Overview

This year, more than any other, we have a critical need to come together to accelerate essential recovery and transformation. Whether you are supporting a newly remote workforce or shifting to different applications and cloud platforms, cybersecurity remains an essential practice to protect your organization and clients.

To help shield your organization in a world of complexity, you need to align security strategy to the business.  Join our virtual security summit to hear from security leaders and organizations who will talk about best practices in dealing with the latest cyber security challenges in the new normal of doing business.

Event Highlights :

  • Hear from industry experts who will talk about best practices in defending against  the latest cyber attacks
  • Learn how Quantum and AI are helping fight attacks and how to move to the cloud with confidence
  • Tour our virtual booth to better understand our product offerings and view demos

Agenda

Session Speakers
Welcome and Introduction
  • Matthew Glitzer, VP, Security - Asia Pacific
Keynote: Security everywhere: Manage new cyber risks
  • Mary O’Brien, General Manager, IBM Security
  • John Wheeler, BISO IBM Security and VP of Strategy & Innovation, Services and Integrated Solutions
Clients Speak: Security key to Digital Transformation
  • Coming Soon
Defend against complex cyber attacks
  • Wendy Whitmore, Vice President, X-Force Threat Intelligence,IBM Cloud and Cognitive Software
Threat Management: Modernize Security with an Open Platform
  • Justin Youngblood, Vice President, IBM Security
Coffee Break with Terminal Game  

Accelerate your incidence response with the next gen SOAR  (Including SIOCS)

  • Coming Soon

Personal Data Protection Act –The Catalyst for a Holistic Data Security Programe

  • Sunil Prabhakaran, Data Privacy and GDPR - IBM Security
Protect your growing remote workforce and securely engage with your clients at a distance
  • Aarti Borkar, Vice President, Offering Management, IBM Security
  • Srinivas Tummalapenta, Distinguished Engineer, CTO & Chief Architect, IBM Security Services

Best practices for organizations to drive a cybersecurity behaviour change program

  • Urmez Rusi Daver, Consulting Services Leader, IBM Asia Pacific
Future of Security: Quantum AI & Encrypted data on cloud
  • Sridhar Muppidi, IBM Fellow, VP & CTO IBM Security
  • J.R Rao, IBM Fellow and CTO, Research Security, IBM Research
Summary and Next Steps
  • Aaron Banks,Security Services Sales Leader, IBM ASEAN

Experience Zone (Demos, 1-1 Consultation, Chat with SME)

• 1-1 Consultations

• On-Demand Demos

 

Sessions

Welcome and Introduction

Welcome note and Introduction by Matthew Glitzer, Vice President Security – Asia Pacific & China

Keynote: Security everywhere: Manage new cyber risks

Everything from new business models to rapid technology adoption to regulations are pushing cybersecurity teams to find new, faster ways to shield their business and ensure privacy while accelerating growth. Infusing security everywhere business is done can support growth while protecting against emerging and accelerating threats. Mary O'Brien and John Wheeler will discuss client stories where IBM brought together the right people, processes, and technology to accelerate business securely

Clients Speak: Security key to Digital Transformation

A fire side chat with security leaders on why security is key to digital transformation.

 

Defend against complex cyber attacks

Cyber Security is getting more complex as today’s multi-vector attacks need a multi-resource solution. Profits, reputation, operations, company value, legal security, corporate confidence—everything takes a hit when you experience a cyber security incident.  As complex cyber threats grow everyday Companies need the ability to detect and monitor threats, protect critical assets, and respond with precision to the evolving attack landscape.
The answer is now simpler , Wendy Whitmore will discuss how to manage critical security incidents and eradicate threats to minimize business impact.

Modernize Security with an Open Platform

Security leaders get a first-hand look at not just the security challenges the journey to cloud imposes, but the tremendous advantages the cloud offers flexibility, automation, and collective insights. Justin Youngblood, Vice President, IBM Security will discuss how the journey to hybrid multicloud is unlocking innovation and uniting defenses. In an increasingly hybrid, multicloud environment, gaining visibility and insights from security data spread across different tools, within multiple clouds, and on-premises is becoming unmanageable. Security teams, already struggling with a skills gap, are often forced to undertake costly migration projects, build complex integrations, and continuously switch between different screens and products, causing threats and risks to be missed, and it’s time for a new approach.

Coffee Break with Terminal Game

Terminal – A cybersecurity game experience. Malicious hackers have targeted a large international airport. Your job is to protect the airport and prevent the attackers from disrupting operations.

Accelerate your incidence response with the next gen SOAR

Threat detection is only half of the equation, you also need a smart incident response platform to accelerate and enrich your investigation. Our expert will discuss how to accelerate incident response and maximize the ability of your Security Operation Center’s (SOC) posture.

Personal Data Protection Act –The Catalyst for a Holistic Data Security Program

With the “borderless” nature and evolving sophistication of cyber crimes, Personal Data Protection Act across the Asia Pacific countries has created a burning platform for every organization to re-evaluate their data security and privacy posture. Sunil Prabhakaran will discuss the need to have a holistic data security program to ensure security and compliance.

Protect your growing remote workforce and securely engage with your clients at a distance

The recent health crisis accelerated the trend in remote work, which had already grown 91% in the last decade. As the number of employees working remotely grows, however, so can your risk. Every organization needs to keep their employees safe and productive -- no matter where they're working from. Learn how IBM has helped organizations deploy tools that modernize your identity program and allow you to address the security risks of a growing remote workforce.

Best practices for organizations to drive a cybersecurity behaviour change program

Social engineering has been one of the most common attack methods used by criminals to trick employees into downloading malware, opening "a door" to a company's headquarters, and other actions that pave the way for a compromise.
Phishing has been one of the top initial attack vectors followed by human error, and organizations are looking for ways to prevent successful phishing attacks by training and creating more aware employees.
Delivering a successful security awareness training program goes beyond the security team. It requires a multidisciplinary effort across the organization, addressing people-related vulnerabilities and mitigating people-centric security risks with the right methods, tools and metrics. Urmez Daver will discuss the key steps needed to drive a cyber security behaviour change and best practices to implement a comprehensive security awareness program for organizations.

Future of Security: Quantum AI & Encrypted data on cloud

Future proofing your security against Quantum Quantum computing promises power far beyond the reach of any supercomputer. That power can render the very best of today's encryption pointless. Organizations that intend to keep their most sensitive data private need to future-proof their security by implementing quantum-safe cryptography, which starts with risk analysis and data classification. Dr. Sridhar Muppidi, IBM Fellow, and J.R Rao will discuss how you can ensure security in the Quantum Age.

Summary and Next Steps

A recap of sessions and recommendations on how organizations can rethink their security posture using modern approach, smarter processes, and advanced technology solutions.

Experience Zone

A first-hand experience of IBM Security Solutions along with demos of products such as IBM Cloud Pak, for Security, IBM QRadar, IBM MaaS360, IBM Guardium, and more. Also, an opportunity to interact exclusively with experts on all things security.

  • 1-1 Consultations
  • On-Demand Demos

Resources

Cost of Data Breach report

Managing data breaches has got a lot more expensive in 2020. Find out what factors help mitigate breach costs.

Cybersecurity Ops: TERMINAL

An interactive gaming experience based on a cyber attack on an international airport.

A zero trust strategy for modern enterprise

Context to connect the right user, to the right data — under the right conditions. Explore IBM’s model for zero trust success.