Staying Ahead of the Cyber Security Game. Nigel Tan ASEAN Technical Leader IBM Security

Similar documents
The Current State of Cyber Security

Security Intelligence

and Security in the Era of Cloud

Cloud Security. Vaughan Harper IBM Security Architect

The webinar will begin shortly

IBM & Security Gov. Point Of Views

Do not forget the basics!!!!!

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

How to Choose the Right Security Information and Event Management (SIEM) Solution

IBM Security Strategy

IBM Security Systems Trends and IBM Framework

Safeguarding the cloud with IBM Dynamic Cloud Security

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

Leverage security intelligence for retail organizations

IBM Security Intelligence Strategy

IBM QRadar Security Intelligence April 2013

Under the Hood of the IBM Threat Protection System

Strengthen security with intelligent identity and access management

Applying IBM Security solutions to the NIST Cybersecurity Framework

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

IBM Security re-defines enterprise endpoint protection against advanced malware

IBM Endpoint Manager Product Introduction and Overview

IBM Security X-Force Threat Intelligence

IBM Security QRadar Vulnerability Manager

IBM Security Briefing: Differentiators & Maturity Model

IBM Advanced Threat Protection Solution

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

QRadar SIEM and Zscaler Nanolog Streaming Service

Security strategies to stay off the Børsen front page

Breaking down silos of protection: An integrated approach to managing application security

Information Security and Practice in Finance Industry. Xingxiong Zhu

IBM Exam M IBM Security Sales Mastery Test v4 Version: 7.0 [ Total Questions: 62 ]

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

IBM Security QRadar Risk Manager

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Risk-based solutions for managing application security

Addressing Security for Hybrid Cloud

IBM Security QRadar Risk Manager

IBM Security IBM Corporation IBM Corporation

IBM Security Framework

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

IBM SECURITY QRADAR INCIDENT FORENSICS

Redefining SIEM to Real Time Security Intelligence

Cloud, Big Data, Mobile, Social and Security

IBM Security Intrusion Prevention Solutions

Security of Cloud Computing for the Power Grid

Q1 Labs Corporate Overview

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

What is Security Intelligence?

Introducing IBM s Advanced Threat Protection Platform

FIVE PRACTICAL STEPS

The Benefits of an Integrated Approach to Security in the Cloud

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

Win the race against time to stay ahead of cybercriminals

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

The Web AppSec How-to: The Defenders Toolbox

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Security & privacy in the cloud; an easy road?

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

CORE Security and GLBA

Gregg Gerber. Strategic Engagement, Emerging Markets

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Securing the mobile enterprise with IBM Security solutions

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Content Security: Protect Your Network with Five Must-Haves

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Security Analytics for Smart Grid

Selecting the right cybercrime-prevention solution

Average annual cost of security incidents

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Today s Cybersecurity Technology: Is Your Business Getting Full Protection?

Practical Steps To Securing Process Control Networks

Cutting the Cost of Application Security

Automated Protection on UCS with Trend Micro Deep Security

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

IBM QRadar as a Service

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

Transcription:

Staying Ahead of the Cyber Security Game Nigel Tan ASEAN Technical Leader IBM Security

PARADIGM SHIFT in crime ORGANIZED COLLABORATIVE AUTOMATED

Cyber Criminals Use BUSINESS INTELLIGENCE

NOBODY IS IMMUNE 2012 40% increase 2013 800,000,000+ records 2014 Unprecedented impact Attack types XSS Heartbleed Physical Access Brute Misconfig. Watering Hole Phishing SQLi DDoS Malware Undisclosed Force Sources: IBM X-Force Threat Intelligence Quarterly 1Q 2015

A New Way to Think About SECURITY

Security Imperatives STOP advanced threats PROTECT critical assets SAFEGUARD cloud and mobile OPTIMIZE your security program

Stop advanced threats Prevent targeted attacks in realtime Detect threats with security intelligence Defend against web fraud and cybercrime

Stop advanced threats Magic bullets don t work; firms need intelligent and integrated solutions

Protect Against Targeted Attacks DETECT Security intelligence Global security information Managed services PREVENT Behavioral malware prevention Zero-day exploit prevention Real-time data security RESPOND Incident forensics Endpoint management Emergency response

Protect critical assets Use context-aware, role-based controls to help prevent unauthorized access Govern and administer users and their access Identify and protect your crown jewels Manage application security risk Manage and secure your network and enpoints

Protect critical assets Organizations struggle to find their sensitive data and to build security around the people and applications that use it

Focus on your most critical assets.01 % to 2 % ~70 % is your critical data of the company s value Source: 2013 Commission on the Theft of American Intellectual Property

Align Security spend with risk 35% - 30% - 25% - 20% - 15% - Spend Risk Security Spend Security Risk 10% - Network Layer Application Layer Source: The State of Risk-Based Security Management, Research Study by Ponemon Institute, 2013

Safeguard Cloud and Mobile IaaS PaaS SaaS Protect Cloud Manage Access Protect Data Gain Visibility Protect Mobile Devices Applications Content Utilize cloud and mobile to reinvent security

Optimize the security program Integrate security silos, reduce complexity, and lower costs Risk-Aware Culture & Strategy Assess and transform your security maturity End-to-End Security Intelligence Build a next generation security operations capability Intelligent Threat Protection and Response Get help from the experts

Optimize the security program Most security programs today are compliance-based vs. risk-based 2012 ESG research

Optimize your security program A financial services firm analyzed 13M+ events per day and blocked 650+ suspicious incidents in the first 6 months Safeguard cloud and mobile A Fortune 10 automobile manufacturer safeguards access to its cloud hub for 8.5M automobile customers and internal users Protect critical assets A computer services company achieved a 33% reduction in the number of vulnerabilities in scanned programs Stop advanced threats A North American healthcare organization protected 30K endpoints and blocked 200 threats in the first 8 weeks

IBM Security

The IBM Security Journey IBM Security Systems IBM Security Services IBM Security 2012 2013 2014 2015 IBM Security Systems IBM Security Services IBM acquires Q1 Labs, creates security division zdnet.com IBM Security has become a juggernaut networkworld.com 19% 2014 YtY growth 3x the market growth

Expand the Value of Security through Integration BigFix QRadar Incident Forensics Trusteer Apex zsecure Network Protection XGS SiteProtector Network QRadar Risk Manager Endpoint Mobile MobileFirst Protect (MaaS360) MobileFirst Platform (Worklight) Trusteer Mobile AppScan Applications Security Intelligence QRadar SIEM QRadar Log Manager QRadar Vulnerability Manager Advanced Fraud Trusteer Pinpoint Trusteer Rapport Data Identity and Access Guardium Suite Privileged Identity Manager Key Lifecycle Manager Consulting Services Managed Services Access Manager Ecosystem Partners IBM X-Force Research Identity Manager

IBM X-Force Exchange: A threat intelligence platform http://exchange.xforce.ibmcloud.com One of world s largest catalogs of vulnerabilities Threat information based on 15B+ monitored security events per day Malware threat intelligence from 270M+ endpoints Threat information based on 25B+ web pages, images Intelligence on 8M+ spam and phishing attacks Reputation data on 1M malicious IP addresses 1,000+ organizations signed up in the first week Participants across 16 industries, 5 of the world s top 10 banks, 6 of the top 10 retailers

Learn more about IBM Security Visit our website ibm.com/security Watch our videos youtube.com/user/ibmsecuritysolutions Read new blog posts SecurityIntelligence.com Follow us on Twitter @ibmsecurity