IoT
IoT
Interop
News
5/15/2015
12:00 AM
Andrew Conry Murray
Andrew Conry Murray
Event Updates
Connect Directly
LinkedIn
Google+
Twitter
RSS
E-Mail
50%
50%
RELATED EVENTS
Stop Cyber Attacks with Threat Intelligence
Aug 30, 2016
In this informative webinar on August 30th you will hear security experts discuss practical ways t ...Read More>>

Top 10 Sessions From Interop Las Vegas

Security, NFV, storage, containers, and unified communications were among the most popular topics at Interop Las Vegas 2015.

Interop has something for everyone when it comes to IT education and training. And based on attendee survey results, the most popular sessions covered a gamut of tech topics, from security to storage to WLANs and IPv6 and more.

Here’s the top 10 sessions, in order as rated by attendees, from Interop 2015.

What NFV Means For The Enterprise

While Network Functions Virtualization started with carriers and large ISPs that wanted to virtualize network services, the concepts and technologies can also be employed in the enterprise. Ivan Pepelnjak, network architect at ipSpace, shared real-life enterprise NFV case studies and delved into critical elements of NFV, including performance, service chaining, and orchestration.

Container Challenges: Know Before You Deploy 

Containers have the potential to transform the data center and cloud services, but as with any emerging technology you have to know what you’re getting in to. Scott Lowe, an engineering architect at VMware, explored challenges for enterprises to keep in mind and provided examples from IT deployments.

Understanding Your Attackers

Dimitri Alperovitch, co-founder and CTO of CrowdStrike, delved into the motivations of different kinds of attackers, from hacktivists to state-sponsored intruders, to help organizations understand how to tailor a risk management strategy to address their most likely adversaries.

IPv6 Microsegmentation Done Right

Ivan appears twice on the list of highest-rated sessions with a look at how the use of IPv6 for microsegmentation in large-scale production environments. One session attendee noted in the review “Excellent balance between technical detail and operational conditions.”

Understanding the Full Legal & Business Liabilities of Cyber Breaches

These days it’s not enough to understand the technological impact of a security breach. There are also business and legal repercussions. Jason Straight, SVP and Chief Privacy Officer at United Lex discussed the negative financial, social, and operational impacts of high-profile breaches, looked at potential regulatory actions, and offered tips to formulate an incident response plan that encompassed business, legal, and technology executives.

One attendee wrote “Good info. I appreciate the combination of analyzing known breaches and how the aftermath of those played out as the precursor to recommendations.”

Designing Today’s Wi-Fi Network for Tomorrow’s Applications

George M. Stefanik, Jr. is a wireless network architect. His session examined how to perform a proper W-Fi design that accounts for user expectations and application and device requirements. He shared design tips for use cases including data, voice, and location; and offered tips on useful tools.

An attendee had this to say about George’s presentation: “Real-world experience is the best. I took away plenty of thoughts from this session.”

UC Interoperability

Irwin Lazar of Nemertes Research looked at emerging middleware that enables multi-vendor interoperability among different Unified Communications platforms. He outlined the rationale for this middleware and examined the ROI. One attendee noted “Great session. Enjoyed the real-world examples.”

Smart Shopping for Your Storage Strategy

New storage options are emerging to meet the demands of today’s virtual infrastructure. Greg Schulz of StorageIO addressed the decision-making process for evaluating storage systems and determining needs. He looked at backup, DR/BC, solid state, and software-defined and cloud storage options.

Build Your Own IPv6 Lab

IPv6 is here, and IT pros need to get comfortable with it. Jeff Carrell, a network consultant at Network Conversions, shared tips for building an IPv6 lab for IT pros to get their hands dirty without sinking major dollars into the project. One attendee commented  “This should be turned into a workshop session. Only complaint is that it was too short.”

Friend or Foe: Risk and Security in the Information Supply Chain

John Pironti is president of the consultancy IP Architects, and co-chair of Interop’s InfoSec & Risk Management track. He’s also a popular speaker at Interop. This session looked at the security challenges that come when organizations integrate with third parties, service providers, and business partners. He shared industry-leading methods and practices of risk-based supply chain security approaches, and offered real-world examples and case studies.

Drew is formerly editor of Network Computing and currently director of content and community for Interop. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for InformationWeek Newsletters
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of August 14, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.