IBM Security as a Service Roadshow for Business Partners – Security


Web Page InsiderThreat-LI

When:  Sep 6, 2018 from 9:00 AM to 3:30 PM (ET)

Today’s security teams are overwhelmed with data from a vast array of sources and a constantly evolving threat landscape. Coupled with the increasing shortage of expert personnel, their ability to create a risk based, compliant, effective security program is a growing challenge.

Learn how we can help you can solve the cybersecurity resource crisis with IBM Security as a Service and IBM Security Services. We will provide an overview of IBM Security Services, how they are delivered, and the benefits to your organization.

Agenda:

IBM Security Strategy
IBM Security Services
Mobile as a Service Application Security on Cloud Guardium Analyzer

Cloud Identity Connect QRadar on Cloud QRadar Watson Advisor IBM Resilient

Registration:

This session is offered free of charge. However, participants are responsible for their own business travel expenses. To enroll, please register at https://ibm.biz/BdYZAj

Continental breakfast and lunch will be provided.

Location

IBM Security
75 Binney Street
Cambridge, MA 02141

 

via IBM Security as a Service Roadshow for Business Partners – Security

Under the Radar


under_the_radar

Join this live webinar to learn more about IBM QRadar and see a live demo. Find out:

  • What QRadar is and what makes it unique
  • How it helps detect known and unknown security threats out-of-the-box
  • Key SOC use cases you can address
  • How QRadar can help accelerate your daily workflow

This session will include a live demo of QRadar and dedicated time for open Q&A. Register today to see QRadar in action and participate in the discussion.

via Event Lobby (EVENT: 1821172)

IBM Think 2019 | February 12 – 15, San Francisco


Join us at IBM’s flagship business and technology conference

Get hands-on experience with the latest technology. Extend your professional network into one of the world’s most celebrated communities of technologists and thought leaders. And have some fun while you’re at it.

Think registration opens September 17.

See the benefits of attending

via IBM Think 2019 | February 12 – 15, San Francisco

Be the first to know all about Think 2019


We’re bringing Think 2019 to San Francisco next year, and we couldn’t be more excited! I know you’re interested in hearing all the big announcements as soon as possible, so I have some good news. You can sign up now for Think updates and be the first to know:
  • Important dates, discounts, and key event details
  • Sessions and speakers you can’t miss
  • Updates on how we’lltake over San Francisco
  • All the infoyouneed to get approval to attend
Just visit the URL below, fill out some basic information, and you’re on the list! That’s all it takes.
Looking forward to seeing you in San Francisco next February!
All the best,
CyberDude

 

Announcing the next IBM Security as a Service Roadshow for Business Partners – Cambridge 09/06/2018


Hi everyone,

I hope your summer is going well.  Since Labor Day is the unofficial end of summer, we’ve scheduled our next stop on the Security as a Service Roadshow in Cambridge for Thursday September 6th.  Hopefully most people will be done with vacations, etc. and we will get a good turnout.

The registration site is open as of today.  Please invite your business partners or customers, thanks!

Registration link:

https://ibm.biz/BdYZAj

A CISO’s Guide to Obtaining Budget: Exploit Pet Projects


exploit_pet_projects-460x200

This final episode of the “CISO’s Guide to Obtaining Budget” podcast series focuses on how CISOs can add security components to CAPEX projects, effectively positioning themselves “upstream” of security needs. Understanding where and when to insert security initiatives into larger projects is a common denominator of success for many security leaders.

via A CISO’s Guide to Obtaining Budget: Exploit Pet Projects

A CISO’s Guide to Obtaining Budget: Never Waste a Good Crisis (or Data Breach)


ThinkstockPhotos-684129732-460x200.jpeg

Unlike most resource allocation decisions within the enterprise, decisions involving security projects are often influenced by external events, namely data breaches encountered by other organizations in one’s own sector or industry.

via A CISO’s Guide to Obtaining Budget: Never Waste a Good Crisis (or Data Breach)

A CISO’s Guide to Obtaining Budget: Consciously Cultivate Credibility


ThinkstockPhotos-522139056-460x200

This episode of the “CISO’s Guide to Obtaining Budget” podcast series details how a CISO should build his or her reputation over time and absent of any major demands. Key recommendations include setting up a regular cadence of meetings with relevant executives to discuss business issues and managing security training exercises to demonstrate your expertise and understanding of business risks.

via A CISO’s Guide to Obtaining Budget: Consciously Cultivate Credibility

A CISO’s Guide to Obtaining Budget: Know Yourself


ThinkstockPhotos-616234458-460x200

The typical CISO likely differs in significant ways from other business executives, perhaps in education, experience and also primary job responsibilities. So how do security leaders learn to speak the same language as their C-suite colleagues?

via A CISO’s Guide to Obtaining Budget: Know Yourself

A CISO’s Guide to Obtaining Budget: Know Your Audience


ThinkstockPhotos-159289017-460x200

This episode of the “CISO’s Guide to Obtaining Budget” podcast series offers advice for CISOs and security leaders looking to bridge the gap and communicate more effectively and meaningfully with other executives. Listen now to learn how successful security leaders translate abstract technical issues into straightforward risks that any executive can understand and take action on.

via A CISO’s Guide to Obtaining Budget: Know Your Audience