Security & Risk Management Expertise On Tap At Interop - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Interop
News
3/30/2015
12:00 AM
Andrew Conry Murray
Andrew Conry Murray
Event Updates
Connect Directly
LinkedIn
Google+
Twitter
RSS
E-Mail
50%
50%

Security & Risk Management Expertise On Tap At Interop

From a cyber security crash course to security product reviews, Interop's InfoSec and Risk Management track will help you stay ahead of threats and protect your organization.

Information security is no longer just the domain of the IT security team. From executives to admins and engineers to developers to employees, protecting corporate systems and reducing risk are everyone’s responsibilities.

Interop Las Vegas offers a full week of in-depth security content including workshops, sessions, and a day-long cyber security crash course put together by the editors of Dark Reading. The following highlights are just a few of the offerings available in Interop’s Infosec and Risk Management track.

Integrating Risk and Security Into Your Organization’s DNA

This full-day workshop, taught by John Pironti, president of IP Architects, aims to help IT practitioners and executives change the all-too-common attitude that security controls are just roadblocks.

This workshop will show you how to create a security culture that consults with, rather than dictates to, business units and employees, and demonstrates clear benefits to the organization. The workshop will also provide a framework for organizations to develop risk profiles to help create due standards of care for corporate assets, and drill into threat and vulnerability analysis.

Dark Reading’s Cyber Security Crash Course

There’s so much happening in security it can be hard to keep up or to figure out which threats present the greatest danger to your company. Join the editors of Dark Reading and a group of security experts for a one-of-a-kind event that shares just what IT needs to know about the state of infosec.

Attendees will get "speed reads" on key areas of security and a walk-through of the latest exploits. You’ll also have an opportunity to ask experts essential questions in a collegial setting and find out what your peers are facing on the security front and how they’re dealing with it.

Please note there’s a limit of 60 attendees for this day-long event.

A CISO’s Perspective: Measuring and Communicating Information Security Progress

Mike Zachman, deputy CISO at Caterpillar, will share how to communicate information security risk in a structured, non-technical manner to demonstrate how that risk is being managed. He’ll discuss the organization’s use of a capability maturity model and program management office to prioritize investments, communicate progress, and ensure alignment with Caterpillar’s 5-year Information Security Transformation.

Ending The Tyranny of Expensive Security Tools: A New Hope

Security is filled to overflowing with products and product categories, which can make an infosec career seem more about managing tools than protecting the organization. This practical session shows you how to take advantage of security capabilities that already exist in networking devices, DNS, and NetFlow. It will also explore open-source security applications that work just as well as commercial products.

Evaluating Essential Advanced Security Options for Your Business

Lab tests can be useful to help IT and security pros decide which products are the best fit for their organizations. This session shares test results from Miercom for product categories including Secure Web Gateways, Advanced Persistent Threat appliances, sandboxing technologies, Next Generation Firewalls, and Vulnerability Analysis solutions.

The session will discuss the comparison criteria and test bed methodology, and why it is important for product selection and deployment. It will also examine how product effectiveness, performance, and resiliency affect Total Cost of Ownership. TCO value proposition for these products will be categorized by product industry, and depicted on an assessment model chart.

Social Engineering: Lessons from the Real World

Social engineering attacks are distressingly effective because people can be easily tricked with a simple e-mail. This session presents real-life demonstrations of social engineering to show how end users are fooled into downloading malware or giving away sensitive information. It also discusses how to defend against these attacks through both training and technology.

Interop Las Vegas is April 27 through May 1. Register now to learn the latest technology developments, accelerate your career, and network with your peers in the IT community.

Drew is formerly editor of Network Computing and currently director of content and community for Interop. View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
Slideshows
IT Careers: 10 Industries with Job Openings Right Now
Cynthia Harvey, Freelance Journalist, InformationWeek,  5/27/2020
Commentary
How 5G Rollout May Benefit Businesses More than Consumers
Joao-Pierre S. Ruth, Senior Writer,  5/21/2020
News
IT Leadership in Education: Getting Online School Right
Jessica Davis, Senior Editor, Enterprise Apps,  5/20/2020
Register for InformationWeek Newsletters
Video
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll