The document discusses cognitive security and IBM's cognitive security solutions. It begins by explaining that traditional security methods are no longer enough due to increasing technological changes. It then introduces cognitive security as a new era of security that uses techniques like machine learning and natural language processing to mimic the human brain. The document summarizes IBM's cognitive security products like IBM QRadar Security Intelligence Platform, IBM QRadar Vulnerability Manager, and IBM QRadar Risk Manager. It acknowledges challenges to adopting cognitive security but emphasizes the need to educate organizations on cognitive security capabilities.
2. INTRODUCTION
For almost a century, we’ve programmed computers to help solve
complex problems. We can now simulate weather, sequence
genomes and instantly share data across the world
The same is true for security. For decades, we’ve programmed
computers to recognize viruses, malware and exploits. We
continuously tune them to become more accurate, but it’s not
enough.
6. WHAT IS COGNITIVE SECURITY
• Cognitive systems are self-learning systems that use data
mining, machine learning, natural language processing and
human–computer interaction to mimic the way the human
brain works.
7. FROM COMPLIANT TO COGNITIVE
• Since the age of the first networks and the
hackers who soon followed, we’ve evolved
security technology to stop attacks.
• To date, there have been two distinct eras of
cyber security: perimeter controls and security
intelligence. These serve as building blocks as
we enter the third era—cognitive security.
8.
9. HOW IBM CAN HELP
• The cognitive journey is just beginning,
but IBM has the intellectual and financial
strength to lead this revolution within
security.
• IBM’s investment in cognitive
technologies spans decades and has
seen great progression in the last five
years.
• The ability to process natural language,
the ability to process voice and images,
and the ability to turn unstructured data
into tools like knowledge graphs that are
easily queriable.
10. IBM WATSON
• Watson is basically a supercomputer, combining
Artificial intelligence and analytical software for
optimal performance
• IBM Qradar Advisor with Watson combines the
cognitive capabilities of Watson
16. QRADAR VULNERABILITY MANAGER
With IBM Security QRadar Vulnerability Manager, IBM introduces a new and
distinctly different response to an important need: a truly integrated approach to
security management that helps to reduce the total cost of security operations and
closes a number of gaps in many existing approaches.
IBM® QRadar® Vulnerability Manager proactively senses and discovers network
device and application security vulnerabilities, adds context and supports the
prioritization of remediation and mitigation activities.
IBM QRadar Vulnerability Manager helps you develop an optimized plan for
addressing security exposures. Unlike stand-alone tools, the solution integrates
vulnerability information to help security teams gain the visibility they need to work
more efficiently and reduce costs.
30.
THE PROMISE AND CHALLENGES OF
COGNITIVE
Many of those surveyed by the IBM Institute for Business Value (IBV) believe that
the benefits of cognitive security solutions will address the gaps they are facing.
Even though cognitive security is still an emerging technology area, 57 percent of
respondants already believe that cognitive security solutions can significantly slow
the efforts of cyber criminals
Potential challenges to the adoption of cognitive security solutions, it is not that
security leaders don’t understand the technology conceptually or aren’t convinced
of the value or the benefits versus other solutions; the challenges are more about
skills, processes and methods.
Forty-five percent of respondents list the top adoption challenges as not being
ready from a competency perspective and a lack of internal skills to implement. To
address these concerns and ensure successful roll-outs of cognitive solutions, more
education and preparation is needed.
31. BECOME EDUCATED ABOUT
COGNITIVE SECURITY
CAPABILITIES
Take a holistic and formal approach to learn about cognitive security solutions.
There could be many misconceptions in your organization from a capability, cost and
implementation perspective.
Understand the potential use cases for cognitive security solutions—match them to your areas
of weakness.
Plan for how you can communicate the benefits of cognitive security solutions to technical and
business stakeholders—build an education plan for your team and your executives
Identify and address skills gaps that may hold back adoption of the technology within your
own organization
32. DEMOGRAPHICS AND METHODOLOGY
To better understand what security challenges organizations are facing, how
they are addressing these challenges and how they view cognitive security
solutions and their potential, the IBM Institute for Business Value (IBV) and
Oxford Economics surveyed a balanced distribution of 700 CISOs and other
security professionals in 35 countries, representing 18 industries between
May and July of 2016.
In order to determine our clusters (the Primed, Prudent and the Pressured)
we applied a k-means clustering algorithm that revealed three distinct
behavior patterns.
Traditional SIEMAs many as 6 products from 6 different vendors are needed
IBM Security Intelligence and Analytics
An integrated, unified architecture in a single web-based console