Interop ITX

 MGM Grand | Las Vegas

 Speaking Engagement


The Interop ITX Conference offers five days of world-class education, compelling speakers, and unlimited networking opportunities to help technology leaders keep up with the challenges and drive their businesses forward.

Dawn-Marie Hutchinson, executive director, and Peter Gregory, executive director, will be speaking at the conference.

Dark Reading Cyber Security Crash Course: Securing Your Enterprise Infrastructure
Dawn-Marie Hutchinson
Monday, May 15, 9:00am-5:00pm
As the traditional IT infrastructure evolves to add new networking capabilities, SDN, and virtualized server environments, the risks they face are changing as well. In this informative session, a top expert on infrastructure security will discuss the latest threats to your corporate IT environment -- and how your organization can mitigate them.

Career Opportunities in IT Security
Dawn-Marie Hutchinson
Wednesday, May 17, 11:40am-12:40pm
According to industry estimates, 1.8 million new jobs will be created in information security over the next five years. Whether you're an IT security pro now or just thinking about making a mid-career move in that direction, the career opportunities are prolific. In this eye-opening panel discussion, top experts in cybersecurity recruiting and training discuss ways that you can build your career around the new wave of information security hiring.

Herding Vendors: Implementing Third Party Risk Programs
Peter Gregory
Friday, May 19, 9:00am-11:00pm
The structure of most organizations' information processing involves large numbers of third party organizations that have access to organizations' most critical and sensitive data. Even modest sized organizations have hundreds of third parties. Without mature structure for effective management of third parties, organizations fail to uncover and manage risks they would find unacceptable had they been known. This session discusses program structure for managing third party risk, including the concept of risk tiering, based on various criteria, with corresponding levels and types of due diligence activities, including short and long questionnaires, requests for evidence, on-site visits, assessments by expert security firms, and intrusive monitoring.

For more information on this event, please visit the conference website.