Enviar búsqueda
Cargar
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
•
2 recomendaciones
•
1,492 vistas
Andris Soroka
Seguir
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 32
Descargar ahora
Descargar para leer sin conexión
Recomendados
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS UK
Maloney slides
Maloney slides
Onkar Sule
eircom Managed Security
eircom Managed Security
eircom
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
IBMSSA
IDBI Intech - Information security consulting
IDBI Intech - Information security consulting
IDBI Intech
VSD Infotech
VSD Infotech
VSD infotech
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Amazon Web Services
Security Intelligence
Security Intelligence
IBMGovernmentCA
Recomendados
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS UK
Maloney slides
Maloney slides
Onkar Sule
eircom Managed Security
eircom Managed Security
eircom
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
IBMSSA
IDBI Intech - Information security consulting
IDBI Intech - Information security consulting
IDBI Intech
VSD Infotech
VSD Infotech
VSD infotech
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Amazon Web Services
Security Intelligence
Security Intelligence
IBMGovernmentCA
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
Anindya Ghosh,
טכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידע
Israel Export Institute_מכון היצוא
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Minh Le
Information Security By Design
Information Security By Design
Nalneesh Gaur
Cat6500 Praesentation
Cat6500 Praesentation
Sophan_Pheng
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
DataExchangeAgency
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Global Business Events
Improving Your Information Security Program
Improving Your Information Security Program
Seccuris Inc.
2012 Data Center Security
2012 Data Center Security
Szymon Dowgwillowicz-Nowicki
Exposing the Money Behind Malware
Exposing the Money Behind Malware
Sophos
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
scoopnewsgroup
Take Control of End User Security
Take Control of End User Security
anniebrowny
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017
japijapi
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Ingram Micro Cloud
APT & What we can do TODAY
APT & What we can do TODAY
James Ryan, CSyP, EA, PMP
Bapinger Network Security
Bapinger Network Security
Djadja Sardjana
C2MS
C2MS
hemanth102030
Trend micro deep security
Trend micro deep security
Trend Micro
Security 2 Q 07[1]
Security 2 Q 07[1]
Sharpe Smith
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
Andris Soroka
Trabajo finalintegracioncruizc2
Trabajo finalintegracioncruizc2
Cecilia Ruiz
Ministerio de educacion 2
Ministerio de educacion 2
rochinely
Más contenido relacionado
La actualidad más candente
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
Anindya Ghosh,
טכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידע
Israel Export Institute_מכון היצוא
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Minh Le
Information Security By Design
Information Security By Design
Nalneesh Gaur
Cat6500 Praesentation
Cat6500 Praesentation
Sophan_Pheng
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
DataExchangeAgency
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Global Business Events
Improving Your Information Security Program
Improving Your Information Security Program
Seccuris Inc.
2012 Data Center Security
2012 Data Center Security
Szymon Dowgwillowicz-Nowicki
Exposing the Money Behind Malware
Exposing the Money Behind Malware
Sophos
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
scoopnewsgroup
Take Control of End User Security
Take Control of End User Security
anniebrowny
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017
japijapi
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Ingram Micro Cloud
APT & What we can do TODAY
APT & What we can do TODAY
James Ryan, CSyP, EA, PMP
Bapinger Network Security
Bapinger Network Security
Djadja Sardjana
C2MS
C2MS
hemanth102030
Trend micro deep security
Trend micro deep security
Trend Micro
Security 2 Q 07[1]
Security 2 Q 07[1]
Sharpe Smith
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
Andris Soroka
La actualidad más candente
(20)
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
טכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידע
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Information Security By Design
Information Security By Design
Cat6500 Praesentation
Cat6500 Praesentation
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Improving Your Information Security Program
Improving Your Information Security Program
2012 Data Center Security
2012 Data Center Security
Exposing the Money Behind Malware
Exposing the Money Behind Malware
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
Take Control of End User Security
Take Control of End User Security
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
APT & What we can do TODAY
APT & What we can do TODAY
Bapinger Network Security
Bapinger Network Security
C2MS
C2MS
Trend micro deep security
Trend micro deep security
Security 2 Q 07[1]
Security 2 Q 07[1]
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
Destacado
Trabajo finalintegracioncruizc2
Trabajo finalintegracioncruizc2
Cecilia Ruiz
Ministerio de educacion 2
Ministerio de educacion 2
rochinely
certificado UCLM - Administración y Dirección de Empresas Sostenibles
certificado UCLM - Administración y Dirección de Empresas Sostenibles
Sergio Benito
Best of Municipal Market - August 2014
Best of Municipal Market - August 2014
Bloomberg Briefs
Scrum Con Exito
Scrum Con Exito
jsalvata
Fadi Amer - CV
Fadi Amer - CV
Fadi Al-Amer
SegurosVeterinarios.com: Los Seguros Veterinarios y el Sector de las Mascotas
SegurosVeterinarios.com: Los Seguros Veterinarios y el Sector de las Mascotas
SegurosVeterinarios.com
EHP_PhD-Thesis
EHP_PhD-Thesis
Eddie Hjelm Pedersen
Soluzioni Flakt Woods per Air Comfort e Fire Safety
Soluzioni Flakt Woods per Air Comfort e Fire Safety
Roberto Zattoni
Cómo hacer rentable un proyecto artístico
Cómo hacer rentable un proyecto artístico
Artevento
Experis Hungary to linkedin Szabolcsi Nikoletta
Experis Hungary to linkedin Szabolcsi Nikoletta
Nikoletta Szabolcsi
IK Profile PPT-NEW 03.12.15
IK Profile PPT-NEW 03.12.15
Anne Kaaria
The Key To Marketing Technology is Breaking Down the Walls (Graham Brown mobi...
The Key To Marketing Technology is Breaking Down the Walls (Graham Brown mobi...
Graham Brown
regioS 1 - Die NRP nach der Startphase
regioS 1 - Die NRP nach der Startphase
regiosuisse
Milan Pištalo - EProBanking
Milan Pištalo - EProBanking
biZbuZZ
The Choice Islam and Christianity (volume two)
The Choice Islam and Christianity (volume two)
Mohanad Alani
La tecnologia y el mundial sudafrica 2010 1
La tecnologia y el mundial sudafrica 2010 1
UTN
Afiches Jorge Lanata. Impacto en redes sociales by SocialAd.biz
Afiches Jorge Lanata. Impacto en redes sociales by SocialAd.biz
SocialLive
Energia solar
Energia solar
Leonardo Torres Ludeña
Marketing low cost
Marketing low cost
Xabier Rolán
Destacado
(20)
Trabajo finalintegracioncruizc2
Trabajo finalintegracioncruizc2
Ministerio de educacion 2
Ministerio de educacion 2
certificado UCLM - Administración y Dirección de Empresas Sostenibles
certificado UCLM - Administración y Dirección de Empresas Sostenibles
Best of Municipal Market - August 2014
Best of Municipal Market - August 2014
Scrum Con Exito
Scrum Con Exito
Fadi Amer - CV
Fadi Amer - CV
SegurosVeterinarios.com: Los Seguros Veterinarios y el Sector de las Mascotas
SegurosVeterinarios.com: Los Seguros Veterinarios y el Sector de las Mascotas
EHP_PhD-Thesis
EHP_PhD-Thesis
Soluzioni Flakt Woods per Air Comfort e Fire Safety
Soluzioni Flakt Woods per Air Comfort e Fire Safety
Cómo hacer rentable un proyecto artístico
Cómo hacer rentable un proyecto artístico
Experis Hungary to linkedin Szabolcsi Nikoletta
Experis Hungary to linkedin Szabolcsi Nikoletta
IK Profile PPT-NEW 03.12.15
IK Profile PPT-NEW 03.12.15
The Key To Marketing Technology is Breaking Down the Walls (Graham Brown mobi...
The Key To Marketing Technology is Breaking Down the Walls (Graham Brown mobi...
regioS 1 - Die NRP nach der Startphase
regioS 1 - Die NRP nach der Startphase
Milan Pištalo - EProBanking
Milan Pištalo - EProBanking
The Choice Islam and Christianity (volume two)
The Choice Islam and Christianity (volume two)
La tecnologia y el mundial sudafrica 2010 1
La tecnologia y el mundial sudafrica 2010 1
Afiches Jorge Lanata. Impacto en redes sociales by SocialAd.biz
Afiches Jorge Lanata. Impacto en redes sociales by SocialAd.biz
Energia solar
Energia solar
Marketing low cost
Marketing low cost
Similar a DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011
Andris Soroka
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
Andris Soroka
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
IBM Danmark
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
Information Security Awareness Group
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
TUESDAY Business Network
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
IBM Security
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
Axxera Security Solutions
Axxera Security Solutions
akshayvreddy
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
Francisco González Jiménez
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
IBM Security
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
ebuc
Top 10 Database Threats
Top 10 Database Threats
Imperva
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
ProductNation/iSPIRT
IBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - Ecuador
Olmedo Abril Arboleda
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
Symantec
S series presentation
S series presentation
Sergey Marunich
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
Işınsu Akçetin
IBM Security Services Overview
IBM Security Services Overview
Casey Lucas
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Internap
Similar a DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
(20)
SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Axxera Security Solutions
Axxera Security Solutions
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
Top 10 Database Threats
Top 10 Database Threats
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
IBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - Ecuador
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
S series presentation
S series presentation
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
IBM Security Services Overview
IBM Security Services Overview
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Más de Andris Soroka
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Andris Soroka
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Andris Soroka
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Andris Soroka
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Andris Soroka
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Andris Soroka
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Andris Soroka
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Andris Soroka
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Andris Soroka
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Andris Soroka
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Andris Soroka
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Andris Soroka
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Andris Soroka
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Andris Soroka
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Andris Soroka
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Andris Soroka
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Andris Soroka
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Andris Soroka
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Andris Soroka
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Andris Soroka
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Andris Soroka
Más de Andris Soroka
(20)
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Último
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
The Digital Insurer
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Angeliki Cooney
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Jago de Vreede
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
The Digital Insurer
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Zilliz
Último
(20)
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
1.
IBM Security Systems Security
strategies to stay out of the headlines Q1 Labs, an IBM Company Andris Soroka, Data Security Solutions Q1 Labs 1st Certified Partner in Baltics © 2012 IBM Corporation 1 © 2012 IBM Corporation
2.
IBM Security Systems Who
we are – specialization security: Innovative & selected software / hardware & hybrid solutions from leading technology vendors from over 10 different countries IT Security consulting (vulnerability assessment tests, security audit, new systems integration, HR training, technical support) First in Baltics who had integrated several innovative IT Security solutions that no one before has done First Certified Q1 Labs Partner in the Baltic States and now IBM Business Partner continuing working with IBM Security Portfolio 2 © 2012 IBM Corporation
3.
IBM Security Systems
According to the 2011 Verizon Data Breach Report, 86 percent of breached organizations failed to detect that their networks were hacked. 3 © 2012 IBM Corporation
4.
IBM Security Systems
Headlines change, cybercrime increases 1995 – 2005 2005 – 2015 1st Decade of the Commercial Internet 2nd Decade of the Commercial Internet Motive Nation-state Actors; National Security Targeted Attacks / Advanced Persistent Threat Espionage, Competitors, Hacktivists Political Activism Monetary Gain Organized Crime, using sophisticated tools Revenge Insiders, using inside information Curiosity Script-kiddies or hackers using tools, web-based “how-to’s” Adversary 4 © 2012 IBM Corporation
5.
IBM Security Systems
What happens in IT security world? Maze.. Around 1500 IT Security vendors for Endpoint Security Platforms and point solutions Data Security DLP suites and point solutions Network Security Gateway solutions NAC, visibility, NBA Authentication, authorization etc. Traditional and next generation’s Identity protection Virtualization and cloud security IT Security governance Operational management & Security Mobile Security 5 © 2012 IBM Corporation
6.
IBM Security Systems
What do we propose? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the IT security and risk posture of an enterprise Security Intelligence provides actionable and comprehensive insight for managing risks and threats from protection and detection through remediation. 6 © 2012 IBM Corporation
7.
IBM Security Systems
What logs – Audit logs Transaction logs Operational IT & Network Identity Governance & Intrusion logs Security Operations Management Compliance Connection logs Log System performance records Tool Log Silo ? User activity logs ? ? ? ???? Different systems alerts and ? ? ? ?? ? ? ? ???? different other systems messages ? ? ? ? Log Jam ? ? ?? From where - ? Firewalls / Intrusion prevention ? ? ? ???? ? ? ? ? ????? Routers / Switches ? ?? ? Intrusion detection ? LOGS ?? ? Servers, desktops, mainframes Business applications Databases Network Servers Databases Homegrown Antivirus software Applications VPN’s You cannot control what You cannot see! 7 © 2012 IBM Corporation
8.
IBM Security Systems 8
© 2012 IBM Corporation
9.
IBM Security Systems 9
© 2012 IBM Corporation
10.
IBM Security Systems
Fully Integrated Security Intelligence • Turnkey log management Log • SME to Enterprise Management • Upgradeable to enterprise SIEM One Console Security • Integrated log, threat, risk & compliance mgmt. • Sophisticated event analytics SIEM • Asset profiling and flow analytics • Offense management and workflow • Predictive threat modeling & simulation Risk • Scalable configuration monitoring and audit Management • Advanced threat visualization and impact analysis Network • Network analytics Activity & • Behavior and anomaly detection Anomaly • Fully integrated with SIEM Detection Network and Application Built on a Single Data Architecture • Layer 7 application monitoring • Content capture Visibility • Physical and virtual environments 10 © 2012 IBM Corporation
11.
IBM Security Systems
Fully Integrated Security Intelligence • Turnkey log management Log • SME to Enterprise Management • Upgradeable to enterprise SIEM • Integrated log, threat, risk & compliance mgmt. • Sophisticated event analytics SIEM • Asset profiling and flow analytics • Offense management and workflow • Predictive threat modeling & simulation Risk • Scalable configuration monitoring and audit Management • Advanced threat visualization and impact analysis Network • Network analytics Activity & • Behavior and anomaly detection Anomaly • Fully integrated with SIEM Detection Network and • Layer 7 application monitoring Application • Content capture Visibility • Physical and virtual environments 11 © 2012 IBM Corporation
12.
IBM Security Systems
Q1 Labs- The Security Intelligence Leader Who is Q1 Labs: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner Magic Quadrant (2009-2012) Award-winning solutions: Family of next-generation Log Management, SIEM, Risk Management, Security Intelligence solutions Proven and growing rapidly: Thousands of customers worldwide Five-year average annual revenue growth of 70%+ Now part of IBM Security Systems: Unmatched security expertise and breadth of integrated capabilities 12 © 2012 IBM Corporation
13.
IBM Security Systems
Security Intelligence Use Cases 13 © 2012 IBM Corporation
14.
IBM Security Systems
Clear & concise delivery of the most relevant information … What was the attack? Was it Who was successful? responsible? Where do I find them? How valuable are How many they to the targets business? involved? Are any of them vulnerable? Where is all the evidence? 14 © 2012 IBM Corporation
15.
IBM Security Systems
Total Security Intelligence: How do we address the challenges? Reduce Big Data Detect Advanced Persistent Threats Predict attacks Manage risk 15 © 2012 IBM Corporation
16.
IBM Security Systems
Big Data: Reduce your data silo down 16 © 2012 IBM Corporation
17.
IBM Security Systems
Reducing Data Silos: How it looks in QRadar Single incident derived from ~20k events and 355 flows QRadar automatically pulls all related events and flows into a single security incident Highlights the magnitude / importance Reduction into manageable daily number 17 © 2012 IBM Corporation
18.
IBM Security Systems
Total Security Intelligence: How do we address the challenges? Reduce Big Data Detect Advanced Persistent Threats Predict attacks Manage risk 18 © 2012 IBM Corporation
19.
IBM Security Systems Anatomy
of an APT: Communications Company 3rd Party Software Update Server Compromised Trojan “auto-updated” to Corporate network Port 8080 used for C&C activities 35M records stolen Attackers create Trojan 60+ Corporate computers infected Attackers w/ backdoor agentcreate Trojan –6 Months Day 0 Day 8 19 © 2012 IBM Corporation
20.
IBM Security Systems
Activity / Behaviour Monitoring, Flow Analytics, Anomaly Detection Behaviour / activity base lining of users and processes Helps detect day-zero attacks and covert channels that have no signature or AV / IPS detection Provides definitive evidence of attack Enables visibility into attacker communications Network traffic does not lie Attackers can stop logging and erase their tracks, but can’t cut off the network (flow data) 20 © 2012 IBM Corporation
21.
IBM Security Systems
Activity and data access monitoring Visualize Data Risks Automated charting and reporting on potential database breaches Correlate Database and Other Network Activity Enrich database security alerts with anomaly detection and flow analysis Better Detect Serious Breaches 360-degree visibility helps distinguish true breaches from benign activity, in real-time 21 © 2012 IBM Corporation
22.
IBM Security Systems
Anomaly Detection & APTs User & Application Activity Monitoring alerts to a user anomaly for Oracle database access. Identify the user, normal access behavior and the anomaly behavior with all source and destination information for quickly resolving the persistent threat. 22 © 2012 IBM Corporation
23.
IBM Security Systems
Stealthy malware detection Potential Botnet Detected? This is as far as traditional SIEM can go IRC on port 80? QFlow detects a covert channel, using Layer 7 flows and deep packet inspection Irrefutable Botnet Communication Layer 7 flow data shows botnet command and control instructions 23 © 2012 IBM Corporation
24.
IBM Security Systems
Total Security Intelligence: How do we address the challenges? Reduce Big Data Detect Advanced Persistent Threats Predict attacks Manage risk 24 © 2012 IBM Corporation
25.
IBM Security Systems
The Security Intelligence Timeline: Proactive vs Headlines 25 © 2012 IBM Corporation
26.
IBM Security Systems
Predicting an Attack: How it looks in QRadar Multiple IP’s attack an IP Drilling into one superflow record shows all IP records contributing to the attack All pulled together in one offence which is detected and raised immediately to the security team 26 © 2012 IBM Corporation
27.
IBM Security Systems
Total Security Intelligence: How do we address the challenges? Reduce Big Data Detect Advanced Persistent Threats Predict attacks Manage risk 27 © 2012 IBM Corporation
28.
IBM Security Systems Managing
risk CISOs know it’s not if, it’s when they get hacked; yet there is still a gap in ability to detect breach. Breaches are taking longer to discover Breaches are not being discovered internally 28Charts from Verizon 2011 Investigative Response Caseload Review © 2012 IBM Corporation
29.
IBM Security Systems
How it looks in QRadar Potential Data Loss? Who? What? Where? Who? An internal user What? Oracle data Where? Gmail 29 © 2012 IBM Corporation
30.
IBM Security Systems
QRadar: The Most Intelligent, Integrated, Automated Security Intelligence Platform • Proactive threat management • Identifies most critical anomalies • Rapid, complete impact analysis • Eliminates silos • Easy deployment • Highly scalable • Rapid time to value • Flexible, future-proof • Operational efficiency 30 © 2012 IBM Corporation
31.
IBM Security Systems
What to do next? Visit our stand Download the Gartner SIEM Critical Capabilities Report http://q1labs.com/resource-center/analyst-reports/details.aspx?id=151 Read our blog http://blog.q1labs.com/ Follow us on Twitter: @q1labs @ibmsecurity 31 © 2012 IBM Corporation
32.
IBM Security Systems
ibm.com/security © Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will 32 necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT © 2012 IBM Corporation WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
Descargar ahora