Visit IBM Resilient at the Next Cyber Security Event

  1. Black Hat USA 2018

    8.4.18

    Black Hat USA 2018

    Black Hat USA is the world's leading information security event, providing attendees with the very latest in research, development, and trends. 
    Read More
  2. SecureWorld St. Louis

    9.18.18

    SecureWorld St. Louis

    SecureWorld conferences provide more content and facilitate more professional connections than any other event in the cybersecurity industry.
    Read More
  3. Security Advisor Alliance Summit

    9.18.18

    Security Advisor Alliance Summit

    The velocity of change demands next generation leadership. The leaders of the Alliance invite you to our Executive Leadership Summit. This premier gathering of senior information security leaders focuses on skill development, leadership building and actionable takeaways that drive personal and organizational success.
    Read More
  4. ENGAGE Forum 2018

    9.25.18

    ENGAGE Forum 2018

    Join us for the first annual Engage 2018 | IBM Resilient Customer Forum, taking place September 26 – 27, 2018 at the IBM Security HQ in Cambridge, MA.
    Read More
  5. DerbyCon

    10.5.18

    DerbyCon

    DerbyCon 8.0’s theme this year is “Evolution” because of the evolution of the information security industry and how it is always changing and our desire to try to make it better. Evolution is simply and exactly how it is defined: the gradual development of something, especially from a simple to a more complex form. The information security space started from something simple, and is becoming more and more complex each and everyday. How we handle the complexities and tackle situations is all apart of how we grow as an industry, and DerbyCon is a place where anyone who is remotely interested or someone who is well established in information security can experience it.
    Read More
  6. Cb Connect 2018

    10.10.18

    Cb Connect 2018

    Join us and participate in a series of panels, presentations and practical training on topics ranging from the need to move endpoint security to the cloud to how to hone your threat hunting skills and the most effective ways to combat the latest and greatest threats shared directly from your peers.
    Read More
  7. IAPP Privacy. Security. Risk. 2018

    10.18.18

    IAPP Privacy. Security. Risk. 2018

    What combination of technology, best practices, policies and regulations promotes growth and innovation without sacrificing privacy? Join the IAPP and your peers in privacy and information security at Privacy. Security. Risk. 2018 in Austin, Texas to work toward an answer.
    Read More
  8. Cyber Security Summit

    10.22.18

    Cyber Security Summit

    At the Cyber Security Summit, our mission is to produce a multi-stakeholder consortium that brings together industry, government and academic interests in an effort to improve the state of cyber security on both a domestic and international level.
    Read More
  9. ISF’s 29th Annual World Congress

    10.27.18

    ISF’s 29th Annual World Congress

    Join over 1,000 global senior executives at a series of keynote presentations, workshops and networking sessions where you can share knowledge, best practice and thought leadership in a confidential peer-group environment.
    Read More

View Our Additional Resources

  1. Accelerating SOC Transformation with IBM Resilient and Carbon Black

     

    Accelerating SOC Transformation with IBM Resilient and Carbon Black

    Security Operation Centers (SOCs) today are complex environments. They often have too many separate tools, uncoordinated analysts in the response process, and confusion around alert prioritization. Because of this, SOCs consistently struggle responding to the most urgent incidents.

    Watch Now
  2. Six Steps for Building a Robust Incident Response Function

     

    Six Steps for Building a Robust Incident Response Function

    To overcome today’s top security challenges, organizations are increasingly seeking to orchestrate their incident response (IR). They aim to build agile, measurable IR workflows, increase communication and coordination, and arm their team with the right tools and intelligence.

    Download Now
  3. Intelligent Orchestration: Battling Complex Cyberattacks with the Next Generation of Incident Response and Security Operations

     

    Intelligent Orchestration: Battling Complex Cyberattacks with the Next Generation of Incident Response and Security Operations

    Intelligent Orchestration – the next generation of incident response (IR) – is a powerful security capability that uniquely blends human and machine intelligence with orchestration and automation, dramatically accelerating and sharpening organizations’ response to cyberattacks.

    Download Now
  4. What is Intelligent Orchestration: Ask Ted

     

    What is Intelligent Orchestration: Ask Ted

    Intelligent Orchestration – the next generation of incident response (IR) – is a powerful security capability that uniquely blends human and machine intelligence with orchestration and automation, dramatically accelerating and sharpening organizations’ response to cyberattacks.

    Watch Now