Security, NFV, storage, containers, and unified communications were among the most popular topics at Interop Las Vegas 2015.
Interop has something for everyone when it comes to IT education and training. And based on attendee survey results, the most popular sessions covered a gamut of tech topics, from security to storage to WLANs and IPv6 and more.
Here’s the top 10 sessions, in order as rated by attendees, from Interop 2015.
While Network Functions Virtualization started with carriers and large ISPs that wanted to virtualize network services, the concepts and technologies can also be employed in the enterprise. Ivan Pepelnjak, network architect at ipSpace, shared real-life enterprise NFV case studies and delved into critical elements of NFV, including performance, service chaining, and orchestration.
Containers have the potential to transform the data center and cloud services, but as with any emerging technology you have to know what you’re getting in to. Scott Lowe, an engineering architect at VMware, explored challenges for enterprises to keep in mind and provided examples from IT deployments.
Dimitri Alperovitch, co-founder and CTO of CrowdStrike, delved into the motivations of different kinds of attackers, from hacktivists to state-sponsored intruders, to help organizations understand how to tailor a risk management strategy to address their most likely adversaries.
Ivan appears twice on the list of highest-rated sessions with a look at how the use of IPv6 for microsegmentation in large-scale production environments. One session attendee noted in the review “Excellent balance between technical detail and operational conditions.”
These days it’s not enough to understand the technological impact of a security breach. There are also business and legal repercussions. Jason Straight, SVP and Chief Privacy Officer at United Lex discussed the negative financial, social, and operational impacts of high-profile breaches, looked at potential regulatory actions, and offered tips to formulate an incident response plan that encompassed business, legal, and technology executives.
One attendee wrote “Good info. I appreciate the combination of analyzing known breaches and how the aftermath of those played out as the precursor to recommendations.”
George M. Stefanik, Jr. is a wireless network architect. His session examined how to perform a proper W-Fi design that accounts for user expectations and application and device requirements. He shared design tips for use cases including data, voice, and location; and offered tips on useful tools.
An attendee had this to say about George’s presentation: “Real-world experience is the best. I took away plenty of thoughts from this session.”
Irwin Lazar of Nemertes Research looked at emerging middleware that enables multi-vendor interoperability among different Unified Communications platforms. He outlined the rationale for this middleware and examined the ROI. One attendee noted “Great session. Enjoyed the real-world examples.”
New storage options are emerging to meet the demands of today’s virtual infrastructure. Greg Schulz of StorageIO addressed the decision-making process for evaluating storage systems and determining needs. He looked at backup, DR/BC, solid state, and software-defined and cloud storage options.
IPv6 is here, and IT pros need to get comfortable with it. Jeff Carrell, a network consultant at Network Conversions, shared tips for building an IPv6 lab for IT pros to get their hands dirty without sinking major dollars into the project. One attendee commented “This should be turned into a workshop session. Only complaint is that it was too short.”
John Pironti is president of the consultancy IP Architects, and co-chair of Interop’s InfoSec & Risk Management track. He’s also a popular speaker at Interop. This session looked at the security challenges that come when organizations integrate with third parties, service providers, and business partners. He shared industry-leading methods and practices of risk-based supply chain security approaches, and offered real-world examples and case studies.
Drew is formerly editor of Network Computing and currently director of content and community for Interop. View Full Bio
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.
Top IT Trends to Watch in Financial ServicesIT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Join us for a roundup of the top stories on InformationWeek.com for the week of September 25, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."