SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
Speaker Industry
SEC–1287: Finding the Needle in the Needle Stack: Why
Cognitive for Security
Sessions Security
Breakout Session
, 09:00 AM – 09:45 AM
Today's security professionals face a wide range of threats, from denial-of-service
attacks and ransomware to targeted attacks and good old social engineering (usually
combined). On the dark web, cybercriminals buy, sell and exchange threats and data at a
very fast pace. This changing threat landscape means Security Operations Center (SOC)
operators need to try and keep up with all that is happening in the cyber security
field—an impossible task! In this session, we will review the threats companies face
today, tour the dark web and see how they are bought and sold, and discuss how
cognitive solutions for security will aid SOC operators when it comes to facing a
potential threat.
SEC–1326: Collaboration Panel: How to Recruit 15,000
Security Peers to Help Thwart Attackers
24 October 2016

Etai Maor, IBM Not Industry Specific
https://www-01.ibm.com/events/global/wow/sessions/print/index.html
1 of 11 9/26/2016 12:37 PM
Speakers Industry
Sessions Security
Panel Discussion
, 01:00 PM – 01:45 PM
In an era of sophisticated attacks, acting as an island on lockdown will leave holes in
your defenses as your vendors, clients, and even your own employees can cause
inadvertent security incidents. Join this panel of experts to learn how collaborative
defense can improve your security posture while leveraging the expertise of over 15,000
of your peers and IBM Security experts. From higher-order threat intelligence to
actionable threat observables and crowd-sourced security apps, the IBM X-Force
Exchange and IBM Security App Exchange platforms are no-cost tools that can put the
expertise of the security market to work for your organization.
SEC–1421: The Value of Evolving to Cognitive Security: A
Panel Discussion
Sessions Security
Panel Discussion
, 10:00 AM – 10:45 AM
On the heels of IBM's recent Cognitive Security announcements, a research study on
cognitive security in the marketplace was conducted, surveying over 700 security
professionals globally. In this panel discussion, you'll hear insights from the authors of
this unprecedented study, including: cybersecurity issues that may be addressed
through cognitive security; readiness characteristics and prerequisites to adopt
cognitive security solutions; current and future cognitive security investment priorities;
and the value proposition associated with cognitive security, including quantitative and
24 October 2016

Chris Meenan, IBM Security
John Markott, Carbon Black
Paul Griswold, IBM
Not Industry Specific
24 October 2016

https://www-01.ibm.com/events/global/wow/sessions/print/index.html
2 of 11 9/26/2016 12:37 PM
Speakers Industry
qualitative benefits of adopting the next evolution in security capabilities.
Speakers Industry
SEC–1680: Cognitive, Cloud and Collaboration: Town
Hall Meeting with IBM Security Technical Leaders and
Watson
Sessions Security
Panel Discussion
, 11:00 AM – 11:45 AM
Join Sandy Bird, IBM Fellow and CTO of the IBM Security Business unit, who will host an
open town hall meeting and panel discussion with the technical leaders from IBM
Security and IBM Watson. The discussion will cover the powerful combination of IBM
Security and cognitive computing, along with cloud security, and how collaboration can
foster the exchange of information and improve the security of an organization. This
session will largely be an open Q&A, during which customers and partners can interact
directly with the technical experts on these topics or others of their choice.
Diana Kelley, IBM
Vijay Dheap, IBM
Carl Nordman, IBM
Mike Pinch, University of Rochester
Not Industry Specific
24 October 2016

Suzy Deffeyes, IBM
Jeb Linton, IBM
Vijay Dheap, IBM
William Bird, IBM
Not Industry Specific
https://www-01.ibm.com/events/global/wow/sessions/print/index.html
3 of 11 9/26/2016 12:37 PM
Speaker Industry
SEC–1682: Stay Ahead of the Threat with Cognitive
Security Intelligence
Sessions Security
Breakout Session
, 04:00 PM – 04:45 PM
Do you face a shortage of skilled security personnel? Does your security staff have
more work than it can complete on a typical day? If your answer to these questions is
yes, you are not alone. Fortunately, the combination of IBM Cognitive Computing and
Security Intelligence will be able to serve as an extension of your staff, and help work
down your backlog of security events and keep you ahead of the latest security threats.
Glad to answer any questions.
SEC–1683: Security Operations and Response: New
Techniques and Solutions for Responding to Security
Threats
Sessions Security
Breakout Session
, 02:00 PM – 02:45 PM
Does your Security Operations Center (SOC) face more work each day than it can ever
possibly complete? Do you feel like you are outnumbered by hackers, and that it is only
a matter of time before your organization is breached? Do you feel like you don't have
the time to take a security incident to closure, and resolve it so it does not happen again?
If you answered yes to any of these questions, attend this session. You will learn more
about new techniques and tools to help you collaborate with others to beat the hackers,
new automated solutions for reducing your security workload, and how to close the loop
24 October 2016

Jeb Linton, IBM Not Industry Specific
24 October 2016

https://www-01.ibm.com/events/global/wow/sessions/print/index.html
4 of 11 9/26/2016 12:37 PM
Speakers Industry
by responding to security incidents and taking them to closure.
Speaker Industry
SEC–1692: IBM Watson Threat Intelligence: Turning
Insight into Action
Sessions Security
Breakout Session
, 09:00 AM – 09:45 AM
New threat intelligence companies form daily. An average of 60,000 security blogs are
written each month. This huge volume of threat data is more than analysts and
responders have the capacity to review, and a significant challenge comes in distilling
the data into the context of how to protect your environment. This discussion will cover
the next generation of threat intelligence analysis, which will leverage the cognitive
computing powers of IBM Watson to accelerate today’s capabilities and turn insights into
actions.
SEC–1856: Cognitive Computing Offers New Cyber
Security Methods
Sessions Security
Breakout Session
Patrick Vandenberg, IBM
Ted Julian, IBM
Not Industry Specific
27 October 2016

Wendi Whitmore, IBM Not Industry Specific
https://www-01.ibm.com/events/global/wow/sessions/print/index.html
5 of 11 9/26/2016 12:37 PM
Speakers Industry
, 04:00 PM – 04:45 PM
Individuals, public and private organizations alike depend on the cyber world. From
citizens using social media, to banks growing their businesses, to law enforcement
supporting national security—every sector of society is increasingly dependent on
technology and networked systems. At the same time, the digital society contains
inherent vulnerabilities that may generate security risks to citizens, businesses or
society's vital functions. This talk explains how the scientific disciplines of AI and signal
processing of cognitive computing offer different tools, like machine learning, natural
language processing, vision, human-computer interaction, dialog and narrative
generation to solve the challenges of building cyber security capacity.
25 October 2016
Martti Lehto, University of Jyväskylä
Gregory Porpora, IBM
Information Technology
https://www-01.ibm.com/events/global/wow/sessions/print/index.html
6 of 11 9/26/2016 12:37 PM
Speakers Industry
SEC–2235: Big Data, Big Security Problems
Sessions Security
Hands-on Lab
, 09:00 AM – 11:30 AM
This year has seen a significant increase in the level of interest in the topic of security
and auditing for Hadoop and MongoDB. Hadoop and MongoDB vendors are responding
with better security features, and by partnering with the market-leading data security
and compliance solution for Hadoop and MongoDB, IBM Security Guardium provides
organizations the value of real-time monitoring, alerting, reports, compliance workflow,
and more for Hadoop and MongoDB. Get hands-on with Guardium and IBM BigInsights
for Apache Hadoop, and learn how to configure real-time alerts for suspicious behavior,
customize prebuilt reports, and use other Guardium features such as quick search and
compliance workflow.
SEC–2332: Strengthen Your Immune System with
Cognitive Analytics and Intelligent Integration
Sessions Security
Breakout Session
, 10:00 AM – 10:45 AM
While phishing, malware, distributed denial-of-service (DDoS) and other external threats
rightfully receive significant attention, they only represent one piece of the threat
equation. Insider threats are the other piece, and they can be equally damaging. In fact,
the 2015 Cyber Security Intelligence Index showed that more than half of data breaches
27 October 2016
TINA CHEN, IBM
Sundari VORUGANTI, IBM
Banking
26 October 2016

https://www-01.ibm.com/events/global/wow/sessions/print/index.html
7 of 11 9/26/2016 12:37 PM
Speakers Industry
are caused by insiders (employees, third-party contractors, partners). This talk will
discuss key insider threats affecting your sensitive data, and show you how a cognitive
and intelligently integrated security immune system can effectively defend against such
threats. Examples of security immune system technologies include: IBM Security
Guardium, Privileged Identity Manager and QRadar.
Speaker Industry
SEC–2338: iOS in the Enterprise
Sessions Security
Breakout Session
, 05:00 PM – 05:45 PM
iPhones and iPads are popular choices for BYOD and corporate-owned usage models.
Learn about the latest iOS advancements and experience how IBM, together with Apple,
delivers an enterprise-class solution for your business. Big changes have been made to
iOS to enable better management, collaboration and security. Join this session, in which
IBM reviews the most essential enhancements and how IBM MaaS360 enables your
organization to take advantage of all the new features.
SEC–2602: It Only Has to Happen Once: Protecting Your
Brand in the Digital Economy
Sessions Security
Walid Rjaibi, IBM
Patrick Vandenberg, IBM
Not Industry Specific
25 October 2016

Joshua Lambert, IBM Not Industry Specific
https://www-01.ibm.com/events/global/wow/sessions/print/index.html
8 of 11 9/26/2016 12:37 PM
Speakers Industry
Breakout Session
, 01:00 PM – 01:45 PM
One breach. One leak. One vulnerability. In the digital economy, it only takes one incident
to destroy your brand. To ensure every transaction, both internal and beyond
organizational boundaries, you require a comprehensive solution that stands up to the
demands of a digital business created by the growth of mobile, cloud and APIs.
Moreover, you have to provide this security confidently and cost-effectively across your
entire ecosystem to ensure brand integrity. Join IBM to discuss strategy and practice,
and learn how to apply enterprise-grade security to today's digital technologies—and
start sleeping better at night.
25 October 2016

Christopher Schmitt, IBM
Chris Collard, IBM
Not Industry Specific
https://www-01.ibm.com/events/global/wow/sessions/print/index.html
9 of 11 9/26/2016 12:37 PM
Speakers Industry
SEC–2945: Accelerate Your General Data Protection
Regulation (GDPR) Efforts with IBM Security Guardium
Sessions Security
Hands-on Lab
, 08:30 AM – 11:00 AM
The European Union (EU) General Data Protection Regulation (GDPR) goes into effect in
May 2018. Organizations worldwide are discovering it's not just EU businesses that are
impacted—it’s any business that holds personal data about EU residents! With that
realization, a lot of scrambling has begun. Join this hands-on lab to get more information
on the personal data-centric GDPR requirements and how IBM Security Guardium can
help you accelerate your efforts. Learn what you need to know to get started, including:
how to better get to know your (personal) data; how to configure an impact assessment
so you can help protect your Data Processors; and how to run compliance reports that
can help make the compliance process easier.
24 October 2016
Cindy Compert, IBM
VIKALP PALIWAL, IBM
Government
https://www-01.ibm.com/events/global/wow/sessions/print/index.html
10 of 11 9/26/2016 12:37 PM
Speaker Industry
SEC–3940: Stomp Out Insider Security Threats and
Fraud with User Behavior Analytics
Sessions Security
Theater Session
, 04:30 PM – 04:50 PM
This interactive theater session will describe how widespread insider security threats
and fraud are today, and how you can use a new app from IBM security to put a stop to
them.
24 October 2016
Roger J. Hellman, IBM Not Industry Specific
https://www-01.ibm.com/events/global/wow/sessions/print/index.html
11 of 11 9/26/2016 12:37 PM

Contenu connexe

Tendances

The 10 most trusted companies in enterprise security for dec 2017
The 10 most trusted companies in enterprise security for dec 2017The 10 most trusted companies in enterprise security for dec 2017
The 10 most trusted companies in enterprise security for dec 2017Merry D'souza
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 
" The Invisible Person ... the Security Architect "
" The Invisible Person ... the Security Architect "" The Invisible Person ... the Security Architect "
" The Invisible Person ... the Security Architect "Bill Ross
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public versionIBM Sverige
 
Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012Imperva
 
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecurityDistributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecuritySounil Yu
 
New Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecurityNew Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecuritySounil Yu
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksMighty Guides, Inc.
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Martin Ruubel
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Martin Ruubel
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdSusan Darby
 
Icit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-deadIcit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-deadRocco Magnotta
 
Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperMartin Ruubel
 
The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...United Security Providers AG
 
Source Code Security the Symantec Way
Source Code Security the Symantec WaySource Code Security the Symantec Way
Source Code Security the Symantec WaySymantec
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromiseCMR WORLD TECH
 

Tendances (20)

The 10 most trusted companies in enterprise security for dec 2017
The 10 most trusted companies in enterprise security for dec 2017The 10 most trusted companies in enterprise security for dec 2017
The 10 most trusted companies in enterprise security for dec 2017
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
" The Invisible Person ... the Security Architect "
" The Invisible Person ... the Security Architect "" The Invisible Person ... the Security Architect "
" The Invisible Person ... the Security Architect "
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
 
Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012
 
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecurityDistributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
 
New Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecurityNew Paradigms for the Next Era of Security
New Paradigms for the Next Era of Security
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
 
Challenging Insecurity: A Roadmap to Cyber Confidence
Challenging Insecurity: A Roadmap to Cyber ConfidenceChallenging Insecurity: A Roadmap to Cyber Confidence
Challenging Insecurity: A Roadmap to Cyber Confidence
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
 
GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
Icit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-deadIcit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-dead
 
Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime Whitepaper
 
The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...
 
Source Code Security the Symantec Way
Source Code Security the Symantec WaySource Code Security the Symantec Way
Source Code Security the Symantec Way
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
 

Similaire à World of Watson 2016 - Information Insecurity

World of Watson 2016 - For your Boss - Panel discussions
World of Watson 2016 - For your Boss - Panel discussionsWorld of Watson 2016 - For your Boss - Panel discussions
World of Watson 2016 - For your Boss - Panel discussionsKeith Redman
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Black Duck by Synopsys
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksMighty Guides, Inc.
 
2017 FS-ISAC Security Conference
2017 FS-ISAC Security Conference2017 FS-ISAC Security Conference
2017 FS-ISAC Security ConferenceDavid Sweigert
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant abnmi
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsBlack Duck by Synopsys
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochureAndy Kim
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM
 
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaSecurity and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaStefan Streichsbier
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMRick Bouter
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
Securing a great Developer Experience - v1.3
Securing a great Developer Experience - v1.3Securing a great Developer Experience - v1.3
Securing a great Developer Experience - v1.3Stefan Streichsbier
 
Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowCapgemini
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsTim Mackey
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultSOCVault
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...Eoin Keary
 

Similaire à World of Watson 2016 - Information Insecurity (20)

World of Watson 2016 - For your Boss - Panel discussions
World of Watson 2016 - For your Boss - Panel discussionsWorld of Watson 2016 - For your Boss - Panel discussions
World of Watson 2016 - For your Boss - Panel discussions
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down Attacks
 
2017 FS-ISAC Security Conference
2017 FS-ISAC Security Conference2017 FS-ISAC Security Conference
2017 FS-ISAC Security Conference
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochure
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
 
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaSecurity and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week Jakarta
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBM
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Securing a great Developer Experience - v1.3
Securing a great Developer Experience - v1.3Securing a great Developer Experience - v1.3
Securing a great Developer Experience - v1.3
 
Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters Now
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 

Plus de Keith Redman

The Business of Trading
The Business of TradingThe Business of Trading
The Business of TradingKeith Redman
 
World of Watson 2016 - Content Management
World of Watson 2016 - Content ManagementWorld of Watson 2016 - Content Management
World of Watson 2016 - Content ManagementKeith Redman
 
World of Watson 2016 - Artificial Intelligence Research
World of Watson 2016 - Artificial Intelligence ResearchWorld of Watson 2016 - Artificial Intelligence Research
World of Watson 2016 - Artificial Intelligence ResearchKeith Redman
 
World of Watson 2016 - Internet of (Things) Tomorrow
World of Watson 2016 - Internet of (Things) TomorrowWorld of Watson 2016 - Internet of (Things) Tomorrow
World of Watson 2016 - Internet of (Things) TomorrowKeith Redman
 
World of Watson 2016 - Data lake or Data Swamp
World of Watson 2016 - Data lake or Data SwampWorld of Watson 2016 - Data lake or Data Swamp
World of Watson 2016 - Data lake or Data SwampKeith Redman
 
World of Watson 2016 - Architecting your Analytics House
World of Watson 2016 - Architecting your Analytics HouseWorld of Watson 2016 - Architecting your Analytics House
World of Watson 2016 - Architecting your Analytics HouseKeith Redman
 
World of Watson 2016 - Put your Analytics on Cloud 9
World of Watson 2016 - Put your Analytics on Cloud 9World of Watson 2016 - Put your Analytics on Cloud 9
World of Watson 2016 - Put your Analytics on Cloud 9Keith Redman
 
World of Watson 2016 - What is this thing called cognitive
World of Watson 2016 - What is this thing called cognitiveWorld of Watson 2016 - What is this thing called cognitive
World of Watson 2016 - What is this thing called cognitiveKeith Redman
 
World of Watson 2016 - Implementing data science
World of Watson 2016 - Implementing data scienceWorld of Watson 2016 - Implementing data science
World of Watson 2016 - Implementing data scienceKeith Redman
 
World of Watson 2016 - Watson analytics
World of Watson 2016 - Watson analyticsWorld of Watson 2016 - Watson analytics
World of Watson 2016 - Watson analyticsKeith Redman
 

Plus de Keith Redman (10)

The Business of Trading
The Business of TradingThe Business of Trading
The Business of Trading
 
World of Watson 2016 - Content Management
World of Watson 2016 - Content ManagementWorld of Watson 2016 - Content Management
World of Watson 2016 - Content Management
 
World of Watson 2016 - Artificial Intelligence Research
World of Watson 2016 - Artificial Intelligence ResearchWorld of Watson 2016 - Artificial Intelligence Research
World of Watson 2016 - Artificial Intelligence Research
 
World of Watson 2016 - Internet of (Things) Tomorrow
World of Watson 2016 - Internet of (Things) TomorrowWorld of Watson 2016 - Internet of (Things) Tomorrow
World of Watson 2016 - Internet of (Things) Tomorrow
 
World of Watson 2016 - Data lake or Data Swamp
World of Watson 2016 - Data lake or Data SwampWorld of Watson 2016 - Data lake or Data Swamp
World of Watson 2016 - Data lake or Data Swamp
 
World of Watson 2016 - Architecting your Analytics House
World of Watson 2016 - Architecting your Analytics HouseWorld of Watson 2016 - Architecting your Analytics House
World of Watson 2016 - Architecting your Analytics House
 
World of Watson 2016 - Put your Analytics on Cloud 9
World of Watson 2016 - Put your Analytics on Cloud 9World of Watson 2016 - Put your Analytics on Cloud 9
World of Watson 2016 - Put your Analytics on Cloud 9
 
World of Watson 2016 - What is this thing called cognitive
World of Watson 2016 - What is this thing called cognitiveWorld of Watson 2016 - What is this thing called cognitive
World of Watson 2016 - What is this thing called cognitive
 
World of Watson 2016 - Implementing data science
World of Watson 2016 - Implementing data scienceWorld of Watson 2016 - Implementing data science
World of Watson 2016 - Implementing data science
 
World of Watson 2016 - Watson analytics
World of Watson 2016 - Watson analyticsWorld of Watson 2016 - Watson analytics
World of Watson 2016 - Watson analytics
 

Dernier

Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...Boston Institute of Analytics
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanMYRABACSAFRA2
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxUnduhUnggah1
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDRafezzaman
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home ServiceSapana Sha
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)jennyeacort
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSINGmarianagonzalez07
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhijennyeacort
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 

Dernier (20)

Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population Mean
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docx
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
 
Call Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort ServiceCall Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort Service
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 

World of Watson 2016 - Information Insecurity

  • 1. Speaker Industry SEC–1287: Finding the Needle in the Needle Stack: Why Cognitive for Security Sessions Security Breakout Session , 09:00 AM – 09:45 AM Today's security professionals face a wide range of threats, from denial-of-service attacks and ransomware to targeted attacks and good old social engineering (usually combined). On the dark web, cybercriminals buy, sell and exchange threats and data at a very fast pace. This changing threat landscape means Security Operations Center (SOC) operators need to try and keep up with all that is happening in the cyber security field—an impossible task! In this session, we will review the threats companies face today, tour the dark web and see how they are bought and sold, and discuss how cognitive solutions for security will aid SOC operators when it comes to facing a potential threat. SEC–1326: Collaboration Panel: How to Recruit 15,000 Security Peers to Help Thwart Attackers 24 October 2016  Etai Maor, IBM Not Industry Specific https://www-01.ibm.com/events/global/wow/sessions/print/index.html 1 of 11 9/26/2016 12:37 PM
  • 2. Speakers Industry Sessions Security Panel Discussion , 01:00 PM – 01:45 PM In an era of sophisticated attacks, acting as an island on lockdown will leave holes in your defenses as your vendors, clients, and even your own employees can cause inadvertent security incidents. Join this panel of experts to learn how collaborative defense can improve your security posture while leveraging the expertise of over 15,000 of your peers and IBM Security experts. From higher-order threat intelligence to actionable threat observables and crowd-sourced security apps, the IBM X-Force Exchange and IBM Security App Exchange platforms are no-cost tools that can put the expertise of the security market to work for your organization. SEC–1421: The Value of Evolving to Cognitive Security: A Panel Discussion Sessions Security Panel Discussion , 10:00 AM – 10:45 AM On the heels of IBM's recent Cognitive Security announcements, a research study on cognitive security in the marketplace was conducted, surveying over 700 security professionals globally. In this panel discussion, you'll hear insights from the authors of this unprecedented study, including: cybersecurity issues that may be addressed through cognitive security; readiness characteristics and prerequisites to adopt cognitive security solutions; current and future cognitive security investment priorities; and the value proposition associated with cognitive security, including quantitative and 24 October 2016  Chris Meenan, IBM Security John Markott, Carbon Black Paul Griswold, IBM Not Industry Specific 24 October 2016  https://www-01.ibm.com/events/global/wow/sessions/print/index.html 2 of 11 9/26/2016 12:37 PM
  • 3. Speakers Industry qualitative benefits of adopting the next evolution in security capabilities. Speakers Industry SEC–1680: Cognitive, Cloud and Collaboration: Town Hall Meeting with IBM Security Technical Leaders and Watson Sessions Security Panel Discussion , 11:00 AM – 11:45 AM Join Sandy Bird, IBM Fellow and CTO of the IBM Security Business unit, who will host an open town hall meeting and panel discussion with the technical leaders from IBM Security and IBM Watson. The discussion will cover the powerful combination of IBM Security and cognitive computing, along with cloud security, and how collaboration can foster the exchange of information and improve the security of an organization. This session will largely be an open Q&A, during which customers and partners can interact directly with the technical experts on these topics or others of their choice. Diana Kelley, IBM Vijay Dheap, IBM Carl Nordman, IBM Mike Pinch, University of Rochester Not Industry Specific 24 October 2016  Suzy Deffeyes, IBM Jeb Linton, IBM Vijay Dheap, IBM William Bird, IBM Not Industry Specific https://www-01.ibm.com/events/global/wow/sessions/print/index.html 3 of 11 9/26/2016 12:37 PM
  • 4. Speaker Industry SEC–1682: Stay Ahead of the Threat with Cognitive Security Intelligence Sessions Security Breakout Session , 04:00 PM – 04:45 PM Do you face a shortage of skilled security personnel? Does your security staff have more work than it can complete on a typical day? If your answer to these questions is yes, you are not alone. Fortunately, the combination of IBM Cognitive Computing and Security Intelligence will be able to serve as an extension of your staff, and help work down your backlog of security events and keep you ahead of the latest security threats. Glad to answer any questions. SEC–1683: Security Operations and Response: New Techniques and Solutions for Responding to Security Threats Sessions Security Breakout Session , 02:00 PM – 02:45 PM Does your Security Operations Center (SOC) face more work each day than it can ever possibly complete? Do you feel like you are outnumbered by hackers, and that it is only a matter of time before your organization is breached? Do you feel like you don't have the time to take a security incident to closure, and resolve it so it does not happen again? If you answered yes to any of these questions, attend this session. You will learn more about new techniques and tools to help you collaborate with others to beat the hackers, new automated solutions for reducing your security workload, and how to close the loop 24 October 2016  Jeb Linton, IBM Not Industry Specific 24 October 2016  https://www-01.ibm.com/events/global/wow/sessions/print/index.html 4 of 11 9/26/2016 12:37 PM
  • 5. Speakers Industry by responding to security incidents and taking them to closure. Speaker Industry SEC–1692: IBM Watson Threat Intelligence: Turning Insight into Action Sessions Security Breakout Session , 09:00 AM – 09:45 AM New threat intelligence companies form daily. An average of 60,000 security blogs are written each month. This huge volume of threat data is more than analysts and responders have the capacity to review, and a significant challenge comes in distilling the data into the context of how to protect your environment. This discussion will cover the next generation of threat intelligence analysis, which will leverage the cognitive computing powers of IBM Watson to accelerate today’s capabilities and turn insights into actions. SEC–1856: Cognitive Computing Offers New Cyber Security Methods Sessions Security Breakout Session Patrick Vandenberg, IBM Ted Julian, IBM Not Industry Specific 27 October 2016  Wendi Whitmore, IBM Not Industry Specific https://www-01.ibm.com/events/global/wow/sessions/print/index.html 5 of 11 9/26/2016 12:37 PM
  • 6. Speakers Industry , 04:00 PM – 04:45 PM Individuals, public and private organizations alike depend on the cyber world. From citizens using social media, to banks growing their businesses, to law enforcement supporting national security—every sector of society is increasingly dependent on technology and networked systems. At the same time, the digital society contains inherent vulnerabilities that may generate security risks to citizens, businesses or society's vital functions. This talk explains how the scientific disciplines of AI and signal processing of cognitive computing offer different tools, like machine learning, natural language processing, vision, human-computer interaction, dialog and narrative generation to solve the challenges of building cyber security capacity. 25 October 2016 Martti Lehto, University of Jyväskylä Gregory Porpora, IBM Information Technology https://www-01.ibm.com/events/global/wow/sessions/print/index.html 6 of 11 9/26/2016 12:37 PM
  • 7. Speakers Industry SEC–2235: Big Data, Big Security Problems Sessions Security Hands-on Lab , 09:00 AM – 11:30 AM This year has seen a significant increase in the level of interest in the topic of security and auditing for Hadoop and MongoDB. Hadoop and MongoDB vendors are responding with better security features, and by partnering with the market-leading data security and compliance solution for Hadoop and MongoDB, IBM Security Guardium provides organizations the value of real-time monitoring, alerting, reports, compliance workflow, and more for Hadoop and MongoDB. Get hands-on with Guardium and IBM BigInsights for Apache Hadoop, and learn how to configure real-time alerts for suspicious behavior, customize prebuilt reports, and use other Guardium features such as quick search and compliance workflow. SEC–2332: Strengthen Your Immune System with Cognitive Analytics and Intelligent Integration Sessions Security Breakout Session , 10:00 AM – 10:45 AM While phishing, malware, distributed denial-of-service (DDoS) and other external threats rightfully receive significant attention, they only represent one piece of the threat equation. Insider threats are the other piece, and they can be equally damaging. In fact, the 2015 Cyber Security Intelligence Index showed that more than half of data breaches 27 October 2016 TINA CHEN, IBM Sundari VORUGANTI, IBM Banking 26 October 2016  https://www-01.ibm.com/events/global/wow/sessions/print/index.html 7 of 11 9/26/2016 12:37 PM
  • 8. Speakers Industry are caused by insiders (employees, third-party contractors, partners). This talk will discuss key insider threats affecting your sensitive data, and show you how a cognitive and intelligently integrated security immune system can effectively defend against such threats. Examples of security immune system technologies include: IBM Security Guardium, Privileged Identity Manager and QRadar. Speaker Industry SEC–2338: iOS in the Enterprise Sessions Security Breakout Session , 05:00 PM – 05:45 PM iPhones and iPads are popular choices for BYOD and corporate-owned usage models. Learn about the latest iOS advancements and experience how IBM, together with Apple, delivers an enterprise-class solution for your business. Big changes have been made to iOS to enable better management, collaboration and security. Join this session, in which IBM reviews the most essential enhancements and how IBM MaaS360 enables your organization to take advantage of all the new features. SEC–2602: It Only Has to Happen Once: Protecting Your Brand in the Digital Economy Sessions Security Walid Rjaibi, IBM Patrick Vandenberg, IBM Not Industry Specific 25 October 2016  Joshua Lambert, IBM Not Industry Specific https://www-01.ibm.com/events/global/wow/sessions/print/index.html 8 of 11 9/26/2016 12:37 PM
  • 9. Speakers Industry Breakout Session , 01:00 PM – 01:45 PM One breach. One leak. One vulnerability. In the digital economy, it only takes one incident to destroy your brand. To ensure every transaction, both internal and beyond organizational boundaries, you require a comprehensive solution that stands up to the demands of a digital business created by the growth of mobile, cloud and APIs. Moreover, you have to provide this security confidently and cost-effectively across your entire ecosystem to ensure brand integrity. Join IBM to discuss strategy and practice, and learn how to apply enterprise-grade security to today's digital technologies—and start sleeping better at night. 25 October 2016  Christopher Schmitt, IBM Chris Collard, IBM Not Industry Specific https://www-01.ibm.com/events/global/wow/sessions/print/index.html 9 of 11 9/26/2016 12:37 PM
  • 10. Speakers Industry SEC–2945: Accelerate Your General Data Protection Regulation (GDPR) Efforts with IBM Security Guardium Sessions Security Hands-on Lab , 08:30 AM – 11:00 AM The European Union (EU) General Data Protection Regulation (GDPR) goes into effect in May 2018. Organizations worldwide are discovering it's not just EU businesses that are impacted—it’s any business that holds personal data about EU residents! With that realization, a lot of scrambling has begun. Join this hands-on lab to get more information on the personal data-centric GDPR requirements and how IBM Security Guardium can help you accelerate your efforts. Learn what you need to know to get started, including: how to better get to know your (personal) data; how to configure an impact assessment so you can help protect your Data Processors; and how to run compliance reports that can help make the compliance process easier. 24 October 2016 Cindy Compert, IBM VIKALP PALIWAL, IBM Government https://www-01.ibm.com/events/global/wow/sessions/print/index.html 10 of 11 9/26/2016 12:37 PM
  • 11. Speaker Industry SEC–3940: Stomp Out Insider Security Threats and Fraud with User Behavior Analytics Sessions Security Theater Session , 04:30 PM – 04:50 PM This interactive theater session will describe how widespread insider security threats and fraud are today, and how you can use a new app from IBM security to put a stop to them. 24 October 2016 Roger J. Hellman, IBM Not Industry Specific https://www-01.ibm.com/events/global/wow/sessions/print/index.html 11 of 11 9/26/2016 12:37 PM