Search for tag: "cyber security"

CISO: knows the importance of cyber-resilience_FR

Discover how you make cyber-security and disaster recovery solutions perform even better for you.

From  310001BB3W 310001BB3W on November 8th, 2019 0 plays

CISO: knows the importance of cyber-resilience_EN

Discover how you make cyber-security and disaster recovery solutions perform even better for you.

From  310001BB3W 310001BB3W on November 8th, 2019 0 plays

COO: links strategy to execution to achieve results_FR

Discover how to protect applications and data from cyber attacks.

From  310001BB3W 310001BB3W on November 8th, 2019 0 plays

COO: links strategy to execution to achieve results_EN

Discover how to protect applications and data from cyber attacks.

From  310001BB3W 310001BB3W on November 8th, 2019 0 plays

IBM QRadar The Intelligent SIEM COES

La plataforma inteligente de seguridad de IBM QRadar

From  550004MX5G 550004MX5G on May 7th, 2019 19 plays

IBM Security Connect Threat Ops Solution

Threat Ops Solution on IBM Security Connect empowers cybersecurity analysts to identify, investigate and respond to critical cyber threats from a unified, cloud-based solution. For more information…

From  50QHPYU842 50QHPYU842 on April 9th, 2019 24 plays

Santander Bank expands digital customer protection using IBM Trusteer

Oscar Flores, of Santander Bank Mexico, tells how IBM Trusteer is helping identify and manage fraud risk for their digital banking customers including through behavioral biometrics and expansion to…

From  50QHPYU842 50QHPYU842 on April 5th, 2019 18 plays

MITRE ATT&CK Support for Resilient

This video is a demonstration of how you can use Resilient functions to retrieve tactic and technique information from the MITRE ATT&CK(tm) Matrix for Enterprise knowledge base, based on id or…

From  3100004906 3100004906 on March 28th, 2019 51 plays

La ciberseguridad como habilitador del negocio - Cloud en 30

La ciberseguridad no es un blocker en los negocios, sino que puede funcionar como un habilitador. Acompaña a Roque Juárez, especialista de IBM Security, a descubrir cómo la…

From  50QHPYU842 50QHPYU842 on March 12th, 2019 54 plays

IBM Security -- Protecting the Faces Behind the Data

It is not just data that needs to be protected. People are the data.

From  50QHPYU842 50QHPYU842 on January 25th, 2019 16 plays

First Look: Building the X-Force Command Cyber Tactical Operations Center

The X-Force Command Cyber Tactical Operations Center, or CTOC, is a first-of-its-kind cyber experience on wheels. IBM Security worked with the crew at Featherlite to build this 23-ton trailer, which…

From  0600009K90 0600009K90 on December 11th, 2018 24 plays

Threat Hunting in Action_ SANS 2018 Survey Results_ Part II

Cyber threat hunting, once the job of only highly trained specialists, is maturing and growing more operationalized. While cyber threat hunting will always require the knowledge, critical thinking…

From  50QHPYU842 50QHPYU842 on December 5th, 2018 46 plays

Threat Hunting Is a Process_ Not a Thing_ SANS 2018 Survey Results_ Part I

How are organizations preparing their environments for hunting? How are they accessing their critical data needed in a hunt? And how are they using the threat and operational data uncovered during…

From  50QHPYU842 50QHPYU842 on December 5th, 2018 60 plays

Every Second Counts: Rapid Recovery for Finance

Business disruption due to a cyberattack can have a devastating impact on an organization. Such disruptions at financial services companies can have a wider impact, extending to the broader economy.…

From  0600009K90 0600009K90 on October 19th, 2018 59 plays

Step up to Security-as-a-Service Era with IBM QRadar on Cloud

With a limited Security team, organizations are struggling to fight against increasing Cyber Threats, meet compliance reporting and keep a check on infrastructure to replace aging solutions. They are…

From  50QKF2525J 50QKF2525J on August 21st, 2017 196 plays