Top 10 Sessions From Interop Las Vegas - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

12:00 AM
Andrew Conry Murray
Andrew Conry Murray
Event Updates
Connect Directly

Top 10 Sessions From Interop Las Vegas

Security, NFV, storage, containers, and unified communications were among the most popular topics at Interop Las Vegas 2015.

Interop has something for everyone when it comes to IT education and training. And based on attendee survey results, the most popular sessions covered a gamut of tech topics, from security to storage to WLANs and IPv6 and more.

Here’s the top 10 sessions, in order as rated by attendees, from Interop 2015.

What NFV Means For The Enterprise

While Network Functions Virtualization started with carriers and large ISPs that wanted to virtualize network services, the concepts and technologies can also be employed in the enterprise. Ivan Pepelnjak, network architect at ipSpace, shared real-life enterprise NFV case studies and delved into critical elements of NFV, including performance, service chaining, and orchestration.

Container Challenges: Know Before You Deploy 

Containers have the potential to transform the data center and cloud services, but as with any emerging technology you have to know what you’re getting in to. Scott Lowe, an engineering architect at VMware, explored challenges for enterprises to keep in mind and provided examples from IT deployments.

Understanding Your Attackers

Dimitri Alperovitch, co-founder and CTO of CrowdStrike, delved into the motivations of different kinds of attackers, from hacktivists to state-sponsored intruders, to help organizations understand how to tailor a risk management strategy to address their most likely adversaries.

IPv6 Microsegmentation Done Right

Ivan appears twice on the list of highest-rated sessions with a look at how the use of IPv6 for microsegmentation in large-scale production environments. One session attendee noted in the review “Excellent balance between technical detail and operational conditions.”

Understanding the Full Legal & Business Liabilities of Cyber Breaches

These days it’s not enough to understand the technological impact of a security breach. There are also business and legal repercussions. Jason Straight, SVP and Chief Privacy Officer at United Lex discussed the negative financial, social, and operational impacts of high-profile breaches, looked at potential regulatory actions, and offered tips to formulate an incident response plan that encompassed business, legal, and technology executives.

One attendee wrote “Good info. I appreciate the combination of analyzing known breaches and how the aftermath of those played out as the precursor to recommendations.”

Designing Today’s Wi-Fi Network for Tomorrow’s Applications

George M. Stefanik, Jr. is a wireless network architect. His session examined how to perform a proper W-Fi design that accounts for user expectations and application and device requirements. He shared design tips for use cases including data, voice, and location; and offered tips on useful tools.

An attendee had this to say about George’s presentation: “Real-world experience is the best. I took away plenty of thoughts from this session.”

UC Interoperability

Irwin Lazar of Nemertes Research looked at emerging middleware that enables multi-vendor interoperability among different Unified Communications platforms. He outlined the rationale for this middleware and examined the ROI. One attendee noted “Great session. Enjoyed the real-world examples.”

Smart Shopping for Your Storage Strategy

New storage options are emerging to meet the demands of today’s virtual infrastructure. Greg Schulz of StorageIO addressed the decision-making process for evaluating storage systems and determining needs. He looked at backup, DR/BC, solid state, and software-defined and cloud storage options.

Build Your Own IPv6 Lab

IPv6 is here, and IT pros need to get comfortable with it. Jeff Carrell, a network consultant at Network Conversions, shared tips for building an IPv6 lab for IT pros to get their hands dirty without sinking major dollars into the project. One attendee commented  “This should be turned into a workshop session. Only complaint is that it was too short.”

Friend or Foe: Risk and Security in the Information Supply Chain

John Pironti is president of the consultancy IP Architects, and co-chair of Interop’s InfoSec & Risk Management track. He’s also a popular speaker at Interop. This session looked at the security challenges that come when organizations integrate with third parties, service providers, and business partners. He shared industry-leading methods and practices of risk-based supply chain security approaches, and offered real-world examples and case studies.

Drew is formerly editor of Network Computing and currently director of content and community for Interop. View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
2021 State of ITOps and SecOps Report
2021 State of ITOps and SecOps Report
This new report from InformationWeek explores what we've learned over the past year, critical trends around ITOps and SecOps, and where leaders are focusing their time and efforts to support a growing digital economy. Download it today!
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

Remote Work Tops SF, NYC for Most High-Paying Job Openings
Jessica Davis, Senior Editor, Enterprise Apps,  7/20/2021
Blockchain Gets Real Across Industries
Lisa Morgan, Freelance Writer,  7/22/2021
Seeking a Competitive Edge vs. Chasing Savings in the Cloud
Joao-Pierre S. Ruth, Senior Writer,  7/19/2021
Register for InformationWeek Newsletters
Current Issue
Monitoring Critical Cloud Workloads Report
In this report, our experts will discuss how to advance your ability to monitor critical workloads as they move about the various cloud platforms in your company.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll