Cyber risk quantification
How can you better align your security strategy to the business and help sheld your organisation in the new world of complexity? This panel will discuss how quantifying cybersecurity risk with the FAIR Institute methodology can transform the security relationship with the business.
We will examine two use cases: the evolving threat landscape during remote working and addressing the security risk associated with Mergers & Acquisitions.
Cyber Resilience, what’s your Minimal Viable Company and how to recover it.
With the industry focus on Resilience, and the significant leap in cyber attacks, Cyber Resilience is the focus of everyone’s mind. However, most companies Recovery strategy, do not include the cyber attack vector and find a rebuild could mean weeks of outage and significant loss of revenue and brand. Learn how to embed resilience in your strategy to ensure you can maintain core purpose and integrity under duress.
Are you ready for a Breach?
Are you ready for breach? Hear from our X-Force IRIS experts on how to prepare, rehearse and respond to a security incident.
Modernise Security with an open platform: How “Cloud Pak for Security” addresses the needs of the Security Analyst
In this session we will provide an overview and demonstrate the power of “federated search” and Threat Intelligence Insights integrated into an orchestration & automation solution supporting the security analysts requirements in performing threat hunting.
SOAR (Security Operations and Response) is not just a SOC Issue
In this session we will explore practical examples of SOAR in a wider business context. We will go beyond the traditional SOAR use-cases and expand on these to include broader business issues such as crisis management scenarios and support for compliance management processes. This will be shown in the context of a topical set of playbooks to support both a COVID-19 and a DSAR scenario.
Building an integrated approach to security operations
The industry is not satisfied with the threat management status quo. Security operations and threat management services can often struggle to deliver high value insights and consistent incident response. Join this session to understand IBM's new approach to threat management, including:
- the use of AI to reduce the number of false positive alerts by 70%+
- Automated Orchestration and automating incident response processes to auto-enrich events and provide transparency
Protect your growing remote workforce – overview
The recent health crisis accelerated the trend in remote work, which had already grown 91% in the last decade. As the number of employees working remotely grows, however, so can your risk. Every organization needs to keep their employees safe and productive – no matter where they're working from. Learn how IBM has helped organizations deploy tools that modernize your identity program and allow you to address the security risks of a growing remote workforce. Protect your growing remote workforce: identifying risk on compromised devices and credentials with IBM Trusteer At a time when the whole world is dealing with a global pandemic, fraudsters are elevating today’s unexpected reality to attack the remote workforce. Learn how IBM Trusteer identifies risk on workforce remote access by transparently collecting hundreds of attributes during login, and provides real time risk analysis that is easily integrated into existing Threat Management workflow.
Protect your growing remote workforce: Privileged Access Management with IBM Secret Server
80% of breaches involve a weak or stolen privileged credential. Now more than ever, the old methods of sharing & re-using admin credentials between people & teams are opening new avenues for criminals to exploit. Join Sam Hector & Vaughan Harper to find out how to provide remote employees the same access to sensitive systems as being in the office – securely, and with a robust audit trail.