Security, NFV, storage, containers, and unified communications were among the most popular topics at Interop Las Vegas 2015.
Interop has something for everyone when it comes to IT education and training. And based on attendee survey results, the most popular sessions covered a gamut of tech topics, from security to storage to WLANs and IPv6 and more.
Here’s the top 10 sessions, in order as rated by attendees, from Interop 2015.
While Network Functions Virtualization started with carriers and large ISPs that wanted to virtualize network services, the concepts and technologies can also be employed in the enterprise. Ivan Pepelnjak, network architect at ipSpace, shared real-life enterprise NFV case studies and delved into critical elements of NFV, including performance, service chaining, and orchestration.
Containers have the potential to transform the data center and cloud services, but as with any emerging technology you have to know what you’re getting in to. Scott Lowe, an engineering architect at VMware, explored challenges for enterprises to keep in mind and provided examples from IT deployments.
Dimitri Alperovitch, co-founder and CTO of CrowdStrike, delved into the motivations of different kinds of attackers, from hacktivists to state-sponsored intruders, to help organizations understand how to tailor a risk management strategy to address their most likely adversaries.
Ivan appears twice on the list of highest-rated sessions with a look at how the use of IPv6 for microsegmentation in large-scale production environments. One session attendee noted in the review “Excellent balance between technical detail and operational conditions.”
These days it’s not enough to understand the technological impact of a security breach. There are also business and legal repercussions. Jason Straight, SVP and Chief Privacy Officer at United Lex discussed the negative financial, social, and operational impacts of high-profile breaches, looked at potential regulatory actions, and offered tips to formulate an incident response plan that encompassed business, legal, and technology executives.
One attendee wrote “Good info. I appreciate the combination of analyzing known breaches and how the aftermath of those played out as the precursor to recommendations.”
George M. Stefanik, Jr. is a wireless network architect. His session examined how to perform a proper W-Fi design that accounts for user expectations and application and device requirements. He shared design tips for use cases including data, voice, and location; and offered tips on useful tools.
An attendee had this to say about George’s presentation: “Real-world experience is the best. I took away plenty of thoughts from this session.”
Irwin Lazar of Nemertes Research looked at emerging middleware that enables multi-vendor interoperability among different Unified Communications platforms. He outlined the rationale for this middleware and examined the ROI. One attendee noted “Great session. Enjoyed the real-world examples.”
New storage options are emerging to meet the demands of today’s virtual infrastructure. Greg Schulz of StorageIO addressed the decision-making process for evaluating storage systems and determining needs. He looked at backup, DR/BC, solid state, and software-defined and cloud storage options.
IPv6 is here, and IT pros need to get comfortable with it. Jeff Carrell, a network consultant at Network Conversions, shared tips for building an IPv6 lab for IT pros to get their hands dirty without sinking major dollars into the project. One attendee commented “This should be turned into a workshop session. Only complaint is that it was too short.”
John Pironti is president of the consultancy IP Architects, and co-chair of Interop’s InfoSec & Risk Management track. He’s also a popular speaker at Interop. This session looked at the security challenges that come when organizations integrate with third parties, service providers, and business partners. He shared industry-leading methods and practices of risk-based supply chain security approaches, and offered real-world examples and case studies.
Drew is formerly editor of Network Computing and currently director of content and community for Interop. View Full Bio
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.