SlideShare a Scribd company logo
1 of 36
©2015 IBM Corporation1 22 November 2016
Cybersecurity in the cognitive era
Priming your digital immune system
David Jarvis, IBM Institute for Business Value
Diana Kelley, IBM Security
Today’s speakers
David Jarvis
Security & CIO Lead
IBM Institute for Business Value
https://securityintelligence.com/author/david-jarvis
https://www.linkedin.com/in/davidajarvis
http://twitter.com/dajarvis
Diana Kelley
Executive Security Advisor
IBM Security
https://securityintelligence.com/author/diana-kelley
https://www.linkedin.com/in/dianakelleysecuritycurve
Entering the cognitive era of
security solutions
 Cybersecurity is reaching an inflection point:
– Increasing numbers and sophistication of threats on track to surpass current
capabilities to address and mitigate them
– Volume of adverse events and incidents surpassing the capacity of most security
operations teams
– Financial costs and risks are growing rapidly
 Security organizations need to leverage new capabilities to get ahead of the risks and
challenges
 But with mounting skills and resource gaps, spending more and staffing up security
operations is getting harder and harder to do
 What if?
– You could enhance the effectiveness of security operations with new tools that could
ingest and organize the threat landscape much more rapidly
– Systems could be taught how to bring better context to each threat and identify real
ones with greater accuracy
©2016 IBM Corporation 22 November 20164
Agenda
Overview Approach and firmographics
The current context Challenges, practices and gaps
Enter cognitive security solutions Benefits and challenges of cognitive security
Primed for cognitive security Characteristics of those that are ready
Recommendations How to start your cognitive security journey
©2016 IBM Corporation 22 November 20165
Industry
We surveyed a balanced distribution of 700 security
professionals in 35 countries, representing 18 industries
Over $10B
$500M - $1B
$1B – $5B
15%
40%
20%
Company size
(in $USD annualized revenue)
Under $500M 20%
$5B – $10B
5%
Geography
North America
Central and
South America
Middle East
and Africa
Western Europe
Central and
Eastern Europe
Asia Pacific
Japan
The current context
©2015 IBM Corporation7 22 November 2016
“It’s literally like being a merchant
sailor in the golden age of piracy —
there is no navy to protect you, there
is no police force, you are on your
own. On top of that, many don’t know
how to sail their boats, and they can’t
fire back at the attackers (it’s illegal).
You are literally trying to survive in a
hostile world with both arms tied
behind your back. However, you do
have some really interesting and
sophisticated tools to use that tell
you all about your threats.”
David Shipley – Director of Strategic Initiatives, Information
Technology Services, University of New Brunswick
©2016 IBM Corporation 22 November 20168
The current security operations context from our data
Dealing with
increasing costs and
justifying investments
with the business
Worried about
addressing speed
and complexity of
threats
Focused on impacts
to operations and
brand reputation
Improving security
operations
capabilities
Working to address
gaps in network and
data security and
threat response
#1 cybersecurity
challenge today and
tomorrow is reducing
average incident response
and resolution time
78% have seen the
cost for cybersecurity
increase in the last
two years
57% looking to improve
monitoring of network,
application, and data-level
security in the next 2-3 years
68% say the loss
of brand reputation
presents the greatest
future concern as a
major impact of an
intrusion
©2016 IBM Corporation 22 November 20169
The top challenge today is around response speed – analytics
will get even more focus in the future
©2016 IBM Corporation 22 November 201610
Companies are increasingly concerned about a loss of
reputation in the future – surpassing operational disruption
The rising costs of cybersecurity infrastructure also becomes a more
substantial issue in the future – increasing ~2X from today
~2X increase in
the worry around
loss of brand
reputation as a
major impact of
an intrusion
Most significant impacts enterprise has experienced / expect from intrusions
74% 57%Operational disruption
Data breach without financial or IP loss 37% 26%
Loss of brand reputation 68%35%
Rising costs for cybersecurity infrastructure 25% 43%
Regulatory violations 20% 23%
Financial loss 20% 31%
Stolen intellectual property 20% 32%
In the futurePast 2 years
Criminal prosecution & liability 5% 4%
©2016 IBM Corporation 22 November 201611
Almost everything is important, but network and data
protection coupled with speed are the weakest areas for most
©2016 IBM Corporation 22 November 201612
Significantly changing priorities in the future suggest some
gaps may widen if future initiatives don’t align to challenges
©2016 IBM Corporation 22 November 201613
With security costs continuing to rise, security leaders are
going to be under increased pressure to justify investments
Cost
78% have seen
the cost for
cybersecurity
increase in the last
two years
84% expect it to
continue to increase
in the next 2-3 years
Investment
70% spend over
10% of their IT
budget on
cybersecurity –
focused mainly on
prevention and
detection
ROI
63% get over a
25% ROI on their
cybersecurity
investments
With the majority
getting between a
25-50% ROI
©2016 IBM Corporation 22 November 201614
This most important factor to obtain funding approval hinges
on clear communication of risks and benefits
21%
24%
43%
51%
61%
0% 10% 20% 30% 40% 50% 60% 70%
External industry expert opinion (security,
legal, compliance, regulatory)
Third-party security services
recommendations (managed security
services, security consulting)
A high-profile breach in my industry
Cross-functional support from finance, risk
management, operations, or other
executives
Description of current risk exposure/gap in
your company
Factors used to justify a request for cybersecurity-related investments
92% say their funding requests for cybersecurity initiatives require a return on
investment (ROI) or other financial analysis for justification and approval
©2016 IBM Corporation 22 November 201615
That communication has to be in the language of the business,
cost to fix simply isn’t enough for financial analyses
16%
31%
41%
46%
66%
0% 10% 20% 30% 40% 50% 60% 70%
Payback period
Cost of capital
Direct loss: equity, cash, intellectual property
value, reputation
Opportunity cost; benefits lost as a result of a
breach
Cost to fix
Most important quantitative variables typically used in ROI/financial analysis for cybersecurity investments
Don’t underestimate the importance of incorporating opportunity cost/loss and
direct loss into investment justifications – speak in the language of the business
©2016 IBM Corporation 22 November 201616
A Canadian leader in financial protection, wealth and asset
management takes a unique approach to create value
The right tone from the top
Their well educated CEO makes security #1 across the C-
suite and promotes collaboration
This approach has reduced the friction associated with
improving risk posture through projects and operations
Creating a solid business case for security
They look at the upstream and downstream benefits to the
business from their security investments
Use their security capabilities to improve overall business
efficiency in a number of ways, for example:
• Retire low use websites
• Bandwidth savings based on blocking transactions
coming into the environment
• Improve employee productivity by effective spam
mitigation
“I consider myself the
Chief Marketing Officer
of security to the rest of
the enterprise,
evangelizing the
benefits of a strong
security posture
supported by
demonstrating the value
it brings to my
stakeholders”
©2016 IBM Corporation 22 November 201617
These challenges, weaknesses, efforts and pressures expose
three gaps to address – in intelligence, speed and accuracy
#2 most challenging
area today is optimizing
accuracy alerts (too
many false positives)
#3 most challenging
area due to insufficient
resources is threat
identification, monitoring
and escalating potential
incidents (61% selecting)
Speed gap
The top cybersecurity
challenge today and
tomorrow is reducing
average incident
response and
resolution time
This is despite the fact
that 80% said their
incident response speed
is much faster than two
years ago
Accuracy gapIntelligence gap
#1 most challenging
area due to insufficient
resources is threat
research (65% selecting)
#3 highest cybersecurity
challenge today is
keeping current on new
threats and
vulnerabilities (40%
selecting)
Addressing gaps while managing cost and ROI pressures
Enter cognitive security solutions
©2016 IBM Corporation 22 November 201619
 Cognitive security is the implementation of
two broad and related capabilities:
– The use of cognitive systems to
analyze security trends and distill
enormous volumes of structured and
unstructured data into information, and
then into actionable knowledge to enable
continuous security and business
improvement
– The use of automated, data-driven
security technologies, techniques and
processes that support cognitive
systems’ having the highest level of
context and accuracy
To close the gaps, different technologies and
approaches are needed – enter cognitive security
 Enhance the work of
SOC analysts
 Speed response with
external intelligence
 Identify threats with
advanced analytics
 Strengthen application
security
 Reduce enterprise risk
Benefits
©2016 IBM Corporation 22 November 201620
Traditional
security data
Cognitive security solutions can help tap the tremendous
amount of security knowledge created for human consumption
• Research
documents
• Industry
publications
• Forensic
information
• Threat intelligence
commentary
• Conference
presentations
• Analyst reports
• Webpages
• Wikis
• Blogs
• News sources
• Newsletters
• Tweets
Security knowledge dark to defenses
Typical organizations leverage only 8% of this content*
Human generated
knowledge
• Security events and alerts
• Logs and configuration data
• User and network activity
• Threat and vulnerability feeds
* Forrester Research: Can You Give The Business The Data That It Needs? November 2013
Examples include:
©2016 IBM Corporation 22 November 201621
Almost two thirds believe cognitive security solutions will
address gaps – with ~20% planning to adopt in 2-3 years
Expectations Top 3 perceived benefits Adoption
Believe that
“cognitive security”
solutions can
significantly slow
down cybercriminals
57%
#1 Intelligence
#2 Speed
#3 Accuracy Although only 7% of the total
sample are currently working
on implementing cognitive-
enabled security solutions
today – this rises to 21% in
the next 2-3 years
3X
Today Next 2-3 years
Improve detection and
incident response decision-
making capabilities (40%)
Significantly improve
incident response time
(37%)
Provide increased
confidence to discriminate
between events and true
incidents (36%)
©2016 IBM Corporation 22 November 201622
Factors holding back adoption include overall maturity and
secondarily, budget and communicating the benefits
0%
15%
16%
25%
28%
28%
45%
45%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%
Don’t understand what is really meant by cognitive
security solutions
Not convinced of value added to current
cybersecurity solutions and capabilities
Not convinced of the benefits versus other
solutions
Not ready from an infrastructure perspective
(security operations center, software, hardware)
Lack of sufficient budget/funding to invest in this in
the next 2–3 years
Too difficult to communicate benefits to decision-
makers/lack proof points or use-cases
Lack of internal skills/competency to implement
Not ready from a competency perspective (skills,
process, methods)
Most are convinced of the value add and benefits of cognitive security
solutions and don’t feel it is a top challenge
©2016 IBM Corporation 22 November 201623
EY sees how cognitive security solutions could be a way to
reduce the overall level of enterprise risk
Seeing internal and external challenges
A rapid pace of technological change and adversaries
advancing their tools and techniques
Digital innovation and transformation efforts within
organizations are pushing the enterprise flat – how do you
move fast with digital transformation without creating a
more porous perimeter?
Reducing overall risk with cognitive security solutions
Cognitive security solutions could:
• Provide better threat intelligence, helping to understand
potential attacks in the future
• Act as an expert advisor for a security operations
analyst, it could not only enhance their expertise, but
also may help to adapt and evolve security controls
based on what the system has learned over time
• Help to manage GRC, deciphering the different
requirements from multiple regulatory agencies
“There is a massive
amount of noise out
there, the human brain
can’t process everything
on a day to day basis –
we need something to
help, something like AI
or cognitive
technologies.”
Chad Holmes, Principal and Cyber
Strategy, Technology and Growth
Leader (CTO) at Ernst & Young LLP
Primed for cognitive security
©2016 IBM Corporation 22 November 201625
“We are poised to take the
next step with cognitive and
intelligent solutions that will
efficiently ingest, organize
and bring context to an
enormous amount to security
information and knowledge
which today consumes a lot
of our time and resources.”
A Canadian leader in financial protection, wealth and asset
management
©2016 IBM Corporation 22 November 201626
We profiled participants based on their security effectiveness
and appreciation of cognitive benefits
Security effectiveness Cognitive understanding Cognitive readiness
 Foundational
capabilities – risk
awareness across the
company, IT hygiene
 Advanced capabilities
– intelligent security
and rapid threat
response, robust data
security and privacy
Believe cognitive
security solutions can:
 Improve detection and
incident response
decision-making
capabilities
 Provide increased
confidence to
discriminate between
events and true
incidents
 Significantly improve
incident response time
 Are implementing or
planning on
implementing cognitive
enabled security
solutions
 Ready to implement
next-generation
cognitive enabled
security now
 Believe that cognitive
security solutions can
significantly slow down
cyber criminals
©2016 IBM Corporation 22 November 201627
An analysis of the responses to these questions revealed
three distinct clusters
Pressured
52%
Primed
22%
Prudent
27%
Organization
More likely to report to the
CIO/CTO
More likely to report to the CEO
More likely to report to the
CIO/CTO
Resources
Lower % of IT budget allocated
to cybersecurity
More likely to report challenges
with obtaining sufficient funding
and filling a shortage of staff
Higher % of IT budget allocated
to cybersecurity
Higher % of IT budget allocated
to cybersecurity
Performance
Large majority feel they are on
par compared with other
companies
Large majority feel they are on
par compared with other
companies
Best self-assessed
preparedness compared with
other companies
Cognitive
familiarity &
challenges
A lower general familiarity with
cognitive security features and
value
More likely to report a lack of
sufficient funding an adoption
challenge for cognitive solutions
More likely to say that are not
ready from a competency
perspective to adopt cognitive-
enabled security solutions and
have trouble communicating the
benefits
A higher general familiarity with
cognitive security features and
value
©2016 IBM Corporation 22 November 201628
The Primed have a better familiarity with cognitive security
and higher confidence, budget, and ROI than others
©2016 IBM Corporation 22 November 201629
The Primed generally employ a more mature approach to their
security practices
©2016 IBM Corporation 22 November 201630
“Cognitive security has so much
potential — you can meet your labor
shortage gap, you can reduce your risk
profile, you can increase your efficiency
of response. It can help you understand
the narrative story. People consume
stories — this happened, then this
happened, with this impact, by this
person. Additionally, cognitive can
lower the skills it takes to get involved
in cybersecurity. It allows you to bring
in new perspectives from non-IT
backgrounds into cracking the problem.”
David Shipley – Director of Strategic Initiatives, Information
Technology Services, University of New Brunswick
©2016 IBM Corporation 22 November 201631
Although cognitive security solutions are still an emerging
technology area, there are things you can do today to prepare
Recognize your
weaknesses
Look at the primary weaknesses and vulnerabilities within your
organization. How are they connected? What is a priority? Evaluate
your intelligence, speed and accuracy.
Become educated
about cognitive
security
capabilities
Take a holistic and formal approach to learn about cognitive security
solutions. There could be many misconceptions in your organization
from a capability, cost and implementation perspective.
Define an
investment plan
It is difficult to build an investment case when a technology is new
and unproven – focus on the fact that cognitive security is a capability
that can improve the overall effectiveness of security operations.
Look to augment
your capabilities,
no matter your
maturity
Cognitive security solutions are an emerging technology area, and its
unique characteristics can benefit organizations of all sizes. Whether
you are Pressured, Prudent or Primed, there are things you can do.
THANK YOU
©2016 IBM Corporation 22 November 201633
Learn more about the study: Cybersecurity in the cognitive era
Visit ibm.com/security/cognitive to download the report
Read the blog at Securityintelligence.com
©2016 IBM Corporation 22 November 201634
Learn more about IBM Security
A global leader in
enterprise security
• #1 in enterprise security
software and services*
• 7,500+ people
• 12,000+ customers
• 133 countries
• 3,500+ security patents
• 19 acquisitions since 2002
*According to Technology Business Research, Inc. (TBR) 2016
Join IBM X-Force Exchange
xforce.ibmcloud.com
Visit our website
ibm.com/security
Watch our videos on YouTube
IBM Security Channel
Read new blog posts
SecurityIntelligence.com
Follow us on Twitter
@ibmsecurity
©2016 IBM Corporation 22 November 201635
Learn more about the IBM Institute for Business Value
For more information
To learn more about this IBM Institute for Business Value study, please contact
us at iibv@us.ibm.com. Follow @IBMIBV on Twitter, and for a full catalog of our
research or to subscribe to our monthly newsletter, visit: ibm.com/iibv
Access IBM Institute for Business Value executive reports on your mobile device
by downloading the free “IBM IBV” app for your phone or tablet from your app
store.
The right partner for a changing world
At IBM, we collaborate with our clients, bringing together business insight,
advanced research and technology to give them a distinct advantage in today’s
rapidly changing environment.
IBM Institute for Business Value
The IBM Institute for Business Value, part of IBM Global Business Services,
develops fact-based strategic insights for senior business executives around
critical public and private sector issues.
©2015 IBM Corporation

More Related Content

What's hot

Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?IBM Security
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware IBM Security
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceIBM Security
 
Top 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionIBM Security
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...IBM Security
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsIBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Attack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainAttack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainIBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteIBM Security
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerIBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016Shannon G., MBA
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 

What's hot (20)

Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat Intelligence
 
Top 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS Solution
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Attack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainAttack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack Chain
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a Hacker
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 

Viewers also liked

Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsIBM Security
 
IBM WebSphere Portal 6.1 Preview - What's New
IBM WebSphere Portal 6.1 Preview - What's NewIBM WebSphere Portal 6.1 Preview - What's New
IBM WebSphere Portal 6.1 Preview - What's NewDvir Reznik
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Stefaan Van daele
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security IntelligenceAnna Landolfi
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Andris Soroka
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersIBM Security
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerThierry Matusiak
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalArrow ECS UK
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Google Analytics and Webmaster tool
Google Analytics and Webmaster toolGoogle Analytics and Webmaster tool
Google Analytics and Webmaster toolRUBEN LICERA
 
Cuestionario De Ciencias N
Cuestionario De Ciencias NCuestionario De Ciencias N
Cuestionario De Ciencias Nclaudiaponce
 
Пассажирский вагон Мать и дитя
Пассажирский вагон Мать и дитяПассажирский вагон Мать и дитя
Пассажирский вагон Мать и дитяkulibin
 

Viewers also liked (17)

Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
 
IBM WebSphere Portal 6.1 Preview - What's New
IBM WebSphere Portal 6.1 Preview - What's NewIBM WebSphere Portal 6.1 Preview - What's New
IBM WebSphere Portal 6.1 Preview - What's New
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security Intelligence
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Google Analytics and Webmaster tool
Google Analytics and Webmaster toolGoogle Analytics and Webmaster tool
Google Analytics and Webmaster tool
 
Vipin kumar gour
Vipin kumar gourVipin kumar gour
Vipin kumar gour
 
Cuestionario De Ciencias N
Cuestionario De Ciencias NCuestionario De Ciencias N
Cuestionario De Ciencias N
 
CV
CVCV
CV
 
Пассажирский вагон Мать и дитя
Пассажирский вагон Мать и дитяПассажирский вагон Мать и дитя
Пассажирский вагон Мать и дитя
 

Similar to Cybersecurity in the Cognitive Era: Priming Your Digital Immune System

Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursSurfWatch Labs
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber securityWGroup
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise The Economist Media Businesses
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Enterprise Management Associates
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseThe Economist Media Businesses
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The Economist Media Businesses
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19IBM Sverige
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience InsuranceAccenture Insurance
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSilicon Valley Bank
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 

Similar to Cybersecurity in the Cognitive Era: Priming Your Digital Immune System (20)

Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Cyber-attacks
Cyber-attacksCyber-attacks
Cyber-attacks
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber security
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 

More from IBM Security

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...IBM Security
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...IBM Security
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadIBM Security
 

More from IBM Security (16)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies ahead
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Cybersecurity in the Cognitive Era: Priming Your Digital Immune System

  • 1. ©2015 IBM Corporation1 22 November 2016 Cybersecurity in the cognitive era Priming your digital immune system David Jarvis, IBM Institute for Business Value Diana Kelley, IBM Security
  • 2. Today’s speakers David Jarvis Security & CIO Lead IBM Institute for Business Value https://securityintelligence.com/author/david-jarvis https://www.linkedin.com/in/davidajarvis http://twitter.com/dajarvis Diana Kelley Executive Security Advisor IBM Security https://securityintelligence.com/author/diana-kelley https://www.linkedin.com/in/dianakelleysecuritycurve
  • 3. Entering the cognitive era of security solutions  Cybersecurity is reaching an inflection point: – Increasing numbers and sophistication of threats on track to surpass current capabilities to address and mitigate them – Volume of adverse events and incidents surpassing the capacity of most security operations teams – Financial costs and risks are growing rapidly  Security organizations need to leverage new capabilities to get ahead of the risks and challenges  But with mounting skills and resource gaps, spending more and staffing up security operations is getting harder and harder to do  What if? – You could enhance the effectiveness of security operations with new tools that could ingest and organize the threat landscape much more rapidly – Systems could be taught how to bring better context to each threat and identify real ones with greater accuracy
  • 4. ©2016 IBM Corporation 22 November 20164 Agenda Overview Approach and firmographics The current context Challenges, practices and gaps Enter cognitive security solutions Benefits and challenges of cognitive security Primed for cognitive security Characteristics of those that are ready Recommendations How to start your cognitive security journey
  • 5. ©2016 IBM Corporation 22 November 20165 Industry We surveyed a balanced distribution of 700 security professionals in 35 countries, representing 18 industries Over $10B $500M - $1B $1B – $5B 15% 40% 20% Company size (in $USD annualized revenue) Under $500M 20% $5B – $10B 5% Geography North America Central and South America Middle East and Africa Western Europe Central and Eastern Europe Asia Pacific Japan
  • 7. ©2015 IBM Corporation7 22 November 2016 “It’s literally like being a merchant sailor in the golden age of piracy — there is no navy to protect you, there is no police force, you are on your own. On top of that, many don’t know how to sail their boats, and they can’t fire back at the attackers (it’s illegal). You are literally trying to survive in a hostile world with both arms tied behind your back. However, you do have some really interesting and sophisticated tools to use that tell you all about your threats.” David Shipley – Director of Strategic Initiatives, Information Technology Services, University of New Brunswick
  • 8. ©2016 IBM Corporation 22 November 20168 The current security operations context from our data Dealing with increasing costs and justifying investments with the business Worried about addressing speed and complexity of threats Focused on impacts to operations and brand reputation Improving security operations capabilities Working to address gaps in network and data security and threat response #1 cybersecurity challenge today and tomorrow is reducing average incident response and resolution time 78% have seen the cost for cybersecurity increase in the last two years 57% looking to improve monitoring of network, application, and data-level security in the next 2-3 years 68% say the loss of brand reputation presents the greatest future concern as a major impact of an intrusion
  • 9. ©2016 IBM Corporation 22 November 20169 The top challenge today is around response speed – analytics will get even more focus in the future
  • 10. ©2016 IBM Corporation 22 November 201610 Companies are increasingly concerned about a loss of reputation in the future – surpassing operational disruption The rising costs of cybersecurity infrastructure also becomes a more substantial issue in the future – increasing ~2X from today ~2X increase in the worry around loss of brand reputation as a major impact of an intrusion Most significant impacts enterprise has experienced / expect from intrusions 74% 57%Operational disruption Data breach without financial or IP loss 37% 26% Loss of brand reputation 68%35% Rising costs for cybersecurity infrastructure 25% 43% Regulatory violations 20% 23% Financial loss 20% 31% Stolen intellectual property 20% 32% In the futurePast 2 years Criminal prosecution & liability 5% 4%
  • 11. ©2016 IBM Corporation 22 November 201611 Almost everything is important, but network and data protection coupled with speed are the weakest areas for most
  • 12. ©2016 IBM Corporation 22 November 201612 Significantly changing priorities in the future suggest some gaps may widen if future initiatives don’t align to challenges
  • 13. ©2016 IBM Corporation 22 November 201613 With security costs continuing to rise, security leaders are going to be under increased pressure to justify investments Cost 78% have seen the cost for cybersecurity increase in the last two years 84% expect it to continue to increase in the next 2-3 years Investment 70% spend over 10% of their IT budget on cybersecurity – focused mainly on prevention and detection ROI 63% get over a 25% ROI on their cybersecurity investments With the majority getting between a 25-50% ROI
  • 14. ©2016 IBM Corporation 22 November 201614 This most important factor to obtain funding approval hinges on clear communication of risks and benefits 21% 24% 43% 51% 61% 0% 10% 20% 30% 40% 50% 60% 70% External industry expert opinion (security, legal, compliance, regulatory) Third-party security services recommendations (managed security services, security consulting) A high-profile breach in my industry Cross-functional support from finance, risk management, operations, or other executives Description of current risk exposure/gap in your company Factors used to justify a request for cybersecurity-related investments 92% say their funding requests for cybersecurity initiatives require a return on investment (ROI) or other financial analysis for justification and approval
  • 15. ©2016 IBM Corporation 22 November 201615 That communication has to be in the language of the business, cost to fix simply isn’t enough for financial analyses 16% 31% 41% 46% 66% 0% 10% 20% 30% 40% 50% 60% 70% Payback period Cost of capital Direct loss: equity, cash, intellectual property value, reputation Opportunity cost; benefits lost as a result of a breach Cost to fix Most important quantitative variables typically used in ROI/financial analysis for cybersecurity investments Don’t underestimate the importance of incorporating opportunity cost/loss and direct loss into investment justifications – speak in the language of the business
  • 16. ©2016 IBM Corporation 22 November 201616 A Canadian leader in financial protection, wealth and asset management takes a unique approach to create value The right tone from the top Their well educated CEO makes security #1 across the C- suite and promotes collaboration This approach has reduced the friction associated with improving risk posture through projects and operations Creating a solid business case for security They look at the upstream and downstream benefits to the business from their security investments Use their security capabilities to improve overall business efficiency in a number of ways, for example: • Retire low use websites • Bandwidth savings based on blocking transactions coming into the environment • Improve employee productivity by effective spam mitigation “I consider myself the Chief Marketing Officer of security to the rest of the enterprise, evangelizing the benefits of a strong security posture supported by demonstrating the value it brings to my stakeholders”
  • 17. ©2016 IBM Corporation 22 November 201617 These challenges, weaknesses, efforts and pressures expose three gaps to address – in intelligence, speed and accuracy #2 most challenging area today is optimizing accuracy alerts (too many false positives) #3 most challenging area due to insufficient resources is threat identification, monitoring and escalating potential incidents (61% selecting) Speed gap The top cybersecurity challenge today and tomorrow is reducing average incident response and resolution time This is despite the fact that 80% said their incident response speed is much faster than two years ago Accuracy gapIntelligence gap #1 most challenging area due to insufficient resources is threat research (65% selecting) #3 highest cybersecurity challenge today is keeping current on new threats and vulnerabilities (40% selecting) Addressing gaps while managing cost and ROI pressures
  • 19. ©2016 IBM Corporation 22 November 201619  Cognitive security is the implementation of two broad and related capabilities: – The use of cognitive systems to analyze security trends and distill enormous volumes of structured and unstructured data into information, and then into actionable knowledge to enable continuous security and business improvement – The use of automated, data-driven security technologies, techniques and processes that support cognitive systems’ having the highest level of context and accuracy To close the gaps, different technologies and approaches are needed – enter cognitive security  Enhance the work of SOC analysts  Speed response with external intelligence  Identify threats with advanced analytics  Strengthen application security  Reduce enterprise risk Benefits
  • 20. ©2016 IBM Corporation 22 November 201620 Traditional security data Cognitive security solutions can help tap the tremendous amount of security knowledge created for human consumption • Research documents • Industry publications • Forensic information • Threat intelligence commentary • Conference presentations • Analyst reports • Webpages • Wikis • Blogs • News sources • Newsletters • Tweets Security knowledge dark to defenses Typical organizations leverage only 8% of this content* Human generated knowledge • Security events and alerts • Logs and configuration data • User and network activity • Threat and vulnerability feeds * Forrester Research: Can You Give The Business The Data That It Needs? November 2013 Examples include:
  • 21. ©2016 IBM Corporation 22 November 201621 Almost two thirds believe cognitive security solutions will address gaps – with ~20% planning to adopt in 2-3 years Expectations Top 3 perceived benefits Adoption Believe that “cognitive security” solutions can significantly slow down cybercriminals 57% #1 Intelligence #2 Speed #3 Accuracy Although only 7% of the total sample are currently working on implementing cognitive- enabled security solutions today – this rises to 21% in the next 2-3 years 3X Today Next 2-3 years Improve detection and incident response decision- making capabilities (40%) Significantly improve incident response time (37%) Provide increased confidence to discriminate between events and true incidents (36%)
  • 22. ©2016 IBM Corporation 22 November 201622 Factors holding back adoption include overall maturity and secondarily, budget and communicating the benefits 0% 15% 16% 25% 28% 28% 45% 45% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Don’t understand what is really meant by cognitive security solutions Not convinced of value added to current cybersecurity solutions and capabilities Not convinced of the benefits versus other solutions Not ready from an infrastructure perspective (security operations center, software, hardware) Lack of sufficient budget/funding to invest in this in the next 2–3 years Too difficult to communicate benefits to decision- makers/lack proof points or use-cases Lack of internal skills/competency to implement Not ready from a competency perspective (skills, process, methods) Most are convinced of the value add and benefits of cognitive security solutions and don’t feel it is a top challenge
  • 23. ©2016 IBM Corporation 22 November 201623 EY sees how cognitive security solutions could be a way to reduce the overall level of enterprise risk Seeing internal and external challenges A rapid pace of technological change and adversaries advancing their tools and techniques Digital innovation and transformation efforts within organizations are pushing the enterprise flat – how do you move fast with digital transformation without creating a more porous perimeter? Reducing overall risk with cognitive security solutions Cognitive security solutions could: • Provide better threat intelligence, helping to understand potential attacks in the future • Act as an expert advisor for a security operations analyst, it could not only enhance their expertise, but also may help to adapt and evolve security controls based on what the system has learned over time • Help to manage GRC, deciphering the different requirements from multiple regulatory agencies “There is a massive amount of noise out there, the human brain can’t process everything on a day to day basis – we need something to help, something like AI or cognitive technologies.” Chad Holmes, Principal and Cyber Strategy, Technology and Growth Leader (CTO) at Ernst & Young LLP
  • 25. ©2016 IBM Corporation 22 November 201625 “We are poised to take the next step with cognitive and intelligent solutions that will efficiently ingest, organize and bring context to an enormous amount to security information and knowledge which today consumes a lot of our time and resources.” A Canadian leader in financial protection, wealth and asset management
  • 26. ©2016 IBM Corporation 22 November 201626 We profiled participants based on their security effectiveness and appreciation of cognitive benefits Security effectiveness Cognitive understanding Cognitive readiness  Foundational capabilities – risk awareness across the company, IT hygiene  Advanced capabilities – intelligent security and rapid threat response, robust data security and privacy Believe cognitive security solutions can:  Improve detection and incident response decision-making capabilities  Provide increased confidence to discriminate between events and true incidents  Significantly improve incident response time  Are implementing or planning on implementing cognitive enabled security solutions  Ready to implement next-generation cognitive enabled security now  Believe that cognitive security solutions can significantly slow down cyber criminals
  • 27. ©2016 IBM Corporation 22 November 201627 An analysis of the responses to these questions revealed three distinct clusters Pressured 52% Primed 22% Prudent 27% Organization More likely to report to the CIO/CTO More likely to report to the CEO More likely to report to the CIO/CTO Resources Lower % of IT budget allocated to cybersecurity More likely to report challenges with obtaining sufficient funding and filling a shortage of staff Higher % of IT budget allocated to cybersecurity Higher % of IT budget allocated to cybersecurity Performance Large majority feel they are on par compared with other companies Large majority feel they are on par compared with other companies Best self-assessed preparedness compared with other companies Cognitive familiarity & challenges A lower general familiarity with cognitive security features and value More likely to report a lack of sufficient funding an adoption challenge for cognitive solutions More likely to say that are not ready from a competency perspective to adopt cognitive- enabled security solutions and have trouble communicating the benefits A higher general familiarity with cognitive security features and value
  • 28. ©2016 IBM Corporation 22 November 201628 The Primed have a better familiarity with cognitive security and higher confidence, budget, and ROI than others
  • 29. ©2016 IBM Corporation 22 November 201629 The Primed generally employ a more mature approach to their security practices
  • 30. ©2016 IBM Corporation 22 November 201630 “Cognitive security has so much potential — you can meet your labor shortage gap, you can reduce your risk profile, you can increase your efficiency of response. It can help you understand the narrative story. People consume stories — this happened, then this happened, with this impact, by this person. Additionally, cognitive can lower the skills it takes to get involved in cybersecurity. It allows you to bring in new perspectives from non-IT backgrounds into cracking the problem.” David Shipley – Director of Strategic Initiatives, Information Technology Services, University of New Brunswick
  • 31. ©2016 IBM Corporation 22 November 201631 Although cognitive security solutions are still an emerging technology area, there are things you can do today to prepare Recognize your weaknesses Look at the primary weaknesses and vulnerabilities within your organization. How are they connected? What is a priority? Evaluate your intelligence, speed and accuracy. Become educated about cognitive security capabilities Take a holistic and formal approach to learn about cognitive security solutions. There could be many misconceptions in your organization from a capability, cost and implementation perspective. Define an investment plan It is difficult to build an investment case when a technology is new and unproven – focus on the fact that cognitive security is a capability that can improve the overall effectiveness of security operations. Look to augment your capabilities, no matter your maturity Cognitive security solutions are an emerging technology area, and its unique characteristics can benefit organizations of all sizes. Whether you are Pressured, Prudent or Primed, there are things you can do.
  • 33. ©2016 IBM Corporation 22 November 201633 Learn more about the study: Cybersecurity in the cognitive era Visit ibm.com/security/cognitive to download the report Read the blog at Securityintelligence.com
  • 34. ©2016 IBM Corporation 22 November 201634 Learn more about IBM Security A global leader in enterprise security • #1 in enterprise security software and services* • 7,500+ people • 12,000+ customers • 133 countries • 3,500+ security patents • 19 acquisitions since 2002 *According to Technology Business Research, Inc. (TBR) 2016 Join IBM X-Force Exchange xforce.ibmcloud.com Visit our website ibm.com/security Watch our videos on YouTube IBM Security Channel Read new blog posts SecurityIntelligence.com Follow us on Twitter @ibmsecurity
  • 35. ©2016 IBM Corporation 22 November 201635 Learn more about the IBM Institute for Business Value For more information To learn more about this IBM Institute for Business Value study, please contact us at iibv@us.ibm.com. Follow @IBMIBV on Twitter, and for a full catalog of our research or to subscribe to our monthly newsletter, visit: ibm.com/iibv Access IBM Institute for Business Value executive reports on your mobile device by downloading the free “IBM IBV” app for your phone or tablet from your app store. The right partner for a changing world At IBM, we collaborate with our clients, bringing together business insight, advanced research and technology to give them a distinct advantage in today’s rapidly changing environment. IBM Institute for Business Value The IBM Institute for Business Value, part of IBM Global Business Services, develops fact-based strategic insights for senior business executives around critical public and private sector issues.