You are on page 1of 2

Global Technology Services

Services
Workshop Flyer GTS Collateral

IBM essential practices


security workshop
How well
welldoes
doesyour
yoursecurity
security posture map
posture map
to an
an essential
essentiallevel
levelofofsecurity
security practices?
practices?

Protecting youryour organisation’s


organization’sdata
dataand
andinfrastructure
infrastructurebegins
beginswith
witha
afocus
focusononeffective security
effective securitymanagement—framing
management—framing a management
a management
system around
around core
core practices
practicesandandestablishing
establishinga astructure
structurethat
thatallows
allows
the mapping
mapping of of security
securityinitiatives
initiativestotoexecutive-level
executive-levellanguage.
language.ThisThis
LEARNING systematic approach
approach toto security
securitycan
canhelp
helpyou
youbetter
betteroptimise
optimizeyour your
OPPORTUNITY resources andand investments,
investments,protecting
protectingwhat
whatisisessential
essentialtotoyour
yourmission
mission and defending
and defending your organization
your organisation againstthreats.
against evolving evolving threats.
& WORKSHOP
To help you
you assess
assess your
yourorganisation’s
organization’scapabilities
capabilitiesand
andreadiness,
readiness,IBM
Security, risk and is offering
IBM offersaa2-3 hour complimentary
one-day workshop focused workshop focused on
on its essential its essential
practices.
compliance executives
executives and practices.
This This workshop
workshop is designedis for
designed for executives
executives concerned concerned with
with security,
security,
risk risk and compliance
and compliance as well asasfor
well
keyasIT,
forinfrastructure
key IT, infrastructure and
and operational
theirtheir
and teams are invited
teams are to leaders. During
operational the During
leaders. workshop,
the you will learn
workshop, youabout IBM’s
will learn essential
about IBM’s
ainvited
complimentary
to a workshop practices, which have
essential practices, been
which adopted
have within IBM,
been adopted withinand help
IBM, determine
and help
your organization’s
determine level of security
your organisation’s level ofcapability maturity. maturity.
security capability
2-3 hourabout
to learn workshop
IBM’s
to learn about
essential IBM’s
practices. Each of these
these practices
practices(shown
(shownbelow)
below)addresses
addressesa aspecific
specificdomain
domainof
essential practices. riskrisk
of andand
security designed
security designedto help advance
to help youryour
advance organisation’s security
organization’s
management
security capabilities.
management Whether Whether
capabilities. your focusyour
is onfocus
building
is ona building
risk-aware
The workshop also aculture or addressing
risk-aware culture orthe complexity
addressing theofcomplexity
cloud and virtualisation—each
of cloud and
includes an assessment essential practice helps
virtualization—each build a practice
essential foundation of optimal
helps security capabilities.
build a foundation
of optimal security capabilities.
and report deliverable.

10 Essential Practices

1 Build a risk aware culture and management system

2 Manage security incidents with greater intelligence


3 Defend the mobile and social workplace

4 Security-rich services, by design

5 Automate security “hygiene”

6 Control network access and assure resilience

7 Address new complexities of cloud and virtualisation

8 Manage third-party security compliance

9 Secure data and protect privacy

10 Manage the identity lifecycle


With this workshop, we will help you answer key questions about your Maturity-based approach
cybersecurity posture, including:

Se elli
In
t
cu ge
• What are my current exposures, and what do I implement to address

rit nc
Automated

y e
security exposures? What security capabilities do I need to help

O
pt
manage risk, protect competitive position, support new business

im
is
ed
models and better manage compliance?

Pr
ofi
• What is needed to automate and integrate security events and logs to

ci
en
Manual
provide actionable intelligence?

t
Ba
• What security roadmap and frameworks will help my business grow

si
c
and operate more safely, now and in the future? Reactive Proactive
• Am I allocating resources to the right priorities?
• How do I more effectively communicate security at an executive level? As organisations become more proactive
and automated in their security intelligence,
they can achieve more optimal operations.
Throughout the session, we focus on your current and required
security capabilities, and discuss the critical aspects of an effective
security risk program. Each of the domains will be discussed from
a technology, process, organisation, metrics and governance For more information
perspective. Please contact your local IBM representative
or visit: www.ibm.com/au
By the end of the workshop, you can:

• Obtain a high-level view of your current enterprise security posture


against IBM’s essential practices, understanding both your capabilities
and risk areas.
• Discuss and determine where your organisation lies within the
essential practices continuum and determine where there may be gaps.
• Understand where your organisation demonstrates maturity in © Copyright IBM Corporation 2016
applying the essential practices and receive recommendations on how
IBM, the IBM logo, ibm.com and logos are trademarks or
to improve your organisation’s security posture. registered trademarks of International Business Machines
Corporation in the United States, other countries, or both.
Please contact your IBM account executive to arrange a session If these and other IBM trademarked terms are marked on
their first occurrence in this information with a trademark
that could change the way you look at and manage security in your
symbol (® or ™), these symbols indicate U.S. registered
organisation. or common law trademarks owned by IBM at the time this
information was published. Such trademarks may also be
registered or common law trademarks in other countries.
About IBM Security A current list of IBM trademarks is available on the Web
IBM can provide the expertise, skills, services and technology to help at “Copyright and trademark information” at: ibm.com/legal/
copytrade.shtml
you reduce the cost and complexity of securing IT infrastructures and
applications. IBM solutions include assessments, strategy, planning Other product, company or service names may be trademarks
or service marks of others.
and design through implementation and management of core security
systems, across multi-vendor environments. This document is current as of the initial date of publication
and may be changed by IBM at any time. Not all offerings are
available in every country in which IBM operates.
To learn more about IBM’s essential practices, visit Essential Security
Practices. For more information on IBM Security, visit
Please Recycle
www-03.ibm.com/security/au/en/ or to join the conversation and follow
@IBMSecurity on Twitter. Visit our Security Intelligence Blog at
www.securityintelligence.com.

You might also like