Enviar pesquisa
Carregar
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
•
2 gostaram
•
1,492 visualizações
Andris Soroka
Seguir
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 32
Baixar agora
Baixar para ler offline
Recomendados
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS UK
Maloney slides
Maloney slides
Onkar Sule
eircom Managed Security
eircom Managed Security
eircom
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
IBMSSA
IDBI Intech - Information security consulting
IDBI Intech - Information security consulting
IDBI Intech
VSD Infotech
VSD Infotech
VSD infotech
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Amazon Web Services
Security Intelligence
Security Intelligence
IBMGovernmentCA
Recomendados
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS UK
Maloney slides
Maloney slides
Onkar Sule
eircom Managed Security
eircom Managed Security
eircom
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
IBMSSA
IDBI Intech - Information security consulting
IDBI Intech - Information security consulting
IDBI Intech
VSD Infotech
VSD Infotech
VSD infotech
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Amazon Web Services
Security Intelligence
Security Intelligence
IBMGovernmentCA
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
Anindya Ghosh,
טכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידע
Israel Export Institute_מכון היצוא
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Minh Le
Information Security By Design
Information Security By Design
Nalneesh Gaur
Cat6500 Praesentation
Cat6500 Praesentation
Sophan_Pheng
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
DataExchangeAgency
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Global Business Events
Improving Your Information Security Program
Improving Your Information Security Program
Seccuris Inc.
2012 Data Center Security
2012 Data Center Security
Szymon Dowgwillowicz-Nowicki
Exposing the Money Behind Malware
Exposing the Money Behind Malware
Sophos
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
scoopnewsgroup
Take Control of End User Security
Take Control of End User Security
anniebrowny
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017
japijapi
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Ingram Micro Cloud
APT & What we can do TODAY
APT & What we can do TODAY
James Ryan, CSyP, EA, PMP
Bapinger Network Security
Bapinger Network Security
Djadja Sardjana
C2MS
C2MS
hemanth102030
Trend micro deep security
Trend micro deep security
Trend Micro
Security 2 Q 07[1]
Security 2 Q 07[1]
Sharpe Smith
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
Andris Soroka
Trabajo finalintegracioncruizc2
Trabajo finalintegracioncruizc2
Cecilia Ruiz
Ministerio de educacion 2
Ministerio de educacion 2
rochinely
Mais conteúdo relacionado
Mais procurados
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
Anindya Ghosh,
טכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידע
Israel Export Institute_מכון היצוא
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Minh Le
Information Security By Design
Information Security By Design
Nalneesh Gaur
Cat6500 Praesentation
Cat6500 Praesentation
Sophan_Pheng
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
DataExchangeAgency
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Global Business Events
Improving Your Information Security Program
Improving Your Information Security Program
Seccuris Inc.
2012 Data Center Security
2012 Data Center Security
Szymon Dowgwillowicz-Nowicki
Exposing the Money Behind Malware
Exposing the Money Behind Malware
Sophos
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
scoopnewsgroup
Take Control of End User Security
Take Control of End User Security
anniebrowny
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017
japijapi
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Ingram Micro Cloud
APT & What we can do TODAY
APT & What we can do TODAY
James Ryan, CSyP, EA, PMP
Bapinger Network Security
Bapinger Network Security
Djadja Sardjana
C2MS
C2MS
hemanth102030
Trend micro deep security
Trend micro deep security
Trend Micro
Security 2 Q 07[1]
Security 2 Q 07[1]
Sharpe Smith
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
Andris Soroka
Mais procurados
(20)
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
טכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידע
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Information Security By Design
Information Security By Design
Cat6500 Praesentation
Cat6500 Praesentation
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Improving Your Information Security Program
Improving Your Information Security Program
2012 Data Center Security
2012 Data Center Security
Exposing the Money Behind Malware
Exposing the Money Behind Malware
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
Take Control of End User Security
Take Control of End User Security
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
APT & What we can do TODAY
APT & What we can do TODAY
Bapinger Network Security
Bapinger Network Security
C2MS
C2MS
Trend micro deep security
Trend micro deep security
Security 2 Q 07[1]
Security 2 Q 07[1]
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
Destaque
Trabajo finalintegracioncruizc2
Trabajo finalintegracioncruizc2
Cecilia Ruiz
Ministerio de educacion 2
Ministerio de educacion 2
rochinely
certificado UCLM - Administración y Dirección de Empresas Sostenibles
certificado UCLM - Administración y Dirección de Empresas Sostenibles
Sergio Benito
Best of Municipal Market - August 2014
Best of Municipal Market - August 2014
Bloomberg Briefs
Scrum Con Exito
Scrum Con Exito
jsalvata
Fadi Amer - CV
Fadi Amer - CV
Fadi Al-Amer
SegurosVeterinarios.com: Los Seguros Veterinarios y el Sector de las Mascotas
SegurosVeterinarios.com: Los Seguros Veterinarios y el Sector de las Mascotas
SegurosVeterinarios.com
EHP_PhD-Thesis
EHP_PhD-Thesis
Eddie Hjelm Pedersen
Soluzioni Flakt Woods per Air Comfort e Fire Safety
Soluzioni Flakt Woods per Air Comfort e Fire Safety
Roberto Zattoni
Cómo hacer rentable un proyecto artístico
Cómo hacer rentable un proyecto artístico
Artevento
Experis Hungary to linkedin Szabolcsi Nikoletta
Experis Hungary to linkedin Szabolcsi Nikoletta
Nikoletta Szabolcsi
IK Profile PPT-NEW 03.12.15
IK Profile PPT-NEW 03.12.15
Anne Kaaria
The Key To Marketing Technology is Breaking Down the Walls (Graham Brown mobi...
The Key To Marketing Technology is Breaking Down the Walls (Graham Brown mobi...
Graham Brown
regioS 1 - Die NRP nach der Startphase
regioS 1 - Die NRP nach der Startphase
regiosuisse
Milan Pištalo - EProBanking
Milan Pištalo - EProBanking
biZbuZZ
The Choice Islam and Christianity (volume two)
The Choice Islam and Christianity (volume two)
Mohanad Alani
La tecnologia y el mundial sudafrica 2010 1
La tecnologia y el mundial sudafrica 2010 1
UTN
Afiches Jorge Lanata. Impacto en redes sociales by SocialAd.biz
Afiches Jorge Lanata. Impacto en redes sociales by SocialAd.biz
SocialLive
Energia solar
Energia solar
Leonardo Torres Ludeña
Marketing low cost
Marketing low cost
Xabier Rolán
Destaque
(20)
Trabajo finalintegracioncruizc2
Trabajo finalintegracioncruizc2
Ministerio de educacion 2
Ministerio de educacion 2
certificado UCLM - Administración y Dirección de Empresas Sostenibles
certificado UCLM - Administración y Dirección de Empresas Sostenibles
Best of Municipal Market - August 2014
Best of Municipal Market - August 2014
Scrum Con Exito
Scrum Con Exito
Fadi Amer - CV
Fadi Amer - CV
SegurosVeterinarios.com: Los Seguros Veterinarios y el Sector de las Mascotas
SegurosVeterinarios.com: Los Seguros Veterinarios y el Sector de las Mascotas
EHP_PhD-Thesis
EHP_PhD-Thesis
Soluzioni Flakt Woods per Air Comfort e Fire Safety
Soluzioni Flakt Woods per Air Comfort e Fire Safety
Cómo hacer rentable un proyecto artístico
Cómo hacer rentable un proyecto artístico
Experis Hungary to linkedin Szabolcsi Nikoletta
Experis Hungary to linkedin Szabolcsi Nikoletta
IK Profile PPT-NEW 03.12.15
IK Profile PPT-NEW 03.12.15
The Key To Marketing Technology is Breaking Down the Walls (Graham Brown mobi...
The Key To Marketing Technology is Breaking Down the Walls (Graham Brown mobi...
regioS 1 - Die NRP nach der Startphase
regioS 1 - Die NRP nach der Startphase
Milan Pištalo - EProBanking
Milan Pištalo - EProBanking
The Choice Islam and Christianity (volume two)
The Choice Islam and Christianity (volume two)
La tecnologia y el mundial sudafrica 2010 1
La tecnologia y el mundial sudafrica 2010 1
Afiches Jorge Lanata. Impacto en redes sociales by SocialAd.biz
Afiches Jorge Lanata. Impacto en redes sociales by SocialAd.biz
Energia solar
Energia solar
Marketing low cost
Marketing low cost
Semelhante a DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011
Andris Soroka
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
Andris Soroka
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
IBM Danmark
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
Information Security Awareness Group
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
TUESDAY Business Network
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
IBM Security
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
Axxera Security Solutions
Axxera Security Solutions
akshayvreddy
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
Francisco González Jiménez
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
IBM Security
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
ebuc
Top 10 Database Threats
Top 10 Database Threats
Imperva
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
ProductNation/iSPIRT
IBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - Ecuador
Olmedo Abril Arboleda
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
Symantec
S series presentation
S series presentation
Sergey Marunich
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
Işınsu Akçetin
IBM Security Services Overview
IBM Security Services Overview
Casey Lucas
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Internap
Semelhante a DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
(20)
SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Axxera Security Solutions
Axxera Security Solutions
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
Top 10 Database Threats
Top 10 Database Threats
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
IBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - Ecuador
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
S series presentation
S series presentation
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
IBM Security Services Overview
IBM Security Services Overview
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Mais de Andris Soroka
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Andris Soroka
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Andris Soroka
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Andris Soroka
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Andris Soroka
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Andris Soroka
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Andris Soroka
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Andris Soroka
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Andris Soroka
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Andris Soroka
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Andris Soroka
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Andris Soroka
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Andris Soroka
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Andris Soroka
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Andris Soroka
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Andris Soroka
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Andris Soroka
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Andris Soroka
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Andris Soroka
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Andris Soroka
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Andris Soroka
Mais de Andris Soroka
(20)
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Último
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Último
(20)
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Slack Application Development 101 Slides
Slack Application Development 101 Slides
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
1.
IBM Security Systems Security
strategies to stay out of the headlines Q1 Labs, an IBM Company Andris Soroka, Data Security Solutions Q1 Labs 1st Certified Partner in Baltics © 2012 IBM Corporation 1 © 2012 IBM Corporation
2.
IBM Security Systems Who
we are – specialization security: Innovative & selected software / hardware & hybrid solutions from leading technology vendors from over 10 different countries IT Security consulting (vulnerability assessment tests, security audit, new systems integration, HR training, technical support) First in Baltics who had integrated several innovative IT Security solutions that no one before has done First Certified Q1 Labs Partner in the Baltic States and now IBM Business Partner continuing working with IBM Security Portfolio 2 © 2012 IBM Corporation
3.
IBM Security Systems
According to the 2011 Verizon Data Breach Report, 86 percent of breached organizations failed to detect that their networks were hacked. 3 © 2012 IBM Corporation
4.
IBM Security Systems
Headlines change, cybercrime increases 1995 – 2005 2005 – 2015 1st Decade of the Commercial Internet 2nd Decade of the Commercial Internet Motive Nation-state Actors; National Security Targeted Attacks / Advanced Persistent Threat Espionage, Competitors, Hacktivists Political Activism Monetary Gain Organized Crime, using sophisticated tools Revenge Insiders, using inside information Curiosity Script-kiddies or hackers using tools, web-based “how-to’s” Adversary 4 © 2012 IBM Corporation
5.
IBM Security Systems
What happens in IT security world? Maze.. Around 1500 IT Security vendors for Endpoint Security Platforms and point solutions Data Security DLP suites and point solutions Network Security Gateway solutions NAC, visibility, NBA Authentication, authorization etc. Traditional and next generation’s Identity protection Virtualization and cloud security IT Security governance Operational management & Security Mobile Security 5 © 2012 IBM Corporation
6.
IBM Security Systems
What do we propose? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the IT security and risk posture of an enterprise Security Intelligence provides actionable and comprehensive insight for managing risks and threats from protection and detection through remediation. 6 © 2012 IBM Corporation
7.
IBM Security Systems
What logs – Audit logs Transaction logs Operational IT & Network Identity Governance & Intrusion logs Security Operations Management Compliance Connection logs Log System performance records Tool Log Silo ? User activity logs ? ? ? ???? Different systems alerts and ? ? ? ?? ? ? ? ???? different other systems messages ? ? ? ? Log Jam ? ? ?? From where - ? Firewalls / Intrusion prevention ? ? ? ???? ? ? ? ? ????? Routers / Switches ? ?? ? Intrusion detection ? LOGS ?? ? Servers, desktops, mainframes Business applications Databases Network Servers Databases Homegrown Antivirus software Applications VPN’s You cannot control what You cannot see! 7 © 2012 IBM Corporation
8.
IBM Security Systems 8
© 2012 IBM Corporation
9.
IBM Security Systems 9
© 2012 IBM Corporation
10.
IBM Security Systems
Fully Integrated Security Intelligence • Turnkey log management Log • SME to Enterprise Management • Upgradeable to enterprise SIEM One Console Security • Integrated log, threat, risk & compliance mgmt. • Sophisticated event analytics SIEM • Asset profiling and flow analytics • Offense management and workflow • Predictive threat modeling & simulation Risk • Scalable configuration monitoring and audit Management • Advanced threat visualization and impact analysis Network • Network analytics Activity & • Behavior and anomaly detection Anomaly • Fully integrated with SIEM Detection Network and Application Built on a Single Data Architecture • Layer 7 application monitoring • Content capture Visibility • Physical and virtual environments 10 © 2012 IBM Corporation
11.
IBM Security Systems
Fully Integrated Security Intelligence • Turnkey log management Log • SME to Enterprise Management • Upgradeable to enterprise SIEM • Integrated log, threat, risk & compliance mgmt. • Sophisticated event analytics SIEM • Asset profiling and flow analytics • Offense management and workflow • Predictive threat modeling & simulation Risk • Scalable configuration monitoring and audit Management • Advanced threat visualization and impact analysis Network • Network analytics Activity & • Behavior and anomaly detection Anomaly • Fully integrated with SIEM Detection Network and • Layer 7 application monitoring Application • Content capture Visibility • Physical and virtual environments 11 © 2012 IBM Corporation
12.
IBM Security Systems
Q1 Labs- The Security Intelligence Leader Who is Q1 Labs: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner Magic Quadrant (2009-2012) Award-winning solutions: Family of next-generation Log Management, SIEM, Risk Management, Security Intelligence solutions Proven and growing rapidly: Thousands of customers worldwide Five-year average annual revenue growth of 70%+ Now part of IBM Security Systems: Unmatched security expertise and breadth of integrated capabilities 12 © 2012 IBM Corporation
13.
IBM Security Systems
Security Intelligence Use Cases 13 © 2012 IBM Corporation
14.
IBM Security Systems
Clear & concise delivery of the most relevant information … What was the attack? Was it Who was successful? responsible? Where do I find them? How valuable are How many they to the targets business? involved? Are any of them vulnerable? Where is all the evidence? 14 © 2012 IBM Corporation
15.
IBM Security Systems
Total Security Intelligence: How do we address the challenges? Reduce Big Data Detect Advanced Persistent Threats Predict attacks Manage risk 15 © 2012 IBM Corporation
16.
IBM Security Systems
Big Data: Reduce your data silo down 16 © 2012 IBM Corporation
17.
IBM Security Systems
Reducing Data Silos: How it looks in QRadar Single incident derived from ~20k events and 355 flows QRadar automatically pulls all related events and flows into a single security incident Highlights the magnitude / importance Reduction into manageable daily number 17 © 2012 IBM Corporation
18.
IBM Security Systems
Total Security Intelligence: How do we address the challenges? Reduce Big Data Detect Advanced Persistent Threats Predict attacks Manage risk 18 © 2012 IBM Corporation
19.
IBM Security Systems Anatomy
of an APT: Communications Company 3rd Party Software Update Server Compromised Trojan “auto-updated” to Corporate network Port 8080 used for C&C activities 35M records stolen Attackers create Trojan 60+ Corporate computers infected Attackers w/ backdoor agentcreate Trojan –6 Months Day 0 Day 8 19 © 2012 IBM Corporation
20.
IBM Security Systems
Activity / Behaviour Monitoring, Flow Analytics, Anomaly Detection Behaviour / activity base lining of users and processes Helps detect day-zero attacks and covert channels that have no signature or AV / IPS detection Provides definitive evidence of attack Enables visibility into attacker communications Network traffic does not lie Attackers can stop logging and erase their tracks, but can’t cut off the network (flow data) 20 © 2012 IBM Corporation
21.
IBM Security Systems
Activity and data access monitoring Visualize Data Risks Automated charting and reporting on potential database breaches Correlate Database and Other Network Activity Enrich database security alerts with anomaly detection and flow analysis Better Detect Serious Breaches 360-degree visibility helps distinguish true breaches from benign activity, in real-time 21 © 2012 IBM Corporation
22.
IBM Security Systems
Anomaly Detection & APTs User & Application Activity Monitoring alerts to a user anomaly for Oracle database access. Identify the user, normal access behavior and the anomaly behavior with all source and destination information for quickly resolving the persistent threat. 22 © 2012 IBM Corporation
23.
IBM Security Systems
Stealthy malware detection Potential Botnet Detected? This is as far as traditional SIEM can go IRC on port 80? QFlow detects a covert channel, using Layer 7 flows and deep packet inspection Irrefutable Botnet Communication Layer 7 flow data shows botnet command and control instructions 23 © 2012 IBM Corporation
24.
IBM Security Systems
Total Security Intelligence: How do we address the challenges? Reduce Big Data Detect Advanced Persistent Threats Predict attacks Manage risk 24 © 2012 IBM Corporation
25.
IBM Security Systems
The Security Intelligence Timeline: Proactive vs Headlines 25 © 2012 IBM Corporation
26.
IBM Security Systems
Predicting an Attack: How it looks in QRadar Multiple IP’s attack an IP Drilling into one superflow record shows all IP records contributing to the attack All pulled together in one offence which is detected and raised immediately to the security team 26 © 2012 IBM Corporation
27.
IBM Security Systems
Total Security Intelligence: How do we address the challenges? Reduce Big Data Detect Advanced Persistent Threats Predict attacks Manage risk 27 © 2012 IBM Corporation
28.
IBM Security Systems Managing
risk CISOs know it’s not if, it’s when they get hacked; yet there is still a gap in ability to detect breach. Breaches are taking longer to discover Breaches are not being discovered internally 28Charts from Verizon 2011 Investigative Response Caseload Review © 2012 IBM Corporation
29.
IBM Security Systems
How it looks in QRadar Potential Data Loss? Who? What? Where? Who? An internal user What? Oracle data Where? Gmail 29 © 2012 IBM Corporation
30.
IBM Security Systems
QRadar: The Most Intelligent, Integrated, Automated Security Intelligence Platform • Proactive threat management • Identifies most critical anomalies • Rapid, complete impact analysis • Eliminates silos • Easy deployment • Highly scalable • Rapid time to value • Flexible, future-proof • Operational efficiency 30 © 2012 IBM Corporation
31.
IBM Security Systems
What to do next? Visit our stand Download the Gartner SIEM Critical Capabilities Report http://q1labs.com/resource-center/analyst-reports/details.aspx?id=151 Read our blog http://blog.q1labs.com/ Follow us on Twitter: @q1labs @ibmsecurity 31 © 2012 IBM Corporation
32.
IBM Security Systems
ibm.com/security © Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will 32 necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT © 2012 IBM Corporation WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
Baixar agora