summary metrics that measure overall network exposure and complexity in a way that can help any company assess its risk and prioritize threats. Get helpful tips on how to reduce exposure, and therefore risk, within your network.

Presentation File