Red Teams: Toward radical innovation
|
|
|
- Alvin Cooper
- 10 years ago
- Views:
Transcription
1 Red Teams: Toward radical innovation July 2005 Executive summary Red Teams assume the role of the outsider to challenge assumptions, look for unexpected alternatives and find the vulnerabilities of a new idea or approach. By consciously working to assume another perspective and out-do the standard team, they provide one means to getting out-of-the-box views and insights. This Executive Technology Report is based on a personal essay by Peter Andrews, Consulting Faculty Member at the IBM Advanced Business Institute in Palisades, New York. Disaster can force you to imagine the unimaginable. Unfortunately, the price is high, which is why Red Teams have come into vogue. While some Red Teams are merely review panels, the more ambitious ones are all about challenging assumptions, finding vulnerabilities and actively finding unconventional means to get a jump on mainstream (or Blue) planning teams. One key element is assuming an adversarial posture, taking the perspective of the enemy or competitor. The U.S. military has been using Red Teams to test their planning for over 30 years (and longer, by other names). They have received new attention as a critical tool for fighting terrorism, but for businesses, they can help provide competitive advantage, especially as a means to expand exploration of innovations. The key benefits of a Red Team are: Identifying significant vulnerabilities Discovering new uses for innovations Challenging taboos and assumptions Providing a minority report on a new concept or idea Revealing the consequences of different perspectives; in particular, the perspectives of those with different goals and risk profiles. Red Teams can work at different levels strategic, operational and tactical. They can goad a Blue Team to be more creative. They can help to anticipate and explain irrational actions and choices by adversaries. In addition, they can help to identify, train and tap talent for the organization, talent that is vital in a fast-changing environment. The success of a Red Team depends on its composition, its support from management, its relationship with the Blue Team, the goals, the available information and the rules of the game: ibm.com/bcs Executive technology report 1
2 Composition Putting together an effective Red Team is as much an art as a science. There is a need to include experts, but there also must be room for people who ask naïve questions. Red Team members need to be able to inhabit the roles of adversaries and risk delivering bad news, but they also must stay on good terms with all parties. They need to understand the mindset and cultures of both their own organizations and the real-world adversaries. They need to be capable of detailed critical analysis, but they also need to be imaginative and iconoclastic. Most of all, they need to have the capability to communicate surprising concepts in clear, compelling language. Management support The Red Team must have the authority and standing to get a fair hearing for its ideas and concepts. For most organizations, this means someone high up in management, but generally not the direct manager of the Blue Team. In addition to enabling a fair hearing, the management must also provide material support, proper staffing and access to information/experts. And, they must provide continuity and stability or the Red Team may find itself blocked and ignored. Relationship with Blue Team The Red Team must have the trust of the Blue Team. Without trust, the Blue Team will hide key data and be reluctant to incorporate the views and insights of the Red Team. At the same time, the Red Team must not be co-opted by the Blue Team. It must maintain a level of independence and a willingness to make unpopular statements. Goals Ultimately, the required deliverables of the Red Team must be defined and there must be some measures of success. This does not mean that the Red Team cannot cross boundaries and provide more than was agreed to, but there must be a level of accountability. The Red Team needs to know what is promised and deliver on those promises. Available information There are times when the information the Red Team has available is restricted. It makes good sense that a Blue Team, creating a computer security system, would not need to reveal every aspect to a Red Team that is assuming the roles of black hat hackers (those people who would attempt to compromise system security without authorization). On the other hand, providing the Red Team with an open book on innovation plans makes sense. In fact, regularly meeting with and working with the Blue Team can benefit both teams, especially if a healthy competition develops. A sure sign that things are working well is if the Blue Team begins to incorporate and anticipate Red Team approaches as it pursues its own work. Rules of the game Given the competitive nature of the teams, the rules of engagement must be clear with regard to information, judgment of success, what comprises proof and when/how opinions and insights are offered. In addition, the ibm.com/bcs Executive technology report 2
3 consequences especially with regard to rewards and career advancement must be stated up front. Creative Red Teams will look at a variety of aspects that affect success in the real world culture, technologies, needs, rewards, laws, market research, risk factors and available resources. Their biggest payoffs will probably come from identifying assumptions and digging into the roles of adversaries. Unexamined assumptions are usually the biggest culprits in narrowing investigation and leading to tunnel vision: things that could never happen, logical chains that can t be circumvented, values, taboos, false definitions and rules, to name a few. By researching the adversaries perhaps including people who are not even on the radar screen motivations, connections, different contexts, different values and risk factors can be explored in new ways. In fact, the best Red Teams are able to inhabit the roles of adversaries in ways that approach good acting. Getting out of the box isn t easy. The U.S. Department of Defense, in a review of Red Team experience, has identified many ways that a team can go wrong. They found instances where the Red Team did not take their assignments seriously, where they were captured by the Blue Team, where they become marginalized with no real impact, where they did not get enough inside information to be credible and where teams violated trust by leaking information. There were some teams that did not have quality memberships and others that failed in their objective to step into the shoes of adversaries. In addition, Red Teams require commitment and real investments, most notably of talent. However, the Red Team can come up with insights that provide genuine competitive advantage or could even disrupt the marketplace. For those who are in a relatively stable environment and those who do not have a means to take radical ideas and turn them into action, Red Teams are not a good use of resources. But in an age of hypercompetitiveness, with regular changes in technologies, laws, sourcing options, the social/political environment and access to talent and resources, Red Teams are beginning to take their place as an essential tool for many businesses. ibm.com/bcs Executive technology report 3
4 Technology to watch Black hat hacking Penetration testing Red and Blue Teams Security cracking Simulation Visualization Related Web sites of interest Office of the Under Secretary of Defense For Acquisition, Technology, and Logistics. Defense Science Board Task Force on The Role and Status of DoD Red Teaming Activities. September Whitley, John and Judy Moore. Red Teaming and the Hypothesizer Concept. Advanced Concepts Group, Sandia National Laboratories. sizerconcept.pdf Jane s Information Group, press release. Jane s Consultancy to use its Red Teaming service to Assess U.S. Terrorism Threat. July 26, Carrison, Dan and Rod Walsh. Red Teams/Tiger Teams. The CEO Refresher Eckert, Toby. U.S. red teams think like terrorists to test security. Copley News Service. SignOnSanDiego.com. August 20, Shinn, James J. and Jan M. Lodal. Red-Teaming the Data Gap. Lodal & Company, Council on Foreign Relations. April 20, hp About this publication Executive Technology Report is a monthly publication intended as a heads-up on emerging technologies and business ideas. All the technological initiatives covered in Executive Technology Report have been extensively analyzed using a proprietary IBM methodology. This involves not only rating the technologies based on their functions and maturity, but also doing quantitative analysis of the social, user and business ibm.com/bcs Executive technology report 4
5 factors that are just as important to its ultimate adoption. From these data, the timing and importance of emerging technologies are determined. Barriers to adoption and hidden value are often revealed, and what is learned is viewed within the context of five technical themes that are driving change: KnowlEdge Management: Capturing a company's collective expertise wherever it resides databases, on paper, in people's minds and distributing it to where it can yield big payoffs Pervasive Computing: Combining communications technologies and an array of computing devices (including PDAs, laptops, pagers and servers) to allow users continual access to the data, communications and information services Realtime: "A sense of ultracompressed time and foreshortened horizons, [a result of technology] compressing to zero the time it takes to get and use information, to learn, to make decisions, to initiate action, to deploy resources, to innovate" (Regis McKenna, Real Time, Harvard Business School Publishing, 1997.) Ease-of-Use: Using user-centric design to make the experience with IT intuitive, less painful and possibly fun Deep Computing: Using unprecedented processing power, advanced software and sophisticated algorithms to solve problems and derive knowledge from vast amounts of data This analysis is used to form the explanations, projections and discussions in each Executive Technology Report issue so that you not only find out what technologies are emerging, but how and why they'll make a difference to your business. If you would like to explore how IBM can help you take advantage of these new concepts and ideas, please contact us at [email protected]. To browse through other resources for business executives, please visit ibm.com/services Executive Technology Report is written by Peter Andrews, Consulting Faculty, IBM Advanced Business Institute, and is published as a service of IBM Corporation. Visit ibm.com/abi Copyright IBM Corporation. All rights reserved. IBM and the IBM logo are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. Other company, product and service names may be trademarks or service marks of others. References in this publication to IBM products and services do not imply that IBM intends to make them available in all countries in which IBM operates. G ibm.com/bcs Executive technology report 5
Five barriers to innovation: Key questions and answers
Five barriers to innovation: Key questions and answers November 2006 Executive summary Innovators face many obstacles, but five are particularly common: inadequate funding, risk avoidance, siloing, time
Reputation management: Building trust among virtual strangers
Reputation management: Building trust among virtual strangers September 2006 Executive summary Trust is essential to efficient business activities, but it doesn t come naturally in an online environment.
A full spectrum of analytics you can get yourself
Industry area A full spectrum of analytics you can get yourself 5 reasons to choose IBM for self-service business intelligence Contents Self-service business intelligence that paints a full picture 3 Reason
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Understanding & Improving Hypervisor Security
The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
Optimizing Network Vulnerability
SOLUTION BRIEF Adding Real-World Exposure Awareness to Vulnerability and Risk Management Optimizing Network Vulnerability Management Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965
Achieving customer loyalty with customer analytics
IBM Software Business Analytics Customer Analytics Achieving customer loyalty with customer analytics 2 Achieving customer loyalty with customer analytics Contents 2 Overview 3 Using satisfaction to drive
Information Security Organizations trends are becoming increasingly reliant upon information technology in
DATASHEET PENETRATION TESTING SERVICE Sales Inquiries: [email protected] Visit us: http://www.spentera.com Protect Your Business. Get Your Service Quotations Today! Copyright 2011. PT. Spentera. All Rights
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
Cyber Adversary Characterization. Know thy enemy!
Cyber Adversary Characterization Know thy enemy! Brief History of Cyber Adversary Modeling Mostly Government Agencies. Some others internally. Workshops DARPA 2000 Other Adversaries, RAND 1999-2000 Insider
IBM Social Media Analytics
IBM Social Media Analytics Analyze social media data to better understand your customers and markets Highlights Understand consumer sentiment and optimize marketing campaigns. Improve the customer experience
IBM Cognos Insight. Independently explore, visualize, model and share insights without IT assistance. Highlights. IBM Software Business Analytics
Independently explore, visualize, model and share insights without IT assistance Highlights Explore, analyze, visualize and share your insights independently, without relying on IT for assistance. Work
Transformation. Fueling Supply Chain. Predictive analytics energizes dynamic networks. By Can A. Dogan, Frode Huse Gjendem, and Jade Rodysill
Fueling Supply Chain Transformation Predictive analytics energizes dynamic networks By Can A. Dogan, Frode Huse Gjendem, and Jade Rodysill 38 July/August 2011 APICS magazine As companies fight for competitive
Things To Do After You ve Been Hacked
Problem: You ve been hacked! Now what? Solution: Proactive, automated incident response from inside the network Things To Do After You ve Been Hacked Tube web share It only takes one click to compromise
Ten Rules of Effective ATM Cash Management
Ten Rules of Effective ATM Cash Management www.cms-cashmanagement.com @CashManage Brendan Doyle, CEO Cash Management Solutions OVERVIEW ATM demand forecasting in most situations is relatively easy Too
University of Ontario Institute of Technology
University of Ontario Institute of Technology Leveraging key data to provide proactive patient care Overview The need To better detect subtle warning signs of complications, clinicians need to gain greater
Cloud Computing on a Smarter Planet. Smarter Computing
Cloud Computing on a Smarter Planet Smarter Computing 2 Cloud Computing on a Smarter Planet As our planet gets smarter more instrumented, interconnected and intelligent the underlying infrastructure needs
Combating a new generation of cybercriminal with in-depth security monitoring
Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.
The 5 Cybersecurity Concerns You Can t Overlook
The 5 Cybersecurity Concerns You Can t Overlook and how to address them 2014 SimSpace Corporation The 5 Cybersecurity Concerns You Can t Overlook CONCERN 1 You don t know how good your cybersecurity team
Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.
Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?
Leveraging Network and Vulnerability metrics Using RedSeal
SOLUTION BRIEF Transforming IT Security Management Via Outcome-Oriented Metrics Leveraging Network and Vulnerability metrics Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom
How To Change A Business Model
SOA governance and organizational change strategy White paper November 2007 Enabling SOA through organizational change Sandy Poi, Global SOA Offerings Governance lead, associate partner, Financial Services
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection September 2011 10 Potential Risks Facing Your IT Department: Multi-layered Security & Network Protection 2 It s
The IBM data governance blueprint: Leveraging best practices and proven technologies
May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and
Competitive Intelligence for B2B Companies
Competitive Intelligence for B2B Companies As competition in many fields intensifies, with new pressures to differentiate and entirely new types of competitors, competitive intelligence is more important
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Big Data and Data Analytics
2.0 Big Data and Data Analytics (Volume 18, Number 3) By Heather A. Smith James D. McKeen Sponsored by: Introduction At a time when organizations are just beginning to do the hard work of standardizing
Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center
Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information
The Impact of Computer Engineering 1. The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015
The Impact of Computer Engineering 1 The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015 The Impact of Computer Engineering 2 Introduction My research project included: Talking
Gaining the upper hand in today s cyber security battle
IBM Global Technology Services Managed Security Services Gaining the upper hand in today s cyber security battle How threat intelligence can help you stop attackers in their tracks 2 Gaining the upper
IBM Social Media Analytics
IBM Analyze social media data to improve business outcomes Highlights Grow your business by understanding consumer sentiment and optimizing marketing campaigns. Make better decisions and strategies across
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. Entry Name HFA Submission Contact Phone Email Qualified Entries must be received by
White Paper February 2009. How IBM Cognos 8 Business Intelligence meets the needs of financial and business analysts
White Paper February 2009 How IBM Cognos 8 Business Intelligence meets the needs of financial and business analysts 2 Contents 3 Business problems How do they do it? 4 Business drivers The tools to deliver
Change Management in Higher Education: Using Model and Design Thinking to Develop Ideas that Work for your Institution
Change Management in Higher Education: Using Model and Design Thinking to Develop Ideas that Work for your Institution By Michael P. Meotti Ed Policy Group Introduction Change and innovation are hot topics
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Global Oil & Gas Suite
IHS ENERGY Global Oil & Gas Suite Comprehensive analysis and insight on upstream opportunities, risk, infrastructure dynamics, and downstream markets Global Oil & Gas Suite Make optimal decisions about
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
The Value of Automated Penetration Testing White Paper
The Value of Automated Penetration Testing White Paper Overview As an information security and the security manager of the company, I am well aware of the difficulties of enterprises and organizations
BIGFIX. BigFix and configuration management database solutions
BigFix and configuration management database solutions Configuration management databases (CMDB) have emerged as an important tool for understanding relationships between IT assets and their support for
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
Making the Internet Business-Ready
Making the Internet Business-Ready If you ve ever shopped online, downloaded music, watched a web video or connected to work remotely, you ve probably used Akamai. Our solutions help to deliver the best
Consumer Goods and Services
Accenture Risk Management Industry Report Consumer Goods and Services 2011 Global Risk Management Point of View Consumer Goods and Services 2011 Global Risk Management Point of View Consumer Goods and
White Paper: Leveraging Web Intelligence to Enhance Cyber Security
White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence
The case for Centralized Customer Decisioning
IBM Software Thought Leadership White Paper July 2011 The case for Centralized Customer Decisioning A white paper written by James Taylor, Decision Management Solutions. This paper was produced in part
RETHINKING CYBER SECURITY
RETHINKING CYBER SECURITY Introduction Advanced Persistent Threats (APTs) and advanced malware have been plaguing IT professionals for over a decade. During that time, the traditional cyber security vendor
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
IBM Software Cloud service delivery and management
IBM Software Cloud service delivery and management Rethink IT. Reinvent business. 2 Cloud service delivery and management Virtually unparalleled change and complexity On this increasingly instrumented,
Roadmap for Transforming Intel s Business with Advanced Analytics
IT Best Practices Business Intelligence and IT Business Transformation November 2011 Roadmap for Transforming Intel s Business with Advanced Analytics Executive Overview is working in close partnership
IBM Global Services. IBM Relocation Services: Your single source for moving or upgrading critical IT resources safely and economically.
IBM Global Services IBM Relocation Services: Your single source for moving or upgrading critical IT resources safely and economically. With IBM as your project manager, you get a single contact to take
How To Manage Threat Intelligence On A Microsoft Microsoft Iphone Or Ipad Or Ipa Device
Product Brochure ThreatStream Optic ThreatStream Threat Intelligence Platform Imagine being able to make sense of all the threat information that s flowing through your security controls and coming from
Transform Your Bank in Measurable Steps
Banking Transformation Framework Transform Your Bank in Measurable Steps Table of Contents 2 Establish a Platform for Transformation 3 Transform Your Business 3 Use the Reference Architecture As a Foundation
A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD
CONTINUOUS MONITORING A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD Healthcare companies utilizing cloud infrastructure require continuous security monitoring. Learn how to prevent
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault. Best Practices Whitepaper June 18, 2014
Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault Best Practices Whitepaper June 18, 2014 2 Table of Contents LIVING UP TO THE SALES PITCH... 3 THE INITIAL PURCHASE AND SELECTION
How To Use Social Media To Improve Your Business
IBM Software Business Analytics Social Analytics Social Business Analytics Gaining business value from social media 2 Social Business Analytics Contents 2 Overview 3 Analytics as a competitive advantage
A Modern Framework for Network Security in the Federal Government
A Modern Framework for Network Security in the Federal Government 1 A MODERN FRAMEWORK FOR NETWORK SECURITY IN THE FEDERAL GOVERNMENT Trends in Federal Requirements for Network Security In recent years,
The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology
The State of Insurance Fraud Technology A study of insurer use, strategies and plans for anti-fraud technology September 2014 The State of Insurance Fraud Technology A study of insurer use, strategies
IBM Analytical Decision Management
IBM Analytical Decision Management Deliver better outcomes in real time, every time Highlights Organizations of all types can maximize outcomes with IBM Analytical Decision Management, which enables you
Calculating value during uncertainty: Getting real with real options
IBM Institute for Business Value Calculating value during uncertainty: Getting real with real options Traditional valuation techniques often fail to capture or adequately quantify the value created by
Cloud computing insights from 110 implementation projects
IBM Academy of Technology Thought Leadership White Paper October 2010 Cloud computing insights from 110 implementation projects IBM Academy of Technology Survey 2 Cloud computing insights from 110 implementation
IBM WebSphere Business Monitor, Version 6.1
Providing real-time visibility into business performance IBM, Version 6.1 Highlights Enables business users to view Integrates with IBM s BPM near real-time data on Web 2.0 portfolio and non-ibm dashboards
Leveraging a Maturity Model to Achieve Proactive Compliance
Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................
Making confident decisions with the full spectrum of analysis capabilities
IBM Software Business Analytics Analysis Making confident decisions with the full spectrum of analysis capabilities Making confident decisions with the full spectrum of analysis capabilities Contents 2
How To Do Both
STRATEGY AND LEADERSHIP MAGAZINE INTERVIEW INNOVATING BY DOING BOTH : CISCO MANAGES CONTRADICTIONS THAT DRIVE GROWTH AND PROFIT (Published on www.emeraldintelligence.com and in Strategy and Leadership
IBM Managed Security Services Vulnerability Scanning:
IBM Managed Security Services August 2005 IBM Managed Security Services Vulnerability Scanning: Understanding the methodology and risks Jerry Neely Network Security Analyst, IBM Global Services Page 2
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Integrated Finance, Risk, and Profitability Management for Insurance
SAP Brief SAP for Insurance SAP Cost and Revenue Allocation for Financial Products Objectives Integrated Finance, Risk, and Profitability Management for Insurance Gain deep business insights Gain deep
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
Understanding SCADA System Security Vulnerabilities
Understanding SCADA System Security Vulnerabilities Talking Points Executive Summary Common Misconceptions about SCADA System Security Common Vulnerabilities Affecting SCADA Networks Tactics to Strengthen
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
The Internet of Things
is a new series from Boyden on how M2M technologies are changing industrial, consumer and healthcare companies and financial institutions. In this first edition, on the Industrial Internet of Things (IIoT),
Unleashing the power of innovation
How the role of innovation within the business and the way companies innovate are being transformed. Unleashing the power of innovation www.pwc.com 2 Unleashing the power of innovation Gauging changing
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
Car Cybersecurity: What do the automakers really think? 2015 Survey of Automakers and Suppliers Conducted by Ponemon Institute
Car Cybersecurity: What do the automakers really think? 2015 Survey of Automakers and Suppliers Conducted by Ponemon Institute 1 Executive Summary The Ponemon Institute recently conducted a cybersecurity
Accenture Technology Consulting. Clearing the Path for Business Growth
Accenture Technology Consulting Clearing the Path for Business Growth Mega technology waves are impacting and shaping organizations in a profound way When a company s executive management team considers
Managing the Unpredictable Human Element of Cybersecurity
CONTINUOUS MONITORING Managing the Unpredictable Human Element of Cybersecurity A WHITE PAPER PRESENTED BY: May 2014 PREPARED BY MARKET CONNECTIONS, INC. 14555 AVION PARKWAY, SUITE 125 CHANTILLY, VA 20151
Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity
Cyber threat intelligence and the lessons from law enforcement kpmg.com/cybersecurity Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many
WHITE PAPER Big Data Analytics. How Big Data Fights Back Against APTs and Malware
WHITE PAPER Big Data Analytics How Big Data Fights Back Against APTs and Malware Table of Contents Introduction 3 The Importance of Machine Learning to Big Data 4 Addressing the Long-Tail Nature of Internet
Strategies for assessing cloud security
IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary
