Session 1: Secure the Enterprise with Confidence
Presenter: Ed Ferrara, Forrester Research
The explosive increase in cyber threats poses an increasingly daunting challenge to the confidentiality, integrity and availability of intellectual property and other sensitive information. Businesses require more secure solutions across a variety of workloads, including traditional transaction processing, mobile, cloud, social media and big data. Is your IT environment engineered with security in mind, or are you adding complexity by using security point solutions which can create risks and additional costs? Our guest speaker will discuss how your industry peers view information security, regulatory compliance and other areas where a secure platform is required to protect essential information, safeguard your corporate reputation and effectively grow your opportunities. All of these are critical to a company's ability to compete in today's business environment.
Session 2: Mainframe Considerations for Cloud and Mobile Applications
Presenter: Glinda Cummings, Senior IBM Security Solutions Product Manager, IBM Software Group
The mainframe has long been acknowledged as a superior platform for running critical workloads and securely hosting the most sensitive data. Recently, many companies have expanded their traditional computing centers to exploit the latest technologies, such as big data analytics, to consolidate workloads for virtualized cloud implementations, and to support mobile communications with employees, vendors, and customers who use their own personal devices (BYOD). These changes introduce risk. How can companies rest assured that their IT centers are secure, data is protected, threats are detected and regulations are met? In this session, we'll discuss the mainframe industrial-strength integration of hardware, system, application, data and security software to provide comprehensive protection. You'll learn more about how the modern mainframe is keeping pace with the changing demands of current IT security scenarios to protect your enterprise.
Session 3: The Security Impact of Big Data
Presenter: Mike Ferguson, Managing Director, Intelligent Business Strategies
Big data best describes how organizations are seeking to gain deeper insight into their businesses by continually augmenting what they know about the entities in their businesses and the world around them. With volumes of data increasing exponentially, the increased velocity at which data is being processed and answers demanded – plus the sheer variety of data that is being collected – mean that the protection of information has become a bigger concern than ever. Big data is an enterprise-wide initiative requiring the exchange and integration of information across many computing and organizational boundaries within and outside the organization. While this represents greater business opportunities, the potential for security breaches can dramatically increase. Listen to Mike Ferguson, independent analyst and IBM Gold consultant, as he describes what organizations should be considering when it comes to implementing information protection solutions in the world of big data and how the IBM System z portfolio helps meet those requirements.
Session 4: Proactive and Preventive Risk and Threat Management
Presenter: Mark Simmonds, IBM Enterprise Architect and Senior Product Marketing Manager, IBM Software Group
The IT threat landscape is an ever-moving target that keeps data centers on constant alert. The challenge is to stay one step ahead of potential threats by taking a more proactive, preventative approach to monitoring all access to, and usage of, your data and infrastructure. The activities of employees, authorized users, testers, and developers and administrators must be monitored constantly to detect inadvertent user errors or possible privileged user abuse. Even simple security configuration changes can have untold adverse effects on the security posture of an enterprise. Good security and privacy policies require a combination of periodic risk assessment, constant event monitoring, automated threat analysis, real-time detection and alerts, and closed-loop remediation. Learn how the numerous security capabilities available on the mainframe can help you proactively protect your enterprise, reduce your risk and enhance security intelligence.
Twitter updates from IBM System z Events
Twitter updates from IBM System z Events