Register Now

     First Name:
     Last Name:
     Title:
     Company:
     Address:
     Dept/BOX/ MS:
     City:
     State/Prov:
     Zip/Postal Code:
     Country:
     Email:
     Phone: - -
     Fax: - -
     Company URL:

 
How many employees are in your entire organization?
 
 
IBM and affiliates may use the information you have provided to keep you informed about IBM products, services and offerings.
 No, do not send me e-mail.
 No, do not call.
 No, do not send me postal mail.
Register Now
 

IBM Privacy Policy


Bookmark and Share

 
 
A Dark Reading Webcast:

The IBM X-Force 2011 Trend Report: Combat data security threats

InformationWeek Webcast

Duration: 60 minutes

Join Robert Freeman, manager for IBM X-Force® Advanced Research, as he discusses the latest results from the "IBM X-Force 2011 Trend and Risk Report", an in-depth analysis of public vulnerability disclosures findings from more than 4,000 clients, and the monitoring and analysis of an average of 13 billion events daily in 2011.

"X-Force 2011 Trend and Risk Report" shows surprising improvements in several areas of Internet security such as a reduction in application security vulnerabilities, exploit code and spam. However, sophisticated threats facing IT security professionals are increasing in frequency and complexity. Attackers constantly adapt their techniques to evade new security measures, easily bypassing traditional perimeter defenses such as firewalls, IDS/IPS and anti-virus systems to get to your organization's sensitive data.

In this comprehensive webcast, you'll learn about increases in key areas of attack activity and how to combat them, including:

Featured Speakers:

Robert Freeman
Robert Freeman
Manager, IBM X-ForceĀ® Advanced Research


Eric Naiburg
Program Director, Information Governance Solutions Product Marketing Strategy

  • Cybercriminal activity: Financially-motivated cybercriminals, state-sponsored espionage groups, hacktivists and insiders will continue to become more savvy and opportunistic.
  • SQL injection: Continues to be a favorite attack vector among malicious groups.
  • IT loophole attacks: Attackers are bypassing existing security methods to gain access given the interconnected nature of the Internet and information systems as well as enterprise ERP, CRM, and custom business applications.
  • Attacks targeting shell command injection vulnerabilities more than doubled in 2011. These vulnerabilities allow the attacker to execute commands directly on a web server.
  • Spike in automated password guessing: Poor passwords and password policies have played a role in a number of high-profile breaches during 2011.
  • Attacks on emerging technologies: With the evolution of cloud computing social networks and mobile devices, attackers found new opportunities to hone their skills and extend their exploits to take advantage of these new technologies.
  • What countermeasures can be used? Database protection mandates and compliance requirements including implementing specific controls and tighter business processes are required by organizations to address risk and help ensure security.

Eric Naiburg, Program Director, Information Governance Solutions Product Marketing Strategy, will present case studies and product demo examples showing how enterprises have implemented IBM InfoSphere Guardium data security solutions to help secure sensitive databases and reduce compliance costs.


 
 

UBM Tech - 600 Community Drive, Manhasset, New York 11030 - Privacy Statement