The Current State of Cyber Security



Similar documents
Staying Ahead of the Cyber Security Game. Nigel Tan ASEAN Technical Leader IBM Security

Security Intelligence

and Security in the Era of Cloud

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

The webinar will begin shortly

Cloud Security. Vaughan Harper IBM Security Architect

How to Choose the Right Security Information and Event Management (SIEM) Solution

Addressing Security for Hybrid Cloud

IBM QRadar Security Intelligence April 2013

Under the Hood of the IBM Threat Protection System

IBM Security Intelligence Strategy

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

IBM SECURITY QRADAR INCIDENT FORENSICS

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Protecting against cyber threats and security breaches

Security strategies to stay off the Børsen front page

IBM & Security Gov. Point Of Views

Mobile Security. Luther Knight Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Do not forget the basics!!!!!

Applying IBM Security solutions to the NIST Cybersecurity Framework

Application Security from IBM Karl Snider, Market Segment Manager March 2012

Safeguarding the cloud with IBM Dynamic Cloud Security

Strengthen security with intelligent identity and access management

IBM Security X-Force Threat Intelligence

IBM Advanced Threat Protection Solution

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management

IBM Security re-defines enterprise endpoint protection against advanced malware

IBM Security QRadar Risk Manager

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

Leverage security intelligence for retail organizations

IBM Security QRadar Risk Manager

IBM Security Systems Trends and IBM Framework

Introducing IBM s Advanced Threat Protection Platform

IBM Security Intrusion Prevention Solutions

IBM Security QRadar Vulnerability Manager

Let s talk about assets in QRadar

IBM Security. Managed Security Services. SOC Poland / GSOC. Damian Staroscic Security Operations Center (SOC) Manager.

Security of Cloud Computing for the Power Grid

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

IBM Security Privileged Identity Manager helps prevent insider threats

IBM Security Framework

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

AMPLIFYING SECURITY INTELLIGENCE

Selecting the right cybercrime-prevention solution

IBM Security Systems Support

IBM Security Strategy

Security Intelligence Solutions

Powering Security and Easy Authentication in a Multi-Channel World

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Securing the mobile enterprise with IBM Security solutions

Security for a Smarter Planet IBM Corporation All Rights Reserved.

Information Security and Practice in Finance Industry. Xingxiong Zhu

IBM Security Briefing: Differentiators & Maturity Model

IBM Endpoint Manager Product Introduction and Overview

Reducing the cost and complexity of endpoint management

IBM Security IBM Corporation IBM Corporation

Win the race against time to stay ahead of cybercriminals

Introduction to PCI DSS

Breaking down silos of protection: An integrated approach to managing application security

IBM QRadar Security Intelligence Platform appliances

Risk-based solutions for managing application security

Tivoli Automation for Proactive Integrated Service Management

Boosting enterprise security with integrated log management

Worldwide Security and Vulnerability Management Forecast and 2013 Vendor Shares

Security is the new frontier. Build a relationship with IBM Security.

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

IBM Security QRadar SIEM Product Overview

Technology and Trends for Smarter Business Analytics

Effectively Using Security Intelligence to Detect Threats and Exceed Compliance

What is Security Intelligence?

The Cyber Threat Landscape

The Benefits of an Integrated Approach to Security in the Cloud

Q1 Labs Corporate Overview

Cloud, Big Data, Mobile, Social and Security

Simplify security management in the cloud

IBM Exam M IBM Security Sales Mastery Test v4 Version: 7.0 [ Total Questions: 62 ]

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

IBM Security Services Cyber Security Intelligence Index

IBM Security QRadar Vulnerability Manager Version User Guide

Rational Asset Manager 7.2 Editions and Licensing

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Address C-level Cybersecurity issues to enable and secure Digital transformation

Transcription:

The Current State of Cyber Security Bob Kalka, Vice President, IBM Security

PARADIGM SHIFT in crime ORGANIZED COLLABORATIVE AUTOMATED 2

Cyber criminals use BUSINESS INTELLIGENCE 3

NOBODY IS IMMUNE 2012 40% increase 2013 800,000,000+ records 2014 Unprecedented impact Attack types XSS Heartbleed Physical Brute Misconfig. Watering Phishing SQLi DDoS Malware Undisclosed Access Force Hole Source: IBM X-Force Threat Intelligence Quarterly 1Q 2015

A NEW APPROACH TO SECURITY

1 Support the CISO agenda Innovate around 2 megatrends IBM Security Strategy Buyers CISO, CIO, and Line-of-Business Deliver a broad portfolio of solutions differentiated through their integration and innovation to address the latest trends Key Security Trends Advanced Threats Cloud Mobile and Internet of Things Compliance Mandates Skills Shortage Lead in selected 3 segments Advanced Fraud Protection Strategy, Risk and Compliance Identity and Access Management IBM Security Portfolio Security Intelligence and Operations Data Security Advanced Threat and Security Research Cybersecurity Assessment and Response Application Security Network, Mobile and Endpoint Protection

Four conversations driving information security Optimize the Security Program Stop Advanced Threats Protect Critical Assets Safeguard Cloud and Mobile

Optimize the security program Risk-Aware Culture & Strategy End-to-End Security Intelligence Assess and transform your security maturity Build a next generation security operations capability Intelligent Threat Protection and Response Get help from the experts

Stop advanced threats Prevent targeted attacks in real-time Detect threats with security intelligence Defend against web fraud and cybercrime

Protect critical assets Govern and administer users and their access Identify and protect your crown jewels Manage application security risk Manage and secure your network and endpoints

Safeguard cloud and mobile IaaS PaaS SaaS Protect Cloud Manage Access Protect Data Gain Visibility Protect Mobile Devices Applications Content Access Utilize cloud and mobile to reinvent security

Roll out 100,000 mobile devices in 6 weeks Protect Devices Secure Content and Collaboration Safeguard Applications and Data Manage Access and Fraud Extend Security Intelligence

Adopt the cloud but not the risk EMPLOYEES BYOD RISKY APPS ON PREM MOBILE APPROVED APPS DETECT Usage of cloud apps and actions CONNECT Users to approved cloud apps PROTECT Against cloud-related threats

Expand the value of security through integration Network Protection XGS SiteProtector Network QRadar Incident Forensics QRadar Risk Manager Endpoint BigFix Trusteer Apex zsecure Mobile MobileFirst Protect (MaaS360) MobileFirst Platform (Worklight) Trusteer Mobile AppScan Applications Security Intelligence QRadar SIEM QRadar Log Manager QRadar Vulnerability Manager Advanced Fraud Trusteer Pinpoint Trusteer Rapport Data Identity and Access Guardium Suite Key Lifecycle Manager Ecosystem Partners Consulting Services Managed Services Privileged Identity Manager Access Manager Identity Manager

Collaborate with 7,500+ security analysts xforce.ibmcloud.com IBM X-Force Exchange Participants across 16 industries, 5 of the world s top 10 banks, and 6 of the top 10 retailers 1 5

Learn more about IBM Security TOP 2 24 133 12K 22 enterprise security software vendor in total revenue industry analyst reports rank IBM Security as a LEADER countries where IBM delivers managed security services clients protected including of the top 29 banks in Japan, North America, and Europe Visit our website IBM Security Website Watch our videos on YouTube IBM Security Channel Read new blog posts SecurityIntelligence.com Follow us on Twitter @ibmsecurity

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. www.ibm.com/security Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of,or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of theinternational Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. 17