Presentation from the Cyber Security Briefing held in Ottawa on June 12, 2013.
-Keynote: Security Trends and Risk Mitigation for the Public Sector - Presented by: Sandy Bird, CTO - Security Division, IBM Canada Ltd.
- Application Security for mobile and web applications - Presented by: Patrick Vandenberg, Program Director, IBM Security Segment Marketing
- Detect Threat and Mitigate Risk Using Security Intelligence - Presented by: Sandy Bird, CTO - Security Division, IBM Canada Ltd.
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteIBM Security
View on-demand webinar:
http://event.on24.com/wcc/r/1155218/416359D28E2D43ACB417A8C7C097B3B8
Introducing the Next-Generation Fraud Protection Suite
The financial services industry continues to be plagued by advanced fraud attacks. Sometimes the attacks are successful, resulting in tremendous fraud losses. Virtually always, financial institutions invest significant time and resources to address this continued cyberfraud risk. The fraud protection solutions cobbled together over the past decade suffer from several shortcomings:
Accuracy – statistical risk models generate high false positive alerts, often missing actual fraud
Adaptability – inflexible solutions cannot (or are slow to) react to new threats and new attack methods
Affordability – disparate systems do not leverage pricing incentives and system updates/modifications can be very expensive
Approval – customers are needlessly disrupted by inaccurate risk assessments and the online channel is sub-optimized due to risk concerns
View this on-demand webinar to learn the more about how IBM has taken a fundamentally different approach to fraud protection and management. The IBM Security Trusteer Fraud Protection Suite provides
Evidence-based fraud detection – reduce false positives and missed fraud, leading to better customer experience
Threat-aware authentication – based on actual risk for rapid enforcement
Advanced case management and reporting capabilities – streamline investigations and threat analysis
A powerful remediation tool – quickly remove existing financial malware from infected endpoints
View on-demand recording: http://securityintelligence.com/events/x-force-threat-intelligence-protect-sensitive-data/
Malicious or inadvertent, an insider threat to your enterprise “crown jewels” can cause significant damage. In this webcast, learn which attack trends you need to be prepared to address, explore options to protect against these threats and how you can combat this area of risk. We will also share best practices and recommendations for implementing an end-to-end data protection strategy including data encryption, monitoring, dynamic data masking and vulnerability assessment for all data sources and repositories.
In this presentation, you will learn:
- The latest findings from the X-Force Threat Intelligence Report
- How various threats and vulnerabilities are evolving
- How companies can mitigate this exposure
10 Security Essentials Every CxO Should KnowIBM Security
View On Demand Webinar: http://event.on24.com/wcc/r/1060940/3EBB3C7D778564710E957F99AF1D7C1B
How comprehensive is your security program? Organizations today are reliant on technology more than ever to achieve competitive advantage. Whether it is growing your brand, automating a supply chain or moving to cloud and mobile, technology is the lifeblood of business. This shift in reliance also brings cyber threats that must be addressed.
Based on extensive experience, IBM has established 10 Essential Practices for a comprehensive security posture. Join Glen Holland, Global Practice Lead of SAP Security Services, to hear about the key imperatives can help you understand and address these threats and protect the business.
In this on demand webinar, you will learn:
- The 10 security essentials and best practices of today’s security leaders
- How to assess your security maturity
- Where your critical gaps lie and how to prioritize your actions
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentIBM Security
View on-demand: http://event.on24.com/wcc/r/1125108/92F1EBE9F405FFB683B79FD046CAC8B7
Forrester Research recently conducted a Total Economic Impact (TEI) study, commissioned by IBM, to examine the potential return on investment (ROI) that organizations may achieve by deploying IBM Security Network Protection (XGS), a next-generation intrusion prevention system (IPS). The study determined that by implementing IBM Security Network Protection (XGS), organizations realize an increase in network performance and availability, while also enjoying reduced costs and security risks.
Join us at this complimentary webinar to hear directly from our guest, Forrester TEI consultant Ben Harris, about the results of IBM Security Network Protection (XGS) study.
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM Security
"2014 Year in Review: From Designer Vulns to Made-to-Order Malware"
The year 2014 brought a surge in the disclosure of critical vulnerabilities to foundational frameworks branded with logos and catchy names, but what were the real reasons behind vulnerability disclosures reaching the highest rate in recorded history last year?
Attackers tailored the Citadel malware to infiltrate new targets, making it imperative for organizations to defend themselves with more than just a single layer of protection. Attend this webinar to learn more about these and other key trends from the Q1 IBM X-Force Threat Intelligence Quarterly.
View on-demand recording: https://attendee.gotowebinar.com/recording/8127444082863896065
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteIBM Security
View on-demand webinar:
http://event.on24.com/wcc/r/1155218/416359D28E2D43ACB417A8C7C097B3B8
Introducing the Next-Generation Fraud Protection Suite
The financial services industry continues to be plagued by advanced fraud attacks. Sometimes the attacks are successful, resulting in tremendous fraud losses. Virtually always, financial institutions invest significant time and resources to address this continued cyberfraud risk. The fraud protection solutions cobbled together over the past decade suffer from several shortcomings:
Accuracy – statistical risk models generate high false positive alerts, often missing actual fraud
Adaptability – inflexible solutions cannot (or are slow to) react to new threats and new attack methods
Affordability – disparate systems do not leverage pricing incentives and system updates/modifications can be very expensive
Approval – customers are needlessly disrupted by inaccurate risk assessments and the online channel is sub-optimized due to risk concerns
View this on-demand webinar to learn the more about how IBM has taken a fundamentally different approach to fraud protection and management. The IBM Security Trusteer Fraud Protection Suite provides
Evidence-based fraud detection – reduce false positives and missed fraud, leading to better customer experience
Threat-aware authentication – based on actual risk for rapid enforcement
Advanced case management and reporting capabilities – streamline investigations and threat analysis
A powerful remediation tool – quickly remove existing financial malware from infected endpoints
View on-demand recording: http://securityintelligence.com/events/x-force-threat-intelligence-protect-sensitive-data/
Malicious or inadvertent, an insider threat to your enterprise “crown jewels” can cause significant damage. In this webcast, learn which attack trends you need to be prepared to address, explore options to protect against these threats and how you can combat this area of risk. We will also share best practices and recommendations for implementing an end-to-end data protection strategy including data encryption, monitoring, dynamic data masking and vulnerability assessment for all data sources and repositories.
In this presentation, you will learn:
- The latest findings from the X-Force Threat Intelligence Report
- How various threats and vulnerabilities are evolving
- How companies can mitigate this exposure
10 Security Essentials Every CxO Should KnowIBM Security
View On Demand Webinar: http://event.on24.com/wcc/r/1060940/3EBB3C7D778564710E957F99AF1D7C1B
How comprehensive is your security program? Organizations today are reliant on technology more than ever to achieve competitive advantage. Whether it is growing your brand, automating a supply chain or moving to cloud and mobile, technology is the lifeblood of business. This shift in reliance also brings cyber threats that must be addressed.
Based on extensive experience, IBM has established 10 Essential Practices for a comprehensive security posture. Join Glen Holland, Global Practice Lead of SAP Security Services, to hear about the key imperatives can help you understand and address these threats and protect the business.
In this on demand webinar, you will learn:
- The 10 security essentials and best practices of today’s security leaders
- How to assess your security maturity
- Where your critical gaps lie and how to prioritize your actions
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentIBM Security
View on-demand: http://event.on24.com/wcc/r/1125108/92F1EBE9F405FFB683B79FD046CAC8B7
Forrester Research recently conducted a Total Economic Impact (TEI) study, commissioned by IBM, to examine the potential return on investment (ROI) that organizations may achieve by deploying IBM Security Network Protection (XGS), a next-generation intrusion prevention system (IPS). The study determined that by implementing IBM Security Network Protection (XGS), organizations realize an increase in network performance and availability, while also enjoying reduced costs and security risks.
Join us at this complimentary webinar to hear directly from our guest, Forrester TEI consultant Ben Harris, about the results of IBM Security Network Protection (XGS) study.
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM Security
"2014 Year in Review: From Designer Vulns to Made-to-Order Malware"
The year 2014 brought a surge in the disclosure of critical vulnerabilities to foundational frameworks branded with logos and catchy names, but what were the real reasons behind vulnerability disclosures reaching the highest rate in recorded history last year?
Attackers tailored the Citadel malware to infiltrate new targets, making it imperative for organizations to defend themselves with more than just a single layer of protection. Attend this webinar to learn more about these and other key trends from the Q1 IBM X-Force Threat Intelligence Quarterly.
View on-demand recording: https://attendee.gotowebinar.com/recording/8127444082863896065
View the on-demand recording: http://securityintelligence.com/events/why-insider-threats-challenge-critical-business-processes/
While advanced threats and mega breaches continue to make headlines, insider threats remain an insidious and often-overlooked area of concern. No longer limited to disgruntled employees, insider threats can come from inadvertent actors who set a breach in motion with an unknowing click on a malicious link in a spam email. Join us to find out the most likely entry points, from privileged users to quasi-insiders at trusted third-parties.
Understanding how to protect valuable data and resources from compromise is top of mind for most organizations. In this live webinar, we will explain common best practices and recommendations for combating this area of risk based on insights from the 2Q IBM X-Force Threat Intelligence Quarterly.
Tolly Report: Stopping Attacks You Can't SeeIBM Security
View on-demand webinar: http://bit.ly/26P8RH8
Network security threats continue to grow not only in number, but also in type and complexity. Attackers are using more sophisticated methods, such as encryption and advanced evasion techniques, to avoid detection. And while security is a key objective for organizations, maintaining network performance and availability remain top priorities as well.
In this webinar, Kevin Tolly, Founder of The Tolly Group, will review the results of a test report IBM commissioned to evaluate the effectiveness and performance of the IBM Security Network Protection XGS 7100 appliance, a next-generation intrusion prevention system (IPS). You will also learn more about the IBM XGS, including how it was able to block 100% of encrypted threats, and stop 100% of attacks using advanced evasion techniques, while maintaining high performance levels.
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
View Webinar: http://ibm.co/1pyzpuI
The momentum continues with the IBM Security AppExchange. Join this webinar to meet the developers of two apps that help you extend the capabilities of IBM Security QRadar.
iSIGHT Threatscape enables users to pull rich threat intelligence from iSIGHT Partners directly into QRadar, improving the ability to mange threats and automate security workflow.
STEALTHbits monitors Microsoft systems and provides an easy and extensible dashboard for viewing active-directory changes logged by STEALTHbits products
Learn the advantages of sharing best practices and collaborating with others to battle highly organized cybercrime - join the era of collaborative defense!
The IBM Security Client References Guide includes summary slides of IBM clients across various industries that have successfully implemented solutions from the IBM Security Portfolio.
This is the product and services portfolio of IBM Security, which is one pillar of IBM CAMSS strategy. Products in portfolio are still moving during early 2015 due to re-portfolio of IBM. However, it will be categorized in 2 major parts.
1) IBM Security Products : all security software and appliance
2) IBM Security Services : all security services, including Cloud security.
QRadar & XGS: Stopping Attacks with a Click of the MouseIBM Security
View on-demand: https://securityintelligence.com/events/qradar-xgs-stopping-attacks-click-mouse/
As the tactics and techniques behind attacks continue to advance and evolve, organizations need a faster way to identify and prevent those attacks in real time. An integrated approach to security can make this a reality, especially when integrations are designed to proactively disrupt the lifecycle of advanced attacks through shared security intelligence and enabling organizations to take immediate action based on that intelligence.
In this session you will learn how IBM QRadar Security Intelligence Platform and IBM Security Network Protection (XGS), a next-generation IPS, work together to disrupt the attack chain and improve network security.
Join IBM Security product expert Craig Knapik as he shares how the QRadar and XGS integration enriches overall security intelligence and improves threat detection, while enabling security professionals to block threats immediately with a simple click of the mouse.
This presentation was discussed in a Webinar with MetricStream in September 2016. It is applicable for small, medium and large businesses when considering information and cyber security risk.
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
What could cybersecurity look like in the cognitive era? Organizations are facing a number of well-known security challenges and these challenges are leading to gaps in intelligence, speed, and accuracy when it comes to threats and incidents. The gaps can’t be addressed by simply scaling up legacy processes and infrastructure – new approaches are needed, and cognitive security solutions may help address these gaps. IBM conducted a survey of over 700 security professionals leaders and practitioners from 35 countries, representing 18 industries to get a sense for what challenges they are facing, how they are being addressed, and how they view cognitive security solutions as a potential powerful new tool.
Join us as Diana Kelley, Executive Security Advisor in IBM Security, and David Jarvis, Functional Research Lead for CIO and Cybersecurity in the IBM Institute for Business Value, discuss findings from the 2016 Cybersecurity Study “Cybersecurity in the Cognitive Era: Priming Your Digital Immune System” This webinar will cover an overview of the study findings, including:
Security challenges, shortcomings and what security leaders are doing about them
Views on cognitive security solutions – how they might help, readiness to implement and what might be holding them back
What those that are ready to implement cognitive enabled security today are thinking and doing
Top 12 Cybersecurity Predictions for 2017IBM Security
No industry is immune from a cyberattack. In fact, cyber experts are predicting that we may see a rise in attacks and a spread as industries previously on the fringe now face direct hits. The question is, “What’s in store for us in 2017?”
Top 2016 Mobile Security Threats and your EmployeesNeil Kemp
The proliferation of mobile technology brings a potential increase of security threats. As Businesses become more mobile we teardown physical servers and trade them in for virtual space on the cloud. we are opening ourselves up to risk.
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...IBM Security
View On-Demand Webinar: https://event.on24.com/eventRegistration/EventLobbyServlet?target=reg20.jsp&referrer=&eventid=1139921&sessionid=1&key=993ECF370F9F3C594E6E3F44A0FA6BA2®Tag=13522&sourcepage=register
2015 was peppered with mega-breaches of highly sensitive data like personal health information and private bedroom behaviors. and companies of all sizes need to pay attention to security basics to stop the infiltration of attackers and protect their data.
Cybercriminals’ targets are now bigger and their rewards greater as they fine-tune efforts to obtain and leverage higher value data than years’ past.
New attack techniques like mobile overlay malware are gaining, while “classic” attacks like DDoS and POS malware continue to be effective due to lackluster practice in security fundamentals.
Malware leaps across target countries are indicative of increasing sophistication and organization in cybercrime rings.
In the 2016 edition of the IBM X-Force Threat Intelligence Report, IBM security research experts examine the macro trends that affected the industry, what to expect in 2016, and recommendations on how you can protect your digital assets.
Today, being connected on-line is a foundational aspect of many businesses. Everything from our computers and cars to phones and refrigerators are connected in the race to digital transformation.
But it comes with a cost. Every device and application in use increases our cyber-attack surface.
These slides--based on the webinar from leading IT research firm Enterprise Management Associates (EMA) and Risk IQ--provide information on:
- How to get an accurate picture of your attack surface
- How threat actors exploit our Internet presence within the context of business and security management tools, issues, and practices
- How you can reduce your risk of an attack
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...IBM Security
View on-demand: http://event.on24.com/wcc/r/1203107/AF33616D86CFB47663095958218D99E0
Being one step ahead of rapidly evolving, well-organized online cybercrime can seem like a losing battle. However, the key to success is combining sophisticated fraud detection with intelligent access management. Tightly uniting these capabilities in an open platform provides the flexibility to choose the appropriate authentication scheme for the various scenarios leveraging built-in biometrics, seamless authentication and mobile technologies. This smooths the access experience for legitimate users on web and mobile into a quick, frictionless authentication process while preventing fraudulent activity in real-time.
Join us in this IBM webinar where industry experts will discuss IBM’s approach on how to:
Detect fraudulent activity from stolen user credentials or a criminal device
Create risk-based access controls that reduce fraud while improving legitimate customers' activity
Speed deployment, improve business results and reduce cost of fraud protection with an integrated fraud protection gateway
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUlf Mattsson
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Description : Organizations have spent massive amounts of money to protect the perimeter of their networks, but if your business exists on the internet, there really is no perimeter. In this presentation, we'll discuss Digital Footprints in understanding your company’s external attack surface. We will discuss social, mobile, web attacks and analyze and review lessons learned recently publicized attacks (Polish banking institutions, Apache Struts Vulnerability or WannaCry ransomware. The speed of business and cybercrime isn't slowing down, so how can you be prepared to address and defend against these types of threats? Attend our session to find out how.
Reducing Your Digital Attack Surface and Mitigating External Threats - What, Why, How:
What is a Digital Footprint?
Breakdown of External Threats (Social, Mobile, Web)
What are blended attacks?
What is actually being targeting at your company?
How are your brands, customers, and employees being attack outside of your company?
How to become proactive in threat monitoring on the internet?
Considerations in External Threat solutions
Threat correspondence tracking considerations
Is legal cease and desist letters adequate in stopping attacks?
Examination of a phishing attack campaign
How phishing kits work
Analysis and lesson learned from recent published attacks
What are the most important capability in a digital risk monitoring solution?
Unlocking The Potential Of Frontline Managers Exec BriefingJeff Lively
Times of change present many challenges for organizations, particularly for frontline managers whose people will be responsible for implementing the change. Pressure to perform is high, as are emotions, and everyone is expected to do more with less.
View the on-demand recording: http://securityintelligence.com/events/why-insider-threats-challenge-critical-business-processes/
While advanced threats and mega breaches continue to make headlines, insider threats remain an insidious and often-overlooked area of concern. No longer limited to disgruntled employees, insider threats can come from inadvertent actors who set a breach in motion with an unknowing click on a malicious link in a spam email. Join us to find out the most likely entry points, from privileged users to quasi-insiders at trusted third-parties.
Understanding how to protect valuable data and resources from compromise is top of mind for most organizations. In this live webinar, we will explain common best practices and recommendations for combating this area of risk based on insights from the 2Q IBM X-Force Threat Intelligence Quarterly.
Tolly Report: Stopping Attacks You Can't SeeIBM Security
View on-demand webinar: http://bit.ly/26P8RH8
Network security threats continue to grow not only in number, but also in type and complexity. Attackers are using more sophisticated methods, such as encryption and advanced evasion techniques, to avoid detection. And while security is a key objective for organizations, maintaining network performance and availability remain top priorities as well.
In this webinar, Kevin Tolly, Founder of The Tolly Group, will review the results of a test report IBM commissioned to evaluate the effectiveness and performance of the IBM Security Network Protection XGS 7100 appliance, a next-generation intrusion prevention system (IPS). You will also learn more about the IBM XGS, including how it was able to block 100% of encrypted threats, and stop 100% of attacks using advanced evasion techniques, while maintaining high performance levels.
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
View Webinar: http://ibm.co/1pyzpuI
The momentum continues with the IBM Security AppExchange. Join this webinar to meet the developers of two apps that help you extend the capabilities of IBM Security QRadar.
iSIGHT Threatscape enables users to pull rich threat intelligence from iSIGHT Partners directly into QRadar, improving the ability to mange threats and automate security workflow.
STEALTHbits monitors Microsoft systems and provides an easy and extensible dashboard for viewing active-directory changes logged by STEALTHbits products
Learn the advantages of sharing best practices and collaborating with others to battle highly organized cybercrime - join the era of collaborative defense!
The IBM Security Client References Guide includes summary slides of IBM clients across various industries that have successfully implemented solutions from the IBM Security Portfolio.
This is the product and services portfolio of IBM Security, which is one pillar of IBM CAMSS strategy. Products in portfolio are still moving during early 2015 due to re-portfolio of IBM. However, it will be categorized in 2 major parts.
1) IBM Security Products : all security software and appliance
2) IBM Security Services : all security services, including Cloud security.
QRadar & XGS: Stopping Attacks with a Click of the MouseIBM Security
View on-demand: https://securityintelligence.com/events/qradar-xgs-stopping-attacks-click-mouse/
As the tactics and techniques behind attacks continue to advance and evolve, organizations need a faster way to identify and prevent those attacks in real time. An integrated approach to security can make this a reality, especially when integrations are designed to proactively disrupt the lifecycle of advanced attacks through shared security intelligence and enabling organizations to take immediate action based on that intelligence.
In this session you will learn how IBM QRadar Security Intelligence Platform and IBM Security Network Protection (XGS), a next-generation IPS, work together to disrupt the attack chain and improve network security.
Join IBM Security product expert Craig Knapik as he shares how the QRadar and XGS integration enriches overall security intelligence and improves threat detection, while enabling security professionals to block threats immediately with a simple click of the mouse.
This presentation was discussed in a Webinar with MetricStream in September 2016. It is applicable for small, medium and large businesses when considering information and cyber security risk.
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
What could cybersecurity look like in the cognitive era? Organizations are facing a number of well-known security challenges and these challenges are leading to gaps in intelligence, speed, and accuracy when it comes to threats and incidents. The gaps can’t be addressed by simply scaling up legacy processes and infrastructure – new approaches are needed, and cognitive security solutions may help address these gaps. IBM conducted a survey of over 700 security professionals leaders and practitioners from 35 countries, representing 18 industries to get a sense for what challenges they are facing, how they are being addressed, and how they view cognitive security solutions as a potential powerful new tool.
Join us as Diana Kelley, Executive Security Advisor in IBM Security, and David Jarvis, Functional Research Lead for CIO and Cybersecurity in the IBM Institute for Business Value, discuss findings from the 2016 Cybersecurity Study “Cybersecurity in the Cognitive Era: Priming Your Digital Immune System” This webinar will cover an overview of the study findings, including:
Security challenges, shortcomings and what security leaders are doing about them
Views on cognitive security solutions – how they might help, readiness to implement and what might be holding them back
What those that are ready to implement cognitive enabled security today are thinking and doing
Top 12 Cybersecurity Predictions for 2017IBM Security
No industry is immune from a cyberattack. In fact, cyber experts are predicting that we may see a rise in attacks and a spread as industries previously on the fringe now face direct hits. The question is, “What’s in store for us in 2017?”
Top 2016 Mobile Security Threats and your EmployeesNeil Kemp
The proliferation of mobile technology brings a potential increase of security threats. As Businesses become more mobile we teardown physical servers and trade them in for virtual space on the cloud. we are opening ourselves up to risk.
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...IBM Security
View On-Demand Webinar: https://event.on24.com/eventRegistration/EventLobbyServlet?target=reg20.jsp&referrer=&eventid=1139921&sessionid=1&key=993ECF370F9F3C594E6E3F44A0FA6BA2®Tag=13522&sourcepage=register
2015 was peppered with mega-breaches of highly sensitive data like personal health information and private bedroom behaviors. and companies of all sizes need to pay attention to security basics to stop the infiltration of attackers and protect their data.
Cybercriminals’ targets are now bigger and their rewards greater as they fine-tune efforts to obtain and leverage higher value data than years’ past.
New attack techniques like mobile overlay malware are gaining, while “classic” attacks like DDoS and POS malware continue to be effective due to lackluster practice in security fundamentals.
Malware leaps across target countries are indicative of increasing sophistication and organization in cybercrime rings.
In the 2016 edition of the IBM X-Force Threat Intelligence Report, IBM security research experts examine the macro trends that affected the industry, what to expect in 2016, and recommendations on how you can protect your digital assets.
Today, being connected on-line is a foundational aspect of many businesses. Everything from our computers and cars to phones and refrigerators are connected in the race to digital transformation.
But it comes with a cost. Every device and application in use increases our cyber-attack surface.
These slides--based on the webinar from leading IT research firm Enterprise Management Associates (EMA) and Risk IQ--provide information on:
- How to get an accurate picture of your attack surface
- How threat actors exploit our Internet presence within the context of business and security management tools, issues, and practices
- How you can reduce your risk of an attack
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...IBM Security
View on-demand: http://event.on24.com/wcc/r/1203107/AF33616D86CFB47663095958218D99E0
Being one step ahead of rapidly evolving, well-organized online cybercrime can seem like a losing battle. However, the key to success is combining sophisticated fraud detection with intelligent access management. Tightly uniting these capabilities in an open platform provides the flexibility to choose the appropriate authentication scheme for the various scenarios leveraging built-in biometrics, seamless authentication and mobile technologies. This smooths the access experience for legitimate users on web and mobile into a quick, frictionless authentication process while preventing fraudulent activity in real-time.
Join us in this IBM webinar where industry experts will discuss IBM’s approach on how to:
Detect fraudulent activity from stolen user credentials or a criminal device
Create risk-based access controls that reduce fraud while improving legitimate customers' activity
Speed deployment, improve business results and reduce cost of fraud protection with an integrated fraud protection gateway
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUlf Mattsson
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Description : Organizations have spent massive amounts of money to protect the perimeter of their networks, but if your business exists on the internet, there really is no perimeter. In this presentation, we'll discuss Digital Footprints in understanding your company’s external attack surface. We will discuss social, mobile, web attacks and analyze and review lessons learned recently publicized attacks (Polish banking institutions, Apache Struts Vulnerability or WannaCry ransomware. The speed of business and cybercrime isn't slowing down, so how can you be prepared to address and defend against these types of threats? Attend our session to find out how.
Reducing Your Digital Attack Surface and Mitigating External Threats - What, Why, How:
What is a Digital Footprint?
Breakdown of External Threats (Social, Mobile, Web)
What are blended attacks?
What is actually being targeting at your company?
How are your brands, customers, and employees being attack outside of your company?
How to become proactive in threat monitoring on the internet?
Considerations in External Threat solutions
Threat correspondence tracking considerations
Is legal cease and desist letters adequate in stopping attacks?
Examination of a phishing attack campaign
How phishing kits work
Analysis and lesson learned from recent published attacks
What are the most important capability in a digital risk monitoring solution?
Unlocking The Potential Of Frontline Managers Exec BriefingJeff Lively
Times of change present many challenges for organizations, particularly for frontline managers whose people will be responsible for implementing the change. Pressure to perform is high, as are emotions, and everyone is expected to do more with less.
Oracle fusion middleware services & solutions at yashYASH Technologies
Oracle Fusion Middleware simplifies enterprise technology management by providing companies with end-to-end system visibility on a common platform. With Oracle Fusion,
you can leverage your existing investment in Oracle to evolve into Fusion Architecture.
YASH Technologies at ASUG Minnesota chapter meetingYASH Technologies
Presentation by Lon Blake, YASH Technologies on System Landscape Requirements and Essential Considerations to Prepare Your SAP Landscape for SAP S/4HANA
Rob Dolan presents different purposes and applications for analytics within government. He provides case study examples of implementations and shares success stories. The webcast of this presentation is available here,
http://engage.vevent.com/rt/ibm~govanalytics
A game made for Recruitment Marketing team at Accenture India.The target was final year Engineering Graduates.The game was hosted on Accenture India Facebook page and their career site
Consolidating services with middleware - NDC London 2017Christian Horsdal
Have many services? Writing new ones often? If so middleware can help you cut down on the ceremony for writting new services and at same time consolidate the handling of cross cutting concerns. But what is middleware? OWIN and ASP.NET Core both have a concept of middleware. What are they? How do they help? In this talk we will dive into the code, write some middleware and show how middleware helps you handle cross-cutting concerns in an isolated and re-usable way across your services. I'll compare and contrast the OWIN and ASP.NET Core middleware concepts and talk about where each is appropriate.
New forms of value creation are emerging above the radar. Traditional business models wil become obsolete and suffer a slow death. Companies that will create meaningful value and will contribute to the quality of our life and society will grow.
The business value of managed services: Findings from IDC research sponsored...IBM Services
This presentation highlights the key findings from a recent study by IDC that determined the financial benefits, IT operational benefits, and positive return on investment realized by IBM managed services clients. To get the full report to to: http://bit.ly/BusinessValueMgdSvc
Reshape your business to become disruption proof. Today every business should challenge it's purpose, it's value proposition and business model to become future-proof. Products and services are becoming increasingly interchangeable. Almost any industry is feeling the urgency. Old handles do not work anymore and straightline thinking stops here. One has to make sure that one delivers meaningful experiences that capture value for clients and all stakeholders. Explore the possibilities to become certified experience professional. Registration for the new program 2016 is open.
A prescribed and simple sales process is key to the timely and accurate positioning of Professional Services. The attached presentation describes a simple process and techniques that have worked well for Enterprise Software companies of medium to large sizes.
IBM Security Strategy Intelligence, Integration and Expertise
by Marc van Zadelhoff, VP, WW Strategy and Product Management and Joe Ruthven IBM MEA Security Leader
Developing programs that are inherently immune to attack requires sound software engineering practices. This session looks at the overall software engineering lifecycle and the critical points at which software security is a specific consideration. From the requirements for third-party suppliers to in-house development, your process must offer a level of confidence that the software functions as intended and is free of vulnerabilities. The presentation shows how using threat models, code pattern analysis tooling, targeted reviews, and more enhances Java security.
Originally presented at JavaOne 2013 San Francisco
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
Safeguarding the cloud with IBM Security solutions - Maintain visibility and control with proven security solutions for public, private and hybrid clouds.
2015 Mobile Security Trends: Are You Ready?IBM Security
We’ve been hearing for years now that mobile security threats are coming into their own, both in terms of volume and capacity to inflict harm. Is 2015 the year when organizations will move past their fundamental BYOD debates and start discussing more progressive mobile security topics? Securing the mobile enterprise requires a comprehensive approach that includes securing devices, protecting data, safeguarding applications, and managing access and fraud.
In this session, hear IBM Security experts discuss:
- The latest mobile security trends and challenges
- Real-life customer experiences
- Best practices on building your overall mobile security strategy
View on-demand recording: http://securityintelligence.com/events/2015-mobile-security-trends/
Cybercrime is growing in both frequency and sophistication. We all know it is out there but do we know what to look for? Do we know how to combat it? Arm yourself with the latest updates from the X-Force Report of current security risks & trends happening today and our solutions from Trusteer to help you stay one step ahead of cybercriminals.
View the full on-demand webcast: https://www2.gotomeeting.com/register/826914418
JavaOne2013: Secure Engineering Practices for JavaChris Bailey
Developing programs that are inherently immune to attack requires sound software engineering practices. This session looks at the overall software engineering lifecycle and the critical points at which software security is a specific consideration. From the requirements for third-party suppliers to in-house development, your process must offer a level of confidence that the software functions as intended and is free of vulnerabilities. The presentation shows how using threat models, code pattern analysis tooling, targeted reviews, and more enhances Java security.
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itIBM Security
Quick steps to avoid the blind spots of shadow it- Cloud security enforcer webinar- available on demand here: https://securityintelligence.com/events/quick-steps-avoid-blind-spots-shadow/
Today’s Enterprise faces a number of “blind spot” challenges involving shadow IT and mobile users. With today’s fast paced technology, those blind spots are becoming more visible and easy to avoid. With IBM Cloud Security Enforcer, you can avoid View this webinar to learn:
- How can I discover and eliminate Shadow IT, even on mobile devices?
- How can I leverage existing technology to reduce costs for the company?
- How can I mitigate risk from non-compliance with regulations and security?
- Why do I have to spend additional money and time to integrate vendor products?
7 Ways to Stay 7 Years Ahead of the Threat 2015IBM Security
View on-demand webinar: https://securityintelligence.com/events/7-ways-stay-7-years-ahead-threat/#.VdXsFFNVhBc
With breach reports becoming a weekly, if not daily, occurrence, organizations need proactive security to protect themselves and their customers against the loss of sensitive data.
The disappearing network perimeter means organizations can no longer rely on traditional methods to secure their networks, and must plan for porous access to corporate assets and intellectual property. Deploying a simple intrusion prevention solution that relies on pattern matching is no longer sufficient. By focusing on blocking the behavior of malware, organizations are better protected with techniques like protocol analysis detection, shellcode heuristics, application layer heuristics, malicious communication prevention, and exploit chain disruption.
View this on-demand webinar to hear from IBM X-Force research and product experts on 7 types of behavioral based protection layered into network and endpoint security that can help your organization stay ahead of the threat.
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
View on-demand presentation: http://securityintelligence.com/events/ibm-2015-cyber-security-intelligence-index/
The cyber threat landscape is increasing in complexity and frequency. Organizations that have historically not been the target of cyber attacks now make headline news with large data losses and compromised transactions. Organizations need a clear point of view on how to respond to these threats, and one that incorporates not only the relevant technology but also the organizational changes needed.
Nick Bradley, Practice Leader of the IBM Threat Research Group and the X-Force Threat Analysis Team, and Nick Coleman, Global Head Cyber Security Intelligence Services outline what organizations need to do now and in the future to stay ahead of the growing cyber security threat.
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
Attackers and exploits are becoming increasingly sophisticated, and the pressure to protect business critical data is only getting more and more intense. Security Intelligence transforms the playing field by adding analytics and context, and shifts the balance in favor of the good guys. Today forward thinking organizations are looking at extending Security Intelligence even further by combining it with Big Data to form a solution that allows them to analyze new types of information, and data that travels at higher velocity, and in larger volume. This powerful combination yields new insights that can more effectively identify threats and fraud than ever before.
In this session, attendees will learn how to combine Security Intelligence and Big Data, and deploy a solution that is well suited for structured, repeatable tasks. We will also cover the addition of complementary new technologies that address speed and flexibility, and are ideal for analyzing unstructured data. This session will also highlight how organizations are using Security Intelligence to pro-actively detect advanced threats before they cause damage, and take effective corrective action if a compromise succeeds.
View the On-demand webinar: https://www2.gotomeeting.com/register/657029698
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App SecIBM Security
Despite being on vulnerability “Top 10” lists for many years, application vulnerabilities such as SQL injection and Cross-Site scripting continue to be significant attack paradigms for organizational data breaches. In fact, the IBM X-Force 2013 Mid-Year Trend and Risk Report confirmed that SQL Injection (SQLi) remained the most common paradigm for attackers to breach organizational security controls. Meanwhile, Cross-Site Scripting continued to be the most common type of application vulnerability.
In this session, we review the latest trends in application and mobile security vulnerabilities, and how to combat them with improved security awareness, organizational controls and application security testing technologies. We also address how to improve application security on your organization’s mobile devices.
Similar to Security Trends and Risk Mitigation for the Public Sector (20)
Investigating, Mitigating and Preventing Cyber Attacks with Security AnalyticsIBMGovernmentCA
Presentation material from Cyber Security Briefing held in Ottawa on June 12, 2013.
- Investigating, Mitigating, and Preventing Cyber Attacks with Security Analytics and Visualization - Presented by: Orion Suydam, Director of Product Management, 21CT
CEO Study Insights; Career Resiliency In Time of ChangeIBMGovernmentCA
From the Webcast in the Smarter Government Virtual Briefing Center. This presentation offers insights on how leading organizations are
preparing their workforces to seize opportunity whenever and wherever it arises—in an increasingly borderless world. Through three main themes, learn what boundaries
may be preventing your organization from matching resources with opportunities,
and how your leaders can more rapidly develop workforce skills and capabilities.
IBM software is optimized to work together in integrated solutions and architected on open standards that allow it to work with other software and hardware.
Keynote phaedra boinodiris serious games beyond training from process optim...IBMGovernmentCA
Keynote from the Smarter Defence Summit with Phaedra Boinodiris. Serious games beyond training from process optimization to complex problem solving in defence.
Social Collaboration presentation by Louis Richardson. This presentation is available in a webcast here; http://engage.vevent.com/rt/ibm~soccolgov
So you think collaboration tools might be valuable for your organization but you just
aren’t sure how they can be used effectively? Learn how Collaboration 2.0 tools can
be used to effectively address real world problems… and how you can identify these
needs within your organization.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
57. 57
57
Attacker motivations are rapidly escalating
National
Security
Nation-state
actors
Stuxnet
Espionage,
Activism
Sponsored groups
and Hacktivists
Aurora
Monetary
Gain
Organized
crime
Zeus
Revenge,
Curiosity
Insiders and
Script-kiddies
Code Red
58. 58
58
Organized groups are using multiple techniques
Using social networking and social engineering to
perform reconnaissance on spear-phishing targets,
leading to compromised hosts and accounts
Infiltrating a trusted partner and then loading malware
onto the target’s network
Creating designer malware tailored to only infect the
target organization, preventing positive identification
by security vendors
Exploiting zero-day vulnerabilities to gain access to
data, applications, systems, and endpoints
Communicating over accepted channels such as port
80 to exfiltrate data from the organization
63. 63
63
By monitoring for subtle indicators across all fronts
Break-in Spoofed email with malicious
file attachment sent to users
Command
& Control (CnC)
Latch-on Anomalous system behavior
and network communications
Expand
Device contacting internal
hosts in strange patterns
Gather Abnormal user behavior and
data access patterns
Command
& Control (CnC)
Exfiltrate Movement of data in chunks
or streams to unknown hosts
66. 66
66
Security Intelligence
Platform
Real-time Processing
• Real-time data correlation
• Anomaly detection
• Event and flow normalization
• Security context & enrichment
• Distributed architecture
Security Operations
• Pre-defined rules and reports
• Offense scoring & prioritization
• Activity and event graphing
• Compliance reporting
• Workflow management
Big Data Warehouse
• Long-term, multi-PB storage
• Unstructured and structured
• Distributed infrastructure
• Preservation of raw data
• Hadoop-based backend
Big Data
Platform
Analytics and Forensics
• Advanced visuals and interaction
• Predictive & decision modeling
• Ad hoc queries
• Spreadsheet UI for analysts
• Collaborative sharing tools
• Pluggable UI
Complementary analytics and workflow from IBM
IBM
Security
Intelligence
with
Big Data
67. 67
67
QRadar leverages Big Data to identify security threats
Appliances
with massive scale
Intelligent data
policy management
Payload indexing leveraging
a purpose-built data store
Advanced threat visualization
and impact analysis
Google-like search
of large data sets
Enrichment with X-Force
and external intelligence
68. 68
68
Example QRadar uses cases
Irrefutable Botnet
Communication
Layer 7 flow data shows botnet
command and control
instructions
Improved
Breach Detection
360-degree visibility helps
distinguish true breaches
from benign activity, in real-
time
Network Traffic
Doesn’t Lie
Attackers can stop logging
and erase their tracks, but
can’t cut off the network
(flow data)
69. 69
69
Extending Security Intelligence with additional
Big Data analytics capabilities
1. Analyze a variety of
non-traditional and
unstructured datasets
2. Significantly increase
the volume of data
stored for forensics and
historic analysis
3. Visualize and query
data in new ways
4. Integrate with my
current operations
IBM Security QRadar
• Data collection and
enrichment
• Event correlation
• Real-time analytics
• Offense prioritization
Advanced Threat Detection
Traditional data sources
Security Intelligence Platform
70. 70
70
By integrating QRadar with IBM’s Enterprise
Hadoop-based offering
Real-time
Streaming
Insights
IBM Security QRadar
• Hadoop-based
• Enterprise-grade
• Any data / volume
• Data mining
• Ad hoc analytics
• Data collection and
enrichment
• Event correlation
• Real-time analytics
• Offense prioritization
Big Data Platform
Custom Analytics
Traditional data sources
IBM InfoSphere BigInsights
Non-traditional
Security Intelligence Platform
Advanced Threat Detection
72. 72
ATTACKER
User receives risky
email from personal
social network
TARGET
Drive-by exploit is
used to install
malware on target PC
User is redirected to
a malicious website
73. 73
73
Using Big Data to mine for trends within email
Use BigInsights to
identify phishing targets
and redirects
Build visualizations,
such as heat maps, to
view top targets
75. 75
ATTACKER
Attacker registers
or acquires a domain Compromised hosts
“phone home” to
attacker C&C servers
Attacker changes the
location of servers, but
domains stay the same
Internal attacks lead
to more infections
Hosts and servers
phone home and
exfiltrate data
78. 78
78
Advanced analytics identify suspicious domains
Why only a few hits
across the entire
organization to these
domains?
Correlating to
public DNS registry
information
increases suspicions
79. 79
79
Importing results to QRadar for real-time analysis
Correlate against
network activity
and visualize
View real-time data and look for active connections
80. 80
80
1
IBM QRadar
Security Intelligence
unified architecture for collecting, storing,
analyzing and querying log, threat,
vulnerability and risk related data
2
IBM Big Data Platform (Streams, Big Insights, Netezza)
addresses the speed and flexibility required for customized data
exploration, discovery and unstructured analysis
3
IBM i2
Analyst Notebook
helps analysts
investigate fraud by
discovering patterns and
trends across volumes of
data
4
IBM SPSS
unified product family to
help capture, predict,
discover trends, and
automatically deliver
high-volume, optimized
decisions
Additional IBM analytics capabilities for security
81. 81
1. Traditional defenses are insufficient
2. Security has become a Big Data problem
3. Security Intelligence is a Big Data solution
4. New analysis can lead to new insights