SlideShare a Scribd company logo
1 of 30
Download to read offline
© 2013 IBM Corporation
IBM Security Intelligence
Less Threat. More Intelligence.
Brendan Hannigan
General Manager, IBM Security Systems
© 2013 IBM Corporation
3
Evolving Threat Landscape
Evolving CISO Landscape
4
CISO Challenge: Competing priorities
83%of enterprises
have difficulty filling
security roles
increase
in Web application
vulnerabilities
from 2011 to 2012
14%
Increase in
compliance
mandates
Common
Vulnerabilities
and Exposures
5
CISO Challenge: Inadequate tools
85tools from
0 out of 46
vendors detected
malware
45vendors
Source: IBM client example
6
CISO Challenge: Business pressures
of CISOs are
concerned about Cloud and
mobile security
of organizations
are using at least one
cloud platform
70%
75%+
7
stolen from
bank accounts
in Operation
High Roller
of C-level execs
say that negligent
insiders are their
biggest concern
increase
in critical
web browser
vulnerabilities
59%
43%
INTERNAL EXTERNAL PAYOFFS
$78M
CISO Challenge: Evolving Threats
8
Advantage: Attacker
9
1 2 3
InnovationIntelligenceFocus
10
Focus
USERS
ASSETSTRANSACTIONS
11
USERS
60,000 employees
Provisioning took up to 2 weeks
No monitoring of privileged users
Focus on users,
not devices
Implement identity
intelligence
Pay special attention
to trusted insiders
Privilege Identity Management
Monitoring and same-day
de-provisioning
for 100+ privileged users
Source: IBM client example
12
ASSETS
critical databases
$21M
Saved
2,000
Secured
in compliance costs
Database Access and Monitoring
Thousands of databases containing
HR, ERP, credit card, and other PII
in a world where 98%
of breaches hit databases
Discover critical business
data
Harden and
secure repositories
Monitor and prevent
unauthorized access
Source: IBM client example
13
30 Million customers in an industry where
$3.4B industry losses from online fraud
85% of breaches go undetected
TRANSACTIONS
Identify most
critical transactions
Monitor sessions,
access, and devices
Look for anomalies
and attacks
Advanced Fraud Protection
Zero instances of fraud
on over 1 million customer endpoints
reported
Source: IBM client example
14
Intelligence
ANALYTICS
VISIBILITYINTEGRATION
15
Context, clustering, baselining,
machine learning, and heuristics
Identify entire classes of Mutated threats
by analyzing 250+protocols and file typesANALYTICS
Pattern
matching
Don’t rely on
signature detection
Use baselines
and reputation
Identify
outliers
16
Reduce 2 Billion logs and events per day
to 25high priority offenses
Get full coverage,
No more blind spots
Reduce and
prioritize alerts
Continuous
monitoring
VISIBILITY
Source: IBM client example
17
Integrated
Platforms
Eliminate silos and
point solutions
Build upon a
common platform
Share information
between controls
Monitor threats across 8 Million subscribers
with an integrated PlatformINTEGRATION
Siloed
Point Products
Source: IBM client example
18
CLOUD
MOBILE
Innovation
19
Cloud-enhanced Security
Automated, customizable,
and elastic
Cloud is an opportunity
for enhanced security
Traditional Security
Manual
and static
20
Mobility is the opportunity
to get security right
Network
and Access
Control
Fraud
Protection
Application
and Data
Security
Endpoint
Management
21
Intelligence
Integration
Expertise
IBM Security Framework
Professional, Managed,
and Cloud Services
22
Advanced Threat Protection
Staying ahead of sophisticated attacks
Defense StrategyAttack Chain IBM Capabilities and Services
QRadar Security Intelligence
X-Force Threat Intelligence
Emergency Response Services
Network Protection
InfoSphere Guardium
Trusteer Apex
QRadar Vulnerability Manager
Endpoint Manager
AppScan
23
CISO: Checkmate!
Analytics-powered security
Leaning forward.
Felix Mohan
Bharti Airtel Limited
© 2013 IBM Corporation
25
Align. Make intelligent.
Third-party risk
Advanced attacks
Regulatory compliance
Voice to data shift
Competitive pressure
Disruptive technologies
Automation
Optimization
Culture
Competency
Communication
Intelligence
Aggravators
Concerns
Align.
Make
intelligent.
Business-aligned
Analytics-driven
26
Airtel intelligence structure.
Technology
Interaction
Information
Integration
Analytics
ContextSecurity
devices
Network
devices
Events
Flows
Contextual assessments
Better risk management
Prioritized and actionable intelligence
Broader and deeper vulnerability insight
Better protection from advanced attacks
Quicker response
QFlow and VFlow Collector
Vulnerability Manager
Risk Manager
SIEM
QRadar
X-Force external threat feed
Trusteer* (2014) Openpages*, BigInsights* (2015-16)
27
Understand. Prioritize. Act.
Advanced threat
protection
Risk
management
Compliance Resource
optimization
Fraud
protection
Simulate “what ifs” for risk impact
Remediate zero-days and new security threats
Monitor asset profiles & behaviour continuously
Visualize traffic patterns and connections
Comply with regulatory mandates and policies
Prioritize vulnerability remediation
Protect transactions
Carry out advanced incident analysis & forensics
Optimize resources and efforts
We are moving from dousing fires to ensuring they don’t happen in the first place!
Vulnerability
scan data
Configuration
data
Event
data Activity
data
Context
Network
topology
#IBMINTERCONNECT
© 2013 IBM Corporation
Thank You
29
10+ demos
5 appliances
•  Visit the Security Intelligence
area in the Solution Center
•  Meet experts from the IBM
Security Singapore Lab
•  Solution Center Sessions: Enhancing IBM Security solutions
with Trusteer fraud detection capabilities
•  Technical Session: Dedicated Security track featuring
Identity and Access Management, Security Intelligence,
Mobile Security, and more
Don’t miss partner & client speakers including YaData and Asian Paints
Don’t miss…
All
Day
2
Day
3
© 2013 IBM Corporation

More Related Content

What's hot

Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itIBM Security
 
Cognitive security
Cognitive securityCognitive security
Cognitive securityIqra khalil
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017Bill Chamberlin
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...IBM Security
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsIBM Security
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsIBM Security
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentIBM Security
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 

What's hot (20)

Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPs
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
T&M Cyber
T&M CyberT&M Cyber
T&M Cyber
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 

Viewers also liked

Information Extraction from HTML: General Machine Learning ...
Information Extraction from HTML: General Machine Learning ...Information Extraction from HTML: General Machine Learning ...
Information Extraction from HTML: General Machine Learning ...butest
 
Branches of TOM, Machine & Structure, Kinematic Links
Branches of TOM, Machine & Structure, Kinematic LinksBranches of TOM, Machine & Structure, Kinematic Links
Branches of TOM, Machine & Structure, Kinematic LinksAkash Patel
 
Android Application Development for Intel Platform
Android Application Development for Intel PlatformAndroid Application Development for Intel Platform
Android Application Development for Intel PlatformAtifAliHaral
 
Lecture 9 slides: Machine learning for Protein Structure ...
Lecture 9 slides: Machine learning for Protein Structure ...Lecture 9 slides: Machine learning for Protein Structure ...
Lecture 9 slides: Machine learning for Protein Structure ...butest
 
Operating System 2
Operating System 2Operating System 2
Operating System 2tech2click
 
System Programing Unit 1
System Programing Unit 1System Programing Unit 1
System Programing Unit 1Manoj Patil
 

Viewers also liked (8)

Information Extraction from HTML: General Machine Learning ...
Information Extraction from HTML: General Machine Learning ...Information Extraction from HTML: General Machine Learning ...
Information Extraction from HTML: General Machine Learning ...
 
Computer Evolution
Computer EvolutionComputer Evolution
Computer Evolution
 
Branches of TOM, Machine & Structure, Kinematic Links
Branches of TOM, Machine & Structure, Kinematic LinksBranches of TOM, Machine & Structure, Kinematic Links
Branches of TOM, Machine & Structure, Kinematic Links
 
Android Application Development for Intel Platform
Android Application Development for Intel PlatformAndroid Application Development for Intel Platform
Android Application Development for Intel Platform
 
Lecture 9 slides: Machine learning for Protein Structure ...
Lecture 9 slides: Machine learning for Protein Structure ...Lecture 9 slides: Machine learning for Protein Structure ...
Lecture 9 slides: Machine learning for Protein Structure ...
 
Operating System 2
Operating System 2Operating System 2
Operating System 2
 
Ntroduction to computer architecture and organization
Ntroduction to computer architecture and organizationNtroduction to computer architecture and organization
Ntroduction to computer architecture and organization
 
System Programing Unit 1
System Programing Unit 1System Programing Unit 1
System Programing Unit 1
 

Similar to IBM InterConnect 2013 Security Keynote

IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
IBM security systems overview v1.0 - rohit nagarajan
IBM security systems overview v1.0 -  rohit nagarajanIBM security systems overview v1.0 -  rohit nagarajan
IBM security systems overview v1.0 - rohit nagarajanShwetank Jayaswal
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019SrikanthRaju7
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure EnterpriseIBM Security
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016Francisco González Jiménez
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterAnna Landolfi
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroPrime Infoserv
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorIBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorFMA Summits
 
7 Ways to Stay 7 Years Ahead of the Threat 2015
7 Ways to Stay 7 Years Ahead of the Threat 20157 Ways to Stay 7 Years Ahead of the Threat 2015
7 Ways to Stay 7 Years Ahead of the Threat 2015IBM Security
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
Power Of SIEM Solutions With CloudIBN
Power Of SIEM Solutions With CloudIBNPower Of SIEM Solutions With CloudIBN
Power Of SIEM Solutions With CloudIBNCloudIBN Technology
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilientPrime Infoserv
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityNetworkCollaborators
 

Similar to IBM InterConnect 2013 Security Keynote (20)

AGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-iAGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-i
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
IBM security systems overview v1.0 - rohit nagarajan
IBM security systems overview v1.0 -  rohit nagarajanIBM security systems overview v1.0 -  rohit nagarajan
IBM security systems overview v1.0 - rohit nagarajan
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorIBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy Sector
 
7 Ways to Stay 7 Years Ahead of the Threat 2015
7 Ways to Stay 7 Years Ahead of the Threat 20157 Ways to Stay 7 Years Ahead of the Threat 2015
7 Ways to Stay 7 Years Ahead of the Threat 2015
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Power Of SIEM Solutions With CloudIBN
Power Of SIEM Solutions With CloudIBNPower Of SIEM Solutions With CloudIBN
Power Of SIEM Solutions With CloudIBN
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
 

More from IBM Events

IBM InterConnect 2013 Smarter Commerce Keynote: Your Customer in Context
IBM InterConnect 2013 Smarter Commerce Keynote: Your Customer in ContextIBM InterConnect 2013 Smarter Commerce Keynote: Your Customer in Context
IBM InterConnect 2013 Smarter Commerce Keynote: Your Customer in ContextIBM Events
 
IBM InterConnect 2013 Smarter Commerce Keynote: SingTel
IBM InterConnect 2013 Smarter Commerce Keynote: SingTelIBM InterConnect 2013 Smarter Commerce Keynote: SingTel
IBM InterConnect 2013 Smarter Commerce Keynote: SingTelIBM Events
 
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie WieckIBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie WieckIBM Events
 
IBM InterConnect 2013 Mobile Keynote: Kristen Lauria
IBM InterConnect 2013 Mobile Keynote: Kristen LauriaIBM InterConnect 2013 Mobile Keynote: Kristen Lauria
IBM InterConnect 2013 Mobile Keynote: Kristen LauriaIBM Events
 
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & WieckIBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & WieckIBM Events
 
IBM InterConnect 2013 Expert Integrated Systems Keynote: Spindo
IBM InterConnect 2013 Expert Integrated Systems Keynote: SpindoIBM InterConnect 2013 Expert Integrated Systems Keynote: Spindo
IBM InterConnect 2013 Expert Integrated Systems Keynote: SpindoIBM Events
 
IBM InterConnect 2013: DevOps Keynote
IBM InterConnect 2013: DevOps KeynoteIBM InterConnect 2013: DevOps Keynote
IBM InterConnect 2013: DevOps KeynoteIBM Events
 
InterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
InterConnect 2013 Big Data & Analytics Keynote: Mychelle MollotInterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
InterConnect 2013 Big Data & Analytics Keynote: Mychelle MollotIBM Events
 
InterConnect 2013 Cloud General Session: Douglas White
InterConnect 2013 Cloud General Session: Douglas WhiteInterConnect 2013 Cloud General Session: Douglas White
InterConnect 2013 Cloud General Session: Douglas WhiteIBM Events
 
IBM InterConnect 2013 Cloud General Session: Jamie Thomas
IBM InterConnect 2013 Cloud General Session: Jamie ThomasIBM InterConnect 2013 Cloud General Session: Jamie Thomas
IBM InterConnect 2013 Cloud General Session: Jamie ThomasIBM Events
 
IBM InterConnect 2013 Cloud General Session: Tom Rosamilia
IBM InterConnect 2013 Cloud General Session: Tom RosamiliaIBM InterConnect 2013 Cloud General Session: Tom Rosamilia
IBM InterConnect 2013 Cloud General Session: Tom RosamiliaIBM Events
 
IBM InterConnect 2013 Cloud General Session: Robert LeBlanc
IBM InterConnect 2013 Cloud General Session: Robert LeBlancIBM InterConnect 2013 Cloud General Session: Robert LeBlanc
IBM InterConnect 2013 Cloud General Session: Robert LeBlancIBM Events
 
IBM InterConnect 2013 Cloud General Session: George Karidis
IBM InterConnect 2013 Cloud General Session: George KaridisIBM InterConnect 2013 Cloud General Session: George Karidis
IBM InterConnect 2013 Cloud General Session: George KaridisIBM Events
 
IBM InterConnect 2013 Cloud General Session: Bryan Guenther
IBM InterConnect 2013 Cloud General Session: Bryan GuentherIBM InterConnect 2013 Cloud General Session: Bryan Guenther
IBM InterConnect 2013 Cloud General Session: Bryan GuentherIBM Events
 
IBM InterConnect 2013: Big Data and Analytics Presented by Mike Rhodin
IBM InterConnect 2013: Big Data and Analytics Presented by Mike RhodinIBM InterConnect 2013: Big Data and Analytics Presented by Mike Rhodin
IBM InterConnect 2013: Big Data and Analytics Presented by Mike RhodinIBM Events
 

More from IBM Events (15)

IBM InterConnect 2013 Smarter Commerce Keynote: Your Customer in Context
IBM InterConnect 2013 Smarter Commerce Keynote: Your Customer in ContextIBM InterConnect 2013 Smarter Commerce Keynote: Your Customer in Context
IBM InterConnect 2013 Smarter Commerce Keynote: Your Customer in Context
 
IBM InterConnect 2013 Smarter Commerce Keynote: SingTel
IBM InterConnect 2013 Smarter Commerce Keynote: SingTelIBM InterConnect 2013 Smarter Commerce Keynote: SingTel
IBM InterConnect 2013 Smarter Commerce Keynote: SingTel
 
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie WieckIBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
 
IBM InterConnect 2013 Mobile Keynote: Kristen Lauria
IBM InterConnect 2013 Mobile Keynote: Kristen LauriaIBM InterConnect 2013 Mobile Keynote: Kristen Lauria
IBM InterConnect 2013 Mobile Keynote: Kristen Lauria
 
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & WieckIBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
 
IBM InterConnect 2013 Expert Integrated Systems Keynote: Spindo
IBM InterConnect 2013 Expert Integrated Systems Keynote: SpindoIBM InterConnect 2013 Expert Integrated Systems Keynote: Spindo
IBM InterConnect 2013 Expert Integrated Systems Keynote: Spindo
 
IBM InterConnect 2013: DevOps Keynote
IBM InterConnect 2013: DevOps KeynoteIBM InterConnect 2013: DevOps Keynote
IBM InterConnect 2013: DevOps Keynote
 
InterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
InterConnect 2013 Big Data & Analytics Keynote: Mychelle MollotInterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
InterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
 
InterConnect 2013 Cloud General Session: Douglas White
InterConnect 2013 Cloud General Session: Douglas WhiteInterConnect 2013 Cloud General Session: Douglas White
InterConnect 2013 Cloud General Session: Douglas White
 
IBM InterConnect 2013 Cloud General Session: Jamie Thomas
IBM InterConnect 2013 Cloud General Session: Jamie ThomasIBM InterConnect 2013 Cloud General Session: Jamie Thomas
IBM InterConnect 2013 Cloud General Session: Jamie Thomas
 
IBM InterConnect 2013 Cloud General Session: Tom Rosamilia
IBM InterConnect 2013 Cloud General Session: Tom RosamiliaIBM InterConnect 2013 Cloud General Session: Tom Rosamilia
IBM InterConnect 2013 Cloud General Session: Tom Rosamilia
 
IBM InterConnect 2013 Cloud General Session: Robert LeBlanc
IBM InterConnect 2013 Cloud General Session: Robert LeBlancIBM InterConnect 2013 Cloud General Session: Robert LeBlanc
IBM InterConnect 2013 Cloud General Session: Robert LeBlanc
 
IBM InterConnect 2013 Cloud General Session: George Karidis
IBM InterConnect 2013 Cloud General Session: George KaridisIBM InterConnect 2013 Cloud General Session: George Karidis
IBM InterConnect 2013 Cloud General Session: George Karidis
 
IBM InterConnect 2013 Cloud General Session: Bryan Guenther
IBM InterConnect 2013 Cloud General Session: Bryan GuentherIBM InterConnect 2013 Cloud General Session: Bryan Guenther
IBM InterConnect 2013 Cloud General Session: Bryan Guenther
 
IBM InterConnect 2013: Big Data and Analytics Presented by Mike Rhodin
IBM InterConnect 2013: Big Data and Analytics Presented by Mike RhodinIBM InterConnect 2013: Big Data and Analytics Presented by Mike Rhodin
IBM InterConnect 2013: Big Data and Analytics Presented by Mike Rhodin
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

IBM InterConnect 2013 Security Keynote