SlideShare a Scribd company logo
1 of 2
Download to read offline
Smarter technology for a Smarter Planet:

Emerging Threats in 2012
Spend a day with IBM X-Force.
Leave better prepared to protect.
Amidst the near constant reports of data leaks, Denial-of-Service attacks, and
socialHacktivism, IBM X-Force declared 2011 the “year of the security breach”. Although
it is 2012, the frequency and scope of these attacks continue to rage on. In an
increasingly connected world, incidents like these magnify the challenge enterprises face
as they attempt to protect against the looming threat of attack.Please join world
renowned experts from IBM X-Force and the Institute for Advanced Security for this full
day session where we will dive into the findings of our latest Trend and Risk report,
explore options to protect against threats, share real world demonstrations of the latest
online security solutions and strategies, and explore the changing role of senior security
leaders.


                                                                                                                                                                       X-Force Evolving Threat
                                                                                                                                                                       event
 26th September 2012, IBM South Bank – Agenda
 Time                       Description                                                                                          Speakers                              September 26th, 2012
                                                                                                                                                                       – IBM South Bank
 09:15                      Welcome - key issues cloud, mobile, big data                                                         Matt Middleton-
                                                                                                                                 Leal
 09:30                      IT Security, Current Landscape and 2012 Predictions from                                             IBM X Force
                            X Force mid year trend report.                                                                       Jean-Paul
                                                                                                                                 Ballerini
 10:15                      Security Intelligence - How to protect against targeted                                              Q1 Labs
                            attacks, insider fraud and unauthorised configuration                                                Steve Durkin
                            changes.
 10:45                      Enabling your Workforce - Securing the Mobile Enterprise                                             Darren Argyle
                                                                                                                                 WW Security
                                                                                                                                 Solutions
                                                                                                                                 Market Leader
 11:10                      Break
 11:20                      Local customer speaker                                                                               tbc
 11:55                      Five Key Steps to Success in Application Security (web &                                             David Tyrrell
                            mobile apps)
 12:20                      Navigating the Landscape: How IBM Security Systems                                                   Infrastructure
                            Combats Evolving Threats (XGS Platform launch) next                                                  Network / XGS
                            level of Advanced threat protection                                                                  Simon Smith
 12:50                      Wrap up & Introduction to IBM Security Systems                                                       Matt Middleton-
                                                                                                                                 Leal
 13:00                      Networking Lunch
 13:45 - 16:30              Use Case Demonstration                                                                               David Tyrrell &
                                                                                                                                 Simon Smith




This unique event is specifically designed to help security experts understand the
changing nature of the threat landscape.

A smarter business needs smarter software, systems and services. Let’s build a smarter
planet.

*The X-Force Trend & Risk Report is written by the world-renowned IBM X-Force research and development team which culls data from their database of 45,000 computer vulnerabilities, 150 million daily intrusion
attempts, 40 million spam and phishing attacks and 10 billion web pages and images to assemble a complete picture of the threat landscape.


This information is provided “as is” without warranty of any kind, express or implied, and is based on current IBM product plans and strategy, which are subject to change by IBM without notice. IBM shall not be
responsible for any damages arising out of the use of, or otherwise related to, this document. Nothing contained in this document is intended to, nor shall have the effect of, creating any warranties or representations from
IBM (or its suppliers or licensors), or altering the terms and conditions of the applicable license agreement governing the use of IBM software.


IBM, the IBM logo, ibm.com, Let’s Build a Smarter Planet, Smarter Planet and the planet icon are trademarks of International Business Machines Corporation, registered in many juris dictions worldwide. Other product
and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at www.ibm.com/legal/copytrade.shtml
Invitation

More Related Content

What's hot

Sap bw integration_2011_flyer
Sap bw integration_2011_flyerSap bw integration_2011_flyer
Sap bw integration_2011_flyerclaudio vettor
 
Today: Mobile Internet, Tomorrow: What?
Today: Mobile Internet, Tomorrow: What?Today: Mobile Internet, Tomorrow: What?
Today: Mobile Internet, Tomorrow: What?Michael Harries
 
Agenda Security Helsinki 29okt2009
Agenda Security Helsinki 29okt2009Agenda Security Helsinki 29okt2009
Agenda Security Helsinki 29okt2009Anna Näsmark
 
Nexus2010 keynote -- ImageSource
Nexus2010 keynote -- ImageSourceNexus2010 keynote -- ImageSource
Nexus2010 keynote -- ImageSourceJohn Mancini
 
IT Next February 2010 Issue
IT Next February 2010 IssueIT Next February 2010 Issue
IT Next February 2010 IssueShashwat DC
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...IT Network marcus evans
 
Converged Security in Critical National Infrastructure**A Risk-Modelled Appro...
Converged Security in Critical National Infrastructure**A Risk-Modelled Appro...Converged Security in Critical National Infrastructure**A Risk-Modelled Appro...
Converged Security in Critical National Infrastructure**A Risk-Modelled Appro...dan solomon
 
Sask 3.0 Summit -Seeing the Meaning, IBM R. Loepp
Sask 3.0 Summit -Seeing the Meaning, IBM  R. LoeppSask 3.0 Summit -Seeing the Meaning, IBM  R. Loepp
Sask 3.0 Summit -Seeing the Meaning, IBM R. LoeppSaskSummit
 

What's hot (9)

Sap bw integration_2011_flyer
Sap bw integration_2011_flyerSap bw integration_2011_flyer
Sap bw integration_2011_flyer
 
Today: Mobile Internet, Tomorrow: What?
Today: Mobile Internet, Tomorrow: What?Today: Mobile Internet, Tomorrow: What?
Today: Mobile Internet, Tomorrow: What?
 
Emc keynote 1030 1130
Emc keynote 1030 1130Emc keynote 1030 1130
Emc keynote 1030 1130
 
Agenda Security Helsinki 29okt2009
Agenda Security Helsinki 29okt2009Agenda Security Helsinki 29okt2009
Agenda Security Helsinki 29okt2009
 
Nexus2010 keynote -- ImageSource
Nexus2010 keynote -- ImageSourceNexus2010 keynote -- ImageSource
Nexus2010 keynote -- ImageSource
 
IT Next February 2010 Issue
IT Next February 2010 IssueIT Next February 2010 Issue
IT Next February 2010 Issue
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
 
Converged Security in Critical National Infrastructure**A Risk-Modelled Appro...
Converged Security in Critical National Infrastructure**A Risk-Modelled Appro...Converged Security in Critical National Infrastructure**A Risk-Modelled Appro...
Converged Security in Critical National Infrastructure**A Risk-Modelled Appro...
 
Sask 3.0 Summit -Seeing the Meaning, IBM R. Loepp
Sask 3.0 Summit -Seeing the Meaning, IBM  R. LoeppSask 3.0 Summit -Seeing the Meaning, IBM  R. Loepp
Sask 3.0 Summit -Seeing the Meaning, IBM R. Loepp
 

Similar to Invitation

Triangle InfoSecon Conference program 2011
Triangle InfoSecon Conference program   2011Triangle InfoSecon Conference program   2011
Triangle InfoSecon Conference program 2011Travis Barnes
 
Ibm endpoint manager pulse
Ibm endpoint manager   pulseIbm endpoint manager   pulse
Ibm endpoint manager pulseRMayo22
 
The Hand That Strikes, Also Blocks
The Hand That Strikes, Also BlocksThe Hand That Strikes, Also Blocks
The Hand That Strikes, Also BlocksSaumil Shah
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public versionIBM Sverige
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your UsersMike Murray
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS UK
 
Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Dale Butler
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operationsCisco Public Relations
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...cVidya Networks
 
NetWatcher crowdsourcing
NetWatcher crowdsourcingNetWatcher crowdsourcing
NetWatcher crowdsourcingScott Suhy
 
EACS Newsletter 2013
EACS Newsletter 2013EACS Newsletter 2013
EACS Newsletter 2013EACS1234
 
EACS Newsletter 2013
EACS Newsletter 2013EACS Newsletter 2013
EACS Newsletter 2013iantaylor2100
 
Eacs newsletter 2013
Eacs newsletter 2013Eacs newsletter 2013
Eacs newsletter 2013iantaylor2100
 
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate SecurityCNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate SecurityAdlan Hussain
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...Ahmed Al Enizi
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCCloudOps Summit
 
Reputational Risk and IT - 2013
Reputational Risk and IT - 2013Reputational Risk and IT - 2013
Reputational Risk and IT - 2013Cynthia Sech
 

Similar to Invitation (20)

Triangle InfoSecon Conference program 2011
Triangle InfoSecon Conference program   2011Triangle InfoSecon Conference program   2011
Triangle InfoSecon Conference program 2011
 
Ibm endpoint manager pulse
Ibm endpoint manager   pulseIbm endpoint manager   pulse
Ibm endpoint manager pulse
 
The Hand That Strikes, Also Blocks
The Hand That Strikes, Also BlocksThe Hand That Strikes, Also Blocks
The Hand That Strikes, Also Blocks
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your Users
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
 
Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
 
vFS3 Main Tent Sessions
vFS3 Main Tent SessionsvFS3 Main Tent Sessions
vFS3 Main Tent Sessions
 
NetWatcher crowdsourcing
NetWatcher crowdsourcingNetWatcher crowdsourcing
NetWatcher crowdsourcing
 
EACS Newsletter 2013
EACS Newsletter 2013EACS Newsletter 2013
EACS Newsletter 2013
 
EACS Newsletter 2013
EACS Newsletter 2013EACS Newsletter 2013
EACS Newsletter 2013
 
Eacs newsletter 2013
Eacs newsletter 2013Eacs newsletter 2013
Eacs newsletter 2013
 
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate SecurityCNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
 
Maximizing Security Training ROI
Maximizing Security Training ROIMaximizing Security Training ROI
Maximizing Security Training ROI
 
vFS3 Breakout Sessions
vFS3   Breakout SessionsvFS3   Breakout Sessions
vFS3 Breakout Sessions
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMC
 
Reputational Risk and IT - 2013
Reputational Risk and IT - 2013Reputational Risk and IT - 2013
Reputational Risk and IT - 2013
 

Invitation

  • 1. Smarter technology for a Smarter Planet: Emerging Threats in 2012 Spend a day with IBM X-Force. Leave better prepared to protect. Amidst the near constant reports of data leaks, Denial-of-Service attacks, and socialHacktivism, IBM X-Force declared 2011 the “year of the security breach”. Although it is 2012, the frequency and scope of these attacks continue to rage on. In an increasingly connected world, incidents like these magnify the challenge enterprises face as they attempt to protect against the looming threat of attack.Please join world renowned experts from IBM X-Force and the Institute for Advanced Security for this full day session where we will dive into the findings of our latest Trend and Risk report, explore options to protect against threats, share real world demonstrations of the latest online security solutions and strategies, and explore the changing role of senior security leaders. X-Force Evolving Threat event 26th September 2012, IBM South Bank – Agenda Time Description Speakers September 26th, 2012 – IBM South Bank 09:15 Welcome - key issues cloud, mobile, big data Matt Middleton- Leal 09:30 IT Security, Current Landscape and 2012 Predictions from IBM X Force X Force mid year trend report. Jean-Paul Ballerini 10:15 Security Intelligence - How to protect against targeted Q1 Labs attacks, insider fraud and unauthorised configuration Steve Durkin changes. 10:45 Enabling your Workforce - Securing the Mobile Enterprise Darren Argyle WW Security Solutions Market Leader 11:10 Break 11:20 Local customer speaker tbc 11:55 Five Key Steps to Success in Application Security (web & David Tyrrell mobile apps) 12:20 Navigating the Landscape: How IBM Security Systems Infrastructure Combats Evolving Threats (XGS Platform launch) next Network / XGS level of Advanced threat protection Simon Smith 12:50 Wrap up & Introduction to IBM Security Systems Matt Middleton- Leal 13:00 Networking Lunch 13:45 - 16:30 Use Case Demonstration David Tyrrell & Simon Smith This unique event is specifically designed to help security experts understand the changing nature of the threat landscape. A smarter business needs smarter software, systems and services. Let’s build a smarter planet. *The X-Force Trend & Risk Report is written by the world-renowned IBM X-Force research and development team which culls data from their database of 45,000 computer vulnerabilities, 150 million daily intrusion attempts, 40 million spam and phishing attacks and 10 billion web pages and images to assemble a complete picture of the threat landscape. This information is provided “as is” without warranty of any kind, express or implied, and is based on current IBM product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this document. Nothing contained in this document is intended to, nor shall have the effect of, creating any warranties or representations from IBM (or its suppliers or licensors), or altering the terms and conditions of the applicable license agreement governing the use of IBM software. IBM, the IBM logo, ibm.com, Let’s Build a Smarter Planet, Smarter Planet and the planet icon are trademarks of International Business Machines Corporation, registered in many juris dictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at www.ibm.com/legal/copytrade.shtml