When it comes to taking chances and not letting an opportunity pass you by, Zac Brown Band said it best in the song, “As She’s Walking Away”:

And don’t be falling in love as she’s walking away
When your heart won’t tell your mind to tell your mouth what it should say
May have lost this battle, live to fight another day
Don’t be falling in love
As she’s walking away.

Next week at IBM InterConnect 2017, you’ll get many opportunities to connect with security services professionals and gain deep insights on how to tackle your biggest cybersecurity challenges. You’ll also get a chance to see Zac Brown Band perform this song, among many others, live.

Connect With Security Services at InterConnect

Just like the guy in the ballad, don’t let these chances pass you by. Below is a quick rundown of the key sessions to pay attention to while you’re at the conference.

‘Roll the Dice and Have Some Faith’: Enabling Your Security Transformation

Enterprise security programs face harsh realities every day. The ever-changing threat landscape, the skills shortage, and the challenge of adapting platforms and technologies keep chief information security officers (CISOs) and their teams on their toes day in and day out. These factors bring up many complicated questions: Are we protected from the latest threats? Are we keeping up our security posture as we seek to innovate and connect more and more systems? Are we quantifying and communicating our risks clearly to our leaders and our board?

Attendees bring their toughest challenges and most pressing questions to InterConnect. They share conversations with each other and with experts all gathered in one place to explore meaningful answers. Whether you are focusing on securing your hybrid cloud, enabling better incident response or solving another cybersecurity challenge, IBM Security Services experts have best practices, customer success stories and recommendations to help you meet your goals and tackle your challenges.

‘If We Were Standing Face to Face’: Security Transformation Services and Best Practices Sessions

In our convenient Session Preview tool, you’ll find a complete overview of our planned security transformation services sessions at InterConnect. Below are some selected highlights from the agenda:

  • A global chemicals company will share how it developed an effective, integrated threat management program and tailored it to its specific needs as a player in the manufacturing industry (STS-5656).
  • Early adopters of Havyn will share how our newest innovation leveraging Watson capabilities will revolutionize the way Managed Security Services clients engage with IBM Security Operations Center (SOC) personnel (STS-4585).
  • A large U.S. corporation will share its journey to adopt a hybrid cloud infrastructure and secure it successfully (STS-5506).
  • IBM X-Force Red experts will share real-world stories of ethical hacking done in the name of security (STS-2205).

There will also be sessions specifically designed to offer insights on the latest security trends and concerns:

  • Learn how to prepare for the General Data Protection Regulation (GDPR) and put a response plan in place (STS-6804).
  • Boards and business executives are now starting to ask tough questions about cybersecurity to their specialized teams. Learn how to communicate business risk effectively (STS-7439).
  • IBM X-Force IRIS powerhouse Wendi Whitmore will share how to improve the response and remediation process to protect a company’s intellectual property more quickly and effectively (STS-5626).

‘Give Me One More Move’: Other Things to See and Do

In addition to the sessions above, we plan to demonstrate our incident response and security testing services at the IBM Security booth. You should also plan to check out our services expo sessions, which will focus on security awareness, SD-WAN and zero trust security.

More from Security Services

How I got started: Attack surface management

4 min read - As the threat landscape multiplies in sophistication and complexity, new roles in cybersecurity are presenting themselves more frequently than ever before. For example, attack surface management. These cybersecurity professionals are responsible for identifying, mapping and securing all external digital assets an organization owns or is connected to. This includes servers, domains, cloud assets and any other digital points that could be exploited by cyber criminals. Their role involves continuously monitoring these assets for vulnerabilities, misconfigurations or other potential security risks…

X-Force uncovers global NetScaler Gateway credential harvesting campaign

6 min read - This post was made possible through the contributions of Bastien Lardy, Sebastiano Marinaccio and Ruben Castillo. In September of 2023, X-Force uncovered a campaign where attackers were exploiting the vulnerability identified in CVE-2023-3519 to attack unpatched NetScaler Gateways to insert a malicious script into the HTML content of the authentication web page to capture user credentials. The campaign is another example of increased interest from cyber criminals in credentials. The 2023 X-Force cloud threat report found that 67% of cloud-related…

Does your security program suffer from piecemeal detection and response?

4 min read - Piecemeal Detection and Response (PDR) can manifest in various ways. The most common symptoms of PDR include: Multiple security information and event management (SIEM) tools (e.g., one on-premise and one in the cloud) Spending too much time or energy on integrating detection systems An underperforming security orchestration, automation and response (SOAR) system Only capable of taking automated responses on the endpoint Anomaly detection in silos (e.g., network separate from identity) If any of these symptoms resonate with your organization, it's…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today