This document provides an agenda for the Insight2015 security conference, which includes sessions on data security, privacy, encryption, key management, and security trends. Some key sessions include a Forrester study on the ROI of IBM Security Guardium, how Nationwide uses Guardium and QRadar together for data security, new features in Guardium v10, and how IBM solutions like Guardium and QRadar integrate to enhance security intelligence and data protection. The agenda covers topics across multiple days and includes various speakers from IBM and customers like Nationwide discussing challenges and best practices around data security.
Organizations are supporting more devices than ever and unified endpoint management is growing rapidly. More than half of organizations will adopt this approach by 2020.
This infographic demonstrates the impact of mobility, Internet of Things (IoT), and artificial intelligence on the future of business transformation.
To learn more, read the complete Forrester report, "Mobile Vision 2020" at https://ibm.co/2pxhisB.
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
Attackers are using increasingly sophisticated methods to access your most sensitive data, and at the same time cloud, mobile and other innovations expand the perimeter you need to protect. This keynote discusses how to build a more secure enterprise with real-time analytics and behavior-based activity monitoring.
Advanced Security Intelligence tools store, correlate and analyze millions of events and flows daily to identify critical incidents your security team needs to investigate. The volume, variety and velocity involved clearly defines Security as a “Big Data challenge.”
Learn how advanced predictive analytics and incident forensics help defend against advanced attacks and respond to and remediate incidents quickly and effectively.
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
Attackers and exploits are becoming increasingly sophisticated, and the pressure to protect business critical data is only getting more and more intense. Security Intelligence transforms the playing field by adding analytics and context, and shifts the balance in favor of the good guys. Today forward thinking organizations are looking at extending Security Intelligence even further by combining it with Big Data to form a solution that allows them to analyze new types of information, and data that travels at higher velocity, and in larger volume. This powerful combination yields new insights that can more effectively identify threats and fraud than ever before.
In this session, attendees will learn how to combine Security Intelligence and Big Data, and deploy a solution that is well suited for structured, repeatable tasks. We will also cover the addition of complementary new technologies that address speed and flexibility, and are ideal for analyzing unstructured data. This session will also highlight how organizations are using Security Intelligence to pro-actively detect advanced threats before they cause damage, and take effective corrective action if a compromise succeeds.
View the On-demand webinar: https://www2.gotomeeting.com/register/657029698
Kista watson summit final public versionIBM Sverige
IBM Security Strategi
Talare: Peter Holm, Sweden Country Manager Security Systems, IBM och Kaja Narum, Integrated Business Unit Leader Security, IBM
Security Operations Center behind the curtain
Talare: Marcus Hallberg, Technical Solution Specialist, IBM Security
From Log to SIEM ... and Incident Response
Talare: Marcus Hallberg, Marcus Hallberg, Technical Solution Specialist, IBM Security och Victor Grane, Techical Sales, IBM Security
IoT Security
Talare: Torbjörn Andersson, Senior Security Consultant, IBM
Presentationerna hölls på Watson Kista Summit 2018
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
To keep pace with cyberattacks, organizations have long sought ways to operationalize security and respond faster to threats. But with increasingly complex IT environments and a growing skills shortage, doing so is easier said than done.
That’s where Intelligent Orchestration can help. Intelligent Orchestration integrates your existing security tools and guides SOC analysts through a fast and laser-focused response by combining case management, human and cyber intelligence, and incident response orchestration and automation.
Organizations are supporting more devices than ever and unified endpoint management is growing rapidly. More than half of organizations will adopt this approach by 2020.
This infographic demonstrates the impact of mobility, Internet of Things (IoT), and artificial intelligence on the future of business transformation.
To learn more, read the complete Forrester report, "Mobile Vision 2020" at https://ibm.co/2pxhisB.
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
Attackers are using increasingly sophisticated methods to access your most sensitive data, and at the same time cloud, mobile and other innovations expand the perimeter you need to protect. This keynote discusses how to build a more secure enterprise with real-time analytics and behavior-based activity monitoring.
Advanced Security Intelligence tools store, correlate and analyze millions of events and flows daily to identify critical incidents your security team needs to investigate. The volume, variety and velocity involved clearly defines Security as a “Big Data challenge.”
Learn how advanced predictive analytics and incident forensics help defend against advanced attacks and respond to and remediate incidents quickly and effectively.
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
Attackers and exploits are becoming increasingly sophisticated, and the pressure to protect business critical data is only getting more and more intense. Security Intelligence transforms the playing field by adding analytics and context, and shifts the balance in favor of the good guys. Today forward thinking organizations are looking at extending Security Intelligence even further by combining it with Big Data to form a solution that allows them to analyze new types of information, and data that travels at higher velocity, and in larger volume. This powerful combination yields new insights that can more effectively identify threats and fraud than ever before.
In this session, attendees will learn how to combine Security Intelligence and Big Data, and deploy a solution that is well suited for structured, repeatable tasks. We will also cover the addition of complementary new technologies that address speed and flexibility, and are ideal for analyzing unstructured data. This session will also highlight how organizations are using Security Intelligence to pro-actively detect advanced threats before they cause damage, and take effective corrective action if a compromise succeeds.
View the On-demand webinar: https://www2.gotomeeting.com/register/657029698
Kista watson summit final public versionIBM Sverige
IBM Security Strategi
Talare: Peter Holm, Sweden Country Manager Security Systems, IBM och Kaja Narum, Integrated Business Unit Leader Security, IBM
Security Operations Center behind the curtain
Talare: Marcus Hallberg, Technical Solution Specialist, IBM Security
From Log to SIEM ... and Incident Response
Talare: Marcus Hallberg, Marcus Hallberg, Technical Solution Specialist, IBM Security och Victor Grane, Techical Sales, IBM Security
IoT Security
Talare: Torbjörn Andersson, Senior Security Consultant, IBM
Presentationerna hölls på Watson Kista Summit 2018
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
To keep pace with cyberattacks, organizations have long sought ways to operationalize security and respond faster to threats. But with increasingly complex IT environments and a growing skills shortage, doing so is easier said than done.
That’s where Intelligent Orchestration can help. Intelligent Orchestration integrates your existing security tools and guides SOC analysts through a fast and laser-focused response by combining case management, human and cyber intelligence, and incident response orchestration and automation.
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksIBM Security
View On Demand Webinar: https://securityintelligence.com/events/life-on-the-endpoint-edge-winning-the-battle-against-cyber-attacks/
The perimeter – the boundary that encloses what you need to protect – was once a fixed value. Now your perimeter is wherever your endpoints are—from on-site servers at your headquarters, to employee devices connecting remotely around the globe. That picture is further complicated by the increasing types of devices that comprise your perimeter: point-of-sale systems (POS), ATMs, remote servers and even that ‘yet-to-be-invented device’ (that your boss will probably want on your network the week it’s released).
With cyber-attacks and vulnerabilities increasing in number and sophistication, how do you ensure endpoints in your organization are immunized against a potential breach while dealing with reduced budgets and limited resources?
View this on-demand webinar to learn about the state of endpoint security and how it is evolving to keep pace with attackers looking to exploit any gap in your perimeter.
IBM X-Force Incident Response and Intelligence Services (X-Force IRIS) can help you cross the incident response chasm, build a holistic program and better prepare you to deal with and thwart the security challenges your organization faces.
To learn more, read the white paper on best practices for improving your incident response processes: http://ibm.co/2lLdC2k.
Attacks on the enterprise are getting increasingly sophisticated. Current solutions available do not seem to be adequate given the innovativeness, precision and persistence of these attacks in different forms and of different dimensions. Organisations thus want to increase the sophistication of their employees and also of the solutions to be deployed given this backdrop.
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
In IBM Resilient’s sixth-annual year-in-review and predictions webinar, our all-star panel of security experts will discuss and debate the stories that defined the industry in 2018 and offer their predictions for what to expect in 2019.
QRadar & XGS: Stopping Attacks with a Click of the MouseIBM Security
View on-demand: https://securityintelligence.com/events/qradar-xgs-stopping-attacks-click-mouse/
As the tactics and techniques behind attacks continue to advance and evolve, organizations need a faster way to identify and prevent those attacks in real time. An integrated approach to security can make this a reality, especially when integrations are designed to proactively disrupt the lifecycle of advanced attacks through shared security intelligence and enabling organizations to take immediate action based on that intelligence.
In this session you will learn how IBM QRadar Security Intelligence Platform and IBM Security Network Protection (XGS), a next-generation IPS, work together to disrupt the attack chain and improve network security.
Join IBM Security product expert Craig Knapik as he shares how the QRadar and XGS integration enriches overall security intelligence and improves threat detection, while enabling security professionals to block threats immediately with a simple click of the mouse.
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...IBM Security
Mobile and Internet of Things (IoT) applications continue to be released at a rapid pace. But organizations’ rush-to-release of new applications to meet rapidly-evolving user demand can jeopardize the applications’ level of security protection.
View these slides from our January 18th webinar, where Larry Ponemon from the Ponemon Institute, Arxan Technologies and IBM Security review findings from our brand-new mobile & IoT application security study.
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
View Webinar: http://ibm.co/1pyzpuI
The momentum continues with the IBM Security AppExchange. Join this webinar to meet the developers of two apps that help you extend the capabilities of IBM Security QRadar.
iSIGHT Threatscape enables users to pull rich threat intelligence from iSIGHT Partners directly into QRadar, improving the ability to mange threats and automate security workflow.
STEALTHbits monitors Microsoft systems and provides an easy and extensible dashboard for viewing active-directory changes logged by STEALTHbits products
Learn the advantages of sharing best practices and collaborating with others to battle highly organized cybercrime - join the era of collaborative defense!
IBM Security Strategy Intelligence, Integration and Expertise
by Marc van Zadelhoff, VP, WW Strategy and Product Management and Joe Ruthven IBM MEA Security Leader
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
When you think of Information Technology (IT) and Operational Technology (OT), which side are you on? You may not feel that you fall on any side of that technological skirmish, but when you stop to carefully consider the differences in these two disciplines, it is nearly impossible to avoid a tendentious leaning.
However, the time may be upon us when the conflicts of IT and OT will be put to rest for the broader purpose of making businesses more agile, efficient, resilient and ultimately, more profitable. We spoke with experts in the field who offered their insights about the challenges facing IT and OT convergence. Here’s what they shared!
Tolly Report: Stopping Attacks You Can't SeeIBM Security
View on-demand webinar: http://bit.ly/26P8RH8
Network security threats continue to grow not only in number, but also in type and complexity. Attackers are using more sophisticated methods, such as encryption and advanced evasion techniques, to avoid detection. And while security is a key objective for organizations, maintaining network performance and availability remain top priorities as well.
In this webinar, Kevin Tolly, Founder of The Tolly Group, will review the results of a test report IBM commissioned to evaluate the effectiveness and performance of the IBM Security Network Protection XGS 7100 appliance, a next-generation intrusion prevention system (IPS). You will also learn more about the IBM XGS, including how it was able to block 100% of encrypted threats, and stop 100% of attacks using advanced evasion techniques, while maintaining high performance levels.
The IBM Security Client References Guide includes summary slides of IBM clients across various industries that have successfully implemented solutions from the IBM Security Portfolio.
Systems of Engagement offer much value to industry & government alike but care needs to be taken in how they are protected against cyber attack. In this presentation I explain Systems of Engagement & illustrate the benefits using government case studies. I then discuss the security challenges Systems of Engagement pose and how to address them with commercial software technologies. Finally I look ahead to how to defend Systems of Insight hosted on future generations of cloud technology.
How to lead a large organization through agile transformation bodhi choudhuriBodhi Choudhuri
You have seen the Agile Manifesto. You have read success stories of startups embracing lean agile. Maybe you even hired consultants and experts. But how is your organization reacting to the change? Agile is not just a change of the delivery framework. It’s a mindset shift for employees and leaders alike. It’s a transformation built around Culture, Principles and Tools/ Technology. Find out how to think end to end, ensure rapid feedback is built into your systems and processes and use the right tools and technology to achieve the desired results.
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksIBM Security
View On Demand Webinar: https://securityintelligence.com/events/life-on-the-endpoint-edge-winning-the-battle-against-cyber-attacks/
The perimeter – the boundary that encloses what you need to protect – was once a fixed value. Now your perimeter is wherever your endpoints are—from on-site servers at your headquarters, to employee devices connecting remotely around the globe. That picture is further complicated by the increasing types of devices that comprise your perimeter: point-of-sale systems (POS), ATMs, remote servers and even that ‘yet-to-be-invented device’ (that your boss will probably want on your network the week it’s released).
With cyber-attacks and vulnerabilities increasing in number and sophistication, how do you ensure endpoints in your organization are immunized against a potential breach while dealing with reduced budgets and limited resources?
View this on-demand webinar to learn about the state of endpoint security and how it is evolving to keep pace with attackers looking to exploit any gap in your perimeter.
IBM X-Force Incident Response and Intelligence Services (X-Force IRIS) can help you cross the incident response chasm, build a holistic program and better prepare you to deal with and thwart the security challenges your organization faces.
To learn more, read the white paper on best practices for improving your incident response processes: http://ibm.co/2lLdC2k.
Attacks on the enterprise are getting increasingly sophisticated. Current solutions available do not seem to be adequate given the innovativeness, precision and persistence of these attacks in different forms and of different dimensions. Organisations thus want to increase the sophistication of their employees and also of the solutions to be deployed given this backdrop.
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
In IBM Resilient’s sixth-annual year-in-review and predictions webinar, our all-star panel of security experts will discuss and debate the stories that defined the industry in 2018 and offer their predictions for what to expect in 2019.
QRadar & XGS: Stopping Attacks with a Click of the MouseIBM Security
View on-demand: https://securityintelligence.com/events/qradar-xgs-stopping-attacks-click-mouse/
As the tactics and techniques behind attacks continue to advance and evolve, organizations need a faster way to identify and prevent those attacks in real time. An integrated approach to security can make this a reality, especially when integrations are designed to proactively disrupt the lifecycle of advanced attacks through shared security intelligence and enabling organizations to take immediate action based on that intelligence.
In this session you will learn how IBM QRadar Security Intelligence Platform and IBM Security Network Protection (XGS), a next-generation IPS, work together to disrupt the attack chain and improve network security.
Join IBM Security product expert Craig Knapik as he shares how the QRadar and XGS integration enriches overall security intelligence and improves threat detection, while enabling security professionals to block threats immediately with a simple click of the mouse.
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...IBM Security
Mobile and Internet of Things (IoT) applications continue to be released at a rapid pace. But organizations’ rush-to-release of new applications to meet rapidly-evolving user demand can jeopardize the applications’ level of security protection.
View these slides from our January 18th webinar, where Larry Ponemon from the Ponemon Institute, Arxan Technologies and IBM Security review findings from our brand-new mobile & IoT application security study.
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
View Webinar: http://ibm.co/1pyzpuI
The momentum continues with the IBM Security AppExchange. Join this webinar to meet the developers of two apps that help you extend the capabilities of IBM Security QRadar.
iSIGHT Threatscape enables users to pull rich threat intelligence from iSIGHT Partners directly into QRadar, improving the ability to mange threats and automate security workflow.
STEALTHbits monitors Microsoft systems and provides an easy and extensible dashboard for viewing active-directory changes logged by STEALTHbits products
Learn the advantages of sharing best practices and collaborating with others to battle highly organized cybercrime - join the era of collaborative defense!
IBM Security Strategy Intelligence, Integration and Expertise
by Marc van Zadelhoff, VP, WW Strategy and Product Management and Joe Ruthven IBM MEA Security Leader
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
When you think of Information Technology (IT) and Operational Technology (OT), which side are you on? You may not feel that you fall on any side of that technological skirmish, but when you stop to carefully consider the differences in these two disciplines, it is nearly impossible to avoid a tendentious leaning.
However, the time may be upon us when the conflicts of IT and OT will be put to rest for the broader purpose of making businesses more agile, efficient, resilient and ultimately, more profitable. We spoke with experts in the field who offered their insights about the challenges facing IT and OT convergence. Here’s what they shared!
Tolly Report: Stopping Attacks You Can't SeeIBM Security
View on-demand webinar: http://bit.ly/26P8RH8
Network security threats continue to grow not only in number, but also in type and complexity. Attackers are using more sophisticated methods, such as encryption and advanced evasion techniques, to avoid detection. And while security is a key objective for organizations, maintaining network performance and availability remain top priorities as well.
In this webinar, Kevin Tolly, Founder of The Tolly Group, will review the results of a test report IBM commissioned to evaluate the effectiveness and performance of the IBM Security Network Protection XGS 7100 appliance, a next-generation intrusion prevention system (IPS). You will also learn more about the IBM XGS, including how it was able to block 100% of encrypted threats, and stop 100% of attacks using advanced evasion techniques, while maintaining high performance levels.
The IBM Security Client References Guide includes summary slides of IBM clients across various industries that have successfully implemented solutions from the IBM Security Portfolio.
Systems of Engagement offer much value to industry & government alike but care needs to be taken in how they are protected against cyber attack. In this presentation I explain Systems of Engagement & illustrate the benefits using government case studies. I then discuss the security challenges Systems of Engagement pose and how to address them with commercial software technologies. Finally I look ahead to how to defend Systems of Insight hosted on future generations of cloud technology.
How to lead a large organization through agile transformation bodhi choudhuriBodhi Choudhuri
You have seen the Agile Manifesto. You have read success stories of startups embracing lean agile. Maybe you even hired consultants and experts. But how is your organization reacting to the change? Agile is not just a change of the delivery framework. It’s a mindset shift for employees and leaders alike. It’s a transformation built around Culture, Principles and Tools/ Technology. Find out how to think end to end, ensure rapid feedback is built into your systems and processes and use the right tools and technology to achieve the desired results.
Recent ECB/ EBA regulations how they will impact European banks in 2016IBM Security
View on demand webinar: https://securityintelligence.com/events/recent-ecbeba-regulations-how-they-will-impact-european-banks-in-2016/
The recent European Central Bank’s (ECB) Recommendations for the Security of Internet Payments and European Banking Authority (EBA) regulations have mandated numerous requirements for European banks to enhance online fraud prevention practices. Most European banks are required to include additional capabilities in risk analysis, malware protection, and strong authentication to meet the security requirements.
Assaf Regev, Product Marketing Manager, IBM Security Trusteer, will expand on how the new regulations will impact the European financial sector and what your bank will need to do to not only comply but also to be more secure.
The key requirements for effective and sustainable online banking security as outlined by the ECB/EBA
The need for layered security – why present controls may not be enough
How IBM can help meet the ECB/EBA recommendations on time and on budget, while minimizing deployment, management and operational costs
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
With the rapid growth of smartphones and tablets in the enterprise, CIOs are struggling to secure mobile devices and data across a wide range of mobile platforms. Attend this session to learn best practices around defining a mobile security policy, educating employees about safe computing practices, and deploying a secure technology framework. We'll discuss the benefits of endpoint management solutions like IBM Endpoint Manager in the context of a comprehensive enterprise deployment encompassing smartphones, tablets, PCs and servers.
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerChris Pepin
IBM Interactive is one of the largest interactive agencies in the world. Recently named among the top five digital marketing agencies in the world by Gartner, it is home to IBM's Mobile Practice services. Come and learn how IBM Interactive works with clients on mobile strategy, user-centered design and mobile strategy realization that will accelerate your mobile application creation, and delight your customers with compelling user experiences on the fastest-growing, user-facing device on the planet.
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIBM Security
View on demand webinar:
https://securityintelligence.com/events/introducing-ibm-cloud-security-enforcer-casb-idaas-and-threat-prevention/
Cloud Security Enforcer is the first solution to combine Cloud Access Security Broker (CASB) functionality with identity services (IDaaS), policy enforcement and dynamic threat prevention intelligence into a single integrated SaaS solution.
Join Daniel Wolff, Program Director Cloud Security Product Management, and Gonzalo de la Hoz, IAM European Segment Leader, as we discuss how IBM Cloud Security Enforcer has integrated multiple technologies crucial to enabling safe adoption of cloud applications in the enterprise:
- Cloud application discovery and risk
- Cloud identity services and application on-boarding
- Closing the mobile device gap
- Policy enforcement and threat prevention
Retail Mobility, Productivity and SecurityIBM Security
Displaying key findings from the Mobility Trends in the Retail Sector research report prepared by Enterprise Strategy Group (ESG) and IBM, this infographic affords valuable context to retail organizations in planning a better tomorrow.
World of Watson 2016 - Information InsecurityKeith Redman
We call it security, however we’re really dealing with our insecurities, especially around our information.
The recent Yahoo announcement is astonishing, not because it happened or the number of people potentially exposed, but for the time it took to realize it had happened – approximately 2 years(?)! Information is the lifeblood of Analytics. We need it and we need to protect it. Check out these sessions to see what’s new in addressing our Insecurities about our Information.
JIMS TECHBYTE 2013- The Annual IT Symposium Of JIMS, Sec-5,Rohini.techbyte2014
The focus of JIMS Annual IT Symposium - TechByte is on proven technologies that have matured beyond the R&D stage, having wide applications and being commercialized especially to the advantage of the Indian Industry and society at large.
Jagan Institute of Management Studies has been highly successful in organizing IT Symposium on emerging technologies for the past several years. The focus is on proven technologies that have matured beyond the R&D stage, having wide applications and being commercialized especially to the advantage of the Indian Industry and society at large.
World of Watson 2016 - For your Boss - Panel discussionsKeith Redman
Are you overworked? Do you need a vacation, or a Staycation? Send your boss to the World of Watson!
The World of Watson has a number of sessions geared specifically to that Cat that manages your professional life. There is also the benefit of one-on-one conversations with IBM executives that can be scheduled with the assistance of your IBM representative. So if you can’t go to the World of Watson, send your boss! After all; when the cat’s away, the mice can play… (If you can’t go, don’t fret it too hard. Many of the major sessions will be streamed on https://ibmgo.com.)
The future is already here. Is your technology ready? On Day Two of the IBM ExecutiveEdge conference in Las Vegas, experts including IBM’s Kevin Keverian, Doug Brown, Gustavo Stolovitzky and Jamie Thomas explore technology in the days and years ahead.
Big data for cybersecurity - skilledfield slides - 25032021Mouaz Alnouri
Now more than ever, the landscape of cybersecurity is getting broader. Both small and large organizations are adopting Big Data technologies to enhance their security detection capabilities.
These slides are from a webinar conducted by Skilledfield, you will learn:
- Why Cybersecurity is a Big Data use case
- How we address Cybersecurity as Big Data Professionals
- How we keep up with the emerging cyber threats
- Benefits of Big Data Technologies for Cybersecurity
Automation: Embracing the Future of SecOpsIBM Security
Join Mike Rothman, Analyst & President of Securosis and Ted Julian, VP of Product Management and co-founder of IBM Resilient, for a webinar on common automation use cases for the Security Operations Center (SOC).
Security Orchestration, Automation and Response (SOAR) tools are garnering interest in enterprise security teams due to tangible short-term benefits.
Watch the recording: https://event.on24.com/wcc/r/2007717/385A881A097E8EFCE493981972303416?partnerref=LI
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
The fourth annual Ponemon report on The Cyber Resilient Organization in 2019, sponsored by IBM Security, focuses on the key trends that make an organization cyber resilient and how cyber resilience has changed since the first report launched in 2015.
Hosted by Larry Ponemon of the Ponemon Institute and Maria Battaglia, IBM Security, these two industry experts answer the questions, what has improved in the cyber security space over the past 4 years? What do organizations still struggle with? And which groups are improving and how?
This webinar will take you through the barriers of becoming cyber resilient and dive into report topics such as implementing automation, aligning privacy and cyber security, and what it takes to become a cyber resilient “High Performer” in 2019.
Listen to the on-demand webinar at: https://event.on24.com/wcc/r/1975828/97089502D02EFD9478B85676EB67266C?partnerref=FM1
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
Data breach and Cybersecurity incident reporting regulations are becoming more widespread. The introduction of GDPR in May 2018, with its 72-hour reporting requirement, resulted in organizations having to review their incident response processes and more regional and industry-specific regulations are being introduced all the time. Security Operations and Privacy teams need to be aligned to meet these new requirements. Technology such as Security Orchestration and Automation is also being adopted to collaborate on the investigation and remediation of security incidents.
This webinar, hosted by Privacy experts from Ovum and IBM, will look at how technology can close the gap between Privacy and Security to reduce the time to contain incidents and maintain compliance with complex breach laws.
View the recording: https://event.on24.com/wcc/r/1930112/BE462033358FFF36C4B27F76C9755753?partnerref=LI
Integrated Response with v32 of IBM ResilientIBM Security
Email integration is an important tool in the IR process. Email ingestion allows alerts to be consumed from external tools that do not have available APIs. Email-driven phishing attacks are also one of the most common investigations for most security teams. A key capability v32 of the Resilient platform is a complete overhaul of the email connector. This updated email capability, now integrated into the core Resilient platform, simplifies the ability of IR teams to capture email-borne malware of phishing attacks and generate incidents and artifacts.
View the corresponding webinar to learn how the new features in the v32 release can help improve your integrated response to attacks and how native email integration can be leveraged as part of workflows and playbooks. You'll also learn what to expect with the updated look and feel of the Resilient platform and significant updates to the Privacy Module to support global regulations.
View the recording: https://ibm.biz/Bd2Yvt
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
IBM Resilient customers are building versatile, adaptable incident response playbooks and workflows with expanded functions and community applications – recently released on the IBM Security App Exchange.
With the new IBM Resilient community, you can collaborate with fellow security experts on today’s top security challenges, share incident response best practices, and gain insights into the newest integrations.
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
Security Operation Centers (SOCs) today are complex environments. They often have too many separate tools, uncoordinated analysts in the response process, and confusion around alert prioritization. Because of this, SOCs consistently struggle responding to the most urgent incidents.
The integration between IBM Resilient and Carbon Black helps SOCs overcome these challenges. IBM Resilient’s Intelligent Orchestration combined with Carbon Black Response provides a single view for all relevant response data and streamlines the entire security process. This makes it simpler for analysts to quickly and efficiently remediate cyberattacks.
Join experts Chris Berninger, Business Development Engineer, Carbon Black, and Hugh Pyle, Product Manager, IBM Resilient, for this webinar, to learn:
- How the IBM Resilient-Carbon Black integration works within your SOC to accelerate incident response improvement
- Strategies to implement Intelligent Orchestrate and automation into your incident response process
- Actions that can be taken today for maximizing the effectiveness of your SOC
Are You Ready to Move Your IAM to the Cloud?IBM Security
Many companies are considering moving their current identity and access management (IAM) implementations to the cloud, or they are looking at the cloud for their new IAM use cases. This might be driven by the threat of attacks via identities, increasing compliance mandates, expanding needs of end users for frictionless data access or improving the total cost of ownership.
View this presentation and watch the corresponding webinar to help you determine whether your organization is ready to move to IDaaS.
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
Although the majority of organizations subscribe to threat intelligence feeds to enhance their security decision making, it's difficult to take full advantage of true insights due to the overwhelming amounts of information available. Even with an integrated security operations portfolio to identify and respond to threats, many companies don't take full advantage of the benefits of external context that threat intelligence brings to identify true indicators of compromise. By taking advantage of both machine- and human-generated indicators within a collaborative threat intelligence platform, security analysts can streamline investigations and speed the time to action.
Join this webinar to hear from the IBM Security Chief Technology Officer for Threat Intelligence to learn:
How the IBM Security Operations and Response architecture can help you identify and response to threats faster
Why threat intelligence is a fundamental component of security investigations
How to seamlessly integrate threat intelligence into existing security solutions for immediate action
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
Businesses and governments alike are experiencing an alarming rate of malicious activity from both external and internal actors.
Not surprisingly, mission-critical mainframe applications make for desirable targets with large repositories of enterprise customer sensitive data. Mainframe environments are increasingly at risk opening accesses through the internet, mobile initiatives, big data initiatives, social initiatives, and more to drive the business forward. Additionally, there are some security challenges that are specific to the mainframe - traditional protection methods are no longer enough, insider threats are also on the rise, mainframe environments could be more vulnerable with reliance on privilege users to administer security, silo-ed mainframe IT management, limited ownership visibility, and lack of uniformed security management across the enterprise.
View this on-demand webcast to learn more about specific mainframe data protection challenges, top tips for protecting sensitive data, and key data protection capabilities that you should consider to address these challenges.
Register here for the playback: https://event.on24.com/wcc/r/1461947/D9664CC82EC641AA58D35462DB703470
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
When your cyber security is under attack, knowing who is behind your threats and what their motives are can help you ensure those threats don't become a reality. But cyber threat actors conduct their threats through a variety of means and for a variety of reasons. That's why it is critical to analyze a variety of data sources and proactively hunt those threats that are lying in wait. This webinar will illustrate how the IBM i2 QRadar Offense Investigator app enables analysts to push event data from QRadar directly into IBM i2 Analyst's Notebook, where users can apply a variety of visual analysis techniques across a disparate data sources, to build a more comprehensive understand of those threats and hunt them.
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
Understand the impact of today's security breaches by attending our June 26th webinar which will discuss the 2017 Ponemon Cost of a Data Breach study.
Join Ponemon Institute and IBM Security Services on June 26th for a webinar discussing the impact of today’s security breaches based on the latest release of the 2017 Cost of Data Breach Study.
Register for IBM Security Services Webinar highlighting Ponemon Institute 2017 Cost of Data Breach Study The 12th annual Cost of Data Breach Study conducted by Ponemon Institute and sponsored by IBM Security Services calculates the real costs, implications and probabilities of security breaches faced by global organizations.
This webinar will present global findings highlighting trends across 11 countries and 2 regions. Attendees will have access to industry experts for live Q/A and will walk away with key insights, cost reducing strategies, investments and proactive best practices to reduce impact to their businesses in preparation for the next breach.
Join IBM Security Services and Larry Ponemon, founder of the Ponemon Institute, as he walks through the results and methodology of the 2017 Cost of Data Breach Study.
WannaCry Ransomware Attack: What to Do NowIBM Security
View on-demand webinar: http://bit.ly/2qoNQ8v
What you need to know and how to protect against the WannaCry Ransomware Attack, the largest coordinated cyberattack of its kind. WannaCry has already crippled critical infrastructure and multiple hospitals and telecommunications organizations, infecting 100s of thousands of endpoints in over 100 countries. In this on-demand webinar, we discuss the anatomy of this unprecedented attack and IBM Researchers share expert insights into what you can do now to protect your organization from this attack and the next one.
How to Improve Threat Detection & Simplify Security OperationsIBM Security
Over 74% of global enterprise security professionals rate improving security monitoring as a top priority. Monitoring must be done efficiently within a security operations center (SOC) to combat increased threats and a limited supply of trained security analysts.
While the vendor landscape for security solutions is rapidly evolving, many early point solutions and first generation SIEMs are not keeping pace with the changing needs of security operations. A new class of platforms has emerged that combine advanced analytics and flexible deployment options. Join this exclusive webinar featuring Forrester Research to learn:
Characteristics of modern security platforms that have evolved from point solutions and basic SIEMs
Criteria to consider when evaluating vendors and solutions
The advantages of an integrated security platform that incorporates cognitive capabilities and augmented intelligence
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsIBM Security
IT security teams have a tough job. While organizations depend upon Internet access to conduct business, security teams are responsible for safeguarding these communications and transactions from those who wish to profit by stealing intellectual property, customer private data or even just encrypting your data and demanding a ransom for its safe recovery. There are a number of tools available to monitor log events, network flows, and packet captures, but most of these are performing after-the-fact analysis. That can make it easy for the bad guys to hide out on your network.
IBM QRadar Network Insights (QNI) uses innovative network threat analytics to identify malicious content – including those hidden in data transmissions, SSL certificate violations, protocol obfuscation, file tags, and suspicious network flows – and then pieces together those indicators of attack to provide security teams with real-time alerts. These alerts help organizations detect attacks that are in progress, as well as determine what damage may have already been inflicted.
View this on-demand webinar to learn how QRadar Network Insights can:
Remove network blind spots and reduce complexities in log data to reveal previously hidden threats and malicious behaviors;
Record application activities, capture file metadata and artifacts, and identify assets, applications and users participating in network communications;
Reduce the impact of threats associated with malware, phishing emails, data exfiltration, and the lateral network movements of advanced attacks.
Top 12 Cybersecurity Predictions for 2017IBM Security
No industry is immune from a cyberattack. In fact, cyber experts are predicting that we may see a rise in attacks and a spread as industries previously on the fringe now face direct hits. The question is, “What’s in store for us in 2017?”
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...IBM Security
After the great response to the first “Safeguard Healthcare Identities and Data with Identity Governance and Intelligence” webinar and the continued success of IBM in the healthcare industry we have decided to bring it back!
With the increased focus on security, you may not have guessed that healthcare is one of the hardest hit industries. The people involved – doctors, nurses, hospital employees, patients, pharmacies and more – have become an easy entry point. Because of this, healthcare organizations have started to look for ways to better manage and govern the identities of their users. The challenge has been integrating with their Electronic Medical Record (EMR) systems, however, IBM has devised a solution.
View the slides from this December 5th webinar to learn about how IBM can help safeguard healthcare identities, as well as how IBM, using IBM Identity Governance and Intelligence, was able to integrate with EPIC EMR.
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemIBM Security
What could cybersecurity look like in the cognitive era? Organizations are facing a number of well-known security challenges and these challenges are leading to gaps in intelligence, speed, and accuracy when it comes to threats and incidents. The gaps can’t be addressed by simply scaling up legacy processes and infrastructure - new approaches are needed, and cognitive security solutions may help address these gaps. IBM conducted a survey of over 700 security professionals leaders and practitioners from 35 countries, representing 18 industries to get a sense for what challenges they are facing, how they are being addressed, and how they view cognitive security solutions as a potential powerful new tool.
Join us as Diana Kelley, Executive Security Advisor in IBM Security, and David Jarvis, Functional Research Lead for CIO and Cybersecurity in the IBM Institute for Business Value, discuss findings from the 2016 Cybersecurity Study "Cybersecurity in The Cognitive Era: Priming your Digital immune system"
This webinar will cover an overview of the study findings, including:
Security challenges, shortcomings and what security leaders are doing about them
Views on cognitive security solutions - how they might help, readiness to implement and what might be holding them back
What those that are ready to implement cognitive enabled security today are thinking and doing
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Elevating Tactical DDD Patterns Through Object Calisthenics
IBM Insight 2015 - Security Sessions Roadmap
1. Agenda subject to change. Please reference online agenda builder at IBM.com/InsightSecurity @ Insight2015 1
@
A New Way to Think About Security
#ibm
insight
Conference General Session
Wednesday, October 28
Mandalay Bay South Convention Center Level 3 South Seas F
Time Session number Session type Location
10:30 AM – 11:30 AM ISP-3143 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon J
Session title Speaker Abstract
Forrester: Total Economic
Impact of IBM Security
Guardium
Jon Erickson, Forrester
Research
In August 2015, IBM commissioned Forester consulting to conduct
a Total Economic Impact (TEI) study to examine the potential return
on investment (ROI) that organizations may realize by deploying
IBM Security Guardium. Join this session to hear directly from our
guest, Forrester TEI consultant and director Jon Erickson, about the
results of study. Based on online interviews conducted with existing
IBM Security Guardium customers, the study uncovered that
organizations may acheive results like cost reduction, risk reduction,
and productivity increases, as well as tactical efficiencies and
strategic benefits from implementations on a common platform.
Time Session number Session type
10:30 AM – 11:30 AM SUP-4052 Super Session
Session title Abstract
Stop unknown threats: Apply analytics to
the challenge of security
As organizations drive innovation and engage with customers in new ways, protecting
against cyberattacks becomes more critical. Traditional security tools focus on the known.
You need a different approach to stop advanced attacks, unknown or never-before-seen
threats from outside the organization, and to deter risky behavior of insiders as well. We will
explore how analytics and a big data approach to security can help you proactively protect
your most critical assets.
Data Security and Privacy
Monday, October 26
2. Agenda subject to change. Please reference online agenda builder at IBM.com/InsightSecurity @ Insight2015 2
Time Session number Session type Location
1:00 PM – 2:00 PM ISP-3364 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon J
Session title Speaker Abstract
Nationwide Case Study:
Data Security and Security
Intelligence Equals Better
Results
Lee March, Nationwide
Sandeep Shah, IBM
Patrice Bordron, Nationwide
Nationwide, a Fortune 100 company based in Columbus, Ohio,
is one of the largest and strongest diversified insurance and
financial services organizations in the U.S. Nationwide deeply values
customer loyalty and the security of customer data: They have been
a leader in considering how to prevent data loss. In this session,
representatives from Nationwide share their views on data security,
security intelligence, and why these two capabilities should be used
together for a more complete and robust data security system, their
lessons learned, and the benefits they gain from deploying IBM
Security Guardium and IBM Security QRadar together.
Data Security and Privacy (continued)
Monday, October 26
Time Session number Session type Location
2:30 PM – 3:30 PM ISP-3313 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon J
Session title Speaker Abstract
Cloud Has Torn Down the
Firewalls: Do You Have What It
Takes to Protect Your Data?
Luis Casco-Arias, IBM As clients embrace cloud environments, firewalls come down
and new types of users start accessing data. Join this session
to learn about data security challenges in this exciting new world
and learn how IBM can help you to address these issues. Learn
about traditional and emerging data security requirements, and
hear specific client use cases with common problems as well as
the best solutions.
Tuesday, October 27
Time Session number Session type Location
10:30 AM – 11:30 AM ISP-3098 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon J
Session title Speaker Abstract
Data Security Architecture: Best
Practices, Tips and Tricks
Nir Carmel, IBM
Yosef Rozenblit, IBM
This session will cover the IBM Data Security architecture, and
provide useful hints and guidelines to help you understand how
this solution can provide you with maximum return on investment.
Typical use cases will be demonstrated to show how functionality
can be applied to solve many customer requirements.
3. Agenda subject to change. Please reference online agenda builder at IBM.com/InsightSecurity @ Insight2015 3
Data Security and Privacy (continued)
Tuesday, October 27
Time Session number Session type Location
1:00 PM – 2:00 PM ISP-3318 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon J
Session title Speaker Abstract
The IBM Security Guardium
Environment: Going Virtual in
the 21st Century
James Albright, Athene
Mitch Glass, Athene USA
As physical hardware ages, costs will only continue to rise. Virtual
environments avoid those costs and offer additional advantages.
Join this session to learn how Athene has deployed IBM Security
Guardium virtually to capitalize on resources, improve performance
and reduce data center costs. This session will provide details
on how robust reporting and documentation can keep your
organization in compliance with both company policy and
regulation. The presentation will also examine the value of using
Guardium professional services in your next project or health check.
Time Session number Session type Location
4:00 PM – 5:00 PM ISP-2249 Breakout Session – Business Mandalay Bay South Convention
Center Level 2 Lagoon J
Session title Speaker Abstract
Yazaki Case Study: Real
Time Data Security With IBM
InfoSphere Guardium for SAP
Solutions
Juergen Laudien, Yazaki
Europe Ltd.
Karsten Stoehr, IBM
Today’s economy seeks a fast performing environment for analytic
and transactional workloads, all while being sensitive to database
security. Join this session to learn how IBM InfoSphere Guardium
enabled Yazaki Europe to build a real time platform that deals
with the security challenges of their SAP and non SAP data
environments.
Time Session number Session type Location
10:30 AM – 11:30 AM ISP-3327 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon E
Session title Speaker Abstract
Who’s in My Data? Securing
User Access Rights with IBM
Security Guardium
Eric Bryan, Great American
Insurance Group
Tim Tait, Great American
Insurance Group
Securely managing the assignment of user access rights is
critical to good IT security and governance. In fact, it is increasingly
becoming required by many regulations. As the cost of compliance
increases with new regulations, and as IT environments become
more heterogeneous and complex, tools must be used to ensure
user access rights are kept to ‘least privilege access’ while not
unintentionally removing any privileges that are needed for business
use. Join this session to learn how Great American Insurance has
used IBM Security Guardium to review and secure user access
rights, including entitlement reporting, ‘last used’ field use, as well
as to streamline and manage access reviews using Guardium’s built
in workflow system.
4. Agenda subject to change. Please reference online agenda builder at IBM.com/InsightSecurity @ Insight2015 4
Time Session number Session type Location
2:30 PM – 3:30 PM ISP-3130 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon J
Session title Speaker Abstract
Introducing IBM Guardium v10
and the Data Security Road Map
Nir Carmel, IBM This session discusses the market requirements around data
security and privacy and introduces you to what’s new in IBM
Guardium v10. It also describes the IBM data security vision
and product road map.
Data Security and Privacy (continued)
Wednesday, October 28
Time Session number Session type Location
1:00 PM – 2:00 PM ISP-2351 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon J
Session title Speaker Abstract
How to Get the Most From IBM
InfoSphere Guardium S TAP
Installation for DB2 z/OS
Peter Bongiovanni, American
International Group
Is your security officer asking about auditing your DB2 on z/OS
environment? Are you concerned about the impact of auditing
on application performance and availability? Are you looking for
guidance from someone who has “been there, done that?” In this
presentation, you will learn AIG’s best practices for installing and
tuning the InfoSphere Guardium S-TAP for DB2 on z/OS in a data
sharing environment. The presentation includes critical planning
information and upgrade steps. There will also be an overview of
the business value provided by InfoSphere Guardium for providing
granular auditing capabilities for security mandates and federal
regulation. The presentation will be given by IBMer, Ernie Mancil.
Time Session number Session type Location
10:30 AM – 11:30 AM ISP-3092 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon E
Session title Speaker Abstract
Big Data: Monitoring Usage
and Implementing Security
and Privacy Controls
Leslie Wiggins, IBM Big data is the rage in the marketplace with lots of potential to solve
a myriad of customer and corporate issues. With this opportunity
comes a new set of issues around security and privacy. The more
data we have and want to use, the more potential there is for cyber
criminals to attempt to harvest that same data. In this session, you
will discover the latest strategies for monitoring big data usage and
implementing controls to ensure your sensitive data is not exploited.
5. Agenda subject to change. Please reference online agenda builder at IBM.com/InsightSecurity @ Insight2015 5
Time Session number Session type Location
11:15 AM – 12:15 PM ISP-2813 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon J
Session title Speaker Abstract
Dynamic Data Protection with
Fine Grained Access Control
and Masking From InfoSphere
Guardium
Sundari Voruganti, IBM
Steve Tallant, IBM
Do new privacy regulations have you confused about how to make
a legacy ad hoc query application conform? Is making application
changes a risky proposition? Is the access control in the application
inadequate to protect leakage? Are there data elements in your
legacy web applications you’d like to mask from certain classes
of users? In this session, learn about exciting new technology
from IBM InfoSphere Guardium that can help you address such
challenging situations across different kinds of database
management systems.
Data Security and Privacy (continued)
Wednesday, October 28
Time Session number Session type Location
9:45 AM – 10:45 AM ISP-3151 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon J
Session title Speaker Abstract
Who Is Accessing Your Files
and IP? Keep Control With IBM
Security Guardium File Activity
Monitoring
Dan Stanca, IBM Up to 80 percent of enterprise data is unstructured and includes
text files, spreadsheets, presentations, source code files, log files
and the ubiquitous PDFs. Do you know which of your files contain
proprietary or sensitive data? Is your organization doing enough to
protect this valuable intellectual capital? Are you able to prevent PII
data leakage? In this session, you will learn about the many aspects
of unstructured data protection and how IBM Security Guardium for
Files can help you protect yourself. The presenter will also share a
use case that highlights how this feature helps IBM protect our own
source code.
Time Session number Session type Location
4:00 PM – 5:00 PM ISP-3170 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon J
Session title Speaker Abstract
Avoid the Headlines: Proactively
Protect Your Data By Creating
Appropriate Controls
Steve Tallant, IBM In a world where data breaches are happening with increasing
frequency, you need a plan to proactively protect your data, before
you end up reacting to a breach. This session will cover the seven
most common use cases that help customers operationalize
security controls within their environment.
Thursday, October 29
6. Agenda subject to change. Please reference online agenda builder at IBM.com/InsightSecurity @ Insight2015 6
Data Security and Privacy (continued)
Thursday, October 29
Time Session number Session type Location
3:30 PM – 4:30 PM ISP-1922 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon J
Session title Speaker Abstract
Bridging the Gap Between
Security Intelligence and Data
Protection
Walid Rjaibi, IBM
Johan Varno, IBM
Hardly a week goes by without headlines about a data security
breach. Staying a step ahead of these increasing and sophisticated
attacks requires a comprehensive and proactive approach to data
security that helps organizations identify risks and automatically
adjust the security defenses before any serious damage can occur.
IBM QRadar and IBM Guardium are trusted by many organiza-
tions worldwide as comprehensive security intelligence and data
protection platforms. This session will thoroughly explore how these
solutions integrate to enhance business agility and resiliency by
automating the process of adjusting the Guardium data defenses
in response to real time security intelligence events from QRadar.
7. Agenda subject to change. Please reference online agenda builder at IBM.com/InsightSecurity @ Insight2015 7
Time Session number Session type Location
1:00 PM – 2:00 PM ISY-3516 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon G
Session title Speaker Abstract
Cloud Security: A New
Approach to Embrace the Cloud
Dan Wolff, IBM There are thousands of cloud applications out there. How can I
enable my users and not just say no? Attend this session and learn
about the IBM strategy for securing cloud environments, new
techniques and solutions for addressing security threats, how
hosted cloud security services can help, and techniques for using
the shift to the cloud as an opportunity to improve the security
of your organization.
Security Trends and Innovation
Monday, October 26
Time Session number Session type Location
4:00 PM – 5:00 PM ISY-1535 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon J
Session title Speaker Abstract
IBM z Systems Mainframe: The
Ultimate Data Security Hub
Julie Bergh, IBM Traditionally up to 80 percent of mission critical data either
originates or resides on mainframes, especially for financial
institutions. The mainframe offers integrated hardware and
software security capabilities that have been evaluated at EAL 5+
including high speed encryption. Mainframes offer many levels of
data protection from masking and encryption to data classification,
data access controls, storage protection for data at rest, and secure
communication for data in motion. All these capabilities combine
to make the mainframe the ultimate secure data repository hub for
your enterprise. Come learn how IBM security solutions integrate
to provide the ultimate data security hub with RACF, DB2, zSecure,
Guardium, QRadar and SKLM.
Time Session number Session type Location
1:00 PM – 2:00 PM ISY-1137 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon E
Session title Speaker Abstract
Trends in Encryption of Data and
Key Management, On Premises
and in the Cloud
Rick Robinson, IBM Data is everywhere; on premise, mobile and cloud systems. These
are the initial applications of data propagation across a boundless
world of storage. As the storage of data across these seamless
platforms becomes ubiquitous, the need for protecting the data, re-
gardless of its location, also needs to be protected through the use
of encryption (and that means centralized key management). The
person who controls the keys to encryption of data holds control
over the data itself. But how has the industry adopted encryption?
What are the standards? Where are we missing adoption? This
presentation looks at trends in encryption and key management,
and presses the questions on where we need improvement.
8. Agenda subject to change. Please reference online agenda builder at IBM.com/InsightSecurity @ Insight2015 8
Security Trends and Innovation (continued)
Tuesday, October 27
Time Session number Session type Location
4:00 PM – 5:00 PM ISY-3528 Breakout Session – Business Mandalay Bay South Convention
Center Level 2 Lagoon G
Session title Speaker Abstract
IBM Security Business Unit:
Helping Organizations Meet
Security Challenges
Patrick Vandenberg, IBM This session provides an overview of the security business
challenges faced by organizations today, and discusses how the
IBM Security Business Unit can help you meet these challenges
and protect your data.
Time Session number Session type Location
2:30 PM – 3:30 PM ISY-3468 Breakout Session – Business Mandalay Bay South Convention
Center Level 2 Lagoon L
Session title Speaker Abstract
Common Themes in Targeted
Attacks and Counter Tactics
Etay Maor, IBM Are current security measures enough to stop targeted attacks?
Could common security practices even aid an attacker? This
presentation will review the common themes of targeted attacks,
specifically focusing on infections and access to internal networks,
exploitation of software vulnerabilities and the use of remote access
tools. The techniques attackers use will be explored along with the
weak points (both in technologies and in humans) they look for and
discuss possible choke points. The session will include multiple live
demos and case studies as well as strategies and tactics for coun-
tering the threats discussed.
Time Session number Session type Location
10:30 AM – 11:30 AM ISY-3454 Breakout Session – Business Mandalay Bay South Convention
Center Level 2 Lagoon L
Session title Speaker Abstract
Community Countermeasures:
The Need for Collaborative
Threat Protection
Patrick Vandenberg, IBM Defending against today’s threats requires collaboration on a scale
never seen before in our industry. Security professionals must turn
to new strategies, employing community based defenses, shared
threat intelligence, and integrated systems of capabilities to disrupt
advanced attacks. A well coordinated system can shift the balance
back to our teams to effectively prevent, detect and respond to
these attacks. Join us to hear how IBM is helping chart a way
forward with coordinated and open security technology, services
and threat intelligence.
Wednesday, October 28
9. Agenda subject to change. Please reference online agenda builder at IBM.com/InsightSecurity @ Insight2015 9
Time Session number Session type Location
4:00 PM – 5:00 PM ISY-2629 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon G
Session title Speaker Abstract
Using IBM Security Intelligence
and Analytics to Protect Your
Business Data
Roger J. Hellman, IBM
Matt Carle, IBM
Your organization is at risk of attack every day, and security threats
continue to grow in sophistication and severity. Fortunately IBM
offers solutions that use intelligence and advanced analytics to
help keep your data safe. Attend this session and learn more about
how IBM Security QRadar detects threats, identifies vulnerabilities,
performs forensic analysis, manages risks and compliance, and
can be deployed in the Cloud. We will also cover the open extension
framework API, and how IBM is creating new opportunities for
Business Partners, developers, and clients to collaborate and
enhance the capabilities of QRadar.
Security Trends and Innovation (continued)
Wednesday, October 28
Time Session number Session type Location
4:00 PM – 5:00 PM AIM-2243 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon E
Session title Speaker Abstract
Surviving the Mobile
Phenomenon: Reduce Risk
While Deploying Mobile Access
to the Enterprise
Jason Hardy, IBM The number of mobile cyber security attacks is continuing to grow.
At any given time, malicious code is infecting more than 11.6 million
mobile devices. Recent research shows that nearly 40 percent of
large companies, including many in the Fortune 500, aren’t taking
the right precautions to secure the mobile applications they build for
customers. The alarming state of mobile insecurity expands beyond
applications, to gaps in mobile device management, data and
content and user access. In this session, learn how you can simplify
and streamline mobile security and understand how a holistic
approach to mobile security can help you tackle known risks and
address the unique interdependencies between them.
10. Agenda subject to change. Please reference online agenda builder at IBM.com/InsightSecurity @ Insight2015 10
Time Session number Session type Location
2:00 PM – 3:00 PM ISY-3525 Breakout Session – Technical Mandalay Bay South Convention
Center Level 2 Lagoon J
Session title Speaker Abstract
Protect Your Business Critical
Data with Intelligent Access
Management Solutions
Jason Keenaghan, IBM With web applications under constant attack, organizations need
more secure ways to adopt web, mobile and cloud technologies,
protect online resources, and address compliance requirements.
Intelligent Identity and Access Management solutions, leveraging
information such as user analytics, threat data, and other metrics,
can help reduce risk and mitigate internal/external threats. Join this
session to learn how user auditing data, device fraud and malware
indicators, and threat awareness can highlight user anomalies and
enable appropriate access decisions.
Security Trends and Innovation (continued)
Thursday, October 29
Time Session number Session type Location
9:45 AM – 10:45 PM ISY-3912 Breakout Session – Business Mandalay Bay South Convention
Center Level 2 Lagoon E
Session title Speaker Abstract
Critical Data Protection Program Nev Zunic, IBM This session discusses how to have visibility into, and manage,
sensitive data assets across the organization. There are troves
of sensitive data spread across an organization’s environment.
Understanding the critical nature and value of the sensitive data
assets is vital to apply necessary controls to protect these assets.
Identifying, discovering, and classifying sensitive data needs to
become an established business process that is performed on an
ongoing basis. The classification of sensitive assets allows controls
to be defined and implemented for data according to its value to the
organization. Understanding the risks associated with sensitive data
enables proactive actions to be taken to mitigate any potential risks.
11. Agenda subject to change. Please reference online agenda builder at IBM.com/InsightSecurity @ Insight2015 11
Security Trends and Innovation (continued)
Thursday, October 29
Time Session number Session type Location
3:30 PM – 4:30 PM ISY-2687 Breakout Session – Business Mandalay Bay South Convention
Center Level 2 Lagoon J
Session title Speaker Abstract
Ensuring Your Mission Critical
Data Stays Protected in the
Digital Age: Mobile to the M
Robert Kennedy, IBM In today’s mobile era, there are over 10 billion devices accessing
information. Enterprises are challenged with integrating new mobile
services with existing organizational processes, while retaining
security of mission critical assets. IBM z Systems provides you with
an enterprise backbone for mobility solutions, which can scale
to handle the huge volumes, deliver proven mobile end to end
integration with reliability, availability, and security, and ensure that
your data is protected. But some of that security is dependent on
effective deployment strategies. This session will review the security
challenges for mobile deployments and discuss the broad set of
solutions that IBM can offer to help with your mobile deployments.
Governance
Monday, October 26
Time Session number Session type Location
2:00 PM – 5:00 PM LCG-1640 Lab Mandalay Bay South Convention
Center Level 1 Bayside F – 06
Session title Speaker Abstract
Simplify Data Security and
Compliance for Big Data Using
IBM Security Guardium
Tina Chen, IBM
Sundari Voruganti, IBM
This year has seen a significant increase in the level of interest
in the topic of security and auditing for Hadoop. Hadoop vendors
are responding with better security features and by partnering
with the market-leading data security and compliance solution
for Hadoop, IBM Security Guardium provides organizations the
value of real-time monitoring, alerting, reports, compliance
workflow, and more for Hadoop. Get hands-on experience with
Guardium and IBM BigInsights and see how to configure real-time
alerts for suspicious behavior, customize prebuilt reports, and use
other Guardium features such as quick search and compliance
workflow.
12. Agenda subject to change. Please reference online agenda builder at IBM.com/InsightSecurity @ Insight2015 12
Data
Thursday, October 29
Time Session number Session type Location
2:00 PM – 5:00 PM LCD-3535 Lab Mandalay Bay South Convention
Center Level 1 Bayside F – 07
Session title Speaker Abstract
IBM InfoSphere Guardium: An
Enterprise Data Security and
Auditing Solution
Martin Dizon, IBM
Raki Roberts, IBM
Organizations of all types must secure their data to meet
compliance regulations and to minimize data attacks. This session
discusses the extensive database auditing and security capabilities
of IBM InfoSphere Guardium and how they help meet data security
and auditing needs. This session includes a business and technical
overview of the Guardium solution and its ability to scale across
the enterprise. It also prepares attendees to help their organization
reduce the cost of compliance by implementing Guardium’s
auditing features, mitigating internal threats using data level
access control, and integrating with enterprise security and
monitoring systems.