Integrated Response with v32 of IBM Resilient

IBM Security
IBM SecurityIBM Security
Customer Webinar: Integrated
Response with v32 of Resilient
January 16th, 2019
2 IBM Security
Agenda
• The Updated In-Product Email in v32
• Updated UI in Resilient
• Privacy Updates and Upcoming Regulations
• New Integrations Available
• Upcoming Customer Events
3 IBM Security
Our Speakers
Monica Dubeau, Privacy Program Manager, CIPP/US
IBM Resilient
Martin Feeney, Product Manager
IBM Resilient
v32 In-Product Email
5 IBM Security
Objectives of In-Product Email
• We want to simplify email setup, maintenance, and processing by bringing all aspects of it into
the main product UI.
• Reduce the time and effort involved in creating and maintaining the existing email product
extension.
• Emails connections will be defined and tested within the UI. Emails will now be directly
referenceable within UI contexts such as rules and scripting.
• Make emails an integrated part of Resilient, visible on the incidents as objects in their own
right.
• Allow operators to collaborate via email with whomever they require within the context of the
incident, with all such emails recorded on the incident.
• Triage inbox to highlight emails that require manual intervention, whether to define new rules to
automatically process them, or to modify existing rules and/or scripts to update processing
logic.
• First release focuses on inbound emails and triage inbox, subsequent releases will enhance
initial capabilities as well as adding support for outbound emails.
Updated Resilient UI
7 IBM Security
• IBM Design Studio’s Carbon
̶ Developed and supported by a dedicated team in Austin, TX
̶ Carbon Library: reusable HTML and SCSS enables consistent markup, styles, and behavior
̶ Well documented
• Full-screen width
• Layout changes
̶ e.g. Incident Details sidebar moved to the right
• First phase in ongoing UI refresh, there’s more to come.
UI Refresh
8 IBM Security
Incident Details Example
Privacy Updates in Resilient
10 IBM Security
The following new regulators were
added to the Privacy Module:
• Alberta Health
• Bermuda
• Canada (PIPEDA)
• Vermont (Data Brokers)
Significant Additions and Updates
The following regulators were
updated in the Privacy Module:
• Belgium
• Colorado
• Connecticut
• Gibraltar
• Iowa
• Nebraska
• NYDFS
• Vermont
11 IBM Security
Text box to document
conclusion
Important Features for PIPEDA (Canada)
12 IBM Security
Guidance that helps
user assess risk
Important Features for PIPEDA (Canada) continued
13 IBM Security
14 IBM Security
Upcoming Privacy Additions
China (Financial PBOC) Hong Kong (Monetary Authority)
Integration Update
16 IBM Security
73 Apps Available: IBM and Business Partner Supported and Community Supported
New Integrations Available on the IBM Security App Exchange
17 IBM Security
New and Notable Apps
Slack
Transfer information between Resilient and
Slack with this functions-based integration
A full list of newly released apps and a description of their features is available in the
Resilient Community: ibm.biz/CommunityDiscussion
IBM and Business Partner Supported Community Supported
Microsoft Exchange
This package can be used to access Microsoft
Exchange email and meeting capabilities from
Resilient
• Google Cloud Functions to Sandbox
• IPinfo IP Address Enrichment
• MxToolbox
• Pastebin
• Pipl
• Search Twitter
• URL to DNS
• Wiki Lookup
X-Force Collections
Enrich incidents in Resilient with context from
IBM X-Force Exchange, a threat intelligence
sharing platform.
18 IBM Security
ibm.biz/resilientcommunity
19 IBM Security
Join the Resilient team at THINK
2019 in San Francisco
• Meet with key Resilient
technology and business
executives
• Attend the Resilient User Group
meeting (Monday 1-3PM, Feb 11)
• Network with other Resilient
customers
More information and registration
details at:
https://www.ibm.com/events/think/
20 IBM Security
Engage 2019 – Regional and Global Customer Forums
• Regional Engage Customer Forums
̶ Europe:
• Zurich, Switzerland - March 19 - 20
• London, England - March 21 - 22
̶ United States:
• San Francisco, CA - April 9 - 10
• Atlanta, GA - April 11 - 12
• Resilient Cyber Range Experience -
Cambridge, MA:
̶ May 7
̶ July 11
̶ October 14
• Engage Global Customer Forum
̶ Cambridge, MA – September 17 - 19
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2018. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOU
ibm.com/security/community
1 de 21

Recomendados

Bridging the Gap between Privacy and Security: Using Technology to Manage Com... por
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
941 visualizações24 slides
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated... por
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
742 visualizações18 slides
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P... por
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
775 visualizações12 slides
Accelerating SOC Transformation with IBM Resilient and Carbon Black por
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
966 visualizações20 slides
Are You Ready to Move Your IAM to the Cloud? por
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
2K visualizações22 slides
Automation: Embracing the Future of SecOps por
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
2K visualizações22 slides

Mais conteúdo relacionado

Mais procurados

How to Improve Threat Detection & Simplify Security Operations por
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
1.9K visualizações36 slides
See How You Measure Up With MaaS360 Mobile Metrics por
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsIBM Security
1.2K visualizações12 slides
Close the Loop on Incident Response por
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
2.6K visualizações1 slide
QRadar & XGS: Stopping Attacks with a Click of the Mouse por
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseIBM Security
1.5K visualizações38 slides
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks por
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksIBM Security
3.7K visualizações17 slides
Compete To Win: Don’t Just Be Compliant – Be Secure! por
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!IBM Security
1.1K visualizações32 slides

Mais procurados(20)

How to Improve Threat Detection & Simplify Security Operations por IBM Security
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
IBM Security1.9K visualizações
See How You Measure Up With MaaS360 Mobile Metrics por IBM Security
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
IBM Security1.2K visualizações
Close the Loop on Incident Response por IBM Security
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
IBM Security2.6K visualizações
QRadar & XGS: Stopping Attacks with a Click of the Mouse por IBM Security
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
IBM Security1.5K visualizações
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks por IBM Security
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
IBM Security3.7K visualizações
Compete To Win: Don’t Just Be Compliant – Be Secure! por IBM Security
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!
IBM Security1.1K visualizações
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System por IBM Security
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
IBM Security1.1K visualizações
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec... por IBM Security
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
IBM Security1.1K visualizações
Security Trend Report, 2017 por Bill Chamberlin
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
Bill Chamberlin2K visualizações
10 Security Essentials Every CxO Should Know por IBM Security
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
IBM Security8.6K visualizações
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso... por IBM Security
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security1.9K visualizações
Top 5 Things to Look for in an IPS Solution por IBM Security
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS Solution
IBM Security1.4K visualizações
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it por IBM Security
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
IBM Security745 visualizações
IBM Security Software Solutions - Powerpoint por Thierry Matusiak
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
Thierry Matusiak1.4K visualizações
Valuing Data in the Age of Ransomware por IBM Security
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
IBM Security703 visualizações
Tolly Report: Stopping Attacks You Can't See por IBM Security
Tolly Report: Stopping Attacks You Can't SeeTolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't See
IBM Security942 visualizações
4 Ways to Build your Immunity to Cyberthreats por IBM Security
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats
IBM Security1.3K visualizações
Ibm security products portfolio por Patrick Bouillaud
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
Patrick Bouillaud4.2K visualizações
IBM QRadar UBA por IBM Security
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
IBM Security5.7K visualizações

Similar a Integrated Response with v32 of IBM Resilient

3 Enablers of Successful Cyber Attacks and How to Thwart Them por
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
1.4K visualizações18 slides
Why Ibm cloud private por
Why Ibm cloud private Why Ibm cloud private
Why Ibm cloud private Shikha Srivastava
83 visualizações29 slides
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin... por
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM Security
1.9K visualizações20 slides
#8311: Transform the Enterprise with IBM Cloud Private por
#8311: Transform the Enterprise with IBM Cloud Private#8311: Transform the Enterprise with IBM Cloud Private
#8311: Transform the Enterprise with IBM Cloud PrivateMichael Elder
1.2K visualizações23 slides
Protecting Mission-Critical Source Code from Application Security Vulnerabili... por
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...IBM Security
1.8K visualizações23 slides
Advanced Mobile Content Collaboration with BOX.NET por
Advanced Mobile Content Collaboration with BOX.NETAdvanced Mobile Content Collaboration with BOX.NET
Advanced Mobile Content Collaboration with BOX.NETAGILLY
359 visualizações33 slides

Similar a Integrated Response with v32 of IBM Resilient(20)

3 Enablers of Successful Cyber Attacks and How to Thwart Them por IBM Security
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
IBM Security1.4K visualizações
Why Ibm cloud private por Shikha Srivastava
Why Ibm cloud private Why Ibm cloud private
Why Ibm cloud private
Shikha Srivastava83 visualizações
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin... por IBM Security
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM Security1.9K visualizações
#8311: Transform the Enterprise with IBM Cloud Private por Michael Elder
#8311: Transform the Enterprise with IBM Cloud Private#8311: Transform the Enterprise with IBM Cloud Private
#8311: Transform the Enterprise with IBM Cloud Private
Michael Elder1.2K visualizações
Protecting Mission-Critical Source Code from Application Security Vulnerabili... por IBM Security
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
IBM Security1.8K visualizações
Advanced Mobile Content Collaboration with BOX.NET por AGILLY
Advanced Mobile Content Collaboration with BOX.NETAdvanced Mobile Content Collaboration with BOX.NET
Advanced Mobile Content Collaboration with BOX.NET
AGILLY359 visualizações
IBM Endpoint Data Sheet por Éric Guay
IBM Endpoint Data SheetIBM Endpoint Data Sheet
IBM Endpoint Data Sheet
Éric Guay111 visualizações
IBM MQ on cloud and containers por Robert Parker
IBM MQ on cloud and containersIBM MQ on cloud and containers
IBM MQ on cloud and containers
Robert Parker3K visualizações
Introduction to IBM Cloud Private - April 2018 por Michael Elder
Introduction to IBM Cloud Private - April 2018Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018
Michael Elder1.5K visualizações
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ... por WASdev Community
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
WASdev Community770 visualizações
Ibm q radar_blind_references por Maarten Werff
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_references
Maarten Werff545 visualizações
8 Principales Raisons de Passer du MDM à l'EMM por AGILLY
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
AGILLY439 visualizações
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net por xband
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
xband327 visualizações
2015 Mobile Security Trends: Are You Ready? por IBM Security
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
IBM Security8.6K visualizações
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly por IBM Security
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM Security1.9K visualizações
What’s the State of Your Endpoint Security? por IBM Security
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
IBM Security2.4K visualizações
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment por IBM Security
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
IBM Security2.1K visualizações
Connecting Devices to the IBM IoT via MQTT - Session 1231 @IBMInsight2015 por Markus Van Kempen
Connecting Devices to the IBM IoT via MQTT - Session 1231 @IBMInsight2015Connecting Devices to the IBM IoT via MQTT - Session 1231 @IBMInsight2015
Connecting Devices to the IBM IoT via MQTT - Session 1231 @IBMInsight2015
Markus Van Kempen1.3K visualizações
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin... por IBM Security
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
IBM Security6.6K visualizações

Mais de IBM Security

Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on... por
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
914 visualizações39 slides
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence por
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
3.2K visualizações30 slides
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ... por
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
4.2K visualizações25 slides
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ... por
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
3.6K visualizações29 slides
WannaCry Ransomware Attack: What to Do Now por
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
6.9K visualizações15 slides
Mobile Vision 2020 por
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
1.5K visualizações1 slide

Mais de IBM Security(14)

Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on... por IBM Security
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
IBM Security914 visualizações
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence por IBM Security
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
IBM Security3.2K visualizações
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ... por IBM Security
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
IBM Security4.2K visualizações
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ... por IBM Security
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
IBM Security3.6K visualizações
WannaCry Ransomware Attack: What to Do Now por IBM Security
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
IBM Security6.9K visualizações
Mobile Vision 2020 por IBM Security
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
IBM Security1.5K visualizações
Retail Mobility, Productivity and Security por IBM Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
IBM Security1.4K visualizações
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli... por IBM Security
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
IBM Security1.4K visualizações
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights por IBM Security
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
IBM Security2.7K visualizações
Top 12 Cybersecurity Predictions for 2017 por IBM Security
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
IBM Security1.3K visualizações
Safeguard Healthcare Identities and Data with Identity Governance and Intelli... por IBM Security
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
IBM Security1.3K visualizações
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System por IBM Security
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
IBM Security675 visualizações
Detect and Respond to Threats Better with IBM Security App Exchange Partners por IBM Security
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security956 visualizações
Compliance is a pit stop – your destination lies ahead por IBM Security
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies ahead
IBM Security846 visualizações

Último

VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue por
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueShapeBlue
85 visualizações54 slides
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive por
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
46 visualizações35 slides
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue por
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlueShapeBlue
50 visualizações23 slides
Uni Systems for Power Platform.pptx por
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
58 visualizações21 slides
Microsoft Power Platform.pptx por
Microsoft Power Platform.pptxMicrosoft Power Platform.pptx
Microsoft Power Platform.pptxUni Systems S.M.S.A.
67 visualizações38 slides
DRBD Deep Dive - Philipp Reisner - LINBIT por
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBITShapeBlue
62 visualizações21 slides

Último(20)

VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue por ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue85 visualizações
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive por Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Network Automation Forum46 visualizações
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue por ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue50 visualizações
Uni Systems for Power Platform.pptx por Uni Systems S.M.S.A.
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptx
Uni Systems S.M.S.A.58 visualizações
Microsoft Power Platform.pptx por Uni Systems S.M.S.A.
Microsoft Power Platform.pptxMicrosoft Power Platform.pptx
Microsoft Power Platform.pptx
Uni Systems S.M.S.A.67 visualizações
DRBD Deep Dive - Philipp Reisner - LINBIT por ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue62 visualizações
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue por ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue46 visualizações
Ransomware is Knocking your Door_Final.pdf por Security Bootcamp
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp76 visualizações
HTTP headers that make your website go faster - devs.gent November 2023 por Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn28 visualizações
Five Things You SHOULD Know About Postman por Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman40 visualizações
MVP and prioritization.pdf por rahuldharwal141
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdf
rahuldharwal14138 visualizações
Business Analyst Series 2023 - Week 3 Session 5 por DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10369 visualizações
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... por ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue54 visualizações
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... por Moses Kemibaro
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Moses Kemibaro29 visualizações
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 visualizações
Data Integrity for Banking and Financial Services por Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely56 visualizações
NTGapps NTG LowCode Platform por Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu141 visualizações
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software344 visualizações
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... por ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue46 visualizações

Integrated Response with v32 of IBM Resilient

  • 1. Customer Webinar: Integrated Response with v32 of Resilient January 16th, 2019
  • 2. 2 IBM Security Agenda • The Updated In-Product Email in v32 • Updated UI in Resilient • Privacy Updates and Upcoming Regulations • New Integrations Available • Upcoming Customer Events
  • 3. 3 IBM Security Our Speakers Monica Dubeau, Privacy Program Manager, CIPP/US IBM Resilient Martin Feeney, Product Manager IBM Resilient
  • 5. 5 IBM Security Objectives of In-Product Email • We want to simplify email setup, maintenance, and processing by bringing all aspects of it into the main product UI. • Reduce the time and effort involved in creating and maintaining the existing email product extension. • Emails connections will be defined and tested within the UI. Emails will now be directly referenceable within UI contexts such as rules and scripting. • Make emails an integrated part of Resilient, visible on the incidents as objects in their own right. • Allow operators to collaborate via email with whomever they require within the context of the incident, with all such emails recorded on the incident. • Triage inbox to highlight emails that require manual intervention, whether to define new rules to automatically process them, or to modify existing rules and/or scripts to update processing logic. • First release focuses on inbound emails and triage inbox, subsequent releases will enhance initial capabilities as well as adding support for outbound emails.
  • 7. 7 IBM Security • IBM Design Studio’s Carbon ̶ Developed and supported by a dedicated team in Austin, TX ̶ Carbon Library: reusable HTML and SCSS enables consistent markup, styles, and behavior ̶ Well documented • Full-screen width • Layout changes ̶ e.g. Incident Details sidebar moved to the right • First phase in ongoing UI refresh, there’s more to come. UI Refresh
  • 8. 8 IBM Security Incident Details Example
  • 9. Privacy Updates in Resilient
  • 10. 10 IBM Security The following new regulators were added to the Privacy Module: • Alberta Health • Bermuda • Canada (PIPEDA) • Vermont (Data Brokers) Significant Additions and Updates The following regulators were updated in the Privacy Module: • Belgium • Colorado • Connecticut • Gibraltar • Iowa • Nebraska • NYDFS • Vermont
  • 11. 11 IBM Security Text box to document conclusion Important Features for PIPEDA (Canada)
  • 12. 12 IBM Security Guidance that helps user assess risk Important Features for PIPEDA (Canada) continued
  • 14. 14 IBM Security Upcoming Privacy Additions China (Financial PBOC) Hong Kong (Monetary Authority)
  • 16. 16 IBM Security 73 Apps Available: IBM and Business Partner Supported and Community Supported New Integrations Available on the IBM Security App Exchange
  • 17. 17 IBM Security New and Notable Apps Slack Transfer information between Resilient and Slack with this functions-based integration A full list of newly released apps and a description of their features is available in the Resilient Community: ibm.biz/CommunityDiscussion IBM and Business Partner Supported Community Supported Microsoft Exchange This package can be used to access Microsoft Exchange email and meeting capabilities from Resilient • Google Cloud Functions to Sandbox • IPinfo IP Address Enrichment • MxToolbox • Pastebin • Pipl • Search Twitter • URL to DNS • Wiki Lookup X-Force Collections Enrich incidents in Resilient with context from IBM X-Force Exchange, a threat intelligence sharing platform.
  • 19. 19 IBM Security Join the Resilient team at THINK 2019 in San Francisco • Meet with key Resilient technology and business executives • Attend the Resilient User Group meeting (Monday 1-3PM, Feb 11) • Network with other Resilient customers More information and registration details at: https://www.ibm.com/events/think/
  • 20. 20 IBM Security Engage 2019 – Regional and Global Customer Forums • Regional Engage Customer Forums ̶ Europe: • Zurich, Switzerland - March 19 - 20 • London, England - March 21 - 22 ̶ United States: • San Francisco, CA - April 9 - 10 • Atlanta, GA - April 11 - 12 • Resilient Cyber Range Experience - Cambridge, MA: ̶ May 7 ̶ July 11 ̶ October 14 • Engage Global Customer Forum ̶ Cambridge, MA – September 17 - 19
  • 21. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBM Corporation 2018. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: THANK YOU ibm.com/security/community