Speaker Industry
SEC–1287: Finding the Needle in the Needle Stack: Why
Cognitive for Security
Sessions Security
Breakout Session
, 09:00 AM – 09:45 AM
Today's security professionals face a wide range of threats, from denial-of-service
attacks and ransomware to targeted attacks and good old social engineering (usually
combined). On the dark web, cybercriminals buy, sell and exchange threats and data at a
very fast pace. This changing threat landscape means Security Operations Center (SOC)
operators need to try and keep up with all that is happening in the cyber security
field—an impossible task! In this session, we will review the threats companies face
today, tour the dark web and see how they are bought and sold, and discuss how
cognitive solutions for security will aid SOC operators when it comes to facing a
potential threat.
SEC–1326: Collaboration Panel: How to Recruit 15,000
Security Peers to Help Thwart Attackers
24 October 2016

Etai Maor, IBM Not Industry Specific
https://www-01.ibm.com/events/global/wow/sessions/print/index.html
1 of 11 9/26/2016 12:37 PM
Speakers Industry
Sessions Security
Panel Discussion
, 01:00 PM – 01:45 PM
In an era of sophisticated attacks, acting as an island on lockdown will leave holes in
your defenses as your vendors, clients, and even your own employees can cause
inadvertent security incidents. Join this panel of experts to learn how collaborative
defense can improve your security posture while leveraging the expertise of over 15,000
of your peers and IBM Security experts. From higher-order threat intelligence to
actionable threat observables and crowd-sourced security apps, the IBM X-Force
Exchange and IBM Security App Exchange platforms are no-cost tools that can put the
expertise of the security market to work for your organization.
SEC–1421: The Value of Evolving to Cognitive Security: A
Panel Discussion
Sessions Security
Panel Discussion
, 10:00 AM – 10:45 AM
On the heels of IBM's recent Cognitive Security announcements, a research study on
cognitive security in the marketplace was conducted, surveying over 700 security
professionals globally. In this panel discussion, you'll hear insights from the authors of
this unprecedented study, including: cybersecurity issues that may be addressed
through cognitive security; readiness characteristics and prerequisites to adopt
cognitive security solutions; current and future cognitive security investment priorities;
and the value proposition associated with cognitive security, including quantitative and
24 October 2016

Chris Meenan, IBM Security
John Markott, Carbon Black
Paul Griswold, IBM
Not Industry Specific
24 October 2016

https://www-01.ibm.com/events/global/wow/sessions/print/index.html
2 of 11 9/26/2016 12:37 PM
Speakers Industry
qualitative benefits of adopting the next evolution in security capabilities.
Speakers Industry
SEC–1680: Cognitive, Cloud and Collaboration: Town
Hall Meeting with IBM Security Technical Leaders and
Watson
Sessions Security
Panel Discussion
, 11:00 AM – 11:45 AM
Join Sandy Bird, IBM Fellow and CTO of the IBM Security Business unit, who will host an
open town hall meeting and panel discussion with the technical leaders from IBM
Security and IBM Watson. The discussion will cover the powerful combination of IBM
Security and cognitive computing, along with cloud security, and how collaboration can
foster the exchange of information and improve the security of an organization. This
session will largely be an open Q&A, during which customers and partners can interact
directly with the technical experts on these topics or others of their choice.
Diana Kelley, IBM
Vijay Dheap, IBM
Carl Nordman, IBM
Mike Pinch, University of Rochester
Not Industry Specific
24 October 2016

Suzy Deffeyes, IBM
Jeb Linton, IBM
Vijay Dheap, IBM
William Bird, IBM
Not Industry Specific
https://www-01.ibm.com/events/global/wow/sessions/print/index.html
3 of 11 9/26/2016 12:37 PM
Speaker Industry
SEC–1682: Stay Ahead of the Threat with Cognitive
Security Intelligence
Sessions Security
Breakout Session
, 04:00 PM – 04:45 PM
Do you face a shortage of skilled security personnel? Does your security staff have
more work than it can complete on a typical day? If your answer to these questions is
yes, you are not alone. Fortunately, the combination of IBM Cognitive Computing and
Security Intelligence will be able to serve as an extension of your staff, and help work
down your backlog of security events and keep you ahead of the latest security threats.
Glad to answer any questions.
SEC–1683: Security Operations and Response: New
Techniques and Solutions for Responding to Security
Threats
Sessions Security
Breakout Session
, 02:00 PM – 02:45 PM
Does your Security Operations Center (SOC) face more work each day than it can ever
possibly complete? Do you feel like you are outnumbered by hackers, and that it is only
a matter of time before your organization is breached? Do you feel like you don't have
the time to take a security incident to closure, and resolve it so it does not happen again?
If you answered yes to any of these questions, attend this session. You will learn more
about new techniques and tools to help you collaborate with others to beat the hackers,
new automated solutions for reducing your security workload, and how to close the loop
24 October 2016

Jeb Linton, IBM Not Industry Specific
24 October 2016

https://www-01.ibm.com/events/global/wow/sessions/print/index.html
4 of 11 9/26/2016 12:37 PM
Speakers Industry
by responding to security incidents and taking them to closure.
Speaker Industry
SEC–1692: IBM Watson Threat Intelligence: Turning
Insight into Action
Sessions Security
Breakout Session
, 09:00 AM – 09:45 AM
New threat intelligence companies form daily. An average of 60,000 security blogs are
written each month. This huge volume of threat data is more than analysts and
responders have the capacity to review, and a significant challenge comes in distilling
the data into the context of how to protect your environment. This discussion will cover
the next generation of threat intelligence analysis, which will leverage the cognitive
computing powers of IBM Watson to accelerate today’s capabilities and turn insights into
actions.
SEC–1856: Cognitive Computing Offers New Cyber
Security Methods
Sessions Security
Breakout Session
Patrick Vandenberg, IBM
Ted Julian, IBM
Not Industry Specific
27 October 2016

Wendi Whitmore, IBM Not Industry Specific
https://www-01.ibm.com/events/global/wow/sessions/print/index.html
5 of 11 9/26/2016 12:37 PM
Speakers Industry
, 04:00 PM – 04:45 PM
Individuals, public and private organizations alike depend on the cyber world. From
citizens using social media, to banks growing their businesses, to law enforcement
supporting national security—every sector of society is increasingly dependent on
technology and networked systems. At the same time, the digital society contains
inherent vulnerabilities that may generate security risks to citizens, businesses or
society's vital functions. This talk explains how the scientific disciplines of AI and signal
processing of cognitive computing offer different tools, like machine learning, natural
language processing, vision, human-computer interaction, dialog and narrative
generation to solve the challenges of building cyber security capacity.
25 October 2016
Martti Lehto, University of Jyväskylä
Gregory Porpora, IBM
Information Technology
https://www-01.ibm.com/events/global/wow/sessions/print/index.html
6 of 11 9/26/2016 12:37 PM
Speakers Industry
SEC–2235: Big Data, Big Security Problems
Sessions Security
Hands-on Lab
, 09:00 AM – 11:30 AM
This year has seen a significant increase in the level of interest in the topic of security
and auditing for Hadoop and MongoDB. Hadoop and MongoDB vendors are responding
with better security features, and by partnering with the market-leading data security
and compliance solution for Hadoop and MongoDB, IBM Security Guardium provides
organizations the value of real-time monitoring, alerting, reports, compliance workflow,
and more for Hadoop and MongoDB. Get hands-on with Guardium and IBM BigInsights
for Apache Hadoop, and learn how to configure real-time alerts for suspicious behavior,
customize prebuilt reports, and use other Guardium features such as quick search and
compliance workflow.
SEC–2332: Strengthen Your Immune System with
Cognitive Analytics and Intelligent Integration
Sessions Security
Breakout Session
, 10:00 AM – 10:45 AM
While phishing, malware, distributed denial-of-service (DDoS) and other external threats
rightfully receive significant attention, they only represent one piece of the threat
equation. Insider threats are the other piece, and they can be equally damaging. In fact,
the 2015 Cyber Security Intelligence Index showed that more than half of data breaches
27 October 2016
TINA CHEN, IBM
Sundari VORUGANTI, IBM
Banking
26 October 2016

https://www-01.ibm.com/events/global/wow/sessions/print/index.html
7 of 11 9/26/2016 12:37 PM
Speakers Industry
are caused by insiders (employees, third-party contractors, partners). This talk will
discuss key insider threats affecting your sensitive data, and show you how a cognitive
and intelligently integrated security immune system can effectively defend against such
threats. Examples of security immune system technologies include: IBM Security
Guardium, Privileged Identity Manager and QRadar.
Speaker Industry
SEC–2338: iOS in the Enterprise
Sessions Security
Breakout Session
, 05:00 PM – 05:45 PM
iPhones and iPads are popular choices for BYOD and corporate-owned usage models.
Learn about the latest iOS advancements and experience how IBM, together with Apple,
delivers an enterprise-class solution for your business. Big changes have been made to
iOS to enable better management, collaboration and security. Join this session, in which
IBM reviews the most essential enhancements and how IBM MaaS360 enables your
organization to take advantage of all the new features.
SEC–2602: It Only Has to Happen Once: Protecting Your
Brand in the Digital Economy
Sessions Security
Walid Rjaibi, IBM
Patrick Vandenberg, IBM
Not Industry Specific
25 October 2016

Joshua Lambert, IBM Not Industry Specific
https://www-01.ibm.com/events/global/wow/sessions/print/index.html
8 of 11 9/26/2016 12:37 PM
Speakers Industry
Breakout Session
, 01:00 PM – 01:45 PM
One breach. One leak. One vulnerability. In the digital economy, it only takes one incident
to destroy your brand. To ensure every transaction, both internal and beyond
organizational boundaries, you require a comprehensive solution that stands up to the
demands of a digital business created by the growth of mobile, cloud and APIs.
Moreover, you have to provide this security confidently and cost-effectively across your
entire ecosystem to ensure brand integrity. Join IBM to discuss strategy and practice,
and learn how to apply enterprise-grade security to today's digital technologies—and
start sleeping better at night.
25 October 2016

Christopher Schmitt, IBM
Chris Collard, IBM
Not Industry Specific
https://www-01.ibm.com/events/global/wow/sessions/print/index.html
9 of 11 9/26/2016 12:37 PM
Speakers Industry
SEC–2945: Accelerate Your General Data Protection
Regulation (GDPR) Efforts with IBM Security Guardium
Sessions Security
Hands-on Lab
, 08:30 AM – 11:00 AM
The European Union (EU) General Data Protection Regulation (GDPR) goes into effect in
May 2018. Organizations worldwide are discovering it's not just EU businesses that are
impacted—it’s any business that holds personal data about EU residents! With that
realization, a lot of scrambling has begun. Join this hands-on lab to get more information
on the personal data-centric GDPR requirements and how IBM Security Guardium can
help you accelerate your efforts. Learn what you need to know to get started, including:
how to better get to know your (personal) data; how to configure an impact assessment
so you can help protect your Data Processors; and how to run compliance reports that
can help make the compliance process easier.
24 October 2016
Cindy Compert, IBM
VIKALP PALIWAL, IBM
Government
https://www-01.ibm.com/events/global/wow/sessions/print/index.html
10 of 11 9/26/2016 12:37 PM
Speaker Industry
SEC–3940: Stomp Out Insider Security Threats and
Fraud with User Behavior Analytics
Sessions Security
Theater Session
, 04:30 PM – 04:50 PM
This interactive theater session will describe how widespread insider security threats
and fraud are today, and how you can use a new app from IBM security to put a stop to
them.
24 October 2016
Roger J. Hellman, IBM Not Industry Specific
https://www-01.ibm.com/events/global/wow/sessions/print/index.html
11 of 11 9/26/2016 12:37 PM

World of Watson 2016 - Information Insecurity

  • 1.
    Speaker Industry SEC–1287: Findingthe Needle in the Needle Stack: Why Cognitive for Security Sessions Security Breakout Session , 09:00 AM – 09:45 AM Today's security professionals face a wide range of threats, from denial-of-service attacks and ransomware to targeted attacks and good old social engineering (usually combined). On the dark web, cybercriminals buy, sell and exchange threats and data at a very fast pace. This changing threat landscape means Security Operations Center (SOC) operators need to try and keep up with all that is happening in the cyber security field—an impossible task! In this session, we will review the threats companies face today, tour the dark web and see how they are bought and sold, and discuss how cognitive solutions for security will aid SOC operators when it comes to facing a potential threat. SEC–1326: Collaboration Panel: How to Recruit 15,000 Security Peers to Help Thwart Attackers 24 October 2016  Etai Maor, IBM Not Industry Specific https://www-01.ibm.com/events/global/wow/sessions/print/index.html 1 of 11 9/26/2016 12:37 PM
  • 2.
    Speakers Industry Sessions Security PanelDiscussion , 01:00 PM – 01:45 PM In an era of sophisticated attacks, acting as an island on lockdown will leave holes in your defenses as your vendors, clients, and even your own employees can cause inadvertent security incidents. Join this panel of experts to learn how collaborative defense can improve your security posture while leveraging the expertise of over 15,000 of your peers and IBM Security experts. From higher-order threat intelligence to actionable threat observables and crowd-sourced security apps, the IBM X-Force Exchange and IBM Security App Exchange platforms are no-cost tools that can put the expertise of the security market to work for your organization. SEC–1421: The Value of Evolving to Cognitive Security: A Panel Discussion Sessions Security Panel Discussion , 10:00 AM – 10:45 AM On the heels of IBM's recent Cognitive Security announcements, a research study on cognitive security in the marketplace was conducted, surveying over 700 security professionals globally. In this panel discussion, you'll hear insights from the authors of this unprecedented study, including: cybersecurity issues that may be addressed through cognitive security; readiness characteristics and prerequisites to adopt cognitive security solutions; current and future cognitive security investment priorities; and the value proposition associated with cognitive security, including quantitative and 24 October 2016  Chris Meenan, IBM Security John Markott, Carbon Black Paul Griswold, IBM Not Industry Specific 24 October 2016  https://www-01.ibm.com/events/global/wow/sessions/print/index.html 2 of 11 9/26/2016 12:37 PM
  • 3.
    Speakers Industry qualitative benefitsof adopting the next evolution in security capabilities. Speakers Industry SEC–1680: Cognitive, Cloud and Collaboration: Town Hall Meeting with IBM Security Technical Leaders and Watson Sessions Security Panel Discussion , 11:00 AM – 11:45 AM Join Sandy Bird, IBM Fellow and CTO of the IBM Security Business unit, who will host an open town hall meeting and panel discussion with the technical leaders from IBM Security and IBM Watson. The discussion will cover the powerful combination of IBM Security and cognitive computing, along with cloud security, and how collaboration can foster the exchange of information and improve the security of an organization. This session will largely be an open Q&A, during which customers and partners can interact directly with the technical experts on these topics or others of their choice. Diana Kelley, IBM Vijay Dheap, IBM Carl Nordman, IBM Mike Pinch, University of Rochester Not Industry Specific 24 October 2016  Suzy Deffeyes, IBM Jeb Linton, IBM Vijay Dheap, IBM William Bird, IBM Not Industry Specific https://www-01.ibm.com/events/global/wow/sessions/print/index.html 3 of 11 9/26/2016 12:37 PM
  • 4.
    Speaker Industry SEC–1682: StayAhead of the Threat with Cognitive Security Intelligence Sessions Security Breakout Session , 04:00 PM – 04:45 PM Do you face a shortage of skilled security personnel? Does your security staff have more work than it can complete on a typical day? If your answer to these questions is yes, you are not alone. Fortunately, the combination of IBM Cognitive Computing and Security Intelligence will be able to serve as an extension of your staff, and help work down your backlog of security events and keep you ahead of the latest security threats. Glad to answer any questions. SEC–1683: Security Operations and Response: New Techniques and Solutions for Responding to Security Threats Sessions Security Breakout Session , 02:00 PM – 02:45 PM Does your Security Operations Center (SOC) face more work each day than it can ever possibly complete? Do you feel like you are outnumbered by hackers, and that it is only a matter of time before your organization is breached? Do you feel like you don't have the time to take a security incident to closure, and resolve it so it does not happen again? If you answered yes to any of these questions, attend this session. You will learn more about new techniques and tools to help you collaborate with others to beat the hackers, new automated solutions for reducing your security workload, and how to close the loop 24 October 2016  Jeb Linton, IBM Not Industry Specific 24 October 2016  https://www-01.ibm.com/events/global/wow/sessions/print/index.html 4 of 11 9/26/2016 12:37 PM
  • 5.
    Speakers Industry by respondingto security incidents and taking them to closure. Speaker Industry SEC–1692: IBM Watson Threat Intelligence: Turning Insight into Action Sessions Security Breakout Session , 09:00 AM – 09:45 AM New threat intelligence companies form daily. An average of 60,000 security blogs are written each month. This huge volume of threat data is more than analysts and responders have the capacity to review, and a significant challenge comes in distilling the data into the context of how to protect your environment. This discussion will cover the next generation of threat intelligence analysis, which will leverage the cognitive computing powers of IBM Watson to accelerate today’s capabilities and turn insights into actions. SEC–1856: Cognitive Computing Offers New Cyber Security Methods Sessions Security Breakout Session Patrick Vandenberg, IBM Ted Julian, IBM Not Industry Specific 27 October 2016  Wendi Whitmore, IBM Not Industry Specific https://www-01.ibm.com/events/global/wow/sessions/print/index.html 5 of 11 9/26/2016 12:37 PM
  • 6.
    Speakers Industry , 04:00PM – 04:45 PM Individuals, public and private organizations alike depend on the cyber world. From citizens using social media, to banks growing their businesses, to law enforcement supporting national security—every sector of society is increasingly dependent on technology and networked systems. At the same time, the digital society contains inherent vulnerabilities that may generate security risks to citizens, businesses or society's vital functions. This talk explains how the scientific disciplines of AI and signal processing of cognitive computing offer different tools, like machine learning, natural language processing, vision, human-computer interaction, dialog and narrative generation to solve the challenges of building cyber security capacity. 25 October 2016 Martti Lehto, University of Jyväskylä Gregory Porpora, IBM Information Technology https://www-01.ibm.com/events/global/wow/sessions/print/index.html 6 of 11 9/26/2016 12:37 PM
  • 7.
    Speakers Industry SEC–2235: BigData, Big Security Problems Sessions Security Hands-on Lab , 09:00 AM – 11:30 AM This year has seen a significant increase in the level of interest in the topic of security and auditing for Hadoop and MongoDB. Hadoop and MongoDB vendors are responding with better security features, and by partnering with the market-leading data security and compliance solution for Hadoop and MongoDB, IBM Security Guardium provides organizations the value of real-time monitoring, alerting, reports, compliance workflow, and more for Hadoop and MongoDB. Get hands-on with Guardium and IBM BigInsights for Apache Hadoop, and learn how to configure real-time alerts for suspicious behavior, customize prebuilt reports, and use other Guardium features such as quick search and compliance workflow. SEC–2332: Strengthen Your Immune System with Cognitive Analytics and Intelligent Integration Sessions Security Breakout Session , 10:00 AM – 10:45 AM While phishing, malware, distributed denial-of-service (DDoS) and other external threats rightfully receive significant attention, they only represent one piece of the threat equation. Insider threats are the other piece, and they can be equally damaging. In fact, the 2015 Cyber Security Intelligence Index showed that more than half of data breaches 27 October 2016 TINA CHEN, IBM Sundari VORUGANTI, IBM Banking 26 October 2016  https://www-01.ibm.com/events/global/wow/sessions/print/index.html 7 of 11 9/26/2016 12:37 PM
  • 8.
    Speakers Industry are causedby insiders (employees, third-party contractors, partners). This talk will discuss key insider threats affecting your sensitive data, and show you how a cognitive and intelligently integrated security immune system can effectively defend against such threats. Examples of security immune system technologies include: IBM Security Guardium, Privileged Identity Manager and QRadar. Speaker Industry SEC–2338: iOS in the Enterprise Sessions Security Breakout Session , 05:00 PM – 05:45 PM iPhones and iPads are popular choices for BYOD and corporate-owned usage models. Learn about the latest iOS advancements and experience how IBM, together with Apple, delivers an enterprise-class solution for your business. Big changes have been made to iOS to enable better management, collaboration and security. Join this session, in which IBM reviews the most essential enhancements and how IBM MaaS360 enables your organization to take advantage of all the new features. SEC–2602: It Only Has to Happen Once: Protecting Your Brand in the Digital Economy Sessions Security Walid Rjaibi, IBM Patrick Vandenberg, IBM Not Industry Specific 25 October 2016  Joshua Lambert, IBM Not Industry Specific https://www-01.ibm.com/events/global/wow/sessions/print/index.html 8 of 11 9/26/2016 12:37 PM
  • 9.
    Speakers Industry Breakout Session ,01:00 PM – 01:45 PM One breach. One leak. One vulnerability. In the digital economy, it only takes one incident to destroy your brand. To ensure every transaction, both internal and beyond organizational boundaries, you require a comprehensive solution that stands up to the demands of a digital business created by the growth of mobile, cloud and APIs. Moreover, you have to provide this security confidently and cost-effectively across your entire ecosystem to ensure brand integrity. Join IBM to discuss strategy and practice, and learn how to apply enterprise-grade security to today's digital technologies—and start sleeping better at night. 25 October 2016  Christopher Schmitt, IBM Chris Collard, IBM Not Industry Specific https://www-01.ibm.com/events/global/wow/sessions/print/index.html 9 of 11 9/26/2016 12:37 PM
  • 10.
    Speakers Industry SEC–2945: AccelerateYour General Data Protection Regulation (GDPR) Efforts with IBM Security Guardium Sessions Security Hands-on Lab , 08:30 AM – 11:00 AM The European Union (EU) General Data Protection Regulation (GDPR) goes into effect in May 2018. Organizations worldwide are discovering it's not just EU businesses that are impacted—it’s any business that holds personal data about EU residents! With that realization, a lot of scrambling has begun. Join this hands-on lab to get more information on the personal data-centric GDPR requirements and how IBM Security Guardium can help you accelerate your efforts. Learn what you need to know to get started, including: how to better get to know your (personal) data; how to configure an impact assessment so you can help protect your Data Processors; and how to run compliance reports that can help make the compliance process easier. 24 October 2016 Cindy Compert, IBM VIKALP PALIWAL, IBM Government https://www-01.ibm.com/events/global/wow/sessions/print/index.html 10 of 11 9/26/2016 12:37 PM
  • 11.
    Speaker Industry SEC–3940: StompOut Insider Security Threats and Fraud with User Behavior Analytics Sessions Security Theater Session , 04:30 PM – 04:50 PM This interactive theater session will describe how widespread insider security threats and fraud are today, and how you can use a new app from IBM security to put a stop to them. 24 October 2016 Roger J. Hellman, IBM Not Industry Specific https://www-01.ibm.com/events/global/wow/sessions/print/index.html 11 of 11 9/26/2016 12:37 PM