Enhancing Safeguards Through Information Analysis: Business Analytics Tools IAEA, Vienna, 09/10/2014 Julian Midwinter - Business Unit Executive i2, Threat and Counter Fraud General Use 2014 IBM Corporation
Agenda Introductions and background Enhancing Safeguards Through Information Analysis: Business Analytics Tools Information analytics, information sharing, collaboration Questions 2 General Use
IBM i2 - A Global Presence Founded in 1990 24 years of delivering capability to our customers 2 Queens award for innovation and excellence Pervasive in market with over 4500 clients More than 350,000 users in 150 countries in 18 languages Used by 8 of the top 10 largest companies, 12 of top 20 banks 25 of the 28 NATO member countries 100% of UK police forces 90% of all target packages in Iraq and Afghanistan were and are developed using i2 solutions 80% of National Security agencies worldwide Every US Federal Law Enforcement agency and organization 4000 US Police jurisdictions
i2 tackling diverse set of critical issues National Security Defense Law Enforcement Private Sector Government Counter Terrorism Counter Intelligence Intelligence Analysis Border Security Cyber Risk Establishing Civilian Structures Counter Intelligence Intelligence Analysis Target Analysis and Defense Peacekeeping Force Protection Pattern of Life Analysis Human Terrain Mapping Tactical Lead Generation Counter Terrorism Major Investigations Organized Crime Neighborhood/ Community Policing Public Order/Major Event Management Volume Crime Fusion Centers Security Investigations Industry Oversight & Compliance Cybercrime Risk Management Anti-Money Laundering Fraud Industry Oversight & Compliance Cybercrime Securities Investigations Anti-Money Laundering Fraud
Changing landscape of threats/risk Organisations are being asked to: Identify and respond to new and diverse threats Act quickly, with greater accuracy Spot new trends early Reduced resources Reductions in headcount Budget restrictions affecting all industries
What many customers know i2 for today
Understand complex relationships
Understanding events over time
even if the times are uncertain
Understanding patterns of behaviour
Understanding where
Social Network Analysis
Social Network Analysis
Information to Intelligence to Action quickly and effectively to improve response.and enable remedial action
Multiple options for user access
Organisational capability progression How can we share intelligence more effectively across the organisation? How can we provide lightweight investigation & analysis tools without being constrained to the desktop? How can we integrate and extend the application? How can we analyse big data? How can we improve data sharing and collaboration? How do I take advantage of cognitive computing? How do we run on the cloud? COTS Desktop IntelliShare Intelligence Analysis Platform (IAP) Solutions Rich Desktop Clients Rich Desktop Clients Web Client Rich Desktop Client Web Client Rich Desktop Clients Web Client & Portal Intelligence repository Intelligence repository Web Services Web Services IAP Service Bus IBM Integrations IAP Big Data
Part of a bigger organisational picture Owned / Open Text / Rich Structured / Unstructured High Performance Warehouse Mining & Query Analytics Big Data Mining Data Acquisition Text Mining and Extraction Data on demand Federated data Big Data Acquisition and Analysis Real Time Data Analysis and Detection Data Analysis and Detection Data Analytics Security Vulnerability Detection Entity Matching and Resolution Data and Analytic Federation /Fusion i2 Investigation & Analysis Visual Investigation and Analytics Case Management Collaboration Operational Interaction Reporting Dissemination Informed Decision Making & Intelligent Led Operations VALUE
Contact - Julian.Midwinter@uk.ibm.com