When it comes to taking chances and not letting an opportunity pass you by, Zac Brown Band said it best in the song, “As She’s Walking Away”:

And don’t be falling in love as she’s walking away
When your heart won’t tell your mind to tell your mouth what it should say
May have lost this battle, live to fight another day
Don’t be falling in love
As she’s walking away.

Next week at IBM InterConnect 2017, you’ll get many opportunities to connect with security services professionals and gain deep insights on how to tackle your biggest cybersecurity challenges. You’ll also get a chance to see Zac Brown Band perform this song, among many others, live.

Connect With Security Services at InterConnect

Just like the guy in the ballad, don’t let these chances pass you by. Below is a quick rundown of the key sessions to pay attention to while you’re at the conference.

‘Roll the Dice and Have Some Faith’: Enabling Your Security Transformation

Enterprise security programs face harsh realities every day. The ever-changing threat landscape, the skills shortage, and the challenge of adapting platforms and technologies keep chief information security officers (CISOs) and their teams on their toes day in and day out. These factors bring up many complicated questions: Are we protected from the latest threats? Are we keeping up our security posture as we seek to innovate and connect more and more systems? Are we quantifying and communicating our risks clearly to our leaders and our board?

Attendees bring their toughest challenges and most pressing questions to InterConnect. They share conversations with each other and with experts all gathered in one place to explore meaningful answers. Whether you are focusing on securing your hybrid cloud, enabling better incident response or solving another cybersecurity challenge, IBM Security Services experts have best practices, customer success stories and recommendations to help you meet your goals and tackle your challenges.

‘If We Were Standing Face to Face’: Security Transformation Services and Best Practices Sessions

In our convenient Session Preview tool, you’ll find a complete overview of our planned security transformation services sessions at InterConnect. Below are some selected highlights from the agenda:

  • A global chemicals company will share how it developed an effective, integrated threat management program and tailored it to its specific needs as a player in the manufacturing industry (STS-5656).
  • Early adopters of Havyn will share how our newest innovation leveraging Watson capabilities will revolutionize the way Managed Security Services clients engage with IBM Security Operations Center (SOC) personnel (STS-4585).
  • A large U.S. corporation will share its journey to adopt a hybrid cloud infrastructure and secure it successfully (STS-5506).
  • IBM X-Force Red experts will share real-world stories of ethical hacking done in the name of security (STS-2205).

There will also be sessions specifically designed to offer insights on the latest security trends and concerns:

  • Learn how to prepare for the General Data Protection Regulation (GDPR) and put a response plan in place (STS-6804).
  • Boards and business executives are now starting to ask tough questions about cybersecurity to their specialized teams. Learn how to communicate business risk effectively (STS-7439).
  • IBM X-Force IRIS powerhouse Wendi Whitmore will share how to improve the response and remediation process to protect a company’s intellectual property more quickly and effectively (STS-5626).

‘Give Me One More Move’: Other Things to See and Do

In addition to the sessions above, we plan to demonstrate our incident response and security testing services at the IBM Security booth. You should also plan to check out our services expo sessions, which will focus on security awareness, SD-WAN and zero trust security.

More from Security Services

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Ermac malware: The other side of the code

6 min read - When the Cerberus code was leaked in late 2020, IBM Trusteer researchers projected that a new Cerberus mutation was just a matter of time. Multiple actors used the leaked Cerberus code but without significant changes to the malware. However, the MalwareHunterTeam discovered a new variant of Cerberus — known as Ermac (also known as Hook) — in late September of 2022.To better understand the new version of Cerberus, we can attempt to shed light on the behind-the-scenes operations of the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today