IBM InterConnect is the premier annual event for security, cloud and mobile. Earlier this year top experts from IBM and other industry-leading organizations presented their latest research and insights at the InterConnect 2016 conference. These sessions contain valuable recommendations for improving your security posture and several of them can now be viewed on-demand at your convenience.


Session Title: Think Like a Hacker – Common Techniques to Exploit Mobile Apps and How to Stop Them
Speakers: David Marshak, Senior Product Manager, IBM Security and Aaron Lint, Vice President of Research, Arxan Technologies
Abstract: The first step in learning how to protect your applications from hackers is to think like one. During this session, you’ll learn just how easy it is for hackers to leverage widely available third-party tools to completely disable and compromise mobile apps. This can lead to unauthorized access to source code, tampering with apps to enable advanced malware attacks, stealing of sensitive data or intellectual property, perpetrating fraud and more. You’ll also hear about the evolution of the mobile threat landscape and view a demonstration of various reverse-engineering and tampering attacks.
Watch the session on-demand

Session Title: The Weakest Link – Ethically Hacking the Connected Building
Speaker: Paul Ionescu, Ethical Hacking Team Lead, IBM Security
Abstract: As more and more devices become connected to the Internet, the ones that control your building’s heat, lighting and air conditioning are no exception when it comes to cyber security risk. The IBM X-Force Ethical Hacking team recently conducted a real-world penetration test experiment on a connected building automation system. They found security flaws that allowed them not only to hack into the building automation system, but even to work their way to the central server that controls more than twenty buildings across North America. With control of this server, a hacker could tamper with the physical conditions of all of the buildings this system controls. Learn about the challenges of securing such systems, and how to protect them.
Watch the session on-demand

Session Title: The Good the Bad and the Ugly – An Identity Governance Story
Speakers: Daniel Poliquin, Principal, Deloitte & Touche LLP and Andrea Rossi, Identity Governance Global Sales Leader, IBM Security
Abstract: In a 1967 “spaghetti Western” film by Sergio Leone, three characters join forces against their will to find a fortune in gold. Similar to the movie, Identity Governance initiatives often force very different characters to work closely together in order to achieve a common objective. In this session a customer an IBMer and a business partner will take you through an Identity Governance story, sharing their different perspectives on purchasing, implementing and using an Identity Governance solution.
Watch the session on-demand

Session Title: Board Room Rodeo – How to Align the C-Suite and Make Better Security Decisions
Speakers: Diana Kelley, Executive Security Advisor, IBM Security
Abstract: Help your business leaders and boards understand impacts of security breaches, where threats come from and actions to take. In this session Diana Kelley will provide findings from a recent IBM Institute for Business Value survey that puts cybersecurity in context for business. The survey was conducted with members of the C-suite and compared to data from IBM CISO surveys and X-Force threat research.
Watch the session on-demand

Session Title: Enabling Work Everywhere – on Mobile and the Cloud – with IBM MaaS360
Speaker: Anar Taori, MaaS360 Senior Director of Product Management, IBM Security
Abstract: Intranets, file shares, cloud repositories—is your content secure? Providing secure access to content stored across multiple corporate repositories is a challenge. In this session, experts will discuss best practices to secure business data and content as it moves to the cloud and is accessed from corporate or employee-owned smartphones and tablets. Learn about new trends in content access and how IBM MaaS 360 (formerly MobileFirst Protect) can help you put a strategy in place to securely deliver content from Box, Sharepoint, OneDrive and other repositories. These solutions can ensure trust between endpoints with controls to make CIOs and CISOs comfortable.
Watch the session on-demand

Session Title: Concur Shares Application Security Best Practices for Everyone — Yes, Even You!
Speaker: Sundar Krishnamurthy, Senior Information Security Engineer, Concur
Abstract: Applications are the last line of defense in organizations and within the world of the Internet of Things. A strong, secure network is but a minor hindrance to a hacker who finds an application software mistake that can be abused. This talk will share real-world code examples, from simple buffer overflows to session hijacking and cross-site scripting, that illustrate how we miss many of the avenues that bad guys use to exploit our systems.
Watch the session on-demand

Session Title: How Shazam Provides Banking Services to Detect and Prevent Fraud Using IBM Security Access Manager
Speakers: Brian Mulligan, Security Product Manager, IBM Security and Stephan Thomasee, VP Information Technology, SHAZAM Network
Abstract: Shazam, an electronic funds transfer network and service provider to banks, is simplifying web and mobile access infrastructure and reducing fraud with integrated IBM Security solutions. Their solution detects potentially fraudulent activity using IBM Trusteer Fraud Protection. Through integration with IBM Security Access Manager, the presence or absence of fraud can be used as a factor in more intelligent access decisions. High-risk users can be prevented from taking certain actions or prompted for a stronger authentication. All this activity is monitored by fraud analysts using IBM QRadar, to proactively address potential fraud victims. This session will explore Shazam’s business need and implementation experience.
Watch the session on-demand

More from CISO

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

The evolution of a CISO: How the role has changed

3 min read - In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027.With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today