This page is fully or partially automatically translated.

Header of IBM
  • Kongress
  • Congress I
  • Cloud Security
  • Data security / DLP / Know-how protection
  • Governance, Riskmanagement & Compliance
  • Identity and access management
  • Industry 4.0 / IoT / Edge Computing
  • Managed Security Services / Hosting
  • SIEM / Threat Analytics / SOC
  • Trend topic

Management and consolidation of complex security infrastructures

Learn how consolidation and automation help solve the challenges of managing complex security systems.

10/7/2020 1:00:00 PM – 10/7/2020 4:00:00 PM

Please log in or register in advance so that you can take part in actions or watch videos about the action!

This action is available to the it-sa 365 community as a video.

Header of IBM
  • Kongress
  • Congress I

Learn how consolidation and automation help solve the challenges of managing complex security systems.

Language: German

Questions and Answers: No

graphical blue background

This video is available to the it-sa 365 community. Please register or log in with your login data.

Action description

Digital transformation and the associated use of cloud technologies is probably the greatest challenge for IT security at present. When companies move their business processes to the cloud, data is fragmented between individual sites and multiple cloud ecosystems. In order to gain an overview of the risks and threats in such infrastructures, many companies have started to use new, specialized tools. In addition, distributed services lead to an explosion of security data that must be evaluated to identify and analyze threats and risks. These requirements result in an increasingly complex security infrastructure. A study conducted by Forrester Consulting on behalf of IBM found that 91 percent of organizations are struggling with this increasing complexity. The latest "Cost of a Data Breach Report" even identifies complexity of the security infrastructure as the biggest cost driver in the event of a data breach. Small and medium-sized organizations in particular are also suffering from the increasing lack of IT security specialists to drive the necessary consolidation and modernization of their security infrastructure. Our congress deals with topics, technologies and solutions that help companies manage increasing complexity, minimize cyber risks and automate security analyses. Get inspired by the presentations of our employees and business partners. // AGENDA // 11:00 - 11:20 Insights on cyber attacks, Methods, motivation and effective countermeasures using the example of Emotet / Ashkan Vila, IBM Security Analyst // 11:20-11:40 Advanced Cyber Defense. / Siegfried Schauer, Cyber Security Evangelist T-Systems Austria GesmbH // 11:40-12:00 Security Operations Center - suitable for medium-sized businesses yes or no? / Michael Ganzhorn, Product Manager Security Operations Center, SVA // 12:00-12:20 From Hacking to Security Strategy. / Stefan Toedling, Co Founder & Business Development, BPN // 12:20-12:40 Cyber Resiliency - The essential link between security & IT continuity. / Dominik Bredel, Senior Consultant, IBM Services / Alexander Ziegler, IT Consultant, IBM Services // 12:40 - 13:00 Privileged Access Management in the Company - Security base or luxury equipment?" / Johannes Hauer, senior consultant, iC Consult GmbH // 13:00 - 13:20 Cybersecurity in production - What are the most important steps in the implementation. / Marcel Kisch, IBM OT Security Leader, EMEA // 13:20 - 13:40 Defence in Depth in practice: Monitoring of production IT and its use in SIEM. / Dr. Frank Stummer, Business Development, Rhebo GmbH // 13:40 - 14:00 It's all about seconds - we give you hours Full Managed Cyber Security Alarm System / Chris Berger, Strategic Sales Consultant, UMB AG Switzerland // The presentations of the lectures, relevant studies and further material are available under the following link:

read more




This action is part of the event Launch Days