SlideShare a Scribd company logo
1 of 9
Download to read offline
Successful digital transformation
Cybersecurity helps reduce digital risk
Sebastien Jardin
Business Development Director
IBM Security France
CLUSIF member
https://www.ibm.com/security
IBM Security / © 2020 IBM Corporation 1
2
IBM Security/ © 2020IBM Corporation
In recent years, cyber attacks have intensified
3
IBM Security/ © 2020IBM Corporation
Cyber criminality is a universal challenge
In 2020, there will be…
5 billion5 billion5 billion5 billion
personal data records stolen
20.8 billion20.8 billion20.8 billion20.8 billion
“things” to secure“things” to secure“things” to secure“things” to secure
€ 700 billion€ 700 billion€ 700 billion€ 700 billion
lost to cybercrime
21st November 2019 at 11:02
Hacktivists | Hackers | Cyber mercenariesHacktivists | Hackers | Cyber mercenariesHacktivists | Hackers | Cyber mercenariesHacktivists | Hackers | Cyber mercenaries
4
IBM Security/ © 2020IBM Corporation
Most of the attacks are financially motivated
Monetizabledata
Financial Services, Retail, Transportation, Medias,
Professional Services, Government, Education,
Manufacturing, Energy, Healthcare
Monetizableactions
Financial Services, Retail, Transportation, Medias,
Professional Services, Government, Education,
Manufacturing, Energy, Healthcare
Influence&Destabilization
Medias, Governement
ProbabilityProbabilityProbabilityProbabilityofoccurrenceofoccurrenceofoccurrenceofoccurrence
SystemicSystemicSystemicSystemicimpactimpactimpactimpact
++++
++++----
----
To cope, technical solutions exist at IBM Security…
Healthcare
14 out of 1514 out of 1514 out of 1514 out of 15 of the
world’s largest healthcare
companies
Automotive
19 out of 2019 out of 2019 out of 2019 out of 20 of the world’s
largest motor vehicle and
parts companies
Airline
8 out of 108 out of 108 out of 108 out of 10 of the world’s
largest airline companies
Telecom
The 10 largestThe 10 largestThe 10 largestThe 10 largest telecom
companies
Finance
49 out of 5049 out of 5049 out of 5049 out of 50 of the world’s
largest financial services
and banking companies
Tech
13 out of 1513 out of 1513 out of 1513 out of 15 of the world’s
largest technology companies
IBM Security secures
95%
of the Global Fortune 500
100%
of the US Fortune 100
Worldwide leader, 8 000 experts, 10 000 Security patents, 17 000 clients
5
IBM Security/ © 2020IBM Corporation
Build Leadership and Culture
• X-Force Cyber Range & C-TOC
• SOC Exchange
• Security Summit
• Users Groups
• Conferences
Detect and Stop Advanced Threats
• QRadar Platform
• X-Force Threat Intelligence
Orchestrate Incident Response
• Resilient
• Cloud Pak for Security
Master Threat Hunting
• i2 Intelligence Analysis
• QRadar Advisor with Watson
Protect Critical Assets
• Guardium Data Protection
• Data Risk Manager
• Multi-cloud Encryption
• Key Lifecycle Manager
Govern Users and Identities
• Identity Governance
• Cloud Identity
• Access Manager
• Secret Server
Secure Hybrid Cloud
• QRadar Cloud Analytics
• Cloud Identity
• Guardium for Cloud
Unify EndpointManagement
• MaaS360
Deliver Digital IdentityTrust
• Trusteer
• Cloud Identity
IBM Security / © 2020 IBM Corporation 6
Incidents responsible is not only a matter of security
IBM Cyber Tactical Operations Center
IBM Security / © 2020 IBM Corporation 7
… and that cybersecurity is becoming obvious
 In France, manufacturers have had to provide anchorages since 1970In France, manufacturers have had to provide anchorages since 1970In France, manufacturers have had to provide anchorages since 1970In France, manufacturers have had to provide anchorages since 1970
 The wearing of seat belts became mandatory at the front in 1979The wearing of seat belts became mandatory at the front in 1979The wearing of seat belts became mandatory at the front in 1979The wearing of seat belts became mandatory at the front in 1979
 The wearing of seat belts became mandatory at the rear in 1990The wearing of seat belts became mandatory at the rear in 1990The wearing of seat belts became mandatory at the rear in 1990The wearing of seat belts became mandatory at the rear in 1990
50%
Reduced risk of death
World Health Organization
1million
Lives saved since 1960
European Union
$50B
Saved per year
USA
€4M
Average cost of data breach
Ponemom Institute, 2019
#1
Cyber risk ranking
Allianz Risk Barometer, 2020
92%
Affected companies
CLUSIF, 2019
72%in5years
Rising cost of cyber attacks
Accenture, 2019
25%/year
Rise of cyber attacks
Accenture, 2019
10%
More resistant by training
X-Force, 2020
8
IBM Security/ © 2020IBM Corporation
Cybersecurity is a business challenge
2020202020202020
20182018201820182017201720172017
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2020. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's
current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both.
Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being
altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can
be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
Thank you
ibm.com/security/community
IBM Security

More Related Content

What's hot

Harman automotive cybersecurity business overview
Harman automotive cybersecurity business overviewHarman automotive cybersecurity business overview
Harman automotive cybersecurity business overviewHARMAN Connected Services
 
Webinar - Automotive SOC - Security Data Analytics for Connected Vehicles
Webinar - Automotive SOC - Security Data Analytics for Connected VehiclesWebinar - Automotive SOC - Security Data Analytics for Connected Vehicles
Webinar - Automotive SOC - Security Data Analytics for Connected VehiclesHARMAN Connected Services
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsSymantec
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 
Cyber Risk Exposure Scorecard
Cyber Risk Exposure ScorecardCyber Risk Exposure Scorecard
Cyber Risk Exposure ScorecardHaley Saalsaa
 
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Business Days
 
Shifting into the Drivers seat - TU Automotive Detroit - 2019
Shifting into the Drivers seat - TU Automotive Detroit - 2019Shifting into the Drivers seat - TU Automotive Detroit - 2019
Shifting into the Drivers seat - TU Automotive Detroit - 2019HARMAN Connected Services
 
Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations Robin Sedeqi
 
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Business Days
 
Cybersecurity and the Shipping Industry
Cybersecurity and the Shipping IndustryCybersecurity and the Shipping Industry
Cybersecurity and the Shipping IndustryThe TNS Group
 
Security analytics @ 5 g Speed - Ecomotion 2019
Security analytics @ 5 g Speed - Ecomotion 2019Security analytics @ 5 g Speed - Ecomotion 2019
Security analytics @ 5 g Speed - Ecomotion 2019HARMAN Connected Services
 
At&t cybersecurity introduction with alien vault
At&t cybersecurity introduction with alien vaultAt&t cybersecurity introduction with alien vault
At&t cybersecurity introduction with alien vaultMohamed Abdelhakim
 
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...ArabNet ME
 
RunSafe Vehicle Guardian
RunSafe Vehicle GuardianRunSafe Vehicle Guardian
RunSafe Vehicle GuardianPeter Laitin
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localAdrian Mikeliunas
 
FASTRInfographic2017
FASTRInfographic2017FASTRInfographic2017
FASTRInfographic2017Craig Hurst
 

What's hot (20)

Harman automotive cybersecurity business overview
Harman automotive cybersecurity business overviewHarman automotive cybersecurity business overview
Harman automotive cybersecurity business overview
 
Webinar - Automotive SOC - Security Data Analytics for Connected Vehicles
Webinar - Automotive SOC - Security Data Analytics for Connected VehiclesWebinar - Automotive SOC - Security Data Analytics for Connected Vehicles
Webinar - Automotive SOC - Security Data Analytics for Connected Vehicles
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
 
Bt tower v1.1
Bt tower v1.1Bt tower v1.1
Bt tower v1.1
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
Cyber Risk Exposure Scorecard
Cyber Risk Exposure ScorecardCyber Risk Exposure Scorecard
Cyber Risk Exposure Scorecard
 
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
 
Shifting into the Drivers seat - TU Automotive Detroit - 2019
Shifting into the Drivers seat - TU Automotive Detroit - 2019Shifting into the Drivers seat - TU Automotive Detroit - 2019
Shifting into the Drivers seat - TU Automotive Detroit - 2019
 
Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations
 
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020
 
Impact of phishing attacks
Impact of phishing attacksImpact of phishing attacks
Impact of phishing attacks
 
Cybersecurity and the Shipping Industry
Cybersecurity and the Shipping IndustryCybersecurity and the Shipping Industry
Cybersecurity and the Shipping Industry
 
Security analytics @ 5 g Speed - Ecomotion 2019
Security analytics @ 5 g Speed - Ecomotion 2019Security analytics @ 5 g Speed - Ecomotion 2019
Security analytics @ 5 g Speed - Ecomotion 2019
 
At&t cybersecurity introduction with alien vault
At&t cybersecurity introduction with alien vaultAt&t cybersecurity introduction with alien vault
At&t cybersecurity introduction with alien vault
 
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...
Tackling Cyber Threats in Banking Digitization by KRYPTON Security - ArabNet ...
 
L123
L123L123
L123
 
HackersAttackersCriminals_2014
HackersAttackersCriminals_2014HackersAttackersCriminals_2014
HackersAttackersCriminals_2014
 
RunSafe Vehicle Guardian
RunSafe Vehicle GuardianRunSafe Vehicle Guardian
RunSafe Vehicle Guardian
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo local
 
FASTRInfographic2017
FASTRInfographic2017FASTRInfographic2017
FASTRInfographic2017
 

Similar to IBM Security - Successful digital transformation

IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...IBM Security
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareSarah Freemantle
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud accessAGILLY
 
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...Global Business Events
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crimeNathan Desfontaines
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyIBM Security
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware IBM Security
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksIBM Security
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netxband
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public versionIBM Sverige
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM Security
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of EngagementJohn Palfreyman
 
21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptxSonaliG6
 

Similar to IBM Security - Successful digital transformation (20)

IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
 
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crime
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of Engagement
 
KPMG-converted.pptx
KPMG-converted.pptxKPMG-converted.pptx
KPMG-converted.pptx
 
21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx
 

Recently uploaded

Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 

Recently uploaded (20)

Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 

IBM Security - Successful digital transformation

  • 1. Successful digital transformation Cybersecurity helps reduce digital risk Sebastien Jardin Business Development Director IBM Security France CLUSIF member https://www.ibm.com/security IBM Security / © 2020 IBM Corporation 1
  • 2. 2 IBM Security/ © 2020IBM Corporation In recent years, cyber attacks have intensified
  • 3. 3 IBM Security/ © 2020IBM Corporation Cyber criminality is a universal challenge In 2020, there will be… 5 billion5 billion5 billion5 billion personal data records stolen 20.8 billion20.8 billion20.8 billion20.8 billion “things” to secure“things” to secure“things” to secure“things” to secure € 700 billion€ 700 billion€ 700 billion€ 700 billion lost to cybercrime 21st November 2019 at 11:02 Hacktivists | Hackers | Cyber mercenariesHacktivists | Hackers | Cyber mercenariesHacktivists | Hackers | Cyber mercenariesHacktivists | Hackers | Cyber mercenaries
  • 4. 4 IBM Security/ © 2020IBM Corporation Most of the attacks are financially motivated Monetizabledata Financial Services, Retail, Transportation, Medias, Professional Services, Government, Education, Manufacturing, Energy, Healthcare Monetizableactions Financial Services, Retail, Transportation, Medias, Professional Services, Government, Education, Manufacturing, Energy, Healthcare Influence&Destabilization Medias, Governement ProbabilityProbabilityProbabilityProbabilityofoccurrenceofoccurrenceofoccurrenceofoccurrence SystemicSystemicSystemicSystemicimpactimpactimpactimpact ++++ ++++---- ----
  • 5. To cope, technical solutions exist at IBM Security… Healthcare 14 out of 1514 out of 1514 out of 1514 out of 15 of the world’s largest healthcare companies Automotive 19 out of 2019 out of 2019 out of 2019 out of 20 of the world’s largest motor vehicle and parts companies Airline 8 out of 108 out of 108 out of 108 out of 10 of the world’s largest airline companies Telecom The 10 largestThe 10 largestThe 10 largestThe 10 largest telecom companies Finance 49 out of 5049 out of 5049 out of 5049 out of 50 of the world’s largest financial services and banking companies Tech 13 out of 1513 out of 1513 out of 1513 out of 15 of the world’s largest technology companies IBM Security secures 95% of the Global Fortune 500 100% of the US Fortune 100 Worldwide leader, 8 000 experts, 10 000 Security patents, 17 000 clients 5 IBM Security/ © 2020IBM Corporation Build Leadership and Culture • X-Force Cyber Range & C-TOC • SOC Exchange • Security Summit • Users Groups • Conferences Detect and Stop Advanced Threats • QRadar Platform • X-Force Threat Intelligence Orchestrate Incident Response • Resilient • Cloud Pak for Security Master Threat Hunting • i2 Intelligence Analysis • QRadar Advisor with Watson Protect Critical Assets • Guardium Data Protection • Data Risk Manager • Multi-cloud Encryption • Key Lifecycle Manager Govern Users and Identities • Identity Governance • Cloud Identity • Access Manager • Secret Server Secure Hybrid Cloud • QRadar Cloud Analytics • Cloud Identity • Guardium for Cloud Unify EndpointManagement • MaaS360 Deliver Digital IdentityTrust • Trusteer • Cloud Identity
  • 6. IBM Security / © 2020 IBM Corporation 6 Incidents responsible is not only a matter of security IBM Cyber Tactical Operations Center
  • 7. IBM Security / © 2020 IBM Corporation 7 … and that cybersecurity is becoming obvious  In France, manufacturers have had to provide anchorages since 1970In France, manufacturers have had to provide anchorages since 1970In France, manufacturers have had to provide anchorages since 1970In France, manufacturers have had to provide anchorages since 1970  The wearing of seat belts became mandatory at the front in 1979The wearing of seat belts became mandatory at the front in 1979The wearing of seat belts became mandatory at the front in 1979The wearing of seat belts became mandatory at the front in 1979  The wearing of seat belts became mandatory at the rear in 1990The wearing of seat belts became mandatory at the rear in 1990The wearing of seat belts became mandatory at the rear in 1990The wearing of seat belts became mandatory at the rear in 1990 50% Reduced risk of death World Health Organization 1million Lives saved since 1960 European Union $50B Saved per year USA €4M Average cost of data breach Ponemom Institute, 2019 #1 Cyber risk ranking Allianz Risk Barometer, 2020 92% Affected companies CLUSIF, 2019 72%in5years Rising cost of cyber attacks Accenture, 2019 25%/year Rise of cyber attacks Accenture, 2019 10% More resistant by training X-Force, 2020
  • 8. 8 IBM Security/ © 2020IBM Corporation Cybersecurity is a business challenge 2020202020202020 20182018201820182017201720172017
  • 9. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBM Corporation 2020. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: Thank you ibm.com/security/community IBM Security