Upload
sherman-dixon
View
218
Download
0
Tags:
Embed Size (px)
Citation preview
© 2012 IBM Corporation
IBM Security Systems
1© 2014 IBM Corporation
2014 Pre-Pulse Security Enablement Academy Agendas
Feb 20th – Feb 22nd 2014 – Las Vegas, NV
updated 2/17/14
IBM Security Systems
This agenda is subject to change.
© 2012 IBM Corporation
IBM Security Systems
2© 2014 IBM Corporation
Security 2014 Pre-Pulse Week at a GlanceThursday Feb 20 Friday
Feb 21 Saturday
Feb 22Sunday
Feb 23
Security Reception
7:00pm – 9:00pm
Security SalesClosing Session
4:30pm – 6:00pm
Pulse Welcome Reception
Technical Track Kickoff
Security Main Tent
Kickoff8:30am – 12:30pm
Sales Track2:00pm – 6:30pm
SICTP
Track
IAM CTP
Track
Threat CTP
Track
App CTP
Track
Apex CTP
Track
Sales Track
8:00 – 4:00
Architect Breakout
1:30 - 3:30
Tiger/GTSTrack
8:00 -11:30
&
3:30 – 4:30
Business Partner Summit
SI CTP Track
IAM CTP Track
Threat CTP Track
AppSec CTP Track
Apex CTP Track
SI CTP Track
IAM CTP Track
Threat CTP Track
AppSec CTP Track
Apex CTP Track
Tiger/GTS Track
Kickoff
Tiger/GTSTrack
For Security Tigers and
GTS Sellers Only
zSecurityBreakout
9:00 – 4:00
SignatureTower 3, Meeting Room C
This agenda is subject to change.
SWGSCL
Event
© 2012 IBM Corporation
IBM Security Systems
3© 2014 IBM Corporation
Pre-Pulse Security Enablement Academy: Tiger and GTS Track Date: Thursday, February 20th Meeting Room: 308 Convention Center Audience: Tiger Team, GTS Security Services Black Belts
Time Topic Speaker
1:00 – 1:15 Tiger/GTS Track Welcome • Bob Kalka
1:15 – 3:00 Detailed Integration Roadmaps for Intelligence, Threat and Fraud Protection (including EOS topics)
• Jason Corbin • Jim Brennan• Upesh Patel
3:00 – 3:30 Break
3:30 – 5:00 Detailed Integration Roadmaps for IAM, including drilldown on appliance positioning and strategy
• Ravi Srinivasan• Jason Keenaghan
5:00 – 5:30 Industry Perspectives and Assets • Tim Appleby
5:30 – 6:30 Security Trends and Innovations • Sandy Bird
This agenda is subject to change.
© 2012 IBM Corporation
IBM Security Systems
4© 2014 IBM Corporation
Pre-Pulse Security Enablement Academy: Tiger and GTS Track Date: Saturday, February 22nd Meeting Room: 308 Convention Center Audience: Tiger Team, GTS Security Services Black Belts
Time Topic Speaker
8:00am – 10:00
Security Integrated Demo Cloud enablement
• Kevin McGillycuddy• David Druker• Steve Keim• Filip Schepers
10:00 - 10:30 Break
10:30 – 12:00 GTS Key Offerings and Partnering• MSIEM, IAM, SOC• Key/joint Wins
• Mike Massimi and team
12:00pm Adjourn – Lunch and rejoin Main Sales Track
Time Topic Speaker
3:30pm – 4:15 ESMW Drilldown • Mark Johnston• Stefaan Van Daele• Ryan Fanzone• John McKeon
4:15 – 4:30 Break, then rejoin Main Sales Track
This agenda is subject to change.
© 2012 IBM Corporation
IBM Security Systems
5© 2014 IBM Corporation
Time Topic Speakers
7:30 – 8:30 Registration and Breakfast
8:30 – 8:40 Welcome / Introduction Bob Kalka, Director, Strategic Accounts, Tiger Team and Enablement
8:40 – 9:30 2014 Sales PrioritiesRecognition
Todd Bacon, VP, WW Sales IBM Security Systems
Dave Munson, Director Security Systems – WW Sales
Craig Greenseid, Security Systems NA Sales
Roman Tuma, Director Security Systems – Growth Markets Sales
Joe Ruthven, BUE Security Systems - MEA Sales
Joaquim Fernando Pires De Campos, BUE Security Systems - LA Sales
Hideo Wada, Director Security Systems – Japan Sales
9:30 – 10:30 Strategy and Roadmap Marc van Zadelhoff, VP Strategy, Marketing, Product Management and Alliances, IBM Security Systems
Denis Kennelly, VP Development Security
10:30 – 11:00 Break
11:00 – 11:30 Superior Client Experience Kent Blossom, VP IBM Security Solutions
Gopal Krishnan, VP Support IBM Security Systems
11:30 – 12:00 Co-selling with Partners: Key to Your Success
Carola Cazenave, Director WW Channels, IBM Security Systems
12:00 – 12:30 Enablement and Expectations Joe Carusillo, Manager, WW Security Sales Enablement
12:30 – 2:00 Lunch (Studio Walk restaurants, not catered)
Pre-Pulse Security Enablement Academy: Main Tent Date: Friday, February 21st (Morning) Meeting Room: 119/120 Convention Center Audience: All Security Sales & Tech Sales, Security Tigers, GTS Sellers, and Business Partners
This agenda is subject to change.
© 2012 IBM Corporation
IBM Security Systems
6© 2014 IBM Corporation
Pre-Pulse Security Enablement Academy: Sales Track Date: Friday, February 21st (Afternoon) Meeting Room: 119 Convention Center Audience: Sales Reps, BP’s, Security Tigers and GTS Sellers
Time Topic Speakers
12:30 – 2:00 Lunch (Studio Walk restaurants, not catered)
2:00 – 2:30 Academy Opening Exam
2:30 – 3:00 Security Portfolio-wide Prospecting • Bob Kalka
3:00 – 3:15 Break
3:15 – 4:15 Security Intelligence• Point of View• Sales Strategy
• Jason Corbin• Darren Fox• Violet Markowski
4:15 – 5:15 Web Fraud & End Point Advance Threat • Point of View• Sales Strategy
• Upesh Patel• Dave Soper
5:15 – 5:45 Selling Cloud Security • Kevin Skipinetz• Kevin Beer
5:45 – 6:30 Interactive Exercise #1 • David Hemsath and table facilitators
This agenda is subject to change.
© 2012 IBM Corporation
IBM Security Systems
7© 2014 IBM Corporation
Americas Security Pre-Pulse Academy: Sales Track Date: Saturday, February 22nd Meeting Room: 119/120 Convention Center Audience: Sales Reps and BP’s Afternoon only - Security Tigers and GTS Sellers
Time Topic Speaker
7:00 – 8:00 Breakfast
8:00 – 9:00 Identity and Access Management • Point of View• Sales Strategy
• Ravi Srinivasan• Joe Skocich• Ray Morin
9:00 – 10:00 Application/Data Security • Point of View• Sales Strategy
• Caleb Barlow• Tim Bedard
10:00 – 10:30 Break
10:30 – 11:30 Threat • Point of View• Sales Strategy
• Jim Brennan• Ryan Hall• Mike Begina, John Sceals, Hank Gillard
11:30 – 12:00 Selling Mobile Security • Caleb Barlow
12:00 – 1:30 Lunch
1:30 – 2:15 Selling Security Solutions for System z • Andy Nietupski
2:15 – 2:30 Selling More through Client Satisfaction • David Dworkin
2:30 – 3:00 Partnering with Security Services • Mike Massimi
3:00 – 3:30 Interactive Exercise #2 • Bob Kennedy and table facilitators
3:30 – 4:00 Academy Closing Exam
4:00 – 4:30 Break
4:30 – 4:40 NA Sales Priorities • John Dunderdale
4:40 – 5:10 Customer Speaker • TBD
5:10 – 6:00 Executive Roundtable • Brendan Hannigan• All Exec’s
7:00 – 9:00 Security Networking Reception This agenda is subject to change.
© 2012 IBM Corporation
IBM Security Systems
8© 2014 IBM Corporation
Pre-Pulse Security Enablement Academy: Tech Sales Track Summary
Thur., Feb. 20
11:00 – 12:00 Registration
12:00 – 4:00 Tech Sales Track General Session (Room 119 Convention Center) - Details on page 9
4:00 – 4:30 Break
4:30 – 7:00 AppSec TrackStudio 3
Trusteer Apex TrackStudio 7
Security Intelligence TrackRoom 306/307
IAM TrackStudio 1
Threat TrackStudio 2
Fri., Feb. 21
08:30 – 12:30
12:30 – 2:00 Lunch
2:00 – 6:30 AppSec TrackStudio 3
Trusteer Apex TrackStudio 7
Security Intelligence TrackRoom 306/307
IAM TrackStudio 1
Threat TrackStudio 2
Sat., Feb. 22
08:00 – 12:00 AppSec TrackStudio 3
Trusteer Apex TrackStudio 7
Security Intelligence TrackRoom 306/307
IAM TrackStudio 1
Threat TrackStudio 2
12:00 – 1:30 Lunch
1:30 – 4:00 AppSec TrackStudio 3
Trusteer Apex TrackStudio 7
Security Intelligence TrackRoom 306/307
IAM TrackStudio 1
Threat TrackStudio 2
4:30 – 6:00 Main Tent
This agenda is subject to change.
© 2012 IBM Corporation
IBM Security Systems
9© 2014 IBM Corporation
Technical Sales Track General Session
Thursday Noon to 4:00pm in Rooms 119/120 Convention Center
12:00 – 12:15 Introduction of IOT Tech Sales Leaders
12:15 – 12:30 Security Technical Advocate Program
12:30 – 1:00 Update on Security solutions for System z
1:00 – 1:30 IAM Sales Update
1:30 – 2:00 Break
2:00 – 2:30 Threat Sales Update
2:30 – 3:00 AppSec Sales Update
3:00 – 3:30 Security Intelligence Sales Update
3:30 – 4:00 Trusteer Sales Update
4:00 – 4:30 Break
4:30 – 7:00 AppSec TrackStudio 3
Trusteer Apex TrackStudio 7
Security Intelligence Track
Room 306/307
IAM TrackStudio 1
Threat TrackStudio 2
This agenda is subject to change.
© 2012 IBM Corporation
IBM Security Systems
10© 2014 IBM Corporation
AppScan CTP Track
Thursday Afternoon Introduction to AppScan Dynamic Scanning Part 1
AppScan Market OverviewAppScan Portfolio OverviewAppScan Positioning AppScan Standard Edition ReviewAppScan Standard Edition Labs
Friday Afternoon Introduction to AppScan Dynamic Scanning Part 2AppScan Enterprise Edition + Deep Dive DemoAppScan Enterprise Edition LabsAppScan Dynamic Advanced Topics
Saturday MorningIntroduction to AppScan Static Analysis Part 1AppScan Product Family OverviewAppScan Source Sales StrategiesAppScan Source Overview & Licensing AppScan Source Exercises
Saturday Afternoon Introduction to AppScan Static Analysis Part 2
AppScan Source Deployment ModelsAppScan Source Advanced FeaturesAppScan Source Process Guide OverviewAppScan Advanced Features - Mobile, F4F, Custom Rules, TroubleshootingAppScan Business Partner Assessment
This agenda is subject to change.
© 2012 IBM Corporation
IBM Security Systems
11© 2014 IBM Corporation
Security Intelligence CTP Track
Thursday 20-Feb Welcome QRadar Positioning and overview The Demo Image Competitive Landscape Starting Demo Image and GUI overview (if time permits) Friday 21-Feb QRadar Architecture and Sizing QRadar Guided Demo Objection Handling
Saturday 22-Feb Student Demo Exercises QRadar-AppScan Integration QVM and Demo Lunch QRM and Demo Test, QA, and Wrap-up
This agenda is subject to change.
© 2012 IBM Corporation
IBM Security Systems
12© 2014 IBM Corporation
IAM CTP Track
Thursday 20th February ISAM 8.0 "all-in-one" appliance strategy session
All-in-one appliance deployment patternsOverview and (beta) demo of common deployment scenarios to be delivered in Feb/March
Sales Messaging and Roadmap 2014 roadmap deliverables for IAM, IDaaS, IAM analytics
ISAM for Mobile presentationIntroduction to appliance and operations (firmware, activation, clustering etc.)Policy Engine Concepts and Configuration: Attributes, Obligations, PIPs,
Risk Profiles, Policy Authoring; How to demonstrate ISAM for Mobile functionality Friday 21st February ISAM for Web and Mobile Appliances Lab (self-paced with breaks)
Learn hands-on experiences with common customer scenarios including: E-mail One Time Password for silent device registration E-mail One Time Password for device registration with consent Attributes from POST data driving HOTP One Time Password Attributes from JSON data driving TOTP (Google Authenticator) One Time
Password Scoped, Delegated Access with OAuth
Integrated Content Protection protecting against SQL injection Common deployment scenarios with sizing and pricing for all-in-one ISAM appliances
This agenda is subject to change.
© 2012 IBM Corporation
IBM Security Systems
13© 2014 IBM Corporation
IAM CTP Track continued
Saturday 22nd February Federated Directory Services presentation
Cover key scenarios to simplify enterprise silos of identitiesCompetitive differentiation with this solution approachOverview of additional scenarios covered in upcoming SSE release
Federated Directory Services lab (self-paced with breaks)Learn hands-on experiences with common customer scenarios including:
Integration of file-based identity sources into a central directoryIntegration of other LDAP identity sources into a central directoryUse of pass-through authentication to support distributed credential repositoriesUse of write-back to allow central mastering of identity attributesAuto-provisioning of ISAM to complete "don't touch my registry" scenario
Privileged Identity Manager Update Cover Preventing Insider Threat ScenarioDeployment patterns for greenfield, existing ISIM, existing ISAM-ESSO install ops
LUNCH ISIM Update including Identity Service Centre
Cover key Identity and Governance customer scenarios including: Provide Line-of-Business with "access catalog" interface
Custom reporting made simple with Cognos reporting engineDeployment patterns for migration and upgrade existing ISIM environmentReview integration of 3rd party IAG governance tool (CrossIdeas)
IAM Sandbox session Detailed review of the updated IAM Sandbox
New scenarios to support pre-sales activitiesUse of IAM Sandbox for demos, PoTs and even PoCs
This agenda is subject to change.
© 2012 IBM Corporation
IBM Security Systems
14© 2014 IBM Corporation
Threat CTP Track
Thursday 20-Feb Introduction to IBM Security Network Protection XGS Setting up the appliance LMI overview and SiteProtector registration
Friday 21-Feb Monitoring event data Network access policy rules Advanced network access control Local authentication
Saturday 22-Feb Remote authentication IPS policy overview Outbound SSL decryption and inspection (Adding technical details) Inbound SSL decryption and inspection QRadar flow data
This agenda is subject to change.
© 2012 IBM Corporation
IBM Security Systems
15© 2014 IBM Corporation
Trusteer Apex Track Thursday, February 20th
Topic
Welcome / Introductions
Trusteer Apex OverviewWhat Problem Does Apex Solve, How Does It Solve It, Product Architecture
4:15 – 4:30 Break
Exploitation PreventionStateful Application Control, Java Content Management, ASLR Enforcement
Corporate Password ProtectionProtecting Enterprise Credentials
Trusteer Apex Track Friday, February 21st
Topic
Data Exfiltration PreventionCommunication Blocking, Application Adaptive Protection
Overview of Trusteer Apex Demo Environment (used for labs)Good Guy, Bad Guy, Trusteer Management Application (TMA)
3:30 – 4:00 Break
Student LabExploitation Prevention, Data Exfiltration Prevention and Corporate Password Protection using Good Guy/Bad Guy Demo Images
This agenda is subject to change.
© 2012 IBM Corporation
IBM Security Systems
16© 2014 IBM Corporation
Trusteer Apex Track Saturday, February 22nd
Topic
Trusteer Management Application (TMA)Exploitation Prevention and Data Exfiltration Policies
Student LabTrusteer Management Application
Troubleshooting Techniques for Apex
10:00 – 10:30 Break
Students Practice DemosPractice Presenting Good Guy/Bad Guy Demo to other Students
12:00 – 1:30 Lunch
Trusteer Apex Sales UpdateSummary of what will be presented to the Security Sellers
Overview of the CompetitionFireEye, McAfee, Bit9, Bromium, Invincea
Trust Apex RoadmapOverview of Product Updates for 1H 2014
Class SummaryQ&A, Feedback, Getting Set Up to Demo to Clients
This agenda is subject to change.