Lab Title |
Abstract |
Next Generation Data Intelligence to Support Security, Privacy and Compliance |
Is your organization challenged with understanding where all personal and sensitive data resides? Have you invested in products like SIEM, SOAR, DLP, but haven’t realized the full ROI? Then this hands-on lab session is your answer! In this lab you will get hands-on experience with our next-gen approach to data discovery, classification and cataloguing by leveraging IBM Security Discover & Classify, to support all your security, privacy, and compliance initiatives. You will learn how to leverage our AI infused engine to discover and classify data (structured and unstructured) through our data-at-rest and data-in-motion scanning techniques and how to automatically build a catalogue by business context. Also, learn how to integrate solution with other security, privacy, and compliance tools. |
Governing on-premise and Cloud Identities from IBM Security Verify SaaS |
Join this hands-on lab to govern identities from on-premise and cloud applications using IBM Security Verify SaaS. During this hands on lab you will onboard a set of on-premise and cloud apps to manage their accounts and fine-grain entitlements with the help several out-of-the-box features from Verify SaaS, such as -
- Request based access
- Account synchronization
- Approval workflows for fine grain entitlements
- Role based access control
- Dynamic Roles for attribute based access control
- Access Certification
- Reporting
|
Event Processing made easy |
IBM Event Automation introduces an exciting new capability for unlocking the value of events: Event Processing. In this Lab, you will get hands-on with this new technology. We will set up a variety of Kafka topics with streams of events flowing to them, and show you how to use the low-code authoring canvas to define event processing flows. You’ll run your event processing flows and see the results directly in the low-code canvas. Then you’ll export the generated SQL and try running that yourself as a production job in Apache Flink. The Lab will show you how easy it is to start processing events on your Kafka topics. |
Cloud Pak deployment on premises from scratch - Guardium Insights case |
Full-day session including:
- the process of installing OpenShift in a bar-metal environment
- configuration of the storage option (rook-ceph)
- CPFS deployment
- IdP configurations for Guardium Inisghts
- Guardium Insights deployment
- initial services configuration
Maximum of 20 people, in case of a larger group, it is necessary to extend care on the group by an additional person Training fully ready, tested several times in battle, full set of training materials available
|
Leverage Guardium to Evaluate and detect untrusted application connections to your Crown Jewels! |
The real time trust evaluator (RTTE) capability within Guardium Data Protection helps clients evaluate and detect application connections on their data, and helps them classify them as trusted or untrusted. This will help users optimize their data security policies and get better insights into threats on their data from unwanted connections. The lab will will help attendees have an opportunity to learn and experience IBM Security Guardium Data Protection's Real Time Trust Evaluator (RTTE) capability. It will showcase the benefits of the RTTE capability, how it evaluates application connections on data, and learn the types of untrusted connections it detects. This will help data security teams leverage this capability to improve on data security policies. |
"Data Security in the Hybrid Cloud Age" |
Expansion into Cloud has accelerated over the past 3 to 5 years, not only single cloud but also multi cloud and on top of that on-prem still continues. With the data being across cloud and on-prem, this is where providing data security across hybrid cloud is critical to be able to protect databases on cloud (DBaaS, PaaS, IaaS) and on-prem databases. In this lab we will get hands on experience on how to connect cloud database and on-prem database together into a single platform which can be used to monitor, and protected the database. |
"Hands On Lab: Agentless Database Monitoring with Universal Connectors" |
Are you expanding your Guardium environment to monitor more new or cloud data sources? The Guardium Universal Connector creates an flexible, robust mechanism to add potentially any new hybrid-cloud or onprem data sources to Guardium Data Protection or Guardium Insights. In this lab, you can explore how to monitor a new datasource with the use of Universal Connector into Guardium, for centralized policy enforcement, threat analytics, reporting and audits. |
"Hands On Lab: Monitoring Cloud Datasources with Guardium Data Protection External Tap" |
You have data in the cloud. As data volume continues to grow—and malicious actors continue to try to infiltrate your cloud environment—it is critical that the sensitive data stored across your data sources is understood, protected, and continuously monitored with audit trail. In this session, you will learn about the solutions behind the “modern data security” buzzword: how Guardium Data Protection employs advanced analytics and multiple data activity monitoring options to secure your cloud growth. |
"Hands On Lab: Breaking the Security Barrier! Guardium Data Protection Analytics + Risk Spotter" |
Participants will learn how to leverage Guardium like a Security Analyst to get more value from your current install!! This session will highlight the security side of Guardium Data Protection by showcasing Risk Spotter and Active Threat Analytics to demonstrate how database activity can help diagnose threats. In addition, we will analyze and act on those threats to show how we can augment existing SOC processes with our information. |
"Hands On Lab: Vulnerability Assessments" |
The Guardium Vulnerability Assessment solution is the first step in the security and compliance lifecycle management for any IT environment. In this session you will hear how easy it is to create a security assessment scan and workflow audits to identify and detect database vulnerabilities in an automated fashion—proactively improving configurations and hardening infrastructures. |
"Hands on Lab: Encryption in Depth; your toolset to keep data secure" |
How do you keep privileged users from accessing sensitive data? What if bad actors escalate their privileges? Can you stop ransomware before it gets started? Find out with this hands on lab around data encryption! |
"Cloud Pak deployment on premises from scratch - Guardium Insights case - Part 2" |
Part 2 - the process of installing OpenShift in a bare-metal environment - configuration of the storage option (rook-ceph) - CPFS deployment - IdP configurations for Guardium Inisghts - Guardium Insights deployment - initial services configuration Maximum of 20 people, in case of a larger group, it is necessary to extend care on the group by an additional person Training fully ready, tested several times in battle, full set of training materials available |
"Hands on Lab - IBM Data Security capabilities with AWS" |
Join us for a hands-on experience focused on IBM’s Data Security capabilities. IBM Security has developed labs, workshops, in-depth webinars, and demos to educate and assist AWS customers in the usage and deployment of IBM Security products. At this workshop, have your questions answered by the experts and discover ways to uncover sensitive data dispersed throughout your AWS Cloud environment. Learn how to automate data reporting, monitor activity, comply with international data privacy regulations quickly, and implement admin access controls across your hybrid ecosystem, in the cloud and on-premises databases. By utilizing our unified dashboard, you can easily locate all your sensitive data residing wherever it lives, in your hybrid cloud and multi-cloud environment." |
Buried Treasure Hunt! Test Your Guardium Data Protection Skills! |
Tired of doing labs where once you finish with them, even though you’ve done every step, you can’t remember what you did? Annoyed that there is less time to explore an environment and find your own answers? Then start the Buried Treasure Hunt with us! This lab challenges advanced Guardium Data Protection (GDP) users to hunt for the treasure that is buried in the GDP UI. Can you locate all the treasures before time runs out? Grab your shovel and sextant matey! |
zSecurity Modernization |
Security threats are constantly changing; has your mainframe security posture kept up? Managing IBM Z security can be extremely complex. IBM has created a suite of mainframe security products to ease this burden, but sometimes a little coaching can improve performance a lot. This hands on lab you can see how zSecure can help you automate security tasks in your environment |