IBM Security at Pulse 2012
We are seeing important market changes in security, most notably in the explosion of data, the consumerization of IT and the increasing sophistication of attackers. Organizations are looking to break down traditional IT security silos and take a better approach to security. With the recent acquisition of Q1 Labs, IBM has invested in what we believe is the next step of IT security: Security Intelligence. In this model, we will take data and information from around the organization and consolidate it into a single, comprehensive view at the top of the organization.
In addition to the dedicated security curriculum sessions, there will be many other opportunities to learn more about how IBM can help with your security challenges:
Track 1: Securing Emerging Technologies and Addressing Emerging Threats
Embracing new technologies, such as virtualization, cloud, and mobile computing, is an important aspect of how organizations stay competitive. However, the same technologies that can accelerate efficiencies can also pose new security challenges. This track will highlight how IBM can help you stay ahead of the evolving threat landscape and at the same time leverage the innovations made possible by emerging technology.
Track 2: Building a Secure Infrastructure
A secure infrastructure is not a static infrastructure. Every day, organizations have to face new security challenges, and the most successful organizations will be the ones that can not only react to these new challenges, but also anticipate them. In this track, we’ll review some of the latest threat research and provide insights on how you can mitigate those threats, and optimize your infrastructure at the same time.
Track 3: Managing Compliance and Audit for a Secure Organization
Regulatory and industry requirements—which are often disconnected or even contradictory—are increasing, making it difficult for enterprises to keep up without draining valuable resources. This track will focus on what it means to effectively manage compliance and audit in a world where the only constant, is constant change. Sessions will feature best practices and user experiences with designing, enforcing and monitoring security policies for users and their activities, information, systems and processes.