SlideShare a Scribd company logo
© 2013 IBM Corporation
IBM Security Intelligence
Less Threat. More Intelligence.
Brendan Hannigan
General Manager, IBM Security Systems
© 2013 IBM Corporation
3
Evolving Threat Landscape
Evolving CISO Landscape
4
CISO Challenge: Competing priorities
83%of enterprises
have difficulty filling
security roles
increase
in Web application
vulnerabilities
from 2011 to 2012
14%
Increase in
compliance
mandates
Common
Vulnerabilities
and Exposures
5
CISO Challenge: Inadequate tools
85tools from
0 out of 46
vendors detected
malware
45vendors
Source: IBM client example
6
CISO Challenge: Business pressures
of CISOs are
concerned about Cloud and
mobile security
of organizations
are using at least one
cloud platform
70%
75%+
7
stolen from
bank accounts
in Operation
High Roller
of C-level execs
say that negligent
insiders are their
biggest concern
increase
in critical
web browser
vulnerabilities
59%
43%
INTERNAL EXTERNAL PAYOFFS
$78M
CISO Challenge: Evolving Threats
8
Advantage: Attacker
9
1 2 3
InnovationIntelligenceFocus
10
Focus
USERS
ASSETSTRANSACTIONS
11
USERS
60,000 employees
Provisioning took up to 2 weeks
No monitoring of privileged users
Focus on users,
not devices
Implement identity
intelligence
Pay special attention
to trusted insiders
Privilege Identity Management
Monitoring and same-day
de-provisioning
for 100+ privileged users
Source: IBM client example
12
ASSETS
critical databases
$21M
Saved
2,000
Secured
in compliance costs
Database Access and Monitoring
Thousands of databases containing
HR, ERP, credit card, and other PII
in a world where 98%
of breaches hit databases
Discover critical business
data
Harden and
secure repositories
Monitor and prevent
unauthorized access
Source: IBM client example
13
30 Million customers in an industry where
$3.4B industry losses from online fraud
85% of breaches go undetected
TRANSACTIONS
Identify most
critical transactions
Monitor sessions,
access, and devices
Look for anomalies
and attacks
Advanced Fraud Protection
Zero instances of fraud
on over 1 million customer endpoints
reported
Source: IBM client example
14
Intelligence
ANALYTICS
VISIBILITYINTEGRATION
15
Context, clustering, baselining,
machine learning, and heuristics
Identify entire classes of Mutated threats
by analyzing 250+protocols and file typesANALYTICS
Pattern
matching
Don’t rely on
signature detection
Use baselines
and reputation
Identify
outliers
16
Reduce 2 Billion logs and events per day
to 25high priority offenses
Get full coverage,
No more blind spots
Reduce and
prioritize alerts
Continuous
monitoring
VISIBILITY
Source: IBM client example
17
Integrated
Platforms
Eliminate silos and
point solutions
Build upon a
common platform
Share information
between controls
Monitor threats across 8 Million subscribers
with an integrated PlatformINTEGRATION
Siloed
Point Products
Source: IBM client example
18
CLOUD
MOBILE
Innovation
19
Cloud-enhanced Security
Automated, customizable,
and elastic
Cloud is an opportunity
for enhanced security
Traditional Security
Manual
and static
20
Mobility is the opportunity
to get security right
Network
and Access
Control
Fraud
Protection
Application
and Data
Security
Endpoint
Management
21
Intelligence
Integration
Expertise
IBM Security Framework
Professional, Managed,
and Cloud Services
22
Advanced Threat Protection
Staying ahead of sophisticated attacks
Defense StrategyAttack Chain IBM Capabilities and Services
QRadar Security Intelligence
X-Force Threat Intelligence
Emergency Response Services
Network Protection
InfoSphere Guardium
Trusteer Apex
QRadar Vulnerability Manager
Endpoint Manager
AppScan
23
CISO: Checkmate!
Analytics-powered security
Leaning forward.
Felix Mohan
Bharti Airtel Limited
© 2013 IBM Corporation
25
Align. Make intelligent.
Third-party risk
Advanced attacks
Regulatory compliance
Voice to data shift
Competitive pressure
Disruptive technologies
Automation
Optimization
Culture
Competency
Communication
Intelligence
Aggravators
Concerns
Align.
Make
intelligent.
Business-aligned
Analytics-driven
26
Airtel intelligence structure.
Technology
Interaction
Information
Integration
Analytics
ContextSecurity
devices
Network
devices
Events
Flows
Contextual assessments
Better risk management
Prioritized and actionable intelligence
Broader and deeper vulnerability insight
Better protection from advanced attacks
Quicker response
QFlow and VFlow Collector
Vulnerability Manager
Risk Manager
SIEM
QRadar
X-Force external threat feed
Trusteer* (2014) Openpages*, BigInsights* (2015-16)
27
Understand. Prioritize. Act.
Advanced threat
protection
Risk
management
Compliance Resource
optimization
Fraud
protection
Simulate “what ifs” for risk impact
Remediate zero-days and new security threats
Monitor asset profiles & behaviour continuously
Visualize traffic patterns and connections
Comply with regulatory mandates and policies
Prioritize vulnerability remediation
Protect transactions
Carry out advanced incident analysis & forensics
Optimize resources and efforts
We are moving from dousing fires to ensuring they don’t happen in the first place!
Vulnerability
scan data
Configuration
data
Event
data Activity
data
Context
Network
topology
#IBMINTERCONNECT
© 2013 IBM Corporation
Thank You
29
10+ demos
5 appliances
•  Visit the Security Intelligence
area in the Solution Center
•  Meet experts from the IBM
Security Singapore Lab
•  Solution Center Sessions: Enhancing IBM Security solutions
with Trusteer fraud detection capabilities
•  Technical Session: Dedicated Security track featuring
Identity and Access Management, Security Intelligence,
Mobile Security, and more
Don’t miss partner & client speakers including YaData and Asian Paints
Don’t miss…
All
Day
2
Day
3
© 2013 IBM Corporation

More Related Content

PDF
Recent ECB/ EBA regulations how they will impact European banks in 2016
PDF
Orchestrate Your Security Defenses; Protect Against Insider Threats
PDF
Top 12 Cybersecurity Predictions for 2017
PPTX
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
PPT
Smart security solutions for SMBs
PDF
The 2016 Ponemon Cost of a Data Breach Study
PPTX
How to Improve Threat Detection & Simplify Security Operations
PDF
Mobile Vision 2020
Recent ECB/ EBA regulations how they will impact European banks in 2016
Orchestrate Your Security Defenses; Protect Against Insider Threats
Top 12 Cybersecurity Predictions for 2017
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Smart security solutions for SMBs
The 2016 Ponemon Cost of a Data Breach Study
How to Improve Threat Detection & Simplify Security Operations
Mobile Vision 2020

What's hot (19)

PPTX
IBM QRadar UBA
PPTX
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
PPT
Cognitive security
PPTX
Security Trend Report, 2017
PDF
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
PPTX
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
PPT
Extend Your Market Reach with IBM Security QRadar for MSPs
PDF
Accelerating SOC Transformation with IBM Resilient and Carbon Black
PPTX
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
PPTX
Cyber risks in supply chains
PDF
T&M Cyber
PPTX
See How You Measure Up With MaaS360 Mobile Metrics
PDF
Rochester Security Event
PDF
Retail Mobility, Productivity and Security
PPTX
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
PDF
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
PPTX
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
PDF
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
PPTX
Integrated Response with v32 of IBM Resilient
IBM QRadar UBA
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cognitive security
Security Trend Report, 2017
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Extend Your Market Reach with IBM Security QRadar for MSPs
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cyber risks in supply chains
T&M Cyber
See How You Measure Up With MaaS360 Mobile Metrics
Rochester Security Event
Retail Mobility, Productivity and Security
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Integrated Response with v32 of IBM Resilient
Ad

Viewers also liked (8)

PPT
Information Extraction from HTML: General Machine Learning ...
PPTX
Computer Evolution
PPTX
Branches of TOM, Machine & Structure, Kinematic Links
PDF
Android Application Development for Intel Platform
PPT
Lecture 9 slides: Machine learning for Protein Structure ...
PPT
Operating System 2
PPT
Ntroduction to computer architecture and organization
PPTX
System Programing Unit 1
Information Extraction from HTML: General Machine Learning ...
Computer Evolution
Branches of TOM, Machine & Structure, Kinematic Links
Android Application Development for Intel Platform
Lecture 9 slides: Machine learning for Protein Structure ...
Operating System 2
Ntroduction to computer architecture and organization
System Programing Unit 1
Ad

Similar to IBM InterConnect 2013 Security Keynote (20)

PPTX
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
PDF
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
PPT
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
PPT
Breaking down the cyber security framework closing critical it security gaps
PPT
IBM Security Strategy Intelligence,
PDF
CS Sakerhetsdagen 2015 IBM Feb 19
PDF
IBM - IAM Security and Trends
PPTX
IBM Security Strategy
PDF
IBM Security Strategy Overview
PDF
Ibm security products portfolio
PDF
A New Remedy for the Cyber Storm Approaching
PDF
IBM Security Products: Intelligence, Integration, Expertise
PPTX
Take your SOC Beyond SIEM
PPT
IBM security systems overview v1.0 - rohit nagarajan
PDF
IBM Security Services Overview
PPT
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
PPT
Ibm security overview 2012 jan-18 sellers deck
PDF
[RakutenTechConf2013] [A-0] Security Meets Analytics
PPT
Avoiding data breach using security intelligence and big data to stay out of ...
PDF
Cyber Security 4.0 conference 30 November 2016
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
Breaking down the cyber security framework closing critical it security gaps
IBM Security Strategy Intelligence,
CS Sakerhetsdagen 2015 IBM Feb 19
IBM - IAM Security and Trends
IBM Security Strategy
IBM Security Strategy Overview
Ibm security products portfolio
A New Remedy for the Cyber Storm Approaching
IBM Security Products: Intelligence, Integration, Expertise
Take your SOC Beyond SIEM
IBM security systems overview v1.0 - rohit nagarajan
IBM Security Services Overview
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
Ibm security overview 2012 jan-18 sellers deck
[RakutenTechConf2013] [A-0] Security Meets Analytics
Avoiding data breach using security intelligence and big data to stay out of ...
Cyber Security 4.0 conference 30 November 2016

More from IBM Events (15)

PDF
IBM InterConnect 2013 Smarter Commerce Keynote: Your Customer in Context
PDF
IBM InterConnect 2013 Smarter Commerce Keynote: SingTel
PDF
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
PDF
IBM InterConnect 2013 Mobile Keynote: Kristen Lauria
PDF
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
PDF
IBM InterConnect 2013 Expert Integrated Systems Keynote: Spindo
PDF
IBM InterConnect 2013: DevOps Keynote
PDF
InterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
PDF
InterConnect 2013 Cloud General Session: Douglas White
PDF
IBM InterConnect 2013 Cloud General Session: Jamie Thomas
PDF
IBM InterConnect 2013 Cloud General Session: Tom Rosamilia
PDF
IBM InterConnect 2013 Cloud General Session: Robert LeBlanc
PDF
IBM InterConnect 2013 Cloud General Session: George Karidis
PDF
IBM InterConnect 2013 Cloud General Session: Bryan Guenther
PDF
IBM InterConnect 2013: Big Data and Analytics Presented by Mike Rhodin
IBM InterConnect 2013 Smarter Commerce Keynote: Your Customer in Context
IBM InterConnect 2013 Smarter Commerce Keynote: SingTel
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Kristen Lauria
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Spindo
IBM InterConnect 2013: DevOps Keynote
InterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
InterConnect 2013 Cloud General Session: Douglas White
IBM InterConnect 2013 Cloud General Session: Jamie Thomas
IBM InterConnect 2013 Cloud General Session: Tom Rosamilia
IBM InterConnect 2013 Cloud General Session: Robert LeBlanc
IBM InterConnect 2013 Cloud General Session: George Karidis
IBM InterConnect 2013 Cloud General Session: Bryan Guenther
IBM InterConnect 2013: Big Data and Analytics Presented by Mike Rhodin

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Approach and Philosophy of On baking technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
Teaching material agriculture food technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Cloud computing and distributed systems.
NewMind AI Weekly Chronicles - August'25 Week I
The AUB Centre for AI in Media Proposal.docx
sap open course for s4hana steps from ECC to s4
20250228 LYD VKU AI Blended-Learning.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Big Data Technologies - Introduction.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Mobile App Security Testing_ A Comprehensive Guide.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Approach and Philosophy of On baking technology
Spectral efficient network and resource selection model in 5G networks
Network Security Unit 5.pdf for BCA BBA.
Chapter 3 Spatial Domain Image Processing.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Teaching material agriculture food technology
Building Integrated photovoltaic BIPV_UPV.pdf

IBM InterConnect 2013 Security Keynote