SlideShare a Scribd company logo
1 of 22
© 2014 IBM Corporation 
BusinessConnect 
A New Era of Smart 
10/6/2014 
IBM Security Intelligence 
Att ligga steget före in en allt mer hotfylld värld 
michael.andersson@se.ibm.com
A New Era of Smart 
The threat level is continually intensifying 
Operational 
Sophistication 
IBM X-Force declared 
Year of the 
Security Breach 
Near Daily Leaks 
of Sensitive Data 
40% increase 
in reported data 
breaches and incidents 
Relentless Use 
of Multiple Methods 
500,000,000+ records 
were leaked, while the future 
shows no sign of change 
2011 2012 2013 
Physical 
access 
Malware XSS Watering 
hole 
Undisclosed 
Note: Size of circle estimates relative impact of incident in terms of cost to business. 
SQL 
injection 
Spear 
phishing 
DDoS Third-party 
software 
Attack types 
Source: IBM X-Force Threat Intelligence Quarterly – 1Q 2014 
3 © 2014 IBM Corporation
A New Era of Smart 
83% 
of enterprises 
have difficulty finding the 
security skills they need 
2012 ESG Research 
614% security tools from 
© 2014 IBM Corporation 
A new security reality is here 
61% 
data theft and cybercrime 
are their greatest threats 
2012 IBM Global Reputational Risk & IT Study 
of organizations say 
$3.5M 
Average cost of a 
data breach 
2014 Cost of Data Breach, Ponemon Institute 
70% 
of security 
executives have cloud and 
mobile security concerns 
2013 IBM CISO Survey 
Mobile malware growth 
in just one year 
2012 - 2013 Juniper Mobile Threat Report 
vendors 
85 
45 
IBM client example
Customer Case 1: 
Under Attack 
5 © 2014 IBM Corporation
A New Era of Smart 
Company confirms even 
more millons of records 
stolen after story leaked 
© 2014 IBM Corporation 
An attack timeline 
Company are 
compliance certified 
...and more 
alerts... Company confirms 
Attacker test malware Malware upgraded – 
Malware fully installed 
Attacker steals 
credentials 
Anti-Virus Software 
identifies malicious 
activity 
IDS/NGFW 
triggers alert 
More alerts from 
IDS/NGFW 
Company are 
notified by 
government 
organization 
Company confirms 
millons of records 
stolen efter story 
leaked 
Attacker first breach 
customer environment 
Begin to exfiltrate 
data 
breach - 
removes most malware 
Attacker lose foothold 
in network 
Company timeline 
Attacker timeline
A New Era of Smart 
© 2014 IBM Corporation 
An attack timeline 
Company are 
compliance 
certified 
Attacker test 
malware 
Malware fully 
installed 
Attacker steals 
credentials 
Anti-Virus Software 
identifies malicious 
activity 
IDS/NGFW 
triggers alert 
More alerts 
from 
IDS/NGFW 
Company 
are notified 
by 
government 
organization 
Company confirms 
millons of records 
stolen efter story 
leaked 
Attacker first 
breach customer 
environment 
...and more 
alerts... 
Malware upgraded – 
Begin to exfiltrate 
data 
Company 
confirms breach - 
removes most 
malware 
Attacker lose 
foothold in 
network 
Company 
confirms even 
more millons 
of records 
stolen after 
Company story leaked 
timeline 
Attacker 
timeline 
 AV and IDS alert 
 False position prone 
 Users don’t 
fully trust 
 No additional activity 
information 
 What traffic 
preceded and 
followed, from 
and to where? 
 Network and 
business context 
 Are these or 
can they reach 
critical assets 
 No business process 
for triaging and 
analysing 
 Ignored!
A New Era of Smart 
© 2014 IBM Corporation 
An attack timeline 
Company are 
compliance 
certified 
Attacker test 
malware 
Malware fully 
installed 
Attacker steals 
credentials 
Anti-Virus Software 
identifies malicious 
activity 
IDS/NGFW 
triggers alert 
More alerts 
from 
IDS/NGFW 
Company 
are notified 
by 
government 
organization 
Company confirms 
millons of records 
stolen efter story 
leaked 
Attacker first 
breach customer 
environment 
...and more 
alerts... 
Malware upgraded – 
Begin to exfiltrate 
data 
Company 
confirms breach - 
removes most 
malware 
Attacker lose 
foothold in 
network 
Company 
confirms even 
more millons 
of records 
stolen after 
Company story leaked 
timeline 
Attacker 
timeline 
 More alerts 
 Different areas of 
network 
 Not correlated with 
other activity or in 
the context of the 
business or network 
 Not enough visibility 
or context 
 Still ignored!
A New Era of Smart 
© 2014 IBM Corporation 
An attack timeline 
Company are 
compliance 
certified 
Attacker test 
malware 
Malware fully 
installed 
Attacker steals 
credentials 
Anti-Virus Software 
identifies malicious 
activity 
IDS/NGFW 
triggers alert 
More alerts 
from 
IDS/NGFW 
Company 
are notified 
by 
government 
organization 
Company confirms 
millons of records 
stolen efter story 
leaked 
Attacker first 
breach customer 
environment 
...and more 
alerts... 
Malware upgraded – 
Begin to exfiltrate 
data 
Company 
confirms breach - 
removes most 
malware 
Attacker lose 
foothold in 
network 
Company 
confirms even 
more millons 
of records 
stolen after 
Company story leaked 
timeline 
Attacker 
timeline 
 Too Late 
 Nightmare business 
scenario unfolds
A New Era of Smart 
© 2014 IBM Corporation 
An attack timeline 
Company are 
compliance 
certified 
Attacker test 
malware 
Malware fully 
installed 
Attacker steals 
credentials 
Anti-Virus Software 
identifies malicious 
activity 
IDS/NGFW 
triggers alert 
More alerts 
from 
IDS/NGFW 
Company 
are notified 
by 
government 
organization 
Company confirms 
millons of records 
stolen efter story 
leaked 
Attacker first 
breach customer 
environment 
...and more 
alerts... 
Malware upgraded – 
Begin to exfiltrate 
data 
Company 
confirms breach - 
removes most 
malware 
Attacker lose 
foothold in 
network 
Company 
confirms even 
more millons 
of records 
stolen efter 
Company story leaked 
timeline 
Attacker 
timeline 
 Nightmare 
 Worst case business 
scenario
A New Era of Smart 
© 2014 IBM Corporation 
QRadar Security Intelligence - Taking in data from wide 
spectrum of feeds
A New Era of Smart 
© 2014 IBM Corporation 
Answering questions to help prevent and remediate attacks 
What data 
contributed to 
the offense?
Customer Case 2: 
Vulnerability prioritization 
13 © 2014 IBM Corporation
A New Era of Smart 
© 2014 IBM Corporation 
IE Zero day announced ! 
 Real example, from a real customer 
 The background 
– 2013-3893 Use-after-free vulnerability 
– Most versions of IE are affected 
– Exploits are available and have been active on the internet at malicious 
web sites for a week 
– Metasploit release an exploit kit within 1 week 
 The Challenge 
– 1000’s of windows assets in the enterprise 
– What ones are vulnerable ? 
• Re scan the network – how long will that take ? 
• Need answers now ! 
– Length of time to patch 
• Must prioritise 
• What ones do I patch first ?
A New Era of Smart 
© 2014 IBM Corporation 
How did QVM and Security Intelligence help – Stage 1 
 No need to re-scan 
 QVM’s early alerts correlated data from the last scan with the zero data vulnerability 
information to immediately create early warning vulnerabilities 
 Time saved 1-2 days in scanning time
A New Era of Smart 
© 2014 IBM Corporation 
How did QVM and Security Intelligence help – Stage 2 
 Patch them all ? No. No need to patch assets were there has been no web traffic 
 QVM correlates QFlow Layer 7 traffic with vulnerabilities on assets to remove those without 
associated traffic 
 Time saved 15%-20% reduction in patching time 
− Not wasting time and effort on patching assets where there has been no web traffic
A New Era of Smart 
© 2014 IBM Corporation 
How did QVM and Security Intelligence help – Stage 3 
 Patch the remainder ? No. Exploits of this vulnerability live in malicious web sites. 
 QRadar filter out those that have visited potentially malicious web sites in the last month 
 21 Assets ! 
 Time saved >90% reduction in patching time – ~5 days
A New Era of Smart 
© 2014 IBM Corporation 
What action to take next ? 
 Patch to apply – QVM has the answer 
 IPS signature to enable – QVM has the answer
A New Era of Smart 
© 2014 IBM Corporation 
Reducing data load by leveraging network context 
Inactive: QFlow Collector data helps QRadar Vulnerability 
Manager sense application activity 
Patched: IBM Endpoint Manager helps QVM understand 
which vulnerabilities will be patched 
Blocked: QRadar Risk Manager helps QVM understand 
which vulnerabilities are blocked by firewalls and IPSs 
Critical: Vulnerability knowledge base, remediation flow 
and QRM policies inform QVM about business critical 
vulnerabilities 
At Risk: X-Force Threat and SIEM security incident data, 
coupled with QFlow network traffic visibility, help QVM see 
assets communicating with potential threats 
Exploited: SIEM correlation and IPS data help QVM reveal 
which vulnerabilities have been exploited
New threats requires a new 
approach 
20 © 2014 IBM Corporation
A New Era of Smart 
© 2014 IBM Corporation 
Security Teams are Adopting a New Approach 
Threats have evolved… Broad Attacks 
Indiscriminate malware, 
spam and DoS activity 
Targeted Attacks 
Advanced, persistent, organized, 
and politically or financially motivated 
Requiring a new 
approach to protection… 
Traditional Approach 
Compliance-driven, Reactionary 
Strategic Approach 
Intelligence-driven, Continuous 
…yet the majority 
of security teams 
are still using 
insufficient defenses 
 Build strong perimeters 
 Protect all assets 
 Use signature-based methods 
 Periodically scan for known 
threats 
 Read the latest news 
 Collect logs 
 Conduct manual interviews 
 Shut down systems 
 Assume constant compromise 
 Prioritize high-risk assets 
 Use behavioral-based methods 
 Continuously monitor activity 
 Consume real-time threat feeds 
 Collect everything 
 Automate correlation and 
analytics 
 Gather, preserve, retrace 
evidence
© 2012 IBM Corporation 
IBM Security Systems 
23 
Use intelligence and 
anomaly detection 
across every domain 
Build an intelligence 
vault around your 
crown jewels 
Prepare your 
response for 
the inevitable 
Use analytics and insights for smarter defense
IBM Security Systems 
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response 
to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated 
or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure 
and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to 
be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, 
products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE 
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. 
www.ibm.com/security 
© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes 
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use 
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any 
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement 
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in 
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole 
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any 
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United 
States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

More Related Content

What's hot

Attack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainAttack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainIBM Security
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlJose Lopez
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyePrime Infoserv
 
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They OccurAnticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They OccurSkybox Security
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itIBM Security
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy clubGet up to Speed
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentIBM Security
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio Rosa[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio RosaTI Safe
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019ImekDesign
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerIBM Security
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteIBM Security
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsIBM Security
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsSteven SIM Kok Leong
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsSteven SIM Kok Leong
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemIBM Security
 

What's hot (20)

Attack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainAttack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack Chain
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They OccurAnticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio Rosa[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio Rosa
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a Hacker
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPs
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical Threats
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 

Similar to IBM Security Intelligence Helps Protect Against Evolving Cyber Threats

Nuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack ChainNuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack ChainIBM Security
 
TechFai.com.pdf
TechFai.com.pdfTechFai.com.pdf
TechFai.com.pdfTechFai
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015Andreanne Clarke
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionBitglass
 
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
Lessons learned from 2017 cybersecurity incidents, 2018 and beyondLessons learned from 2017 cybersecurity incidents, 2018 and beyond
Lessons learned from 2017 cybersecurity incidents, 2018 and beyondAPNIC
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceDarren Argyle
 
Security_prediction_2014
Security_prediction_2014Security_prediction_2014
Security_prediction_2014Truong Minh Yen
 
Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet IBM Sverige
 
Everything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepEverything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepIvanti
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessFibonalabs
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016Francisco González Jiménez
 
Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileMarketingArrowECS_CZ
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of thingsChristian Milde
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Lancope, Inc.
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security ServicesRadware
 

Similar to IBM Security Intelligence Helps Protect Against Evolving Cyber Threats (20)

Nuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack ChainNuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack Chain
 
TechFai.com.pdf
TechFai.com.pdfTechFai.com.pdf
TechFai.com.pdf
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
Lessons learned from 2017 cybersecurity incidents, 2018 and beyondLessons learned from 2017 cybersecurity incidents, 2018 and beyond
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
Security_prediction_2014
Security_prediction_2014Security_prediction_2014
Security_prediction_2014
 
Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet
 
Everything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepEverything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeep
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast Mobile
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
DarkWeb
DarkWebDarkWeb
DarkWeb
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security Services
 

More from IBM Sverige

Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18IBM Sverige
 
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18IBM Sverige
 
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
IBM Sverige
 
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, InterexionIBM Sverige
 
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBMIBM Sverige
 
Multiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetMultiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetIBM Sverige
 
Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'IBM Sverige
 
Blockchain explored
Blockchain explored Blockchain explored
Blockchain explored IBM Sverige
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architectedIBM Sverige
 
Blockchain explained
Blockchain explainedBlockchain explained
Blockchain explainedIBM Sverige
 
Grow smarter project kista watson summit 2018_tommy auoja-1
Grow smarter project  kista watson summit 2018_tommy auoja-1Grow smarter project  kista watson summit 2018_tommy auoja-1
Grow smarter project kista watson summit 2018_tommy auoja-1IBM Sverige
 
Bemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalBemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalIBM Sverige
 
Power ai nordics dcm
Power ai nordics dcmPower ai nordics dcm
Power ai nordics dcmIBM Sverige
 
Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18IBM Sverige
 
Hwx introduction to_ibm_ai
Hwx introduction to_ibm_aiHwx introduction to_ibm_ai
Hwx introduction to_ibm_aiIBM Sverige
 
Ac922 watson 180208 v1
Ac922 watson 180208 v1Ac922 watson 180208 v1
Ac922 watson 180208 v1IBM Sverige
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box IBM Sverige
 
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Watson kista summit 2018   en bättre arbetsdag för de många människornaWatson kista summit 2018   en bättre arbetsdag för de många människorna
Watson kista summit 2018 en bättre arbetsdag för de många människornaIBM Sverige
 
Iwcs and cisco watson kista summit 2018 v2
Iwcs and cisco   watson kista summit 2018 v2Iwcs and cisco   watson kista summit 2018 v2
Iwcs and cisco watson kista summit 2018 v2IBM Sverige
 
Ibm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIbm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIBM Sverige
 

More from IBM Sverige (20)

Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
 
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
 
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

 
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
 
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
 
Multiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetMultiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska Universitetssjukhuset
 
Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'
 
Blockchain explored
Blockchain explored Blockchain explored
Blockchain explored
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architected
 
Blockchain explained
Blockchain explainedBlockchain explained
Blockchain explained
 
Grow smarter project kista watson summit 2018_tommy auoja-1
Grow smarter project  kista watson summit 2018_tommy auoja-1Grow smarter project  kista watson summit 2018_tommy auoja-1
Grow smarter project kista watson summit 2018_tommy auoja-1
 
Bemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalBemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston final
 
Power ai nordics dcm
Power ai nordics dcmPower ai nordics dcm
Power ai nordics dcm
 
Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18
 
Hwx introduction to_ibm_ai
Hwx introduction to_ibm_aiHwx introduction to_ibm_ai
Hwx introduction to_ibm_ai
 
Ac922 watson 180208 v1
Ac922 watson 180208 v1Ac922 watson 180208 v1
Ac922 watson 180208 v1
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box
 
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Watson kista summit 2018   en bättre arbetsdag för de många människornaWatson kista summit 2018   en bättre arbetsdag för de många människorna
Watson kista summit 2018 en bättre arbetsdag för de många människorna
 
Iwcs and cisco watson kista summit 2018 v2
Iwcs and cisco   watson kista summit 2018 v2Iwcs and cisco   watson kista summit 2018 v2
Iwcs and cisco watson kista summit 2018 v2
 
Ibm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIbm intro (watson summit) bkacke
Ibm intro (watson summit) bkacke
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

IBM Security Intelligence Helps Protect Against Evolving Cyber Threats

  • 1. © 2014 IBM Corporation BusinessConnect A New Era of Smart 10/6/2014 IBM Security Intelligence Att ligga steget före in en allt mer hotfylld värld michael.andersson@se.ibm.com
  • 2. A New Era of Smart The threat level is continually intensifying Operational Sophistication IBM X-Force declared Year of the Security Breach Near Daily Leaks of Sensitive Data 40% increase in reported data breaches and incidents Relentless Use of Multiple Methods 500,000,000+ records were leaked, while the future shows no sign of change 2011 2012 2013 Physical access Malware XSS Watering hole Undisclosed Note: Size of circle estimates relative impact of incident in terms of cost to business. SQL injection Spear phishing DDoS Third-party software Attack types Source: IBM X-Force Threat Intelligence Quarterly – 1Q 2014 3 © 2014 IBM Corporation
  • 3. A New Era of Smart 83% of enterprises have difficulty finding the security skills they need 2012 ESG Research 614% security tools from © 2014 IBM Corporation A new security reality is here 61% data theft and cybercrime are their greatest threats 2012 IBM Global Reputational Risk & IT Study of organizations say $3.5M Average cost of a data breach 2014 Cost of Data Breach, Ponemon Institute 70% of security executives have cloud and mobile security concerns 2013 IBM CISO Survey Mobile malware growth in just one year 2012 - 2013 Juniper Mobile Threat Report vendors 85 45 IBM client example
  • 4. Customer Case 1: Under Attack 5 © 2014 IBM Corporation
  • 5. A New Era of Smart Company confirms even more millons of records stolen after story leaked © 2014 IBM Corporation An attack timeline Company are compliance certified ...and more alerts... Company confirms Attacker test malware Malware upgraded – Malware fully installed Attacker steals credentials Anti-Virus Software identifies malicious activity IDS/NGFW triggers alert More alerts from IDS/NGFW Company are notified by government organization Company confirms millons of records stolen efter story leaked Attacker first breach customer environment Begin to exfiltrate data breach - removes most malware Attacker lose foothold in network Company timeline Attacker timeline
  • 6. A New Era of Smart © 2014 IBM Corporation An attack timeline Company are compliance certified Attacker test malware Malware fully installed Attacker steals credentials Anti-Virus Software identifies malicious activity IDS/NGFW triggers alert More alerts from IDS/NGFW Company are notified by government organization Company confirms millons of records stolen efter story leaked Attacker first breach customer environment ...and more alerts... Malware upgraded – Begin to exfiltrate data Company confirms breach - removes most malware Attacker lose foothold in network Company confirms even more millons of records stolen after Company story leaked timeline Attacker timeline  AV and IDS alert  False position prone  Users don’t fully trust  No additional activity information  What traffic preceded and followed, from and to where?  Network and business context  Are these or can they reach critical assets  No business process for triaging and analysing  Ignored!
  • 7. A New Era of Smart © 2014 IBM Corporation An attack timeline Company are compliance certified Attacker test malware Malware fully installed Attacker steals credentials Anti-Virus Software identifies malicious activity IDS/NGFW triggers alert More alerts from IDS/NGFW Company are notified by government organization Company confirms millons of records stolen efter story leaked Attacker first breach customer environment ...and more alerts... Malware upgraded – Begin to exfiltrate data Company confirms breach - removes most malware Attacker lose foothold in network Company confirms even more millons of records stolen after Company story leaked timeline Attacker timeline  More alerts  Different areas of network  Not correlated with other activity or in the context of the business or network  Not enough visibility or context  Still ignored!
  • 8. A New Era of Smart © 2014 IBM Corporation An attack timeline Company are compliance certified Attacker test malware Malware fully installed Attacker steals credentials Anti-Virus Software identifies malicious activity IDS/NGFW triggers alert More alerts from IDS/NGFW Company are notified by government organization Company confirms millons of records stolen efter story leaked Attacker first breach customer environment ...and more alerts... Malware upgraded – Begin to exfiltrate data Company confirms breach - removes most malware Attacker lose foothold in network Company confirms even more millons of records stolen after Company story leaked timeline Attacker timeline  Too Late  Nightmare business scenario unfolds
  • 9. A New Era of Smart © 2014 IBM Corporation An attack timeline Company are compliance certified Attacker test malware Malware fully installed Attacker steals credentials Anti-Virus Software identifies malicious activity IDS/NGFW triggers alert More alerts from IDS/NGFW Company are notified by government organization Company confirms millons of records stolen efter story leaked Attacker first breach customer environment ...and more alerts... Malware upgraded – Begin to exfiltrate data Company confirms breach - removes most malware Attacker lose foothold in network Company confirms even more millons of records stolen efter Company story leaked timeline Attacker timeline  Nightmare  Worst case business scenario
  • 10. A New Era of Smart © 2014 IBM Corporation QRadar Security Intelligence - Taking in data from wide spectrum of feeds
  • 11. A New Era of Smart © 2014 IBM Corporation Answering questions to help prevent and remediate attacks What data contributed to the offense?
  • 12. Customer Case 2: Vulnerability prioritization 13 © 2014 IBM Corporation
  • 13. A New Era of Smart © 2014 IBM Corporation IE Zero day announced !  Real example, from a real customer  The background – 2013-3893 Use-after-free vulnerability – Most versions of IE are affected – Exploits are available and have been active on the internet at malicious web sites for a week – Metasploit release an exploit kit within 1 week  The Challenge – 1000’s of windows assets in the enterprise – What ones are vulnerable ? • Re scan the network – how long will that take ? • Need answers now ! – Length of time to patch • Must prioritise • What ones do I patch first ?
  • 14. A New Era of Smart © 2014 IBM Corporation How did QVM and Security Intelligence help – Stage 1  No need to re-scan  QVM’s early alerts correlated data from the last scan with the zero data vulnerability information to immediately create early warning vulnerabilities  Time saved 1-2 days in scanning time
  • 15. A New Era of Smart © 2014 IBM Corporation How did QVM and Security Intelligence help – Stage 2  Patch them all ? No. No need to patch assets were there has been no web traffic  QVM correlates QFlow Layer 7 traffic with vulnerabilities on assets to remove those without associated traffic  Time saved 15%-20% reduction in patching time − Not wasting time and effort on patching assets where there has been no web traffic
  • 16. A New Era of Smart © 2014 IBM Corporation How did QVM and Security Intelligence help – Stage 3  Patch the remainder ? No. Exploits of this vulnerability live in malicious web sites.  QRadar filter out those that have visited potentially malicious web sites in the last month  21 Assets !  Time saved >90% reduction in patching time – ~5 days
  • 17. A New Era of Smart © 2014 IBM Corporation What action to take next ?  Patch to apply – QVM has the answer  IPS signature to enable – QVM has the answer
  • 18. A New Era of Smart © 2014 IBM Corporation Reducing data load by leveraging network context Inactive: QFlow Collector data helps QRadar Vulnerability Manager sense application activity Patched: IBM Endpoint Manager helps QVM understand which vulnerabilities will be patched Blocked: QRadar Risk Manager helps QVM understand which vulnerabilities are blocked by firewalls and IPSs Critical: Vulnerability knowledge base, remediation flow and QRM policies inform QVM about business critical vulnerabilities At Risk: X-Force Threat and SIEM security incident data, coupled with QFlow network traffic visibility, help QVM see assets communicating with potential threats Exploited: SIEM correlation and IPS data help QVM reveal which vulnerabilities have been exploited
  • 19. New threats requires a new approach 20 © 2014 IBM Corporation
  • 20. A New Era of Smart © 2014 IBM Corporation Security Teams are Adopting a New Approach Threats have evolved… Broad Attacks Indiscriminate malware, spam and DoS activity Targeted Attacks Advanced, persistent, organized, and politically or financially motivated Requiring a new approach to protection… Traditional Approach Compliance-driven, Reactionary Strategic Approach Intelligence-driven, Continuous …yet the majority of security teams are still using insufficient defenses  Build strong perimeters  Protect all assets  Use signature-based methods  Periodically scan for known threats  Read the latest news  Collect logs  Conduct manual interviews  Shut down systems  Assume constant compromise  Prioritize high-risk assets  Use behavioral-based methods  Continuously monitor activity  Consume real-time threat feeds  Collect everything  Automate correlation and analytics  Gather, preserve, retrace evidence
  • 21. © 2012 IBM Corporation IBM Security Systems 23 Use intelligence and anomaly detection across every domain Build an intelligence vault around your crown jewels Prepare your response for the inevitable Use analytics and insights for smarter defense
  • 22. IBM Security Systems Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. www.ibm.com/security © Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.