
If you're going a bit stir crazy like I am, you're probably looking for ways to keep yourself busy. I've been pushing off some learning and development opportunities myself, but now that I have some free time on my hands, I'm taking the opportunity to upskill. We invite you to do the same with Think 2020.
In light of everything going on in the world, we pivoted IBM's premier event,
Think, to entirely digital streaming live and on-demand taking place next week May 5-6. This year's event is the biggest we've ever done and even better it's
totally free - including keynotes, technical sessions, and labs. Not only are lab sessions absolutely free, but we are offering certifications for only $75 when you register.
Think 2020 has thousands of sessions, including keynotes from Arvind Krishna, Jim Whitehurst, Ginni Rometty and IBM Security General Manager Mary O'Brien. Additional featured sessions include human rights lawyer Amal Clooney, actress and neuroscientist Mayim Bialik, will.i.am and more.
We worked hard to ensure that we built sessions and labs that not only will help you learn the capabilities of IBM products but help guide you through the challenges many security teams are facing with increasingly remote workforces. See below for a curated list of QRadar and
Security sessions and labs. I recommend browsing the
full catalog to build your own schedule of sessions that interest you. I look forward to seeing you there!
Keynote and Featured Sessions
Address New Cybersecurity Risks [6736]
COVID-19 poses an unparalleled cybersecurity challenge that we can meet, together. Your security and IT operations are rapidly shifting to protect your remote employees, clients and your business. Learn how IBM Security has partnered with Petrofac, helping them navigate challenges, new and known, with experts and innovation. And learn how IBM Security is delivering a new model to help to authenticate people more quickly and effectively as the work-from-home workforce continues to expand—new authentication offerings known in the industry as a “Zero Trust” model to help you be resilient in the of face any storm.
- Mary O'Brien, General Manager, IBM Security, IBM
- George Eapen, Global CISO and Group Head of Cyber Security, Petrofac
- Wendi Whitmore, Vice President, X-Force Threat Intelligence, IBM Security
Security State of the Union [6865]
Cloud adoption in enterprises, and regulated industries like financial services, brings about stringent requirements around security and compliance. Financial services ready IBM Public Cloud, announced in partnership with Bank of America, has market leading data protection to address regulated workloads, and integrated set of security services that enables consistent, continuous security and compliance. In this session, we will share strategy and capabilities around cloud security, client use cases highlighting practical experience in achieving best of security in Cloud, as well as latest set of these capabilities and offerings. This will cover those that are built into IBM Public Cloud, as well as rich set of hybrid cloud security offerings from IBM Security that enables secure journey to Cloud.
- Nataraj Nagaratnam, CTO, Cloud Security, IBM
- Sridhar Muppidi, IBM Fellow, VP and CTO IBM Security, IBM
Detect & Respond to Accelerating Threats [7114]
Global events such as the Novel Coronavirus (COVID-19) make all of us attractive targets for cybersecurity criminals. While threat actors using events like COVID-19 as a lynchpin to attack organizations is not new behavior, this is a developing situation and one in which we must all remain vigilant as criminals greatly increase malicious activity. Join IBM Security experts who will share the X-Force Incident Command process, designed to help X-Force respond in a unified fashion to large-scale cyber events. Watch now and understand how X-Force can help unify and protect your organization.
- John Wheeler, VP, Services Strategy, Offerings, Engineering & Business Operations, IBM
- Wendi Whitmore, Vice President, X-Force Threat Intelligence, IBM Security
- Axel Schittek, VP of IT Governance, Fiducia
Technical Sessions
Staying a Step Ahead: Applying Advanced Algorithms to Insider Threats [3233]
Insider threats are at the top of CISO priorities. Security analysts need a way to detect risky and suspicious users. Rules-based analytics are no longer enough; the solution must understand normal user behavior and then detect anomalous deviations from it. IBM QRadar User Behavior Analytics (UBA) analyzes individuals’ behavior and detects anomalous activities. Its machine learning algorithms can be used to find time series anomalies, activity/frequency deviations, peer group analysis and dynamic clustering. This session presents our comprehensive approach to safeguarding against harmful insider threats, along with a study of a real-life application with QRadar UBA customers.
- Joe Mobisa, IT Security Engineer, HMS
- Christopher Meenan, Director, Security Intelligence Offering Management and Strategy, IBM
The Importance of Automation in Today's Cybersecurity [3358]
In today’s world, cyber tools are increasingly making our jobs more efficient. We can more readily communicate and collaborate, innovate and design, grow and empower... But we’re not the only ones with growing cyber capabilities. Bad actors across the globe are making it hard on business cyber security teams, especially smaller ones. Security automation might sounds hard, and expensive, but automation starts small and can be easy. Learn how organizations are improving their security operations while saving significant time and cost with SOAR capabilities powered by IBM Security Resilient, delivered in the IBM Cloud Pak for Security.
- Jared Fagel, Cyber Security Analyst, ALLETE Inc. - IBM Champion
- Ted Julian, Offering Management leader for Resilient, IBM
Best Practices for Managing Connected Security Data, No Matter Where It Resides [7107]
Businesses today are moving their operations to the cloud piece by piece, with applications and data spread across multiple clouds and on-premises resources. To work efficiently in today's environment, teams need a better way to secure this fragmented IT environment without costly migration projects and complex integrations, or the need to continuously switch between different screens and products. Learn how you can quickly search for threats, orchestrate actions and automate responses—all while leaving your data where it is with IBM Cloud Pak for Security
- Christopher Meenan, Director, Security Intelligence Offering Management and Strategy, IBM
On-Demand and Scheduled Lab Sessions
Manage Your Use Cases in IBM QRadar [2007]
This lab will show attendees how to build an IBM QRadar use case from beginning to end. You will learn how to:
1) Easily ingest logs into QRadar by building your own custom parser and using an out-of-the-box parser (DSM)
2) Build a use case in QRadar by creating your own rule for a specific security scenario
3) Map your use case to the MITRE Framework.
- Shane Lundy, QRadar Offering Manager, IBM
- Mutaz Alsallal, QRadar Offering Manager, IBM
Tuesday, May 05
| 15:00 - 17:00 | Scheduled Lab 09
Wednesday, May 06 | 12:00 - 14:00 | Scheduled Lab 02
Friday, May 08 | 12:00 - 14:00 | Scheduled Lab 01
Manage Your Use Cases in IBM QRadar [2007-SP]
This lab will show attendees how to build an IBM QRadar use case from beginning to end. You will learn how to:
1) Easily ingest logs into QRadar by building your own custom parser and using an out-of-the-box parser (DSM)
2) Build a use case in QRadar by creating your own rule for a specific security scenario
3) Map your use case to the MITRE Framework.
NOTE: This lab is Self Paced and unmoderated. The attendee is expected to execute Hands-On instructions without an instructor.
Secure Your Home Network with the pfSense Open Source Firewall and IBM QRadar Community Edition [5653]
Many of us have been adding IoT devices to our home wi-fi networks that may never have been patched and that can be used to hack your computer, cell phones and tablets. This session will show you a very inexpensive (almost totally free) method to get the same level of data protection at home that corporations use today.
- Polo Aguirre Rodriguez, Worldwide Client Technical Advocate, IBM
- Jose Bravo, NA Security Architect, IBM
- Vladimir Jeremic, Program manager - Content Strategy for Security and Threat Intelligence, IBM
- Luis Rodriguez Diaz, Consultant, IBM
Monday, May 04 | 18:00 - 20:00 | Scheduled Lab 04
Wednesday, May 06 | 18:00 - 20:00 | Scheduled Lab 03
Friday, May 08 | 15:00 - 17:00 | Scheduled Lab 02
IBM Resilient SOAR Integration Workshop (w/ Red Hat Ansible) [2906]
Come along to understand how to design and implement IBM Resilient Security Orchestration, Automation and Response (SOAR) functions and integration in a fully guided, hands-on lab session. We will provide all required materials and content; just bring yourself and some basic coding skills.
- Roland Wolters, Principal Technical Marketing Manager, Red Hat
- Gerald Trotman, Pre-Sales Integrations Engineer, IBM
Monday, May 04 | 15:00 - 17:00 | Scheduled Lab 04
Using IBM QRadar‘s Different Search Functions, with a Focus on Advanced Searches [6383]
This lab explores the different search features in IBM QRadar, and offers hands-on experience of a variety of use cases. The focus will be on advanced searches that make use of the Ariel Query Language (AQL). Attendees will learn how to structure search statements and make efficient use of supporting material in the IBM Knowledge Center. At the end of the lab, attendees will be given challenging tasks to solve on their own.
- Andy Grasmück, Technical Enablement Specialist, IBM
Tuesday, May 05 | 15:00 - 17:00 | Scheduled Lab 04
Friday, May 08 | 09:00 - 11:00 | Scheduled Lab 09
#QRadar