16
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation 2014 Pre-Pulse Security Enablement Academy Agendas Feb 20 th – Feb 22 nd 2014 – Las Vegas, NV updated 2/17/14 IBM Security Systems This agenda is subject to change.

© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation 2014 Pre-Pulse Security Enablement Academy Agendas Feb 20 th – Feb 22 nd 2014 – Las

Embed Size (px)

Citation preview

© 2012 IBM Corporation

IBM Security Systems

1© 2014 IBM Corporation

2014 Pre-Pulse Security Enablement Academy Agendas

Feb 20th – Feb 22nd 2014 – Las Vegas, NV

updated 2/17/14

IBM Security Systems

This agenda is subject to change.

© 2012 IBM Corporation

IBM Security Systems

2© 2014 IBM Corporation

Security 2014 Pre-Pulse Week at a GlanceThursday Feb 20 Friday

Feb 21 Saturday

Feb 22Sunday

Feb 23

Security Reception

7:00pm – 9:00pm

Security SalesClosing Session

4:30pm – 6:00pm

Pulse Welcome Reception

Technical Track Kickoff

Security Main Tent

Kickoff8:30am – 12:30pm

Sales Track2:00pm – 6:30pm

SICTP

Track

IAM CTP

Track

Threat CTP

Track

App CTP

Track

Apex CTP

Track

Sales Track

8:00 – 4:00

Architect Breakout

1:30 - 3:30

Tiger/GTSTrack

8:00 -11:30

&

3:30 – 4:30

Business Partner Summit

SI CTP Track

IAM CTP Track

Threat CTP Track

AppSec CTP Track

Apex CTP Track

SI CTP Track

IAM CTP Track

Threat CTP Track

AppSec CTP Track

Apex CTP Track

Tiger/GTS Track

Kickoff

Tiger/GTSTrack

For Security Tigers and

GTS Sellers Only

zSecurityBreakout

9:00 – 4:00

SignatureTower 3, Meeting Room C

This agenda is subject to change.

SWGSCL

Event

© 2012 IBM Corporation

IBM Security Systems

3© 2014 IBM Corporation

Pre-Pulse Security Enablement Academy: Tiger and GTS Track Date: Thursday, February 20th Meeting Room: 308 Convention Center Audience: Tiger Team, GTS Security Services Black Belts

Time Topic Speaker

1:00 – 1:15 Tiger/GTS Track Welcome • Bob Kalka

1:15 – 3:00 Detailed Integration Roadmaps for Intelligence, Threat and Fraud Protection (including EOS topics)

• Jason Corbin • Jim Brennan• Upesh Patel

3:00 – 3:30 Break

3:30 – 5:00 Detailed Integration Roadmaps for IAM, including drilldown on appliance positioning and strategy

• Ravi Srinivasan• Jason Keenaghan

5:00 – 5:30 Industry Perspectives and Assets • Tim Appleby

5:30 – 6:30 Security Trends and Innovations • Sandy Bird

This agenda is subject to change.

© 2012 IBM Corporation

IBM Security Systems

4© 2014 IBM Corporation

Pre-Pulse Security Enablement Academy: Tiger and GTS Track Date: Saturday, February 22nd Meeting Room: 308 Convention Center Audience: Tiger Team, GTS Security Services Black Belts

Time Topic Speaker

8:00am – 10:00

Security Integrated Demo Cloud enablement

• Kevin McGillycuddy• David Druker• Steve Keim• Filip Schepers

10:00 - 10:30 Break

10:30 – 12:00 GTS Key Offerings and Partnering• MSIEM, IAM, SOC• Key/joint Wins

• Mike Massimi and team

12:00pm Adjourn – Lunch and rejoin Main Sales Track

Time Topic Speaker

3:30pm – 4:15 ESMW Drilldown • Mark Johnston• Stefaan Van Daele• Ryan Fanzone• John McKeon

4:15 – 4:30 Break, then rejoin Main Sales Track

This agenda is subject to change.

© 2012 IBM Corporation

IBM Security Systems

5© 2014 IBM Corporation

Time Topic Speakers

7:30 – 8:30 Registration and Breakfast

8:30 – 8:40 Welcome / Introduction Bob Kalka, Director, Strategic Accounts, Tiger Team and Enablement

8:40 – 9:30 2014 Sales PrioritiesRecognition

Todd Bacon, VP, WW Sales IBM Security Systems

Dave Munson, Director Security Systems – WW Sales

Craig Greenseid, Security Systems NA Sales

Roman Tuma, Director Security Systems – Growth Markets Sales

Joe Ruthven, BUE Security Systems - MEA Sales

Joaquim Fernando Pires De Campos, BUE Security Systems - LA Sales

Hideo Wada, Director Security Systems – Japan Sales

9:30 – 10:30 Strategy and Roadmap Marc van Zadelhoff, VP Strategy, Marketing, Product Management and Alliances, IBM Security Systems

Denis Kennelly, VP Development Security

10:30 – 11:00 Break

11:00 – 11:30 Superior Client Experience Kent Blossom, VP IBM Security Solutions

Gopal Krishnan, VP Support IBM Security Systems

11:30 – 12:00 Co-selling with Partners: Key to Your Success

Carola Cazenave, Director WW Channels, IBM Security Systems

12:00 – 12:30 Enablement and Expectations Joe Carusillo, Manager, WW Security Sales Enablement

12:30 – 2:00 Lunch (Studio Walk restaurants, not catered)

Pre-Pulse Security Enablement Academy: Main Tent Date: Friday, February 21st (Morning) Meeting Room: 119/120 Convention Center Audience: All Security Sales & Tech Sales, Security Tigers, GTS Sellers, and Business Partners

This agenda is subject to change.

© 2012 IBM Corporation

IBM Security Systems

6© 2014 IBM Corporation

Pre-Pulse Security Enablement Academy: Sales Track Date: Friday, February 21st (Afternoon) Meeting Room: 119 Convention Center Audience: Sales Reps, BP’s, Security Tigers and GTS Sellers

Time Topic Speakers

12:30 – 2:00 Lunch (Studio Walk restaurants, not catered)

2:00 – 2:30 Academy Opening Exam

2:30 – 3:00 Security Portfolio-wide Prospecting • Bob Kalka

3:00 – 3:15 Break

3:15 – 4:15 Security Intelligence• Point of View• Sales Strategy

• Jason Corbin• Darren Fox• Violet Markowski

4:15 – 5:15 Web Fraud & End Point Advance Threat • Point of View• Sales Strategy

• Upesh Patel• Dave Soper

5:15 – 5:45 Selling Cloud Security • Kevin Skipinetz• Kevin Beer

5:45 – 6:30 Interactive Exercise #1 • David Hemsath and table facilitators

This agenda is subject to change.

© 2012 IBM Corporation

IBM Security Systems

7© 2014 IBM Corporation

Americas Security Pre-Pulse Academy: Sales Track Date: Saturday, February 22nd Meeting Room: 119/120 Convention Center Audience: Sales Reps and BP’s Afternoon only - Security Tigers and GTS Sellers

Time Topic Speaker

7:00 – 8:00 Breakfast

8:00 – 9:00 Identity and Access Management • Point of View• Sales Strategy

• Ravi Srinivasan• Joe Skocich• Ray Morin

9:00 – 10:00 Application/Data Security • Point of View• Sales Strategy

• Caleb Barlow• Tim Bedard

10:00 – 10:30 Break

10:30 – 11:30 Threat • Point of View• Sales Strategy

• Jim Brennan• Ryan Hall• Mike Begina, John Sceals, Hank Gillard

11:30 – 12:00 Selling Mobile Security • Caleb Barlow

12:00 – 1:30 Lunch

1:30 – 2:15 Selling Security Solutions for System z • Andy Nietupski

2:15 – 2:30 Selling More through Client Satisfaction • David Dworkin

2:30 – 3:00 Partnering with Security Services • Mike Massimi

3:00 – 3:30 Interactive Exercise #2 • Bob Kennedy and table facilitators

3:30 – 4:00 Academy Closing Exam

4:00 – 4:30 Break

4:30 – 4:40 NA Sales Priorities • John Dunderdale

4:40 – 5:10 Customer Speaker • TBD

5:10 – 6:00 Executive Roundtable • Brendan Hannigan• All Exec’s

7:00 – 9:00 Security Networking Reception This agenda is subject to change.

© 2012 IBM Corporation

IBM Security Systems

8© 2014 IBM Corporation

Pre-Pulse Security Enablement Academy: Tech Sales Track Summary

Thur., Feb. 20

11:00 – 12:00 Registration

12:00 – 4:00 Tech Sales Track General Session (Room 119 Convention Center) - Details on page 9

4:00 – 4:30 Break

4:30 – 7:00 AppSec TrackStudio 3

Trusteer Apex TrackStudio 7

Security Intelligence TrackRoom 306/307

IAM TrackStudio 1

Threat TrackStudio 2

Fri., Feb. 21

08:30 – 12:30

12:30 – 2:00 Lunch

2:00 – 6:30 AppSec TrackStudio 3

Trusteer Apex TrackStudio 7

Security Intelligence TrackRoom 306/307

IAM TrackStudio 1

Threat TrackStudio 2

Sat., Feb. 22

08:00 – 12:00 AppSec TrackStudio 3

Trusteer Apex TrackStudio 7

Security Intelligence TrackRoom 306/307

IAM TrackStudio 1

Threat TrackStudio 2

12:00 – 1:30 Lunch

1:30 – 4:00 AppSec TrackStudio 3

Trusteer Apex TrackStudio 7

Security Intelligence TrackRoom 306/307

IAM TrackStudio 1

Threat TrackStudio 2

4:30 – 6:00 Main Tent

This agenda is subject to change.

© 2012 IBM Corporation

IBM Security Systems

9© 2014 IBM Corporation

Technical Sales Track General Session

Thursday Noon to 4:00pm in Rooms 119/120 Convention Center

12:00 – 12:15 Introduction of IOT Tech Sales Leaders

12:15 – 12:30 Security Technical Advocate Program

12:30 – 1:00 Update on Security solutions for System z

1:00 – 1:30 IAM Sales Update

1:30 – 2:00 Break

2:00 – 2:30 Threat Sales Update

2:30 – 3:00 AppSec Sales Update

3:00 – 3:30 Security Intelligence Sales Update

3:30 – 4:00 Trusteer Sales Update

4:00 – 4:30 Break

4:30 – 7:00 AppSec TrackStudio 3

Trusteer Apex TrackStudio 7

Security Intelligence Track

Room 306/307

IAM TrackStudio 1

Threat TrackStudio 2

This agenda is subject to change.

© 2012 IBM Corporation

IBM Security Systems

10© 2014 IBM Corporation

AppScan CTP Track

Thursday Afternoon Introduction to AppScan Dynamic Scanning Part 1

AppScan Market OverviewAppScan Portfolio OverviewAppScan Positioning AppScan Standard Edition ReviewAppScan Standard Edition Labs

Friday Afternoon Introduction to AppScan Dynamic Scanning Part 2AppScan Enterprise Edition + Deep Dive DemoAppScan Enterprise Edition LabsAppScan Dynamic Advanced Topics

Saturday MorningIntroduction to AppScan Static Analysis Part 1AppScan Product Family OverviewAppScan Source Sales StrategiesAppScan Source Overview & Licensing AppScan Source Exercises

Saturday Afternoon Introduction to AppScan Static Analysis Part 2

AppScan Source Deployment ModelsAppScan Source Advanced FeaturesAppScan Source Process Guide OverviewAppScan Advanced Features - Mobile, F4F, Custom Rules, TroubleshootingAppScan Business Partner Assessment

This agenda is subject to change.

© 2012 IBM Corporation

IBM Security Systems

11© 2014 IBM Corporation

Security Intelligence CTP Track

Thursday 20-Feb Welcome QRadar Positioning and overview The Demo Image Competitive Landscape Starting Demo Image and GUI overview (if time permits) Friday 21-Feb QRadar Architecture and Sizing QRadar Guided Demo Objection Handling

Saturday 22-Feb Student Demo Exercises QRadar-AppScan Integration QVM and Demo Lunch QRM and Demo Test, QA, and Wrap-up

This agenda is subject to change.

© 2012 IBM Corporation

IBM Security Systems

12© 2014 IBM Corporation

IAM CTP Track

Thursday 20th February ISAM 8.0 "all-in-one" appliance strategy session

All-in-one appliance deployment patternsOverview and (beta) demo of common deployment scenarios to be delivered in Feb/March

Sales Messaging and Roadmap 2014 roadmap deliverables for IAM, IDaaS, IAM analytics

ISAM for Mobile presentationIntroduction to appliance and operations (firmware, activation, clustering etc.)Policy Engine Concepts and Configuration: Attributes, Obligations, PIPs,

Risk Profiles, Policy Authoring; How to demonstrate ISAM for Mobile functionality Friday 21st February ISAM for Web and Mobile Appliances Lab (self-paced with breaks)

Learn hands-on experiences with common customer scenarios including: E-mail One Time Password for silent device registration E-mail One Time Password for device registration with consent Attributes from POST data driving HOTP One Time Password Attributes from JSON data driving TOTP (Google Authenticator) One Time

Password Scoped, Delegated Access with OAuth

Integrated Content Protection protecting against SQL injection Common deployment scenarios with sizing and pricing for all-in-one ISAM appliances

This agenda is subject to change.

© 2012 IBM Corporation

IBM Security Systems

13© 2014 IBM Corporation

IAM CTP Track continued

Saturday 22nd February Federated Directory Services presentation

Cover key scenarios to simplify enterprise silos of identitiesCompetitive differentiation with this solution approachOverview of additional scenarios covered in upcoming SSE release

Federated Directory Services lab (self-paced with breaks)Learn hands-on experiences with common customer scenarios including:

Integration of file-based identity sources into a central directoryIntegration of other LDAP identity sources into a central directoryUse of pass-through authentication to support distributed credential repositoriesUse of write-back to allow central mastering of identity attributesAuto-provisioning of ISAM to complete "don't touch my registry" scenario

Privileged Identity Manager Update Cover Preventing Insider Threat ScenarioDeployment patterns for greenfield, existing ISIM, existing ISAM-ESSO install ops

LUNCH ISIM Update including Identity Service Centre

Cover key Identity and Governance customer scenarios including: Provide Line-of-Business with "access catalog" interface

Custom reporting made simple with Cognos reporting engineDeployment patterns for migration and upgrade existing ISIM environmentReview integration of 3rd party IAG governance tool (CrossIdeas)

IAM Sandbox session Detailed review of the updated IAM Sandbox

New scenarios to support pre-sales activitiesUse of IAM Sandbox for demos, PoTs and even PoCs

This agenda is subject to change.

© 2012 IBM Corporation

IBM Security Systems

14© 2014 IBM Corporation

Threat CTP Track

Thursday 20-Feb Introduction to IBM Security Network Protection XGS Setting up the appliance LMI overview and SiteProtector registration

Friday 21-Feb Monitoring event data Network access policy rules Advanced network access control Local authentication

Saturday 22-Feb Remote authentication IPS policy overview Outbound SSL decryption and inspection (Adding technical details) Inbound SSL decryption and inspection QRadar flow data

This agenda is subject to change.

© 2012 IBM Corporation

IBM Security Systems

15© 2014 IBM Corporation

Trusteer Apex Track Thursday, February 20th

Topic

Welcome / Introductions

Trusteer Apex OverviewWhat Problem Does Apex Solve, How Does It Solve It, Product Architecture

4:15 – 4:30 Break

Exploitation PreventionStateful Application Control, Java Content Management, ASLR Enforcement

Corporate Password ProtectionProtecting Enterprise Credentials

Trusteer Apex Track Friday, February 21st

Topic

Data Exfiltration PreventionCommunication Blocking, Application Adaptive Protection

Overview of Trusteer Apex Demo Environment (used for labs)Good Guy, Bad Guy, Trusteer Management Application (TMA)

3:30 – 4:00 Break

Student LabExploitation Prevention, Data Exfiltration Prevention and Corporate Password Protection using Good Guy/Bad Guy Demo Images

This agenda is subject to change.

© 2012 IBM Corporation

IBM Security Systems

16© 2014 IBM Corporation

Trusteer Apex Track Saturday, February 22nd

Topic

Trusteer Management Application (TMA)Exploitation Prevention and Data Exfiltration Policies

Student LabTrusteer Management Application

Troubleshooting Techniques for Apex

10:00 – 10:30 Break

Students Practice DemosPractice Presenting Good Guy/Bad Guy Demo to other Students

12:00 – 1:30 Lunch

Trusteer Apex Sales UpdateSummary of what will be presented to the Security Sellers

Overview of the CompetitionFireEye, McAfee, Bit9, Bromium, Invincea

Trust Apex RoadmapOverview of Product Updates for 1H 2014

Class SummaryQ&A, Feedback, Getting Set Up to Demo to Clients

This agenda is subject to change.