IBM Security Virtual Summit 2020
ASEAN
3 September 2020 | 11:00 AM - 2:00 PM SGT
3 September 2020 | 11:00 AM - 2:00 PM SGT
This year, more than any other, we have a critical need to come together to accelerate essential recovery and transformation. Whether you are supporting a newly remote workforce or shifting to different applications and cloud platforms, cybersecurity remains an essential practice to protect your organization and clients.
To help shield your organization in a world of complexity, you need to align security strategy to the business. Join our virtual security summit to hear from security leaders and organizations who will talk about best practices in dealing with the latest cyber security challenges in the new normal of doing business.
Event Highlights :
Session | Speakers |
---|---|
Welcome and Introduction |
|
Keynote: Security everywhere: Manage new cyber risks |
|
Clients Speak: Security key to Digital Transformation |
|
Defend against complex cyber attacks |
|
Threat Management: Modernize Security with an Open Platform |
|
Coffee Break with Terminal Game | |
Accelerate your incidence response with the next gen SOAR (Including SIOCS) |
|
Personal Data Protection Act –The Catalyst for a Holistic Data Security Programe |
|
Protect your growing remote workforce and securely engage with your clients at a distance |
|
Best practices for organizations to drive a cybersecurity behaviour change program |
|
Future of Security: Quantum AI & Encrypted data on cloud |
|
Summary and Next Steps |
|
Experience Zone (Demos, 1-1 Consultation, Chat with SME) • 1-1 Consultations • On-Demand Demos |
Welcome and Introduction Welcome note and Introduction by Matthew Glitzer, Vice President Security – Asia Pacific & China |
Keynote: Security everywhere: Manage new cyber risks Everything from new business models to rapid technology adoption to regulations are pushing cybersecurity teams to find new, faster ways to shield their business and ensure privacy while accelerating growth. Infusing security everywhere business is done can support growth while protecting against emerging and accelerating threats. Mary O'Brien and John Wheeler will discuss client stories where IBM brought together the right people, processes, and technology to accelerate business securely |
Clients Speak: Security key to Digital Transformation A fire side chat with security leaders on why security is key to digital transformation.
|
Defend against complex cyber attacks Cyber Security is getting more complex as today’s multi-vector attacks need a multi-resource solution. Profits, reputation, operations, company value, legal security, corporate confidence—everything takes a hit when you experience a cyber security incident. As complex cyber threats grow everyday Companies need the ability to detect and monitor threats, protect critical assets, and respond with precision to the evolving attack landscape. |
Modernize Security with an Open Platform Security leaders get a first-hand look at not just the security challenges the journey to cloud imposes, but the tremendous advantages the cloud offers flexibility, automation, and collective insights. Justin Youngblood, Vice President, IBM Security will discuss how the journey to hybrid multicloud is unlocking innovation and uniting defenses. In an increasingly hybrid, multicloud environment, gaining visibility and insights from security data spread across different tools, within multiple clouds, and on-premises is becoming unmanageable. Security teams, already struggling with a skills gap, are often forced to undertake costly migration projects, build complex integrations, and continuously switch between different screens and products, causing threats and risks to be missed, and it’s time for a new approach. |
Coffee Break with Terminal Game Terminal – A cybersecurity game experience. Malicious hackers have targeted a large international airport. Your job is to protect the airport and prevent the attackers from disrupting operations. |
Accelerate your incidence response with the next gen SOAR Threat detection is only half of the equation, you also need a smart incident response platform to accelerate and enrich your investigation. Our expert will discuss how to accelerate incident response and maximize the ability of your Security Operation Center’s (SOC) posture. |
Personal Data Protection Act –The Catalyst for a Holistic Data Security Program With the “borderless” nature and evolving sophistication of cyber crimes, Personal Data Protection Act across the Asia Pacific countries has created a burning platform for every organization to re-evaluate their data security and privacy posture. Sunil Prabhakaran will discuss the need to have a holistic data security program to ensure security and compliance. |
Protect your growing remote workforce and securely engage with your clients at a distance The recent health crisis accelerated the trend in remote work, which had already grown 91% in the last decade. As the number of employees working remotely grows, however, so can your risk. Every organization needs to keep their employees safe and productive -- no matter where they're working from. Learn how IBM has helped organizations deploy tools that modernize your identity program and allow you to address the security risks of a growing remote workforce. |
Best practices for organizations to drive a cybersecurity behaviour change program Social engineering has been one of the most common attack methods used by criminals to trick employees into downloading malware, opening "a door" to a company's headquarters, and other actions that pave the way for a compromise. |
Future of Security: Quantum AI & Encrypted data on cloud Future proofing your security against Quantum Quantum computing promises power far beyond the reach of any supercomputer. That power can render the very best of today's encryption pointless. Organizations that intend to keep their most sensitive data private need to future-proof their security by implementing quantum-safe cryptography, which starts with risk analysis and data classification. Dr. Sridhar Muppidi, IBM Fellow, and J.R Rao will discuss how you can ensure security in the Quantum Age. |
Summary and Next Steps A recap of sessions and recommendations on how organizations can rethink their security posture using modern approach, smarter processes, and advanced technology solutions. |
Experience Zone A first-hand experience of IBM Security Solutions along with demos of products such as IBM Cloud Pak, for Security, IBM QRadar, IBM MaaS360, IBM Guardium, and more. Also, an opportunity to interact exclusively with experts on all things security.
|
Managing data breaches has got a lot more expensive in 2020. Find out what factors help mitigate breach costs.
An interactive gaming experience based on a cyber attack on an international airport.
Context to connect the right user, to the right data — under the right conditions. Explore IBM’s model for zero trust success.