IBM TechXChange 2023 Security Sessions

IBM TechXChange 2023 Security Sessions

  1. A Customer Perspective for Mainframe Security with zSecure by Don Chinnis Julie Bergh
  2. A Deep Dive into IBM QRadar Suite with Custom Federated Search Connectors by Md Saroer-E Azam Danny Elliott
  3. Advance Your Threat Detection with QRadar's NTA/NDR by Ray Menard Jerry Frady
  4. A Knight's Journey: A retrospective look at dataset encryption by Phil Allison Joshua Klahn
  5. All-In-One Verify Solution to Replace SiteMinder, RSA to Secure Billion Dollar Business Acquisition by Lizzy Forward Rama Yenumula
  6. API Automation with IBM Security Verify by Ben Foulkes Vivek Shankar
  7. Ask the Experts Access Management by Philip Nye Carl Hovi
  8. Automated Vulnerability Assessments with Guardium: Secure Your IT Environment by Ken Anderson
  9. Battling CyberCrime: Unraveling the Long-Term Fight Against Phishing with IBM Security by Iosif-Viorel (Vio) Onut, Ph.D. Guy Jourdan Chenta Lee
  10. Build an MFA solution in an OpenShift container environment using Verify operators by Alex Kemenov Philip Nye
  11. Building a PAM Vault in Just 90 Minutes: A Hands-On Guide by Bosko Popovic Andy Crandall
  12. Building Custom Integrations on IBM SOAR: A Deep Dive into App Host by Bo Bleckel
  13. Building Cyber Defense Capabilities: The uOttawa-IBM Cyber Range Initiative by Iosif-Viorel (Vio) Onut, Ph.D. Guy Jourdan
  14. Combating Large-Scale Identity-Based Attacks: Strategies and Insights by Jose Rodriguez
  15. Combatting Fraud with Trustboard: Offline & Real-Time Strategies by Shachar Tal
  16. Data Intelligence Revolution for Enhanced Security, Privacy, and Compliance by Ashish J. Pirabu Pathmasenan
  17. Data Security's Next Frontier: Elevating Guardium Data Protection with Insights by Matt Simons, CIPP/US, CIPM
  18. Decoding the AppHost: Anatomy, Configuration & Troubleshooting by Andrew Campagna
  19. Deliver Frictionless Consumer IAM Experiences with IBM Security Verify SaaS by Milan Saumil Patel Vivek Shankar
  20. Digital Wallet and P2P Fraud: A Zelle Case Study by Shachar Tal
  21. Enhance Your Security: Transitioning from Managed SOC Services to IBM Security QRadar SOAR by Gerald Trotman Jim Funderwhite Rick Johnston
  22. Enhance Your Threat Hunting: A Practical Guide with Kestrel by Sulakshan Vajipayajula
  23. Enhancing Log Management with Rsyslog: A QRadar Integration by Mark Walborn Jack Radigan
  24. Enhancing Security with Privileged Deployment Architectures: A Deep Dive into Verify Privilege Vault by Andy Crandall
  25. Enhancing Your IBM Cloud Pak for Security: Maintenance, Troubleshooting, and Best Practices by Eddie Melendez
  26. Ensure Better Security with QRadar SIEM & NDR: Advanced Tuning Guide - by Sterling Jones Colin Hay
  27. Ensuring Secure and Compliant Cloud Migration and Repatriation by Devan Shah Hector Hernandez Andrey Smolenko
  28. Expert Panel on Qradar SIEM, NDR & UBA: Get Your Questions Answered by Jerry Frady Ray Menard
  29. Explore Guardium Insights & GI SaaS: Your Path to Data Security & Compliance by Matt Simons, CIPP/US, CIPM Guy Shanny
  30. Exploring the Future: IBM's QRadar Portfolio Roadmap by Sterling Jones Chaitanya Challa
  31. Fine-Tuning IBM QRadar for Improved Performance and Efficiency by Brian White Vladimir Jeremic
  32. From resistance to resilience - How we implemented an automation solution to deploy 1000 agents by Klaubert Herr Caio Rodrigues Alves
  33. Future-Proofing zSecurity: Staying Ahead in the Ever-Changing Landscape Marco Cruz-Martinez Randy Young
  34. Guardium Success Stories: A Data Security Panel with Q&A by David Rozenblat Roey Yaacovi POB OBrien (Huntington Bank)
  35. Identity Governance and Administration from Verify SaaS by Dinesh Jain Alex Kemenov
  36. Identity Governance and Administration Experts Panel by Dinesh Jain Tony Vaccariello Corey William Jaak Hickey Timothy G Majerus
  37. Identity Manager Deployed within 90 minutes with Containerization by Tony Vaccariello Corey Williams
  38. Infuse AI into Data Security by Devan Shah
  39. Join the Treasure Hunt! A Challenge to Test Your Guardium Data Protection Skills by Ken Anderson
  40. Let's Explore Adversarial AI: The Rise of Deceptive Chatbots and Deep Fakes by Jeff Crume, PhD, CISSP
  41. Leverage AI and Kestrel for Enhanced Lateral Movement Detection by Sulakshan Vajipayajula Leila Rashidi
  42. Leveraging Real-Time Fraud Detection Across Digital Channels by Ile Ristov Milcho Hristoski
  43. MALECIC’23: Machine Learning Challenges in Cybersecurity – A Comprehensive Workshop by Nuno Moniz Paula Branco Guy-Vincent Jourdan
  44. Managing Mobile Endpoints with MaaS360: Deployment and Threat Defense by Colin S. MaryKate O'Neill
  45. Mastering Guardium: Essential Tips & Tactics by David Rozenblat Roman Katsnelson
  46. Mastering Guardium Insights: Your Guide to Seamless Data Security Deployment & Management by Matt Simons, CIPP/US, CIPM Tim Tait
  47. Mastering Threat Hunting: Strategies, Modeling, and Modern Practices by Peter Szczepankiewicz
  48. Maximizing Device Management: Enterprise Solutions & BYOD with MaaS360 by MaryKate O'Neill
  49. Modernize Legacy Applications with the Application Gateway by Alex Kemenov Carl Hovi
  50. Modernize your identity governance for legacy and cloud applications with IBM Security Verify by Dinesh Jain
  51. Modernizing Identity and Access Management in Healthcare by Bhanu Voocha (Thomas Jefferson University) , Srini Avula (Jefferson) Milan Saumil Patel
  52. Navigating Advanced API Protection in Open Banking: A Hands-On Lab by Vivek Shankar Alex Kemenov
  53. Optimizing IBM Security Guardium S-TAP for z/OS: Guardium Tech Talk and Best Practices by Chris Born Ronald Aguirre Joshua Klahn
  54. Privileged Access Management Roundtable by James Horst Nellie Osian Andy Crandall
  55. Promoting Data Security in AWS with IBM: A Comprehensive Workshop by Ken Anderson Senthil Nagaraj (Amazon)
  56. Protecting highly sensitive health information using IBM Security Verify SaaS by Marcelo Oks
  57. QRadar & Cloud Integration: A Comprehensive Deep Dive into Scalable Data Consumption by Jerry Frady Chaitanya Challa
  58. Quantum-Proof Your Software: A Real-World Case Study on IBM Db2 by Andriy Miranskyy Walid Rjaibi, PhD, CISSP
  59. Reimagining Legacy Apps: Modern Access through Application Gateway by Philip Nye Jose Rodriguez
  60. Risk Based Authentication Powered by Trusteer Delivered by Verify by Carl Hovi Shachar Tal
  61. Safeguard the crown jewels using encryption key management for data security by Ken Anderson
  62. Secure Your Critical Data with Guardium: Evaluating and Detecting Untrusted Application Connections by Pirabu Pathmasenan Raki Robert
  63. Securing the Future: Data Protection in the Hybrid Cloud Era by Devan Shah
  64. Securing the Open-X World: OAuth & API Protection with IBM Security Verify by Vivek Shankar
  65. Securing Your Cloud Database: End-to-End Data Activity Monitoring with Guardium by Tim Tait Devan Shah
  66. Strengthening Security with Guardium Data Protection Analytics & Risk Spotter by Ken Anderson
  67. Supercharge Threat Management with Unified Analyst Experience (UAX) by Chaitanya Challa
  68. The future is Passwordless with Fido and Passkeys by Philip Nye
  69. Transformative Data Security in Hybrid Cloud Environments: A Shift-Left Strategy by Tony Zirnoon, CISSP Devin Shirley, C-CISO, CISSP, CRISC Ronak Patel
  70. Unifying Security: Advantages of a Common MFA Architecture Across IBM Mainframe, Midrange, and Distributed Systems by Lizzy Forward Jared Hunter Hrithik Govardan (Rocket software)
  71. Unifying Security: IBM's QRadar Vision for a Safer Future by Ray Menard
  72. Unleashing Agentless Database Monitoring: A Lab Guide to Universal Connectors with Guardium by Polly Lau
  73. Unlock the Power of Kubernetes Operators with IBM Security Verify by Philip Nye Jose Rodriguez
  74. Unveiling Guardium: Key Tips, Tricks, and Best Practices by Courtney Dunn Amy Wong
  75. Verify Access and SaaS Strategic Vision and Roadmap by Philip Nye Milan Saumil Patel
  76. Verify Governance and SaaS Strategic Vision and Roadmap by Dinesh Jain
  77. What's New - Recently released Feature and Functionality by Chaitanya Challa
  78. Zero Trust: Unveiling the Foundational Role of Data Security in your Maturity Journey by Ashish J.







To view or add a comment, sign in

More articles by Narayana M.

  • Reflection 2022

    2022 has been another special year for me as I have changed gears and transitioned into a technical specialist role…

  • GRATITUDE

    paropakāra vissmritir na yujyatae manāgapapakriyā tu tat kritā tadaiva vissmritā varāi The meaning of this ancient…

    10 Comments
  • 2021 Reflections

    2021 has been an awesome year for me. Winning IBM Call for Code 2021 globally is my best achievement till date.

    5 Comments
  • 2020 Year in Review

    2020 has been a challenging year for everyone but the pandemic did drive digital transformation and virtual…

    3 Comments
  • Cloud Application Poster Design Hackathon for Year 5 Students

    IBM's Blue Day Out gives all employees the chance to spend a day volunteering at a charity or organisation. As part of…

Others also viewed

Explore content categories