SlideShare uma empresa Scribd logo
1 de 32
Baixar para ler offline
IBM Security Systems




Security strategies to
stay out of the
headlines

Q1 Labs, an IBM Company

Andris Soroka, Data Security Solutions

Q1 Labs 1st Certified Partner in Baltics

© 2012 IBM Corporation
1                                          © 2012 IBM Corporation
IBM Security Systems




Who we are – specialization security:
       Innovative & selected software / hardware
       & hybrid solutions from leading technology
       vendors from over 10 different countries

       IT Security consulting (vulnerability
       assessment tests, security audit, new
       systems integration, HR training, technical
       support)

        First in Baltics who had integrated several
       innovative IT Security solutions that no one
       before has done

       First Certified Q1 Labs Partner in the
       Baltic States and now IBM Business
       Partner continuing working with IBM
       Security Portfolio

2                                                     © 2012 IBM Corporation
IBM Security Systems




    According to the 2011 Verizon Data Breach Report,
    86 percent of breached organizations failed to detect
    that their networks were hacked.

3                                                    © 2012 IBM Corporation
IBM Security Systems


    Headlines change, cybercrime increases
                                          1995 – 2005                                  2005 – 2015
                              1st   Decade of the Commercial Internet      2nd   Decade of the Commercial Internet

                   Motive
                                                                                              Nation-state Actors;
    National Security                                                                          Targeted Attacks /
                                                                                           Advanced Persistent Threat
              Espionage,
                                                                             Competitors, Hacktivists
       Political Activism

          Monetary Gain                                             Organized Crime, using sophisticated tools


                  Revenge                              Insiders, using inside information


                  Curiosity                    Script-kiddies or hackers using tools, web-based “how-to’s”


                                                                                                       Adversary



4                                                                                                      © 2012 IBM Corporation
IBM Security Systems


     What happens in IT security world? Maze..

    Around 1500 IT Security vendors for
       Endpoint Security
            Platforms and point solutions
       Data Security
            DLP suites and point solutions
       Network Security
            Gateway solutions
            NAC, visibility, NBA
            Authentication, authorization etc.
            Traditional and next generation’s
       Identity protection
       Virtualization and cloud security
       IT Security governance
       Operational management & Security
       Mobile Security

5                                                © 2012 IBM Corporation
IBM Security Systems


     What do we propose?


                             Security Intelligence
                             --noun
                             1. the real-time collection, normalization, and analytics of
                                 the     data generated by users, applications and
                                 infrastructure that impacts the IT security and risk
                                 posture of an enterprise




    Security Intelligence provides actionable and comprehensive insight for managing
    risks and threats from protection and detection through remediation.




6                                                                                     © 2012 IBM Corporation
IBM Security Systems




     What logs –
         Audit logs
         Transaction logs
                                              Operational      IT & Network Identity     Governance &
         Intrusion logs                       Security         Operations   Management   Compliance

         Connection logs                                           Log

         System performance records
                                                                   Tool         Log
                                                                                Silo           ?
         User activity logs                                   ?           ?     ?    ????
         Different systems alerts and                            ?        ?      ? ??
                                                                   ?        ?     ? ????
      different other systems messages                               ?        ?
                                                                       ?           ?
                                                            Log Jam      ?      ? ??
    From where -                                                           ?
           Firewalls / Intrusion prevention                                  ? ? ?   ????
                                                                               ? ? ?
                                                                                 ? ?????
       Routers / Switches                                                         ? ??  ?
       Intrusion detection                                                          ? LOGS
                                                                                       ??
                                                                                     ?
       Servers, desktops, mainframes
       Business applications
       Databases                                  Network         Servers     Databases Homegrown
       Antivirus software                                                               Applications
       VPN’s

           You cannot control what You cannot see!
7                                                                                         © 2012 IBM Corporation
IBM Security Systems




8                          © 2012 IBM Corporation
IBM Security Systems




9                          © 2012 IBM Corporation
IBM Security Systems



     Fully Integrated Security Intelligence
                                              • Turnkey log management
             Log                              • SME to Enterprise
          Management                          • Upgradeable to enterprise SIEM
                                    One Console Security

                                              •    Integrated log, threat, risk & compliance mgmt.
                                              •    Sophisticated event analytics
              SIEM                            •    Asset profiling and flow analytics
                                              •    Offense management and workflow



                                              • Predictive threat modeling & simulation
             Risk                             • Scalable configuration monitoring and audit
          Management                          • Advanced threat visualization and impact analysis




            Network
                                                  • Network analytics
            Activity &
                                                  • Behavior and anomaly detection
            Anomaly                               • Fully integrated with SIEM
            Detection



          Network and
          Application
                            Built on a Single Data Architecture
                                           • Layer 7 application monitoring
                                           • Content capture
           Visibility                             • Physical and virtual environments


10                                                                                                   © 2012 IBM Corporation
IBM Security Systems



     Fully Integrated Security Intelligence

                                   • Turnkey log management
            Log                    • SME to Enterprise
         Management                • Upgradeable to enterprise SIEM




                                   •    Integrated log, threat, risk & compliance mgmt.
                                   •    Sophisticated event analytics
              SIEM                 •    Asset profiling and flow analytics
                                   •    Offense management and workflow



                                   • Predictive threat modeling & simulation
            Risk                   • Scalable configuration monitoring and audit
         Management                • Advanced threat visualization and impact analysis




           Network
                                       • Network analytics
           Activity &
                                       • Behavior and anomaly detection
           Anomaly                     • Fully integrated with SIEM
           Detection



          Network and                  • Layer 7 application monitoring
          Application                  • Content capture
           Visibility                  • Physical and virtual environments


11                                                                                        © 2012 IBM Corporation
IBM Security Systems


     Q1 Labs- The Security Intelligence Leader

     Who is Q1 Labs:
           Innovative Security Intelligence software company
           One of the largest and most successful SIEM vendors
           Leader in Gartner Magic Quadrant (2009-2012)


     Award-winning solutions:
           Family of next-generation Log Management, SIEM, Risk Management,
            Security Intelligence solutions


     Proven and growing rapidly:
           Thousands of customers worldwide
           Five-year average annual revenue growth of 70%+


     Now part of IBM Security Systems:
           Unmatched security expertise and breadth of integrated capabilities

12                                                                                © 2012 IBM Corporation
IBM Security Systems




                      Security Intelligence
                          Use Cases




13                                            © 2012 IBM Corporation
IBM Security Systems



              Clear & concise delivery of the most relevant information …


                                                  What was the
                                                  attack?

                                                                                         Was it
                                   Who was                                               successful?
                                   responsible?




                                                                       Where do I find
                                                                       them?               How valuable are
                            How many                                                       they to the
                            targets                                                        business?
                            involved?


                                                         Are any of
                                                         them
                                                         vulnerable?


                                                                  Where is all
                                                                  the evidence?



14                                                                                                     © 2012 IBM Corporation
IBM Security Systems


     Total Security Intelligence:
     How do we address the challenges?


         Reduce Big Data
         Detect Advanced Persistent Threats
         Predict attacks
         Manage risk




15                                             © 2012 IBM Corporation
IBM Security Systems


     Big Data: Reduce your data silo down




16                                          © 2012 IBM Corporation
IBM Security Systems


     Reducing Data Silos: How it looks in QRadar
                                               Single incident
                                               derived from ~20k
                                               events and 355
                                               flows




 QRadar automatically pulls all related
  events and flows into a single security
  incident
 Highlights the magnitude / importance
 Reduction into manageable daily
  number




17                                                     © 2012 IBM Corporation
IBM Security Systems


     Total Security Intelligence:
     How do we address the challenges?


        Reduce Big Data
        Detect Advanced Persistent Threats
        Predict attacks
        Manage risk




18                                            © 2012 IBM Corporation
IBM Security Systems


Anatomy of an APT: Communications Company
                               3rd Party
                        Software Update Server
                            Compromised
                                                                Trojan “auto-updated”
                                                                to Corporate network




                                                              Port 8080 used for C&C
                                                                     activities
                                                                35M records stolen
       Attackers
     create Trojan

                               60+ Corporate
                             computers infected Attackers
                             w/ backdoor agentcreate Trojan


       –6 Months               Day 0                                 Day 8
19                                                                         © 2012 IBM Corporation
IBM Security Systems


     Activity / Behaviour Monitoring, Flow Analytics, Anomaly
     Detection
                                                                 Behaviour / activity base
                                                                  lining of users and processes
                                                                 Helps detect day-zero
                                                                  attacks and covert channels
                                                                  that have no signature or AV
                                                                  / IPS detection
                                                                 Provides definitive evidence
                                                                  of attack
                                                                 Enables visibility into attacker
                                                                  communications




                                  Network traffic does not lie
     Attackers can stop logging and erase their tracks, but can’t cut off the network (flow data)
20                                                                                     © 2012 IBM Corporation
IBM Security Systems


     Activity and data access monitoring

                                              Visualize Data Risks
                                              Automated charting and reporting
                                              on potential database breaches




                                              Correlate Database and
                                               Other Network Activity
                                              Enrich database security alerts
                                              with anomaly detection and flow
                                              analysis




                                           Better Detect Serious Breaches
                                       360-degree visibility helps distinguish true
                                       breaches from benign activity, in real-time


21                                                                   © 2012 IBM Corporation
IBM Security Systems


     Anomaly Detection & APTs

                            User & Application Activity Monitoring alerts to a user anomaly for
                            Oracle database access.




                                                                                       Identify the user, normal
                                                                                       access behavior and the
                                                                                       anomaly behavior with all
                                                                                       source and destination
                                                                                       information for quickly resolving
                                                                                       the persistent threat.




22                                                                                                           © 2012 IBM Corporation
IBM Security Systems


     Stealthy malware detection

                                       Potential Botnet Detected?
                                       This is as far as traditional SIEM can go




                                           IRC on port 80?
                                           QFlow detects a covert channel,
                                           using Layer 7 flows and deep
                                           packet inspection




                                  Irrefutable Botnet Communication
                                      Layer 7 flow data shows botnet
                                     command and control instructions




23                                                             © 2012 IBM Corporation
IBM Security Systems


     Total Security Intelligence:
     How do we address the challenges?


         Reduce Big Data
         Detect Advanced Persistent Threats
         Predict attacks
         Manage risk




24                                             © 2012 IBM Corporation
IBM Security Systems


     The Security Intelligence Timeline: Proactive vs Headlines




25                                                     © 2012 IBM Corporation
IBM Security Systems


     Predicting an Attack: How it looks in QRadar
                                                              Multiple IP’s attack an IP




                                                                  Drilling into one
                                                                  superflow record
                                                                  shows all IP records
                                                                  contributing to the
                                                                  attack




                    All pulled together in one offence which is detected and
                             raised immediately to the security team
26                                                                             © 2012 IBM Corporation
IBM Security Systems


     Total Security Intelligence:
     How do we address the challenges?


         Reduce Big Data
         Detect Advanced Persistent Threats
         Predict attacks
         Manage risk




27                                             © 2012 IBM Corporation
IBM Security Systems


Managing risk

CISOs know it’s not if, it’s when they get hacked; yet there is still a gap in ability to
detect breach.
     Breaches are taking longer to discover
     Breaches are not being discovered internally




28Charts   from Verizon 2011 Investigative Response Caseload Review             © 2012 IBM Corporation
IBM Security Systems


     How it looks in QRadar

      Potential Data Loss?
      Who? What? Where?

                              Who?
                              An internal user




                                      What?
                                      Oracle data




                                      Where?
                                      Gmail




29                                                  © 2012 IBM Corporation
IBM Security Systems


      QRadar: The Most Intelligent, Integrated,
      Automated Security Intelligence Platform


                                • Proactive threat management
                                • Identifies most critical anomalies
                                • Rapid, complete impact analysis




     • Eliminates silos                                                • Easy deployment
     • Highly scalable                                                 • Rapid time to value
     • Flexible, future-proof                                          • Operational efficiency




30                                                                                    © 2012 IBM Corporation
IBM Security Systems



     What to do next?

      Visit our stand

      Download the Gartner SIEM Critical Capabilities Report
       http://q1labs.com/resource-center/analyst-reports/details.aspx?id=151

      Read our blog http://blog.q1labs.com/

      Follow us on Twitter: @q1labs @ibmsecurity




31                                                                             © 2012 IBM Corporation
IBM Security Systems




                                                                     ibm.com/security




  © Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes only, and is
  provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to,
  these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its
  suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials
  to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities
  referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a
  commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International
  Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of
  others.

   Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper
   access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to
   or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure
   can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will
32 necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT © 2012 IBM Corporation
                                                                                                                                                     WARRANT
   THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

Mais conteúdo relacionado

Mais procurados

Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By DesignNalneesh Gaur
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 PraesentationSophan_Pheng
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze DataExchangeAgency
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Global Business Events
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security ProgramSeccuris Inc.
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind MalwareSophos
 
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive SecurityPeter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Securityscoopnewsgroup
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Securityanniebrowny
 
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017japijapi
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Ingram Micro Cloud
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network SecurityDjadja Sardjana
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]Sharpe Smith
 
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyDSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyAndris Soroka
 

Mais procurados (20)

Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
טכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידעטכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידע
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 Praesentation
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security Program
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind Malware
 
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive SecurityPeter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
APT & What we can do TODAY
APT & What we can do TODAYAPT & What we can do TODAY
APT & What we can do TODAY
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
C2MS
C2MSC2MS
C2MS
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
 
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyDSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
 

Destaque

Trabajo finalintegracioncruizc2
Trabajo finalintegracioncruizc2Trabajo finalintegracioncruizc2
Trabajo finalintegracioncruizc2Cecilia Ruiz
 
Ministerio de educacion 2
Ministerio de educacion 2Ministerio de educacion 2
Ministerio de educacion 2rochinely
 
certificado UCLM - Administración y Dirección de Empresas Sostenibles
certificado UCLM - Administración y Dirección de Empresas Sosteniblescertificado UCLM - Administración y Dirección de Empresas Sostenibles
certificado UCLM - Administración y Dirección de Empresas SosteniblesSergio Benito
 
Best of Municipal Market - August 2014
Best of Municipal Market - August 2014Best of Municipal Market - August 2014
Best of Municipal Market - August 2014Bloomberg Briefs
 
Scrum Con Exito
Scrum Con ExitoScrum Con Exito
Scrum Con Exitojsalvata
 
SegurosVeterinarios.com: Los Seguros Veterinarios y el Sector de las Mascotas
SegurosVeterinarios.com: Los Seguros Veterinarios y el Sector de las MascotasSegurosVeterinarios.com: Los Seguros Veterinarios y el Sector de las Mascotas
SegurosVeterinarios.com: Los Seguros Veterinarios y el Sector de las MascotasSegurosVeterinarios.com
 
Soluzioni Flakt Woods per Air Comfort e Fire Safety
Soluzioni Flakt Woods per Air Comfort e Fire SafetySoluzioni Flakt Woods per Air Comfort e Fire Safety
Soluzioni Flakt Woods per Air Comfort e Fire SafetyRoberto Zattoni
 
Cómo hacer rentable un proyecto artístico
Cómo hacer rentable un proyecto artísticoCómo hacer rentable un proyecto artístico
Cómo hacer rentable un proyecto artísticoArtevento
 
Experis Hungary to linkedin Szabolcsi Nikoletta
Experis Hungary to linkedin Szabolcsi NikolettaExperis Hungary to linkedin Szabolcsi Nikoletta
Experis Hungary to linkedin Szabolcsi NikolettaNikoletta Szabolcsi
 
IK Profile PPT-NEW 03.12.15
IK Profile PPT-NEW 03.12.15IK Profile PPT-NEW 03.12.15
IK Profile PPT-NEW 03.12.15Anne Kaaria
 
The Key To Marketing Technology is Breaking Down the Walls (Graham Brown mobi...
The Key To Marketing Technology is Breaking Down the Walls (Graham Brown mobi...The Key To Marketing Technology is Breaking Down the Walls (Graham Brown mobi...
The Key To Marketing Technology is Breaking Down the Walls (Graham Brown mobi...Graham Brown
 
regioS 1 - Die NRP nach der Startphase
regioS 1 - Die NRP nach der StartphaseregioS 1 - Die NRP nach der Startphase
regioS 1 - Die NRP nach der Startphaseregiosuisse
 
Milan Pištalo - EProBanking
Milan Pištalo - EProBankingMilan Pištalo - EProBanking
Milan Pištalo - EProBankingbiZbuZZ
 
The Choice Islam and Christianity (volume two)
The Choice Islam and Christianity (volume two)The Choice Islam and Christianity (volume two)
The Choice Islam and Christianity (volume two)Mohanad Alani
 
La tecnologia y el mundial sudafrica 2010 1
La tecnologia y el mundial sudafrica 2010 1La tecnologia y el mundial sudafrica 2010 1
La tecnologia y el mundial sudafrica 2010 1UTN
 
Afiches Jorge Lanata. Impacto en redes sociales by SocialAd.biz
Afiches Jorge Lanata. Impacto en redes sociales by SocialAd.bizAfiches Jorge Lanata. Impacto en redes sociales by SocialAd.biz
Afiches Jorge Lanata. Impacto en redes sociales by SocialAd.bizSocialLive
 

Destaque (20)

Trabajo finalintegracioncruizc2
Trabajo finalintegracioncruizc2Trabajo finalintegracioncruizc2
Trabajo finalintegracioncruizc2
 
Ministerio de educacion 2
Ministerio de educacion 2Ministerio de educacion 2
Ministerio de educacion 2
 
certificado UCLM - Administración y Dirección de Empresas Sostenibles
certificado UCLM - Administración y Dirección de Empresas Sosteniblescertificado UCLM - Administración y Dirección de Empresas Sostenibles
certificado UCLM - Administración y Dirección de Empresas Sostenibles
 
Best of Municipal Market - August 2014
Best of Municipal Market - August 2014Best of Municipal Market - August 2014
Best of Municipal Market - August 2014
 
Scrum Con Exito
Scrum Con ExitoScrum Con Exito
Scrum Con Exito
 
Fadi Amer - CV
Fadi Amer - CVFadi Amer - CV
Fadi Amer - CV
 
SegurosVeterinarios.com: Los Seguros Veterinarios y el Sector de las Mascotas
SegurosVeterinarios.com: Los Seguros Veterinarios y el Sector de las MascotasSegurosVeterinarios.com: Los Seguros Veterinarios y el Sector de las Mascotas
SegurosVeterinarios.com: Los Seguros Veterinarios y el Sector de las Mascotas
 
EHP_PhD-Thesis
EHP_PhD-ThesisEHP_PhD-Thesis
EHP_PhD-Thesis
 
Soluzioni Flakt Woods per Air Comfort e Fire Safety
Soluzioni Flakt Woods per Air Comfort e Fire SafetySoluzioni Flakt Woods per Air Comfort e Fire Safety
Soluzioni Flakt Woods per Air Comfort e Fire Safety
 
Cómo hacer rentable un proyecto artístico
Cómo hacer rentable un proyecto artísticoCómo hacer rentable un proyecto artístico
Cómo hacer rentable un proyecto artístico
 
Experis Hungary to linkedin Szabolcsi Nikoletta
Experis Hungary to linkedin Szabolcsi NikolettaExperis Hungary to linkedin Szabolcsi Nikoletta
Experis Hungary to linkedin Szabolcsi Nikoletta
 
IK Profile PPT-NEW 03.12.15
IK Profile PPT-NEW 03.12.15IK Profile PPT-NEW 03.12.15
IK Profile PPT-NEW 03.12.15
 
The Key To Marketing Technology is Breaking Down the Walls (Graham Brown mobi...
The Key To Marketing Technology is Breaking Down the Walls (Graham Brown mobi...The Key To Marketing Technology is Breaking Down the Walls (Graham Brown mobi...
The Key To Marketing Technology is Breaking Down the Walls (Graham Brown mobi...
 
regioS 1 - Die NRP nach der Startphase
regioS 1 - Die NRP nach der StartphaseregioS 1 - Die NRP nach der Startphase
regioS 1 - Die NRP nach der Startphase
 
Milan Pištalo - EProBanking
Milan Pištalo - EProBankingMilan Pištalo - EProBanking
Milan Pištalo - EProBanking
 
The Choice Islam and Christianity (volume two)
The Choice Islam and Christianity (volume two)The Choice Islam and Christianity (volume two)
The Choice Islam and Christianity (volume two)
 
La tecnologia y el mundial sudafrica 2010 1
La tecnologia y el mundial sudafrica 2010 1La tecnologia y el mundial sudafrica 2010 1
La tecnologia y el mundial sudafrica 2010 1
 
Afiches Jorge Lanata. Impacto en redes sociales by SocialAd.biz
Afiches Jorge Lanata. Impacto en redes sociales by SocialAd.bizAfiches Jorge Lanata. Impacto en redes sociales by SocialAd.biz
Afiches Jorge Lanata. Impacto en redes sociales by SocialAd.biz
 
Energia solar
Energia solarEnergia solar
Energia solar
 
Marketing low cost
Marketing low costMarketing low cost
Marketing low cost
 

Semelhante a DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence

SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011 SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011 Andris Soroka
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...Andris Soroka
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonIBM Danmark
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutionsakshayvreddy
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016Francisco González Jiménez
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
 
Top 10 Database Threats
Top 10 Database ThreatsTop 10 Database Threats
Top 10 Database ThreatsImperva
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...ProductNation/iSPIRT
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 

Semelhante a DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence (20)

SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011 SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi VerzeNebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutions
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
Top 10 Database Threats
Top 10 Database ThreatsTop 10 Database Threats
Top 10 Database Threats
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
 
IBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - EcuadorIBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - Ecuador
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
S series presentation
S series presentationS series presentation
S series presentation
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 

Mais de Andris Soroka

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Andris Soroka
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Andris Soroka
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Andris Soroka
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Andris Soroka
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Andris Soroka
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Andris Soroka
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Andris Soroka
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Andris Soroka
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Andris Soroka
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Andris Soroka
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Andris Soroka
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Andris Soroka
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Andris Soroka
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Andris Soroka
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Andris Soroka
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Andris Soroka
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Andris Soroka
 

Mais de Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence

  • 1. IBM Security Systems Security strategies to stay out of the headlines Q1 Labs, an IBM Company Andris Soroka, Data Security Solutions Q1 Labs 1st Certified Partner in Baltics © 2012 IBM Corporation 1 © 2012 IBM Corporation
  • 2. IBM Security Systems Who we are – specialization security: Innovative & selected software / hardware & hybrid solutions from leading technology vendors from over 10 different countries IT Security consulting (vulnerability assessment tests, security audit, new systems integration, HR training, technical support) First in Baltics who had integrated several innovative IT Security solutions that no one before has done First Certified Q1 Labs Partner in the Baltic States and now IBM Business Partner continuing working with IBM Security Portfolio 2 © 2012 IBM Corporation
  • 3. IBM Security Systems According to the 2011 Verizon Data Breach Report, 86 percent of breached organizations failed to detect that their networks were hacked. 3 © 2012 IBM Corporation
  • 4. IBM Security Systems Headlines change, cybercrime increases 1995 – 2005 2005 – 2015 1st Decade of the Commercial Internet 2nd Decade of the Commercial Internet Motive Nation-state Actors; National Security Targeted Attacks / Advanced Persistent Threat Espionage, Competitors, Hacktivists Political Activism Monetary Gain Organized Crime, using sophisticated tools Revenge Insiders, using inside information Curiosity Script-kiddies or hackers using tools, web-based “how-to’s” Adversary 4 © 2012 IBM Corporation
  • 5. IBM Security Systems What happens in IT security world? Maze.. Around 1500 IT Security vendors for Endpoint Security Platforms and point solutions Data Security DLP suites and point solutions Network Security Gateway solutions NAC, visibility, NBA Authentication, authorization etc. Traditional and next generation’s Identity protection Virtualization and cloud security IT Security governance Operational management & Security Mobile Security 5 © 2012 IBM Corporation
  • 6. IBM Security Systems What do we propose? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the IT security and risk posture of an enterprise Security Intelligence provides actionable and comprehensive insight for managing risks and threats from protection and detection through remediation. 6 © 2012 IBM Corporation
  • 7. IBM Security Systems What logs – Audit logs Transaction logs Operational IT & Network Identity Governance & Intrusion logs Security Operations Management Compliance Connection logs Log System performance records Tool Log Silo ? User activity logs ? ? ? ???? Different systems alerts and ? ? ? ?? ? ? ? ???? different other systems messages ? ? ? ? Log Jam ? ? ?? From where - ? Firewalls / Intrusion prevention ? ? ? ???? ? ? ? ? ????? Routers / Switches ? ?? ? Intrusion detection ? LOGS ?? ? Servers, desktops, mainframes Business applications Databases Network Servers Databases Homegrown Antivirus software Applications VPN’s You cannot control what You cannot see! 7 © 2012 IBM Corporation
  • 8. IBM Security Systems 8 © 2012 IBM Corporation
  • 9. IBM Security Systems 9 © 2012 IBM Corporation
  • 10. IBM Security Systems Fully Integrated Security Intelligence • Turnkey log management Log • SME to Enterprise Management • Upgradeable to enterprise SIEM One Console Security • Integrated log, threat, risk & compliance mgmt. • Sophisticated event analytics SIEM • Asset profiling and flow analytics • Offense management and workflow • Predictive threat modeling & simulation Risk • Scalable configuration monitoring and audit Management • Advanced threat visualization and impact analysis Network • Network analytics Activity & • Behavior and anomaly detection Anomaly • Fully integrated with SIEM Detection Network and Application Built on a Single Data Architecture • Layer 7 application monitoring • Content capture Visibility • Physical and virtual environments 10 © 2012 IBM Corporation
  • 11. IBM Security Systems Fully Integrated Security Intelligence • Turnkey log management Log • SME to Enterprise Management • Upgradeable to enterprise SIEM • Integrated log, threat, risk & compliance mgmt. • Sophisticated event analytics SIEM • Asset profiling and flow analytics • Offense management and workflow • Predictive threat modeling & simulation Risk • Scalable configuration monitoring and audit Management • Advanced threat visualization and impact analysis Network • Network analytics Activity & • Behavior and anomaly detection Anomaly • Fully integrated with SIEM Detection Network and • Layer 7 application monitoring Application • Content capture Visibility • Physical and virtual environments 11 © 2012 IBM Corporation
  • 12. IBM Security Systems Q1 Labs- The Security Intelligence Leader Who is Q1 Labs:  Innovative Security Intelligence software company  One of the largest and most successful SIEM vendors  Leader in Gartner Magic Quadrant (2009-2012) Award-winning solutions:  Family of next-generation Log Management, SIEM, Risk Management, Security Intelligence solutions Proven and growing rapidly:  Thousands of customers worldwide  Five-year average annual revenue growth of 70%+ Now part of IBM Security Systems:  Unmatched security expertise and breadth of integrated capabilities 12 © 2012 IBM Corporation
  • 13. IBM Security Systems Security Intelligence Use Cases 13 © 2012 IBM Corporation
  • 14. IBM Security Systems Clear & concise delivery of the most relevant information … What was the attack? Was it Who was successful? responsible? Where do I find them? How valuable are How many they to the targets business? involved? Are any of them vulnerable? Where is all the evidence? 14 © 2012 IBM Corporation
  • 15. IBM Security Systems Total Security Intelligence: How do we address the challenges?  Reduce Big Data  Detect Advanced Persistent Threats  Predict attacks  Manage risk 15 © 2012 IBM Corporation
  • 16. IBM Security Systems Big Data: Reduce your data silo down 16 © 2012 IBM Corporation
  • 17. IBM Security Systems Reducing Data Silos: How it looks in QRadar Single incident derived from ~20k events and 355 flows  QRadar automatically pulls all related events and flows into a single security incident  Highlights the magnitude / importance  Reduction into manageable daily number 17 © 2012 IBM Corporation
  • 18. IBM Security Systems Total Security Intelligence: How do we address the challenges?  Reduce Big Data  Detect Advanced Persistent Threats  Predict attacks  Manage risk 18 © 2012 IBM Corporation
  • 19. IBM Security Systems Anatomy of an APT: Communications Company 3rd Party Software Update Server Compromised Trojan “auto-updated” to Corporate network Port 8080 used for C&C activities 35M records stolen Attackers create Trojan 60+ Corporate computers infected Attackers w/ backdoor agentcreate Trojan –6 Months Day 0 Day 8 19 © 2012 IBM Corporation
  • 20. IBM Security Systems Activity / Behaviour Monitoring, Flow Analytics, Anomaly Detection  Behaviour / activity base lining of users and processes  Helps detect day-zero attacks and covert channels that have no signature or AV / IPS detection  Provides definitive evidence of attack  Enables visibility into attacker communications Network traffic does not lie Attackers can stop logging and erase their tracks, but can’t cut off the network (flow data) 20 © 2012 IBM Corporation
  • 21. IBM Security Systems Activity and data access monitoring Visualize Data Risks Automated charting and reporting on potential database breaches Correlate Database and Other Network Activity Enrich database security alerts with anomaly detection and flow analysis Better Detect Serious Breaches 360-degree visibility helps distinguish true breaches from benign activity, in real-time 21 © 2012 IBM Corporation
  • 22. IBM Security Systems Anomaly Detection & APTs User & Application Activity Monitoring alerts to a user anomaly for Oracle database access. Identify the user, normal access behavior and the anomaly behavior with all source and destination information for quickly resolving the persistent threat. 22 © 2012 IBM Corporation
  • 23. IBM Security Systems Stealthy malware detection Potential Botnet Detected? This is as far as traditional SIEM can go IRC on port 80? QFlow detects a covert channel, using Layer 7 flows and deep packet inspection Irrefutable Botnet Communication Layer 7 flow data shows botnet command and control instructions 23 © 2012 IBM Corporation
  • 24. IBM Security Systems Total Security Intelligence: How do we address the challenges?  Reduce Big Data  Detect Advanced Persistent Threats  Predict attacks  Manage risk 24 © 2012 IBM Corporation
  • 25. IBM Security Systems The Security Intelligence Timeline: Proactive vs Headlines 25 © 2012 IBM Corporation
  • 26. IBM Security Systems Predicting an Attack: How it looks in QRadar Multiple IP’s attack an IP Drilling into one superflow record shows all IP records contributing to the attack All pulled together in one offence which is detected and raised immediately to the security team 26 © 2012 IBM Corporation
  • 27. IBM Security Systems Total Security Intelligence: How do we address the challenges?  Reduce Big Data  Detect Advanced Persistent Threats  Predict attacks  Manage risk 27 © 2012 IBM Corporation
  • 28. IBM Security Systems Managing risk CISOs know it’s not if, it’s when they get hacked; yet there is still a gap in ability to detect breach.  Breaches are taking longer to discover  Breaches are not being discovered internally 28Charts from Verizon 2011 Investigative Response Caseload Review © 2012 IBM Corporation
  • 29. IBM Security Systems How it looks in QRadar Potential Data Loss? Who? What? Where? Who? An internal user What? Oracle data Where? Gmail 29 © 2012 IBM Corporation
  • 30. IBM Security Systems QRadar: The Most Intelligent, Integrated, Automated Security Intelligence Platform • Proactive threat management • Identifies most critical anomalies • Rapid, complete impact analysis • Eliminates silos • Easy deployment • Highly scalable • Rapid time to value • Flexible, future-proof • Operational efficiency 30 © 2012 IBM Corporation
  • 31. IBM Security Systems What to do next?  Visit our stand  Download the Gartner SIEM Critical Capabilities Report http://q1labs.com/resource-center/analyst-reports/details.aspx?id=151  Read our blog http://blog.q1labs.com/  Follow us on Twitter: @q1labs @ibmsecurity 31 © 2012 IBM Corporation
  • 32. IBM Security Systems ibm.com/security © Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will 32 necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT © 2012 IBM Corporation WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.