Sponsor: IBM Corporation

Cloud Identity Connect – IBM Cloud Identity Portfolio Solutions

The next generation of digital transformation to unleash business growth is being fueled by the cloud enterprise. Employees demand the same experience at work that they enjoy as consumers including seamless access to the latest tools in the market. This puts pressure on IT to deliver on these expectations while controlling risk and maintaining security controls. IBM Cloud Identity Connect is a new Identity-as-a-Service (IDaaS) offering which provides your users with rapid and secure access to thousands of popular cloud applications while enabling single sign-on (SSO) to all their applications, whether they are in the cloud or on premise. You can extend the IT investment you’ve already made in on premise security infrastructure without slowing your business users and their need for speed.

Attendees in this live webinar by IBM to learn how Cloud Identity Connect:

  • Speeds business agility to adopt cloud applications
  • Secures user productivity with SSO from any device, and
  • Enables greater IT efficiency by extending existing infrastructure

SME Bio: Sean Brown, Principle Offering Manager IBM Cloud Identity at IBM.

As Principle Offering Manager with IBM, I am responsible for all aspects involving bringing new and market leading Identity solutions into the IBM Cloud Security portfolio. I am responsible for overseeing the development, marketing, sales and fulfillment of all my offerings, as well as research into new offerings not yet released. I have numerous posting across the web. In my spare time, I enjoy spending time with my family, disc golfing, Geocaching and traveling. I have worked in the collaboration and security industry since 2005, starting with IBM's acquisition of Internet Security Systems. Previous to working with IBM ISS, I was the IT Manager for another IBM acquisition going back to 2002.

View IBM's privacy policy here

View Now

IBM Cloud Identity – Infusing Identity Everywhere: On-premise, Mobile and Cloud

The next generation of digital transformation to unleash business growth is being fueled by the cloud enterprise. Employees demand the same experience at work that they enjoy as consumers including seamless access to the latest tools in the market. This puts pressure on IT to deliver on these expectations while controlling risk and maintaining security controls. IBM Cloud Identity Connect is a new Identity-as-a-Service (IDaaS) offering which provides your users with rapid and secure access to thousands of popular cloud applications while enabling single sign-on (SSO) to all their applications, whether they are in the cloud or on premise. You can extend the IT investment you’ve already made in on premise security infrastructure without slowing your business users and their need for speed.

Attendees in this live webinar by IBM to learn how Cloud Identity Connect:

  • Speeds business agility to adopt cloud applications
  • Secures user productivity with SSO from any device, and
  • Enables greater IT efficiency by extending existing infrastructure

SME Bio: Sean Brown, Principle Offering Manager IBM Cloud Identity at IBM.

As Principle Offering Manager with IBM, I am responsible for all aspects involving bringing new and market leading Identity solutions into the IBM Cloud Security portfolio. I am responsible for overseeing the development, marketing, sales and fulfillment of all my offerings, as well as research into new offerings not yet released. I have numerous posting across the web. In my spare time, I enjoy spending time with my family, disc golfing, Geocaching and traveling. I have worked in the collaboration and security industry since 2005, starting with IBM's acquisition of Internet Security Systems. Previous to working with IBM ISS, I was the IT Manager for another IBM acquisition going back to 2002.

View IBM's privacy policy here

Get Whitepaper

Rock Your SOC (Security Operations Center) with Watson for Cyber Security

In today’s threat environment, given the sophistication and increase in cyber-attacks, security analysts must investigate and accurately identify threats on a daily basis to detect and stop threats in time before damage is caused. During an investigation, analysts need to pivot on multiple data sources such as threat feeds, security blogs, research articles, talking to peers and more. It can quickly become overwhelming when an analyst needs to investigate each incident in 20 minutes or less just to keep up with current alerts. Inaccuracies can creep in while they are simultaneously navigating and correlating information from multiple sources.

With the cognitive power of Watson for Cyber Security, analysts can now use QRadar Advisor with Watson to investigate incidents compiled by the QRadar security analytics platform and provide key insights to qualify and identify root cause of the incident.

Watch this webinar to see how a Tier 1 and Tier 2 SOC analyst uses QRadar Advisor with Watson to accurately identify and understand threats at speed and scale. See the complete lifecycle of an investigation in the SOC from when an offense is compiled by QRadarsecurity analytics platform to how you can use the results from the investigation from Watson to shutdown threats.

Carlos Aguilera, Global Security Solutions Architect
At IBM, Carlos helped create and shape the Manage SIEM service practice. In his current role as a Global Security Solutions Architect, he is responsible for communicating, shaping, and developing the services to best answer enterprise client needs. Carlos applies creative thinking and lessons learned through his tenure at IBM to offer solutions to complex problems for his clients. Recently Carlos devotes most of his time working on cognitive technologies such as QRadar Advisor Watson for Cyber Security or Havyn (cognitive security assistant).

Chris Hankins, CISSP, is the Offering Manager for Cognitive Security within the IBM Security Business Unit
Chris leads the IBM North America technical practice for cognitive security. Using his experience as a security analyst and architect, he leverages his expertise in cyber operations, forensics, threat intelligence, incident response and cognitive security to help organizations address strategic and operational initiatives within their security program, address sophisticated threats, and improve the overall risk posture of the business.

View IBM's privacy policy here

View Now

Magic Quadrant for Application Security Testing

Security testing is growing faster than any other security market, as AST solutions adapt to new development methodologies and increased application complexity. Security and risk management leaders must integrate AST into their application security programs. Download our guide to learn more.

View IBM's privacy policy here

Get Whitepaper