Registration Form

Please fill out the form below to register for this webinar.

Please keep me informed of products, services and offerings from IBM companies worldwide

* Indicates a required field.

Thank you for registering.

Data has been called the new oil of today’s global economy. Protecting this data from theft or inappropriate access has become increasingly complex, more so given the fact that in many cases, the threat originates from the inside. Employees have legitimate access to valuable data in the normal course of their jobs making it almost impossible to detect malicious acts.  Any clues of wrongdoing they do leave behind often fall through the cracks because security products work in siloes.

An integrated approach is the need of the day. First you need to identify the crown jewels, where this data is located, how it is accessed, and by whom. Then, you need to protect your critical information with appropriate access controls and user governance for all your privileged users including infrastructure level administrators and executives. Lastly, you need to detect suspicious activity by analyzing user behavior to stop bad actors before they can cause any damage.

In this webcast we will take you through various scenarios which explain how you can integrate your security solutions to better protect yourself from insider threats.

Featured Speakers

Rahul Agarwal

IBM Security Services - Portfolio Marketing

IBM Security

Ola Sergatchov

Portfolio Director - IBM Security Identity and Access Management

IBM Security

Johnny Shin

Executive Consultant - Identity and Access Management Architecture & Program Delivery

IBM Security