This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

it-sa 365 Key Visual
Launch Days Lecture programme

Management and consolidation of complex security infrastructures

Learn how consolidation and automation help solve the challenges of managing complex security systems.

calendar_today Wed, 07.10.2020, 13:00 - 16:00

event_available Digital

Action Video

south_east

Action description

south_east

Speaker

south_east

Moderator

south_east

Themes

Cloud Security Data security / DLP / Know-how protection Governance, Riskmanagement and Compliance Identity and access management Industry 4.0 / IoT / Edge Computing Managed Security Services / Hosting SIEM / Threat Analytics / SOC Trend topic

Event

This action is part of the event Launch Days

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Digital transformation and the associated use of cloud technologies is probably the greatest challenge for IT security at present. When companies move their business processes to the cloud, data is fragmented between individual sites and multiple cloud ecosystems. In order to gain an overview of the risks and threats in such infrastructures, many companies have started to use new, specialized tools. In addition, distributed services lead to an explosion of security data that must be evaluated to identify and analyze threats and risks. These requirements result in an increasingly complex security infrastructure. A study conducted by Forrester Consulting on behalf of IBM found that 91 percent of organizations are struggling with this increasing complexity. The latest "Cost of a Data Breach Report" even identifies complexity of the security infrastructure as the biggest cost driver in the event of a data breach. Small and medium-sized organizations in particular are also suffering from the increasing lack of IT security specialists to drive the necessary consolidation and modernization of their security infrastructure. Our congress deals with topics, technologies and solutions that help companies manage increasing complexity, minimize cyber risks and automate security analyses. Get inspired by the presentations of our employees and business partners. // AGENDA // 11:00 - 11:20 Insights on cyber attacks, Methods, motivation and effective countermeasures using the example of Emotet / Ashkan Vila, IBM Security Analyst // 11:20-11:40 Advanced Cyber Defense. / Siegfried Schauer, Cyber Security Evangelist T-Systems Austria GesmbH // 11:40-12:00 Security Operations Center - suitable for medium-sized businesses yes or no? / Michael Ganzhorn, Product Manager Security Operations Center, SVA // 12:00-12:20 From Hacking to Security Strategy. / Stefan Toedling, Co Founder & Business Development, BPN // 12:20-12:40 Cyber Resiliency - The essential link between security & IT continuity. / Dominik Bredel, Senior Consultant, IBM Services / Alexander Ziegler, IT Consultant, IBM Services // 12:40 - 13:00 Privileged Access Management in the Company - Security base or luxury equipment?" / Johannes Hauer, senior consultant, iC Consult GmbH // 13:00 - 13:20 Cybersecurity in production - What are the most important steps in the implementation. / Marcel Kisch, IBM OT Security Leader, EMEA // 13:20 - 13:40 Defence in Depth in practice: Monitoring of production IT and its use in SIEM. / Dr. Frank Stummer, Business Development, Rhebo GmbH // 13:40 - 14:00 It's all about seconds - we give you hours Full Managed Cyber Security Alarm System / Chris Berger, Strategic Sales Consultant, UMB AG Switzerland // The presentations of the lectures, relevant studies and further material are available under the following link: http://ibm.biz/ibm-itsa365 ... read more

Language: German

Questions and Answers: No

Speaker

show more

Moderator

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.