Despite several high-profile attacks conducted by suspected state-sponsored groups using advanced methods, IBM X-Force® believes off-the-shelf tools and techniques used against a broad target base were responsible for the bulk of 2012’s security incidents. They attribute this to the wide availability of toolkits and the large number of vulnerable Internet applications. IBM X-Force® observes that attackers achieved a greater return on exploit development in 2012.
IBM Security also recently predicted mobile computing devices should be more secure than traditional user computing devices by 2014. Our report covers today’s secure software mobile application development initiatives and how security executives advocate the separation of personas or roles on employee-owned devices.
Please join experts from IBM X-Force and IBM Security Systems for this half day briefing. We will dive into the findings of our latest Trend and Risk report, explore options to protect against threats, and share real world examples of the latest online security solutions and strategies.
Register now for this opportunity to hear the latest insights and learn how to protect and safeguard your organisation with IBM's end-to-end security capabilities.
Wednesday 3rd July, 9-1pm at IBM Client Centre, Southbank, London