Hi [[ session.user.profile.firstName ]]

Panel: Mobile Apps – The Danger of Making Security an Afterthought

The BYOD phenomenon has resulted in the need to accept personal mobile devices on corporate networks with the expected security risks. Join our panel of experts as they discuss the top of mind issues for security officers:

- technical approaches to identifying security vulnerabilities
- methods of embedding security into the application life cycle
- research efforts to ensure application security technologies keep pace with latest threats and vulnerabilities
- approaches for scaling testing across an enterprise

The panel:

Benjamin Robbins, Principal, Palador (moderator)
Diana Kelley, Application Security Strategist, IBM
Brian Katz, Director and Head of Mobility Engineering, Sanofi
David Rogers, Founder, Copper Horse Solutions Ltd
Recorded Apr 17 2013 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Benjamin Robbins, Palador (moderator); Diana Kelley, IBM; Brian Katz, Sanofi; David Rogers, Copper Horse Solutions Ltd
Presentation preview: Panel: Mobile Apps – The Danger of Making Security an Afterthought

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Blending Big Data and SIEM for Better Security Intelligence Recorded: Sep 18 2013 58 mins
    Moderator: Winn Schwartau, Security Awareness Company; Peter Allor, IBM; Eric Green, SC Magazine
    The biggest technological breakthroughs sometimes come not from new technologies, but from creative and novel implementation. SIEM and log management tools, threat and risk analysis and large data sets are not new in the world of IT security. Blending cyber security, data security and big data to create channels of communication between your data and among your security team can create unprecedented insight into the threats facing your organization and allow you to secure preemptively and respond promptly to attacks.

    Join Peter Allor of IBM and our panel for an open discussion on how layering security can achieve the next level of security intelligence.
  • Amplifying Security Intelligence with Big Data and Advanced Analytics Recorded: Sep 10 2013 44 mins
    Vijay Dheap, Big Data Security Intelligence Solutions and Mobile Security Strategy, IBM
    As the organizational perimeter blurs due to rapid market adoption of cloud and mobile technologies as well as consumer engagement in social networks, an organization cannot solely focus on defense. Rather, they need to be proactive about mitigating risk and identifying threats. The urgency cannot be emphasized enough as cyber crime, breaches and advanced persistent threats (APTs) continue to occur at an alarming rate. Knowing who and what to protect or defend against are among the top questions that organizations need to ask. To answer these questions, there becomes and increasing need to analyze security data over long periods of time and also correlate that data with information from sources not traditionally deemed relevant for security. This need for big data and big data analysis amplifies an organization's security intelligence. And once a baseline has been established, organizations can employ additional big data analytics to improve its security IQ and better defend against APTs, insider threats, fraud, hactivism and cyber attacks. Join IBM for this webcast where we will share:

    The evolution of security intelligence

    The new realities and emerging security challenges

    Motivations for coupling security intelligence with big data analytics

    The cyber security questions that security leaders need answered

    The merging of security intelligence with business intelligence and the skills gap
  • 5 Steps to A Simpler Security Program & Protection from Next Generation Threats Recorded: Aug 15 2013 59 mins
    Moderator: Jarad Carleton, Frost & Sullivan; James Brennan, IBM: Alex Lanstein, FireEye; Mike Perez, Black Hills Info Sec
    Next Generation Security practices and tools are allowing organizations to protect themselves from nonlinear and evolving attacks. However, these programs can easily strain an organization's IT budget and become difficult to maintain. This panel will attempt to debunk the myth that more is better by outlining a framework for achieving the visibility and incident response capabilities needed to confront the most insidious attacks without breaking the bank and building a complex security apparatus.
  • Next Generation Intrusion Prevention -- Staying Ahead of Emerging Threats Recorded: Aug 15 2013 45 mins
    Paul Kaspian, Senior Product Marketing Manager - IBM Security Systems
    In todays complex IT environments, avoiding a significant security incident presents increasing challenges. New, sophisticated threats, combined with the proliferation of personal mobile devices in the enterprise - not to mention the complexities of emerging technologies like cloud computing -- changes the way organizations need to think about network security. During this webinar, Paul Kaspian from IBM Security Systems will delve into these challenges and how IBM Security Network Protection and Intrusion Prevention Systems provide advanced threat protection capabilities, visibility and control over the network.
  • Panel: Securing Your Enterprise Cloud Recorded: May 16 2013 59 mins
    Bill Brenner, CSO Magazine; Nataraj Nagaratnam, IBM; Chris Farrow, Compassion International; Jason Mendenhall, Switch
    As the cloud model continues to disrupt and enhance the modern enterprise IT teams are facing new challenges retaining security and control in these new environments. This panel will explore a multifaceted approach to the cloud that looks at the importance of integrating the right tech solutions and deployments while negotiating and understanding your relationship with cloud providers.

    Panel:

    Bill Brenner, Managing Editor, CSO Magazine (moderator)
    Nataraj Nagaratnam, Ph.D., IBM Distinguished Engineer, IBM Master Inventor
    Chris Farrow, Information Security Specialist, Compassion International
    Jason Mendenhall, EVP Cloud, Switch
  • Next Generation Access and Identity Management For a Multi-Perimeter World Recorded: May 15 2013 47 mins
    Vijay Dheap, Global Product Manager - IBM Master Inventor Big Data Security Intelligence & Mobile Security
    In today's open and interconnected enterprise, traditional perimeters are being extended to adopt mobile, cloud, social access and information interactions. To make matters worse, many organizations face the growing risk and burden of managing multiple identity and access controls without the required security intelligence to address those challenges. They need the ability to secure identity and access across the wide variety of enterprise and internet resources from any device, any service and any source. In this session, join IBM to review the emerging needs, the next generation access and identity management solutions available today to enable secure and rapid adoption of mobile, cloud, and social transformation.
  • Five Steps to an Effective Application Security Program Recorded: Apr 18 2013 48 mins
    Karl Snider Market Segment Manager, Application Security, IBM Security
    "Just tell me what I need to do”. That’s what we hear from Development teams as they tackle the challenge of Application Security. Unfortunately, there is no one-size-fits-all solution. In this presentation, we’ll take a pragmatic and prescriptive approach to the challenge, based on the experience of our clients. We present five key steps which will help you tackle application security without blowing your budget. This information can help you frame your application security program, and come up with an approach that is right for your organization.
  • Panel: Mobile Apps – The Danger of Making Security an Afterthought Recorded: Apr 17 2013 59 mins
    Benjamin Robbins, Palador (moderator); Diana Kelley, IBM; Brian Katz, Sanofi; David Rogers, Copper Horse Solutions Ltd
    The BYOD phenomenon has resulted in the need to accept personal mobile devices on corporate networks with the expected security risks. Join our panel of experts as they discuss the top of mind issues for security officers:

    - technical approaches to identifying security vulnerabilities
    - methods of embedding security into the application life cycle
    - research efforts to ensure application security technologies keep pace with latest threats and vulnerabilities
    - approaches for scaling testing across an enterprise

    The panel:

    Benjamin Robbins, Principal, Palador (moderator)
    Diana Kelley, Application Security Strategist, IBM
    Brian Katz, Director and Head of Mobility Engineering, Sanofi
    David Rogers, Founder, Copper Horse Solutions Ltd
Manage your business infrastructure and security in real time.
Engage with content that helps you optimize the value of your business infrastructures and technology assets enabling greater visibility, control and automation across end-to-end business operations.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Panel: Mobile Apps – The Danger of Making Security an Afterthought
  • Live at: Apr 17 2013 4:00 pm
  • Presented by: Benjamin Robbins, Palador (moderator); Diana Kelley, IBM; Brian Katz, Sanofi; David Rogers, Copper Horse Solutions Ltd
  • From:
Your email has been sent.
or close