We are just a few weeks away from the premier deep-dive on-line event for customers and partners of IBM Security’s cyber solutions – the IBM Security Virtual Master Skills University.
Thousands of your cyber professional peers have already signed up to learn how to get even more out of our industry-leading solutions, and we’d love you to join us as well.
New for 2021, all VMSU tracks are designed around roles, so you can build your skills with an even better understanding of how they align with your day-to-day work. Take a look at these tracks, and register today
1. Access Management Operations and Administration (Formerly the Verify Access track)
Master Skills University Tracks:
Attend this track if you're responsible for Verify Access infrastructure (keeping the product running), authentication, authorization, single sign on, MFA, API Protection, web proxy services, risk-based access control, or other access management capabilities.2. *Data Security Analytics (New Track for 2021)
Learn how to modernize your approach to data security analytics, leverage Guardium Analytics for threat detection and mitigation, reduce false positives and alert fatigue, operationalize Guardium through policy enforcement, and more in this brand-new track.
Attend this track if you're responsible for security and analytics, specifically analyzing the risk level of a threat.3. Data Security Operations and Compliance (Formerly the Guardium track)
In this track, you'll learn how to modernize your approach to data security, evolve to a more flexible and sustainable architecture, and simplify processes to meet audit and compliance controls. Plus, you'll take a deep dive into best practices for Guardium deployment, operationalization, management, and more.
Attend this track if you're responsible for Guardium infrastructure (keeping the product running), compliance, and audit.4. Identity Management (Formerly the Verify Governance track)
In this track, you'll learn how to innovate and modernize your approach to Identity Management through deep-dive sessions on solving governance needs with Verify Governance, Identity Manager, identity management of on-prem LDAP/AD directories, privileged access management, preventing ransomware attacks with IBM Security Verify Privilege Manager, IBM Security Verify Privilege use cases for Zero Trust, and more.
Attend this track if you're responsible for Verify Governance, Verify Governance Identity Manager, Verify Privilege, User Lifecycle Management, Provisioning policies, RBAC, ABAC, SoD, Access Reviews, and identity governance. 5. Incident Investigation, Threat Hunting, Response, and Orchestration (This track merges the former QRadar Advanced, Resilient, and Cloud Pak for Security tracks)
In this track, you'll learn how to modernize your approach to SOAR and investigate incidents with ease and efficiency through deep-dives into discovery and identification, enrichment, containment and remediation, recovery and communication, and more.
Attend this track if you're responsible for SOAR, Resilient, Cloud Pak for Security including DE, TII and Threat Investigator products, including operations and administration roles.6. Threat Detection, Advanced Searching, Network & Behavior Analytics (This track merges the former QRadar Advanced and QRadar Basic tracks)
Kick your threat detection skills up to the next level in this track that focuses on advanced techniques for detecting network-based threats, creating superior searching and dashboards, and improving detection of complex threats. You'll also learn advanced troubleshooting tips and tricks and see what's ahead with a review of the IBM Security SOAR roadmap.
Attend this track if you're responsible for QRadar, UBA and NDR, including operations and administration roles.7. *Zero Trust Practitioner (New track for 2021)
Zero Trust is more than just a buzzword - it's a critical framework to ensure that every user and every device is wrapped in security. In this new track, you'll learn how to define a Zero Trust strategy, architecture, and governance board. You'll also explore Zero Trust use cases like securing the remote workforce, protecting the hybrid cloud, preserving customer privacy, reducing the risk of insider threat, and more - all delivered through interactive workshops.
Attend this track if you're responsible for designing a Zero Trust framework, architecture, and strategy.
We look forward to seeing you in September!