This year most of us had to deal with sudden changes and unexpected demands in our IT environment. What started as a challenge has resulted in a faster IT transformation that is geared towards producing more dynamic and scalable infrastructure. We are experiencing an acceleration that information security professionals must be prepared for.

In our live and interactive Cybersecurity Friday sessions the local IBM Security team will provide insights on changing trends and new directions. The first two events in October explore how to improve digital trust; the two sessions in November are dedicated to threat management.

Friday, October 23

09.00-11.00 am CET

Creating Digital Trust for Digital Success

Now more than ever, developing digital channels is key to remaining competitive and weathering the stormy economic times ahead. We will look at the core of digital trust: a frictionless experience that balances user-friendliness with responsible and secure handling of user data. Live from our studio and offering plenty of interaction with our experts.

  • How can the Zero Trust Model support your efforts to create a frictionless user experience?
  • How can you handle user data responsibly to meet compliance and gain the trust of your customers?
  • How can encryption help?
  • Hear from clients, experts and users what they view as challenges and opportunities.

Friday, October 30

09.00-10.30 am CET

Introducing the Digital Trust tool set

Experience IBM Security’s Digital Tust capabilities during the demo day. Through a series of short demonstrations you’ll discover the latest key technology and offerings. Our experts are happy to answer your questions during the live Q&A after each demo.

  • The Zero Trust Journey: how to get started with IBM Security Services.
  • User-friendly authentication with IBM Security Verify and Hitachi VeinID Five
  • Providing access to smartphones, workstations and laptops with IBM Security Verify Access and IBM MaaS360.
  • Protecting data in the cloud with IBM Security Guardium 

Friday, November 13

09.00-10.30 am CET

Managing threats in challenging times

Security teams nowadays need to make sense of more assets, more connections, more movements and more threats - all at once. In addition, IT security professionals are challenged to support a dynamic infrastructure with remote users on one end and cloud-based applications and data on the other. In one Friday morning we will show how IBM Security can help you manage threats in this new normal of IT. Live from our studio and offering plenty of interaction with our experts.

  • How to detect and respond to threats faster - at scale and with flexibility?
  • How to gain insights into threats across hybrid, multi-cloud environments?
  • How to extend your security department with outside help?
  • Hear from local experts and users

Friday, November 27

09.00-10.30 am CET

Introducing the Threat Management tool set

Experience IBM Security’s threat management capabilities during the demo day. Through a series of short demos you will experience the latest solutions that can help you manage threats in the new normal of IT. Our experts are happy to answer your questions during the live Q&A after each demo.

  • Enabling threat management - experience our offerings 
  • Detecting threats: IBM Security QRadar  
  • Responding to threats: IBM Cloud Pak for Security 
  • Hunting for threats: IBM i2 
  • Extending your SOC: X-Force incident response and intelligence services

Cyber Breach Game Experience

Not sure if Cybersecurity Fridays suit your information needs?
Let this game change your mind!

Terminal: An international airport is under cyberattack. Do you have what it takes to prevent the attackers from shutting airport systems down with ransomware? Experience an intense, realistic cyber breach video game in “Cybersecurity Ops: Terminal.”

X-Force IRIS Breach Breaker

Data breaches create chaos, but the decisions you make in the midst of the breach can help bring your organization out of it. Do you have the right systems in place to help you identify, respond, and recover from a breach? Step into our interactive SOC demo to tackle a mock situation and break the breach.