Loading...

Keynote: Intelligent Security in a Post-Perimeter World - Pulse 2014

648 views

Loading...

Loading...

Transcript

The interactive transcript could not be loaded.

Loading...

Loading...

Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Feb 25, 2014

http://ibm.com/pulse

So let's say you've made some Bold Moves in protecting the security of the enterprise. But are your moves bold enough to keep out the hackers? In the world of IT security, attackers are highly organized and using increasingly sophisticated methods to gain entry to your most sensitive data. At the same time, cloud and mobile are eliminating the concept of the "perimeter." Learn how today's CISO is building a more secure enterprises using analytics, asset-based protection and activity monitoring to protect the crown jewels of the organization. You'll also learn how you can make your attackers' bold moves go... POOF!

Speakers:
Brendan Hannigan, IBM
Deb Dixson, Delhaize Americas

Loading...

When autoplay is enabled, a suggested video will automatically play next.

Up next


to add this to Watch Later

Add to

Loading playlists...