SlideShare uma empresa Scribd logo
1 de 33
COGNITIVE
SECUTIRY
A NEW ERA OF SECURIITY FOR NEW ERA
OF COMPUTING
INTRODUCTION
 For almost a century, we’ve programmed computers to help solve
complex problems. We can now simulate weather, sequence
genomes and instantly share data across the world
 The same is true for security. For decades, we’ve programmed
computers to recognize viruses, malware and exploits. We
continuously tune them to become more accurate, but it’s not
enough.
Bring your
own IT
Social
business
Cloud and
virtualization
1 billion mobile
workers
1 trillion
connected
objects
Innovative technology changes everything
You know? you can
do this online now.
Marketing
Services
Online
Gaming
Online
Gaming
Online
Gaming
Online
Gaming
Central
Government
Gaming
Gaming
Internet
Services
Online
Gaming
Online
Gaming
Online
Services
Online
Gaming
IT
Security
Banking
IT
Security
Government
Consulting
IT
Security
Tele-
communicat
ions
Enter-
tainment
Consumer
Electronics
Agriculture
Apparel
Insurance
Consulting
Consumer
Electronics
Internet
Services
Central
Govt
Central
Govt
Central
Govt
Attack Type
SQL Injection
URL Tampering
Spear Phishing
3rd
Party Software
DDoS
SecureID
Trojan Software
Unknown
Source: IBM X-Force®
Research 2011 Trend and Risk Report
Size of circle estimates relative impact of breach in terms of cost
to business
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
Entertainment
Defense
Defense
Defense
Consumer
Electronics
Central
Government
Central
Government
Central
Government
Central
Government
Central
Government
Central
Government
Central
Government
Consumer
Electronics
National
Police
National
Police
State
Police
State
Police
Police
Gaming
Financial
Market
Online
Services
Consulting
Defense
Heavy
Industry
Entertainment
2011 Sampling of Security Incidents by Attack Type, Time and Impact
WHAT IS COGNITIVE SECURITY
• Cognitive systems are self-learning systems that use data
mining, machine learning, natural language processing and
human–computer interaction to mimic the way the human
brain works.
FROM COMPLIANT TO COGNITIVE
• Since the age of the first networks and the
hackers who soon followed, we’ve evolved
security technology to stop attacks.
• To date, there have been two distinct eras of
cyber security: perimeter controls and security
intelligence. These serve as building blocks as
we enter the third era—cognitive security.
HOW IBM CAN HELP
• The cognitive journey is just beginning,
but IBM has the intellectual and financial
strength to lead this revolution within
security.
• IBM’s investment in cognitive
technologies spans decades and has
seen great progression in the last five
years.
• The ability to process natural language,
the ability to process voice and images,
and the ability to turn unstructured data
into tools like knowledge graphs that are
easily queriable.
IBM WATSON
• Watson is basically a supercomputer, combining
Artificial intelligence and analytical software for
optimal performance
• IBM Qradar Advisor with Watson combines the
cognitive capabilities of Watson
IBM QRADAR SECURITY
INTELLIGENCE PLATFORM
• Turn-key log management and reporting
• SME to Enterprise
• Upgradeable to enterprise SIEM
• Log, flow, vulnerability & identity correlation
• Sophisticated asset profiling
• Offense management and workflow
• Network security configuration monitoring
• Vulnerability prioritization
• Predictive threat modeling & simulation
SIEM
Log
Management
Configuration
& Vulnerability
Management
Network
Activity &
Anomaly
Detection
Network and
Application
Visibility
• Network analytics
• Behavioral anomaly detection
• Fully integrated in SIEM
• Layer 7 application monitoring
• Content capture for deep insight & forensics
• Physical and virtual environments
Fully Integrated Security Intelligence
• Turn-key log management and reporting
• SME to Enterprise
• Upgradeable to enterprise SIEM
• Log, flow, vulnerability & identity correlation
• Sophisticated asset profiling
• Offense management and workflow
• Network security configuration monitoring
• Vulnerability prioritization
• Predictive threat modeling & simulation
SIEM
Log
Management
Configuration
& Vulnerability
Management
Network
Activity &
Anomaly
Detection
Network and
Application
Visibility
• Network analytics
• Behavioral anomaly detection
• Fully integrated in SIEM
• Layer 7 application monitoring
• Content capture for deep insight & forensics
• Physical and virtual environments
One Console Security
Built on a Single Data Architecture
Fully Integrated Security Intelligence
LINK
 http://www-03.ibm.com/software/products/en/qradar-siem
 http://ibm.autoboxengage.com/security/?
cm_mc_uid=50858139055314932739656&cm_mc_sid_502
00000=1493526694&cm_mc_sid_52640000=1493526694
IBM QRADAR
VULNERABILITY
MANAGER
QRADAR VULNERABILITY MANAGER
 With IBM Security QRadar Vulnerability Manager, IBM introduces a new and
distinctly different response to an important need: a truly integrated approach to
security management that helps to reduce the total cost of security operations and
closes a number of gaps in many existing approaches.
 IBM® QRadar® Vulnerability Manager proactively senses and discovers network
device and application security vulnerabilities, adds context and supports the
prioritization of remediation and mitigation activities.
 IBM QRadar Vulnerability Manager helps you develop an optimized plan for
addressing security exposures. Unlike stand-alone tools, the solution integrates
vulnerability information to help security teams gain the visibility they need to work
more efficiently and reduce costs.
Displaying 1 to 40 of 517 items
Displaying 1 to 40 of 311 items
IBM QRADAR
RISK MANAGER
 
THE PROMISE AND CHALLENGES OF
COGNITIVE
 Many of those surveyed by the IBM Institute for Business Value (IBV) believe that
the benefits of cognitive security solutions will address the gaps they are facing. 
Even though cognitive security is still an emerging technology area, 57 percent of
respondants already believe that cognitive security solutions can significantly slow
the efforts of cyber criminals
  Potential challenges to the adoption of cognitive security solutions, it is not that
security leaders don’t understand the technology conceptually or aren’t convinced
of the value or the benefits versus other solutions; the challenges are more about
skills, processes and methods.
 Forty-five percent of respondents list the top adoption challenges as not being
ready from a competency perspective and a lack of internal skills to implement. To
address these concerns and ensure successful roll-outs of cognitive solutions, more
education and preparation is needed.
BECOME EDUCATED ABOUT
COGNITIVE SECURITY
CAPABILITIES
 
 Take a holistic and formal approach to learn about cognitive security solutions.
There could be many misconceptions in your organization from a capability, cost and
implementation perspective.
 Understand the potential use cases for cognitive security solutions—match them to your areas
of weakness.
 Plan for how you can communicate the benefits of cognitive security solutions to technical and
business stakeholders—build an education plan for your team and your executives
 Identify and address skills gaps that may hold back adoption of the technology within your 
own organization
  DEMOGRAPHICS AND METHODOLOGY
 To better understand what security challenges organizations are facing, how
they are addressing these challenges and how they view cognitive security
solutions and their potential, the IBM Institute for Business Value (IBV) and
Oxford Economics surveyed a balanced distribution of 700 CISOs and other
security professionals in 35 countries, representing 18 industries between
May and July of 2016.
 In order to determine our clusters (the Primed, Prudent and the Pressured)
we applied a k-means clustering algorithm that revealed three distinct
behavior patterns.
THANK YOU! 

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Cloud Resource Management
Cloud Resource ManagementCloud Resource Management
Cloud Resource Management
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Captcha and Recaptcha Seminar
Captcha and Recaptcha Seminar Captcha and Recaptcha Seminar
Captcha and Recaptcha Seminar
 
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdf
CYBERBULLYING DETECTION USING              MACHINE LEARNING-1 (1).pdfCYBERBULLYING DETECTION USING              MACHINE LEARNING-1 (1).pdf
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdf
 
NLP in Cognitive Systems
NLP in Cognitive SystemsNLP in Cognitive Systems
NLP in Cognitive Systems
 
Vc dimension in Machine Learning
Vc dimension in Machine LearningVc dimension in Machine Learning
Vc dimension in Machine Learning
 
Unit 3
Unit   3Unit   3
Unit 3
 
Spammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social NetworksSpammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social Networks
 
Generative Adversarial Networks
Generative Adversarial NetworksGenerative Adversarial Networks
Generative Adversarial Networks
 
Support Vector Machines (SVM)
Support Vector Machines (SVM)Support Vector Machines (SVM)
Support Vector Machines (SVM)
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Threat Detection using artificial intelligence
Threat Detection using artificial intelligenceThreat Detection using artificial intelligence
Threat Detection using artificial intelligence
 
Faster R-CNN: Towards real-time object detection with region proposal network...
Faster R-CNN: Towards real-time object detection with region proposal network...Faster R-CNN: Towards real-time object detection with region proposal network...
Faster R-CNN: Towards real-time object detection with region proposal network...
 
Intelligent surveillance system
Intelligent surveillance system Intelligent surveillance system
Intelligent surveillance system
 
Image classification using convolutional neural network
Image classification using convolutional neural networkImage classification using convolutional neural network
Image classification using convolutional neural network
 
BIG DATA-Seminar Report
BIG DATA-Seminar ReportBIG DATA-Seminar Report
BIG DATA-Seminar Report
 
cloud computing technology
cloud computing technologycloud computing technology
cloud computing technology
 
Service Oriented Architecture In Automotive
Service Oriented Architecture In AutomotiveService Oriented Architecture In Automotive
Service Oriented Architecture In Automotive
 
Captcha1
Captcha1Captcha1
Captcha1
 
Proxy log review and use cases
Proxy log review and use casesProxy log review and use cases
Proxy log review and use cases
 

Semelhante a Cognitive security

Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
sucesuminas
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
Jyothi Satyanathan
 

Semelhante a Cognitive security (20)

IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, Expertise
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
 
The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 

Último

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 

Cognitive security

  • 1. COGNITIVE SECUTIRY A NEW ERA OF SECURIITY FOR NEW ERA OF COMPUTING
  • 2. INTRODUCTION  For almost a century, we’ve programmed computers to help solve complex problems. We can now simulate weather, sequence genomes and instantly share data across the world  The same is true for security. For decades, we’ve programmed computers to recognize viruses, malware and exploits. We continuously tune them to become more accurate, but it’s not enough.
  • 3. Bring your own IT Social business Cloud and virtualization 1 billion mobile workers 1 trillion connected objects Innovative technology changes everything
  • 4. You know? you can do this online now.
  • 5. Marketing Services Online Gaming Online Gaming Online Gaming Online Gaming Central Government Gaming Gaming Internet Services Online Gaming Online Gaming Online Services Online Gaming IT Security Banking IT Security Government Consulting IT Security Tele- communicat ions Enter- tainment Consumer Electronics Agriculture Apparel Insurance Consulting Consumer Electronics Internet Services Central Govt Central Govt Central Govt Attack Type SQL Injection URL Tampering Spear Phishing 3rd Party Software DDoS SecureID Trojan Software Unknown Source: IBM X-Force® Research 2011 Trend and Risk Report Size of circle estimates relative impact of breach in terms of cost to business Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Entertainment Defense Defense Defense Consumer Electronics Central Government Central Government Central Government Central Government Central Government Central Government Central Government Consumer Electronics National Police National Police State Police State Police Police Gaming Financial Market Online Services Consulting Defense Heavy Industry Entertainment 2011 Sampling of Security Incidents by Attack Type, Time and Impact
  • 6. WHAT IS COGNITIVE SECURITY • Cognitive systems are self-learning systems that use data mining, machine learning, natural language processing and human–computer interaction to mimic the way the human brain works.
  • 7. FROM COMPLIANT TO COGNITIVE • Since the age of the first networks and the hackers who soon followed, we’ve evolved security technology to stop attacks. • To date, there have been two distinct eras of cyber security: perimeter controls and security intelligence. These serve as building blocks as we enter the third era—cognitive security.
  • 8.
  • 9. HOW IBM CAN HELP • The cognitive journey is just beginning, but IBM has the intellectual and financial strength to lead this revolution within security. • IBM’s investment in cognitive technologies spans decades and has seen great progression in the last five years. • The ability to process natural language, the ability to process voice and images, and the ability to turn unstructured data into tools like knowledge graphs that are easily queriable.
  • 10. IBM WATSON • Watson is basically a supercomputer, combining Artificial intelligence and analytical software for optimal performance • IBM Qradar Advisor with Watson combines the cognitive capabilities of Watson
  • 12. • Turn-key log management and reporting • SME to Enterprise • Upgradeable to enterprise SIEM • Log, flow, vulnerability & identity correlation • Sophisticated asset profiling • Offense management and workflow • Network security configuration monitoring • Vulnerability prioritization • Predictive threat modeling & simulation SIEM Log Management Configuration & Vulnerability Management Network Activity & Anomaly Detection Network and Application Visibility • Network analytics • Behavioral anomaly detection • Fully integrated in SIEM • Layer 7 application monitoring • Content capture for deep insight & forensics • Physical and virtual environments Fully Integrated Security Intelligence
  • 13. • Turn-key log management and reporting • SME to Enterprise • Upgradeable to enterprise SIEM • Log, flow, vulnerability & identity correlation • Sophisticated asset profiling • Offense management and workflow • Network security configuration monitoring • Vulnerability prioritization • Predictive threat modeling & simulation SIEM Log Management Configuration & Vulnerability Management Network Activity & Anomaly Detection Network and Application Visibility • Network analytics • Behavioral anomaly detection • Fully integrated in SIEM • Layer 7 application monitoring • Content capture for deep insight & forensics • Physical and virtual environments One Console Security Built on a Single Data Architecture Fully Integrated Security Intelligence
  • 16. QRADAR VULNERABILITY MANAGER  With IBM Security QRadar Vulnerability Manager, IBM introduces a new and distinctly different response to an important need: a truly integrated approach to security management that helps to reduce the total cost of security operations and closes a number of gaps in many existing approaches.  IBM® QRadar® Vulnerability Manager proactively senses and discovers network device and application security vulnerabilities, adds context and supports the prioritization of remediation and mitigation activities.  IBM QRadar Vulnerability Manager helps you develop an optimized plan for addressing security exposures. Unlike stand-alone tools, the solution integrates vulnerability information to help security teams gain the visibility they need to work more efficiently and reduce costs.
  • 17. Displaying 1 to 40 of 517 items
  • 18.
  • 19.
  • 20. Displaying 1 to 40 of 311 items
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.   THE PROMISE AND CHALLENGES OF COGNITIVE  Many of those surveyed by the IBM Institute for Business Value (IBV) believe that the benefits of cognitive security solutions will address the gaps they are facing.  Even though cognitive security is still an emerging technology area, 57 percent of respondants already believe that cognitive security solutions can significantly slow the efforts of cyber criminals   Potential challenges to the adoption of cognitive security solutions, it is not that security leaders don’t understand the technology conceptually or aren’t convinced of the value or the benefits versus other solutions; the challenges are more about skills, processes and methods.  Forty-five percent of respondents list the top adoption challenges as not being ready from a competency perspective and a lack of internal skills to implement. To address these concerns and ensure successful roll-outs of cognitive solutions, more education and preparation is needed.
  • 31. BECOME EDUCATED ABOUT COGNITIVE SECURITY CAPABILITIES    Take a holistic and formal approach to learn about cognitive security solutions. There could be many misconceptions in your organization from a capability, cost and implementation perspective.  Understand the potential use cases for cognitive security solutions—match them to your areas of weakness.  Plan for how you can communicate the benefits of cognitive security solutions to technical and business stakeholders—build an education plan for your team and your executives  Identify and address skills gaps that may hold back adoption of the technology within your  own organization
  • 32.   DEMOGRAPHICS AND METHODOLOGY  To better understand what security challenges organizations are facing, how they are addressing these challenges and how they view cognitive security solutions and their potential, the IBM Institute for Business Value (IBV) and Oxford Economics surveyed a balanced distribution of 700 CISOs and other security professionals in 35 countries, representing 18 industries between May and July of 2016.  In order to determine our clusters (the Primed, Prudent and the Pressured) we applied a k-means clustering algorithm that revealed three distinct behavior patterns.

Notas do Editor

  1. Traditional SIEMAs many as 6 products from 6 different vendors are needed IBM Security Intelligence and Analytics An integrated, unified architecture in a single web-based console