IBM Tivoli Security Management Blog
Kelly Schupp 06000132TN firstname.lastname@example.org Tags:  risk compliance encryption security cloud-security virtualization identity-management single management sign-on pulse application-security data-security cloud key-management 1 Comment 2,297 Visits
Today I spoke with Jeanette Fetzer, who is leading the security, risk and compliance management track at Pulse 2010. The topic of our discussion was the Call for Papers that is taking place now for Pulse 2010. Jeanette is looking for customers, partners and analysts to submit proposals. See below what will catch Jeanette's eye when submitting abstracts.
What are hot topics in the area of Security, Risk and Compliance Management right now? Which topics would you really like to see presented at Pulse?
Security, Risk and Compliance Management is a broad topic area that covers managing people and identities, securing applications and information as well as the infrastructure. We plan to have a variety of topics on the Pulse agenda that spread across this spectrum. Some hot topics we know customers want to exchange ideas on include Privileged Identity Management, Role Management, Application Security, Data Security, Virtualization and Cloud security, Encryption and key management and datacenter security. Last year, we witnessed some really valuable exchanges in the sessions where presenters shared how technologies like Federation or Single Sign On helped reduce costs in their businesses or extend their business models cost effectively.
Who are good candidates for submitting abstracts? And why?
We are interested in abstracts from customers, partners and analysts who are familiar with today's security challenges and how IBM's security solutions help to address those challenges. We'd like speakers who can share real world experience from selecting the IBM solution to implementing it with their fellow attendees.
What are you looking for in a good proposal?
A good proposal should have a strong title that is indicative of the content of the session. The abstract should offer in 150 words or less some insight into the security and enterprise challenges you faced and how you solved them with IBM security solutions. Please try to steer clear of using lots of acronyms. You may wish to highlight your industry or the size of your deployment or some exciting statistics about your implementation like number of users, employees or customers served, managed systems, geographic locations involved in your deployment or cost savings anticipated or realized. Attendees are interested in best practice and "lessons learned" discussions as well as some sharing of architecture ideas.
What are the benefits of submitting an abstract for Pulse?
Your paper may be published in the Pulse 2010 proceedings and you will have the opportunity to present as part of the formal agenda. All accepted client speaker submissions will receive a full conference pass* ($2195 value) and admission to our on-site VIP client lounge. For more information on submitting abstracts for Pulse, visit http://ow.ly/r4ej
"It's the eye of the tiger, it's the thrill of the fight" EMA sees a promising future for the IBM Security Tiger Team
Lauren Mullins 270000QCXM email@example.com Tags:  data-security cloud cloud-security security single pulse virtualization compliance-management sign-on risk-management application-security compliance encryption risk key-management insider-threat management identity-management 1,840 Visits
IBM is rising up to the challenge to meet customer needs of purchasing integrated security solutions with its recently announced IBM Security Tiger Team. Last year IBM announced its security framework in order to unify its security message to the market. Now, IBM has made a bold move by creating a cross IBM Security Tiger Team, run by Kent Blossom, Vice President IBM Security Solutions. The Tiger Team will sell the entire set of IBM security capabilities spanning software, hardware and services, represented in the IBM Security Framework. The team will assess risk and compliance issues facing their client's business and develop the IBM solution to move a client into a secure environment. EMA says, " For IBM, this is an important step toward revealing the company as the large and powerful security vendor it truly is."
You can access the EMA article here (it will require registration):http://ow.ly/umqk