So let's say you've made some Bold Moves in protecting the security of the enterprise. But are your moves bold enough to keep out the hackers? In the world of IT security, attackers are highly organized and using increasingly sophisticated methods to gain entry to your most sensitive data. At the same time, cloud and mobile are eliminating the concept of the "perimeter." Learn how today's CISO is building a more secure enterprises using analytics, asset-based protection and activity monitoring to protect the crown jewels of the organization. You'll also learn how you can make your attackers' bold moves go... POOF!
Speakers: Brendan Hannigan, IBM Deb Dixson, Delhaize Americas