SlideShare a Scribd company logo
Like the human brain, Cognitive Analysis turns data into insight
Processes
Information
Draws
Conclusions
Codifies Instincts &
Experience into Learning
Enables machines to
penetrate the
complexity of data to
identify associations
Presents
powerful techniques
to handle unstructured
data
Continuously learns
not only from
previous insights, but
also for new data
entering the system
Provides NLP support
to enable human to
machine and machine
to machine
communication
Does not require
rules, instead relies
on hypothesis
generation using
multiple data sets
which might not
always appear
connected or relevant
NLP: Natural Language Processing
Feature Traditional Security Applications
Threat Detection Signature-based detection Signature-free & machine learning based detection
Threat Research Manual research Automated research using Natural Language
Processing (NLP) technology
Threat
Comparison
Manual comparison Automated comparison of threats against multiple
threat repositories
Threat
Prioritization
Manual prioritization of threats and workload Automated threat prioritization using file analysis,
research, and NLP
Threat Action Manual kick off workflow to remediate Integration with workflow systems and optional
automated remediation
Automated threat research is a force multiplier for your security teams
Increased Productivity – Be proactive, not reactive
SparkSecure emulates your best security experts - at machine scale
Cognitive Security adaptively and
intelligently mirrors “human-like”
log analysis
Security Threat Intel & Advisory
Threats prioritized by confidence to
streamline user response time
Fast queries of petabytes
enabled by Hadoop architecture
IBM Watson powers in-context
threat advisory using the largest
gathered corpus of security
knowledge
Flexible delivery allows for web
hosted or on-premises
deployment integrated with your
SIEM or devices
DeepNLP searches open and dark
web for threat assessment
User inputs train model to
improve Machine Learning
algorithms
Big Data architecture (Spark,
Kafka, Hive etc) supports real-time
data streaming, massive storage,
and easy scalability
NLP automated research automatically determines threat confidence
Automated
NLP Research
High level threat
summary
NLP Evidence
Summary
NLP Confidence
Score
Reads thousands of pages
of relevant threat context
SparkSecure: comprehensive, cutting-edge defense
* IBM Watson remediation is an optional add on
We are offering a lot at a very reasonable price point!
Machine Learning Anti-Virus combats obfuscation and
polymorphism
Break down the
DNA of every file
Analyze all of the
components
individually
Determine
likelihood of
malicious nature

More Related Content

PDF
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
PDF
Cognitive Security: How Artificial Intelligence is Your New Best Friend
PDF
Telesoft Cyber Threat Hunting Infographic
PPTX
Cognitive Computing in Security with AI
PPTX
Threat Hunting 101: Intro to Threat Detection and Incident Response
PPTX
Hunting the Evil of your Infrastructure
PPTX
Cyber Threat Hunting: Identify and Hunt Down Intruders
PPTX
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
Cognitive Security: How Artificial Intelligence is Your New Best Friend
Telesoft Cyber Threat Hunting Infographic
Cognitive Computing in Security with AI
Threat Hunting 101: Intro to Threat Detection and Incident Response
Hunting the Evil of your Infrastructure
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...

What's hot (20)

PDF
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
PDF
AI approach to malware similarity analysis: Maping the malware genome with a...
PDF
Ctia course outline
DOC
Honeypot Essentials
PPTX
Machine Learning in Information Security by Mohammed Zuber
PPTX
Crits new one_dark-goffin
PPTX
A Brief Introduction to Penetration Testing
PPTX
Malware Detection Using Machine Learning Techniques
PPTX
Role of data mining in cyber security
PPTX
Threat intelligence - nullmeetblr 21st June 2015
PDF
57 slide presentation
PDF
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
PPTX
External Attacks Against Pivileged Accounts
PDF
TTPs for Threat hunting In Oil Refineries
PPT
Anton Chuvakin on What is NOT Working in Security 2004
PDF
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
PPTX
Penetration testing overview
PPTX
Automating cybersecurity
PDF
Machine learning cybersecurity boon or boondoggle
PPTX
Balance Risk With Better Threat Detection
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
AI approach to malware similarity analysis: Maping the malware genome with a...
Ctia course outline
Honeypot Essentials
Machine Learning in Information Security by Mohammed Zuber
Crits new one_dark-goffin
A Brief Introduction to Penetration Testing
Malware Detection Using Machine Learning Techniques
Role of data mining in cyber security
Threat intelligence - nullmeetblr 21st June 2015
57 slide presentation
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
External Attacks Against Pivileged Accounts
TTPs for Threat hunting In Oil Refineries
Anton Chuvakin on What is NOT Working in Security 2004
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Penetration testing overview
Automating cybersecurity
Machine learning cybersecurity boon or boondoggle
Balance Risk With Better Threat Detection
Ad

Viewers also liked (20)

PDF
Machine Learning and Cognitive Fingerprinting - SparkCognition
PDF
Machine learning’s impact on utilities webinar
PDF
AWEA Cognitive Analytics for Predictive Futures
PDF
Watson join the cognitive era
PPTX
Artificial Intelligence Application in Oil and Gas
PDF
(48) (human cognitive processing) alexander ziem frames of understanding in t...
PDF
Design for an Enterprise Hub
PDF
Cognitive Usability: Using Human Factors to Influence Future Online Usability...
PDF
Ncad medical device design process 2016
PDF
Data science unit introduction
PDF
Information processing theory abd
PPT
The cognitive load theory
PDF
Cognitive system in real life: Il caso LIRA
PDF
Search++: Cognitive transformation of human-system interaction: Presented by ...
PPTX
Motor system overview
PPT
10b motor system voluntary control
PPTX
Cognitive process by sipnayan101
PDF
Fundamentals of Human Cognitive Process
PPTX
Motor system pathways for students
PDF
Conceptualizing in research : an overview
Machine Learning and Cognitive Fingerprinting - SparkCognition
Machine learning’s impact on utilities webinar
AWEA Cognitive Analytics for Predictive Futures
Watson join the cognitive era
Artificial Intelligence Application in Oil and Gas
(48) (human cognitive processing) alexander ziem frames of understanding in t...
Design for an Enterprise Hub
Cognitive Usability: Using Human Factors to Influence Future Online Usability...
Ncad medical device design process 2016
Data science unit introduction
Information processing theory abd
The cognitive load theory
Cognitive system in real life: Il caso LIRA
Search++: Cognitive transformation of human-system interaction: Presented by ...
Motor system overview
10b motor system voluntary control
Cognitive process by sipnayan101
Fundamentals of Human Cognitive Process
Motor system pathways for students
Conceptualizing in research : an overview
Ad

Similar to Cognitive Analysis With SparkSecure (20)

PDF
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
PPT
Cognitive security
PDF
Apache Spark for Cyber Security in an Enterprise Company
PDF
Peter Allor - The New Era of Cognitive Security
PPTX
AI for improved surveillance & cybersecurity
PDF
AI for Cyber Security and Adversarial AI
PDF
The future of cyber security
PPTX
PCM Vision 2019 Breakout: IBM | Red Hat
 
PPTX
Protecting health and life science organizations from breaches and ransomware
PDF
NOVA Data Science Meetup 1/19/2017 - Presentation 1
PPTX
PCM Vision 2019 Keynote: Jeff Crume
 
PPTX
Cognitive automation with machine learning in cyber security
PPTX
Network-Intrusion-Detection-Using-Machine-Learning-1.pptx
PDF
Big Data LDN 2017: Cognitive Search & Analytics – Bringing the Power of AI to...
PPTX
BsidesLVPresso2016_JZeditsv6
DOCX
IBM Watson V3 Application Development- certification guide
PDF
Scaling ML-Based Threat Detection For Production Cyber Attacks
PPTX
Intelligent-Intrusion-Detection-System-Using-Enterprise-Network-Security.pptx...
PDF
The new MFA security gap deciphered — Real-world guide on how to fix it For C...
PPTX
Machine Learning with Apache Spark
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
Cognitive security
Apache Spark for Cyber Security in an Enterprise Company
Peter Allor - The New Era of Cognitive Security
AI for improved surveillance & cybersecurity
AI for Cyber Security and Adversarial AI
The future of cyber security
PCM Vision 2019 Breakout: IBM | Red Hat
 
Protecting health and life science organizations from breaches and ransomware
NOVA Data Science Meetup 1/19/2017 - Presentation 1
PCM Vision 2019 Keynote: Jeff Crume
 
Cognitive automation with machine learning in cyber security
Network-Intrusion-Detection-Using-Machine-Learning-1.pptx
Big Data LDN 2017: Cognitive Search & Analytics – Bringing the Power of AI to...
BsidesLVPresso2016_JZeditsv6
IBM Watson V3 Application Development- certification guide
Scaling ML-Based Threat Detection For Production Cyber Attacks
Intelligent-Intrusion-Detection-System-Using-Enterprise-Network-Security.pptx...
The new MFA security gap deciphered — Real-world guide on how to fix it For C...
Machine Learning with Apache Spark

Recently uploaded (20)

PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PPTX
oil_refinery_comprehensive_20250804084928 (1).pptx
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PDF
Lecture1 pattern recognition............
PDF
.pdf is not working space design for the following data for the following dat...
PPTX
IB Computer Science - Internal Assessment.pptx
PPTX
Supervised vs unsupervised machine learning algorithms
PPTX
1_Introduction to advance data techniques.pptx
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PDF
Foundation of Data Science unit number two notes
PPTX
Introduction to Knowledge Engineering Part 1
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
Computer network topology notes for revision
IBA_Chapter_11_Slides_Final_Accessible.pptx
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
STUDY DESIGN details- Lt Col Maksud (21).pptx
Miokarditis (Inflamasi pada Otot Jantung)
oil_refinery_comprehensive_20250804084928 (1).pptx
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
Lecture1 pattern recognition............
.pdf is not working space design for the following data for the following dat...
IB Computer Science - Internal Assessment.pptx
Supervised vs unsupervised machine learning algorithms
1_Introduction to advance data techniques.pptx
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
Foundation of Data Science unit number two notes
Introduction to Knowledge Engineering Part 1
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
climate analysis of Dhaka ,Banglades.pptx
Computer network topology notes for revision

Cognitive Analysis With SparkSecure

  • 1. Like the human brain, Cognitive Analysis turns data into insight Processes Information Draws Conclusions Codifies Instincts & Experience into Learning Enables machines to penetrate the complexity of data to identify associations Presents powerful techniques to handle unstructured data Continuously learns not only from previous insights, but also for new data entering the system Provides NLP support to enable human to machine and machine to machine communication Does not require rules, instead relies on hypothesis generation using multiple data sets which might not always appear connected or relevant NLP: Natural Language Processing
  • 2. Feature Traditional Security Applications Threat Detection Signature-based detection Signature-free & machine learning based detection Threat Research Manual research Automated research using Natural Language Processing (NLP) technology Threat Comparison Manual comparison Automated comparison of threats against multiple threat repositories Threat Prioritization Manual prioritization of threats and workload Automated threat prioritization using file analysis, research, and NLP Threat Action Manual kick off workflow to remediate Integration with workflow systems and optional automated remediation Automated threat research is a force multiplier for your security teams Increased Productivity – Be proactive, not reactive SparkSecure emulates your best security experts - at machine scale
  • 3. Cognitive Security adaptively and intelligently mirrors “human-like” log analysis Security Threat Intel & Advisory Threats prioritized by confidence to streamline user response time Fast queries of petabytes enabled by Hadoop architecture IBM Watson powers in-context threat advisory using the largest gathered corpus of security knowledge Flexible delivery allows for web hosted or on-premises deployment integrated with your SIEM or devices DeepNLP searches open and dark web for threat assessment User inputs train model to improve Machine Learning algorithms Big Data architecture (Spark, Kafka, Hive etc) supports real-time data streaming, massive storage, and easy scalability
  • 4. NLP automated research automatically determines threat confidence Automated NLP Research High level threat summary NLP Evidence Summary NLP Confidence Score Reads thousands of pages of relevant threat context
  • 5. SparkSecure: comprehensive, cutting-edge defense * IBM Watson remediation is an optional add on We are offering a lot at a very reasonable price point!
  • 6. Machine Learning Anti-Virus combats obfuscation and polymorphism Break down the DNA of every file Analyze all of the components individually Determine likelihood of malicious nature

Editor's Notes

  • #7: Now let’s talk about where the rubber meets the road. How do we actually handle polymorphic malware with ML? The first thing you can do is explode a file out to a huge feature set. This includes doing header analysis, strings analysis, entropy analysis, and many other types of feature extractions. From there, an extremely advanced classifier can look at all of the different pieces and figure out how they might fit together. Instead of just looking for known signatures, the algorithm looks for patterns and figures out how they might fit together. I’m going to go out on a limb, and I’ve never used this example before, so please bear with me, and compare this to legos. Imagine you have something really mean…like a pirate ship. You know what that looks like when it’s fully built. But what if you break down all of the pieces, you can build anything you want with it. You may be able to tell it’s a boat…but it may be difficult to figure out that it’s a pirate ship. Imagine if you could look at all of the pieces and figure out all of the things that you could make with