Sponsor: IBM Corporation

Ready, set, GDPR

IBM Security Guardium tools can be the cornerstone of an enterprise’s compliance initiative for GDPR personal data protection requirements.

View IBM's privacy policy here

Get Whitepaper

Gartner & IBM Webcast: The Future of Threat Detection

The Future of Threat Detection: UEBA and SIEM Together?

An IBM Security webinar featuring Gartner analyst Anton Chuvakin

Gone are the days of a clearly defined network perimeter, in which you can confidently rely on static rules to detect intruders. As the cyber threat landscape has evolved, so has the vendor landscape. With all the options available, do you know which threat detection solutions to invest in – much less which ones will still exist in five years?

Listen to this IBM Security webinar featuring Gartner analyst Anton Chuvakin to learn:

  • Similarities and differences between SIEM and UEBA solutions
  • Predictions on the future of these two markets
  • How QRadar’s single-platform approach to SIEM and UEBA can help you not only detect more threats, but also more accurately determine if a threat is real versus benign

View IBM's privacy policy here

View Now

Forrester Report: The Eight Business And Security Benefits Of Zero Trust

In response to increasingly complex cyberattacks, security pros devote resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great way to lose sight of your ultimate goal: protecting customers and empowering the business. Zero Trust networks accomplish the dual tasks of deep, continuous data inspection across the network and lean operation and oversight — tasks that seem mutually exclusive in traditional networks. This report highlights the eight most significant ways Zero Trust boosts security and your business. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.

Get Whitepaper

Unlocking the Power of Analytics with an Always-on Data Lake

Digital transformation is impacting the world of business, both in terms of the technology available for the transformation and how that technology is leveraged to deliver business outcomes. As more companies look to analytics and data science for effective decision making, a new generation of integrated, web-scale, highly durable, resilient, and secure storage is needed to support their digital transformation journey.

  • Businesses are using data from both internal and external sources to drive digital transformation.
  • Leveraging cloud-based analytics for effective decision making is one of the highest priorities for business today
  • Cloud-based object storage can provide a persistent data store for analytics, delivering scale, flexibility, and cost savings beyond traditional database and file systems

View IBM's privacy policy here

Get Whitepaper

Why You Should Look at the IBM Cloud for Archival Solutions

Organizations of all sizes continue to experience operational, economic, management, and technical struggles in how they are delivering IT services, often motivating them to embark on digital transformation journeys. For many organizations taking such journeys, the cloud is a big part of the answer. Cloud-based storage can provide a compelling alternative to on-premises archival-class storage and enable levels of agility not previously achievable.

View IBM's privacy policy here

Get Whitepaper

Cloud Identity Connect – IBM Cloud Identity Portfolio Solutions

The next generation of digital transformation to unleash business growth is being fueled by the cloud enterprise. Employees demand the same experience at work that they enjoy as consumers including seamless access to the latest tools in the market. This puts pressure on IT to deliver on these expectations while controlling risk and maintaining security controls. IBM Cloud Identity Connect is a new Identity-as-a-Service (IDaaS) offering which provides your users with rapid and secure access to thousands of popular cloud applications while enabling single sign-on (SSO) to all their applications, whether they are in the cloud or on premise. You can extend the IT investment you’ve already made in on premise security infrastructure without slowing your business users and their need for speed.

Attendees in this live webinar by IBM to learn how Cloud Identity Connect:

  • Speeds business agility to adopt cloud applications
  • Secures user productivity with SSO from any device, and
  • Enables greater IT efficiency by extending existing infrastructure

SME Bio: Sean Brown, Principle Offering Manager IBM Cloud Identity at IBM.

As Principle Offering Manager with IBM, I am responsible for all aspects involving bringing new and market leading Identity solutions into the IBM Cloud Security portfolio. I am responsible for overseeing the development, marketing, sales and fulfillment of all my offerings, as well as research into new offerings not yet released. I have numerous posting across the web. In my spare time, I enjoy spending time with my family, disc golfing, Geocaching and traveling. I have worked in the collaboration and security industry since 2005, starting with IBM's acquisition of Internet Security Systems. Previous to working with IBM ISS, I was the IT Manager for another IBM acquisition going back to 2002.

View IBM's privacy policy here

View Now

IBM Cloud Identity – Infusing Identity Everywhere: On-premise, Mobile and Cloud

The next generation of digital transformation to unleash business growth is being fueled by the cloud enterprise. Employees demand the same experience at work that they enjoy as consumers including seamless access to the latest tools in the market. This puts pressure on IT to deliver on these expectations while controlling risk and maintaining security controls. IBM Cloud Identity Connect is a new Identity-as-a-Service (IDaaS) offering which provides your users with rapid and secure access to thousands of popular cloud applications while enabling single sign-on (SSO) to all their applications, whether they are in the cloud or on premise. You can extend the IT investment you’ve already made in on premise security infrastructure without slowing your business users and their need for speed.

Attendees in this live webinar by IBM to learn how Cloud Identity Connect:

  • Speeds business agility to adopt cloud applications
  • Secures user productivity with SSO from any device, and
  • Enables greater IT efficiency by extending existing infrastructure

SME Bio: Sean Brown, Principle Offering Manager IBM Cloud Identity at IBM.

As Principle Offering Manager with IBM, I am responsible for all aspects involving bringing new and market leading Identity solutions into the IBM Cloud Security portfolio. I am responsible for overseeing the development, marketing, sales and fulfillment of all my offerings, as well as research into new offerings not yet released. I have numerous posting across the web. In my spare time, I enjoy spending time with my family, disc golfing, Geocaching and traveling. I have worked in the collaboration and security industry since 2005, starting with IBM's acquisition of Internet Security Systems. Previous to working with IBM ISS, I was the IT Manager for another IBM acquisition going back to 2002.

View IBM's privacy policy here

Get Whitepaper

Webinar – Rock Your SOC (Security Operations Center) with Watson for Cyber Security

In today’s threat environment, given the sophistication and increase in cyber-attacks, security analysts must investigate and accurately identify threats on a daily basis to detect and stop threats in time before damage is caused. During an investigation, analysts need to pivot on multiple data sources such as threat feeds, security blogs, research articles, talking to peers and more. It can quickly become overwhelming when an analyst needs to investigate each incident in 20 minutes or less just to keep up with current alerts. Inaccuracies can creep in while they are simultaneously navigating and correlating information from multiple sources.

With the cognitive power of Watson for Cyber Security, analysts can now use QRadar Advisor with Watson to investigate incidents compiled by the QRadar security analytics platform and provide key insights to qualify and identify root cause of the incident.

Watch this webinar to see how a Tier 1 and Tier 2 SOC analyst uses QRadar Advisor with Watson to accurately identify and understand threats at speed and scale. See the complete lifecycle of an investigation in the SOC from when an offense is compiled by QRadarsecurity analytics platform to how you can use the results from the investigation from Watson to shutdown threats.

Carlos Aguilera, Global Security Solutions Architect
At IBM, Carlos helped create and shape the Manage SIEM service practice. In his current role as a Global Security Solutions Architect, he is responsible for communicating, shaping, and developing the services to best answer enterprise client needs. Carlos applies creative thinking and lessons learned through his tenure at IBM to offer solutions to complex problems for his clients. Recently Carlos devotes most of his time working on cognitive technologies such as QRadar Advisor Watson for Cyber Security or Havyn (cognitive security assistant).

Chris Hankins, CISSP, is the Offering Manager for Cognitive Security within the IBM Security Business Unit
Chris leads the IBM North America technical practice for cognitive security. Using his experience as a security analyst and architect, he leverages his expertise in cyber operations, forensics, threat intelligence, incident response and cognitive security to help organizations address strategic and operational initiatives within their security program, address sophisticated threats, and improve the overall risk posture of the business.

View IBM's privacy policy here

View Now