SlideShare una empresa de Scribd logo
1 de 10
Securing a Smarter Planet with IBM Security Business Partners via online networking Kelly Schupp, IBM Marketing Communications Strategist LinkedIn  | IBM profile Elaine Tully, IBM Marketing Specialist LinkedIn   |  Twitter   |  IBM profile Tiffany Winman, IBM community and social media strategist LinkedIn   |  Twitter   |  IBM profile
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why is online networking so important? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Sources: 1) Forrester, 2008; 2) eMarketer, 2008 / Linked In 2008; 3) & 4) Inc. 500, 2008; 5) Universal McCann, 2008
Benefits of networking ,[object Object],[object Object],[object Object],[object Object]
IBM at RSA Website ,[object Object],[object Object],[object Object],[object Object],[object Object],http://ibm.com/security/events/rsa
IBM Security community ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://ibm.com/community/security
LinkedIn: IBM Security Group ,[object Object],[object Object],[object Object],[object Object],[object Object]
Twitter: IBM Security  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://twitter.com/ibmsecurity
YouTube: Service Management ,[object Object],[object Object],[object Object],[object Object],http://youtube.com/ibmservicemanagement
Leverage new IBM PartnerWorld communities http://ibm.com/connect/partnerworld

Más contenido relacionado

Destacado

Application Security
Application SecurityApplication Security
Application Securityflorinc
 
[Short 10-00] Глеб Пахаренко - Криптография на каждый день
[Short 10-00] Глеб Пахаренко - Криптография на каждый день[Short 10-00] Глеб Пахаренко - Криптография на каждый день
[Short 10-00] Глеб Пахаренко - Криптография на каждый деньUISGCON
 
Ibm smarter planet strategy 20130524 v5
Ibm smarter planet strategy 20130524 v5Ibm smarter planet strategy 20130524 v5
Ibm smarter planet strategy 20130524 v5ISSIP
 
Security of academic data in the cloud
Security of academic data in the cloudSecurity of academic data in the cloud
Security of academic data in the cloudJanet Brokerage
 
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)Mark Heid
 
Social Media & Open Social Introduction
Social Media & Open Social IntroductionSocial Media & Open Social Introduction
Social Media & Open Social Introductionkit sharma
 
The Three Pillars of Effective Social Media
The Three Pillars of Effective Social MediaThe Three Pillars of Effective Social Media
The Three Pillars of Effective Social Mediasarahsteelsm
 
Social Media Case Studies B2B Technology Companies
Social Media Case Studies B2B Technology CompaniesSocial Media Case Studies B2B Technology Companies
Social Media Case Studies B2B Technology CompaniesVizRED
 
Social Media For Business Part 1 Social Media Basics
Social Media For Business Part 1 Social Media BasicsSocial Media For Business Part 1 Social Media Basics
Social Media For Business Part 1 Social Media BasicsSteven Fisher
 
Executing a Successful Social Media Listening Strategy
Executing a Successful Social Media Listening StrategyExecuting a Successful Social Media Listening Strategy
Executing a Successful Social Media Listening StrategySocial Media Strategies Summit
 
Social Business & Innovation in IBM - CBS 2016
Social Business & Innovation in IBM  - CBS 2016 Social Business & Innovation in IBM  - CBS 2016
Social Business & Innovation in IBM - CBS 2016 Anders Quitzau
 
TechSolCom présente IBM Smarter Commerce
TechSolCom présente IBM Smarter CommerceTechSolCom présente IBM Smarter Commerce
TechSolCom présente IBM Smarter CommerceTechSolCom
 
Social Media Strategy @ IBM: Programs & Resources
Social Media Strategy @ IBM: Programs & ResourcesSocial Media Strategy @ IBM: Programs & Resources
Social Media Strategy @ IBM: Programs & ResourcesDelaney Turner
 

Destacado (14)

Application Security
Application SecurityApplication Security
Application Security
 
[Short 10-00] Глеб Пахаренко - Криптография на каждый день
[Short 10-00] Глеб Пахаренко - Криптография на каждый день[Short 10-00] Глеб Пахаренко - Криптография на каждый день
[Short 10-00] Глеб Пахаренко - Криптография на каждый день
 
Ibm smarter planet strategy 20130524 v5
Ibm smarter planet strategy 20130524 v5Ibm smarter planet strategy 20130524 v5
Ibm smarter planet strategy 20130524 v5
 
Security of academic data in the cloud
Security of academic data in the cloudSecurity of academic data in the cloud
Security of academic data in the cloud
 
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
 
Social Media & Open Social Introduction
Social Media & Open Social IntroductionSocial Media & Open Social Introduction
Social Media & Open Social Introduction
 
Social media @ IBM
Social media @ IBM Social media @ IBM
Social media @ IBM
 
The Three Pillars of Effective Social Media
The Three Pillars of Effective Social MediaThe Three Pillars of Effective Social Media
The Three Pillars of Effective Social Media
 
Social Media Case Studies B2B Technology Companies
Social Media Case Studies B2B Technology CompaniesSocial Media Case Studies B2B Technology Companies
Social Media Case Studies B2B Technology Companies
 
Social Media For Business Part 1 Social Media Basics
Social Media For Business Part 1 Social Media BasicsSocial Media For Business Part 1 Social Media Basics
Social Media For Business Part 1 Social Media Basics
 
Executing a Successful Social Media Listening Strategy
Executing a Successful Social Media Listening StrategyExecuting a Successful Social Media Listening Strategy
Executing a Successful Social Media Listening Strategy
 
Social Business & Innovation in IBM - CBS 2016
Social Business & Innovation in IBM  - CBS 2016 Social Business & Innovation in IBM  - CBS 2016
Social Business & Innovation in IBM - CBS 2016
 
TechSolCom présente IBM Smarter Commerce
TechSolCom présente IBM Smarter CommerceTechSolCom présente IBM Smarter Commerce
TechSolCom présente IBM Smarter Commerce
 
Social Media Strategy @ IBM: Programs & Resources
Social Media Strategy @ IBM: Programs & ResourcesSocial Media Strategy @ IBM: Programs & Resources
Social Media Strategy @ IBM: Programs & Resources
 

Último

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Securing a Smarter Planet with IBM Security Business Partners via online networking

  • 1. Securing a Smarter Planet with IBM Security Business Partners via online networking Kelly Schupp, IBM Marketing Communications Strategist LinkedIn | IBM profile Elaine Tully, IBM Marketing Specialist LinkedIn | Twitter | IBM profile Tiffany Winman, IBM community and social media strategist LinkedIn | Twitter | IBM profile
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Leverage new IBM PartnerWorld communities http://ibm.com/connect/partnerworld