SlideShare una empresa de Scribd logo
© 2015 IBM Corporation
Smarter Cyber Security
V8; 5 Jan 15
John Palfreyman, IBM
© 2015 IBM Corporation
Agenda
2
Systems of
Engagement
Cyber Security
Implications
Cyber Security Risk
Mitigation
Future Perspective
© 2015 IBM Corporation
Smarter Planet
3
Instrumented – Interconnected - Intelligent
© 2015 IBM Corporation
Cloud
Drivers
 Mission speed and agility
 New business models – alternatives to escalating CAPEX
Sample Use Cases
 Back office functions (HR, CRM, SCM) as a service
 Predictive and analytics functions (e.g. for smart procurement) as a service
4
© 2015 IBM Corporation
Mobile
Drivers
 Inherently mobile operations
 Business agility and flexibility
 Rate of change of technology
Sample Use Cases
 Mobile information capture, with
workflow management
 Education where & when needed
 Case advice to social workers
5
© 2015 IBM Corporation
Big Data / Analytics
Drivers
 Masses of sensor data available
 Need for intelligence to help
make government / industry
“smarter”
 Increasing proportion of
“unreliable” data
Sample Use Cases
 Analysis of citizen group
sentiment & need based on their
Social Media usage
 Sensor data processing for traffic
& utility prediction
 Predictive policing operations
based on historical mission data
analysis & sensor data
6
© 2015 IBM Corporation
Social Business
Drivers
 Use of Social Channels by
clients / citizens / bad guys
 New recruitment approach –
drive to attract “the best!”
 Personnel rotation &
retirement
Sample Use Cases
 Citizen (/consumer) sentiment
analysis
 Terrorism detection,
investigation & prevention
 Knowledge capture and
dissemination
 Recruitment, rapid onboarding
& retention of key staff
7
© 2015 IBM Corporation
Systems of Engagement
8
 Collaborative
 Interaction oriented
 User centric
 Unpredictable
 Dynamic
Social
Business
Mobile
Big Data /
Analytics
Cloud
© 2015 IBM Corporation
Case Study – Major European Air Force
Business Challenge
• Support Organisational Transformation
• HQ Task Distribution
• Senior Staff demanding Mobile Access
IBM Solution
• IBM Connections (including Mobile App)
• MS Sharepoint Integration (Doc
Management)
• MaaS 360 based Tablet Security
Benefits
• Improved work efficiency
• Consistent & timely information access
• Secure MODERN tablet
9
© 2015 IBM Corporation
Section Summary
10
1. Cloud, Big Data / Analytics, Social Business & Mobile are all relevant
to, and increasingly used by Industry & Government
2. Most value accrues at the points of intersection = Systems of
Engagement
3. Systems of Engagement can underpin organisational transformation,
enhancing intelligence-led business
© 2015 IBM Corporation
Agenda
11
Systems of
Engagement
Cyber Security
Implications
Cyber Security Risk
Mitigation
Future Perspective
© 2015 IBM Corporation
IBM’s Definition . . .
Cyber Security /–n 1. the protection of an
organisation and its assets from electronic attack
to minimise the risk of business disruption.
12
© 2015 IBM Corporation
The Millennial Generation . . .
13
Expect:
 to embrace technology for
improved productivity and
simplicity in their personal lives
 tools that seem
made for and by them
 freedom of choice, embracing
change and innovation
Innovate in a new way:
 Actively involve a large user
population
 Work at Internet Scale and Speed
 Discover the points of value via
iteration
 Engage the Millennial generation
© 2015 IBM Corporation
Smart Phones (& Tablets) . . .
14
 Used in the same way as a personal computer
 Ever increasing functionality (app store culture) . . .
 . . . and more accessible architectures
 Offer “anywhere” banking, social media, e-mail . . .
 Include non-PC (!) features Context, MMS, TXT
 Emergence of authentication devices
© 2015 IBM Corporation
. . . are harder to defend . . .
15
 Anti-virus software missing, or
inadequate
 Encryption / decryption drains the
battery
 Battery life is always a challenge
 Most users disable security features
 Stolen or “found” devices information
– and very easy to loose
 Malware, mobile spyware, account
impersonation
 Need to extend password, encryption
policies
 Extends set of attack vectors
© 2015 IBM Corporation
. . . and now mainstream.
16
 Bring-your-own device
expected
 Securing corporate data
 Additional complexities
 Purpose-specific endpoints
 Device Management
© 2015 IBM Corporation
Social Media – Lifestyle Centric Computing
17 www.theconversationprism.com
Different Channels
Web centric
Conversational
Personal
Open
Explosive growth
© 2015 IBM Corporation
Social Business – Relevance for (e.g) Defence
18
Driver How social business can help . . .
Coalition operations the
norm
Find and connect with experts other coalition members
Demonstrate clear coalition value to stakeholders
Budgetary pressures Improved efficiencies through use of social media
platform
Develop critical skills by virtual training
Ever more complex
missions
Tap into mission expertise and lessons learnt
Use jams, blogs & wikis to solve problems
Cyber security threat Secure hosted social media platform
Analysis of threat social media activity
Technology driven
change
Promote technology usage through blogs, jams
Information & education on mission value of technology
Unknown asymmetric
threat
Supplement intelligence on threat by monitoring social
media usage
Collaborate cross department on specific threats
© 2015 IBM Corporation
Internal Amnesia, External Ignorance – Case Study
19
Client’s Challenges
• Silo’d Organisation
• Lack of Consistent Methodology
• External Ignorance
• Internal Amnesia
Monitor bad guys
• Early Warning of events / incident
• Information to Commander
Alternatives to
• Workflow Centric Analysis
• Traditional Intelligence Sources
IBM Solution
• IBM Connections
• Analysis Software
• GBS Integration & Configuration
© 2015 IBM Corporation
Social Media - Special Security Challenges
 Too much information
 Online impersonation
 Trust / Social
Engineering / PSYOP
 Targeting
20
Source: Digital Shadows, Sophos, Facebook
© 2015 IBM Corporation
Section Summary
21
1. Social Business and Mobile are underpinning organisational
transformation
2. Millennial Generation expect technologies in the workplace
3. Introduce new vulnerabilities – understand to contain
© 2015 IBM Corporation
Agenda
22
Systems of
Engagement
Cyber Security
Implications
Cyber Security Risk
Mitigation
Future Perspective
© 2015 IBM Corporation
Balance
Technical Mitigation
 Better firewalls
 Improved anti-virus
 Advanced Crypto
23
People Mitigation
 Leadership
 Education
 Culture
 Process
© 2015 IBM Corporation
Risk Management Approach
24
 Monitor threats
 Understand (your) systems
 Assess Impact & Probability
 Design containment mechanisms
 Don’t expect perfect defences
 Containment & quarantine planning
 Learn & improve
Maturity-based approach
Proactive
AutomatedManual
Reactive
© 2015 IBM Corporation
Securing a Mobile Device
Device Security
• Enrolment & access control
• Security Policy enforcement
• Secure data container
• Remote wipe
Transaction Security
• Allow transactions on individual basis
• Device monitoring & event detection
• Sever based risk engine – allow,
restrict, flag for review
Software & Application
• Endpoint management – software
• Application: secure by design
• Application scanning for vulnerabilities
Access Control
• Enforce access policies
• Approved devices and users
• Context aware authorisation
25
© 2015 IBM Corporation
Secure, Social Business
26
Leadership
• More senior, most impact
• Important to leader, important to all
• Setting “tone” for culture
Culture
• Everyone knows importance AND risk
• Full but SAFEusage
• Mentoring
Process
• What’s allowed, what’s not
• Internal & external usage
• Smart, real time black listing
Education
• Online education (benefits, risks)
• Annual recertification
• For all, at all levels
© 2015 IBM Corporation
Security Intelligence > Smart Analysis of too much data!
* Truthfulness, accuracy or precision, correctness
Volume Velocity Veracity*Variety
Data at Rest
Terabytes to
exabytes of
existing data to
process
Data in Motion
Streaming data,
milliseconds to
seconds to
respond
Data in Many
Forms
Structured,
unstructured, text,
multimedia
Data in Doubt
Uncertainty due to
data inconsistency
& incompleteness,
ambiguities, latency,
deception, model
approximations
© 2015 IBM Corporation
Data ingest
Insights
IBM Security QRadar
• Hadoop-based
• Enterprise-grade
• Any data / volume
• Data mining
• Ad hoc analytics
• Data collection and
enrichment
• Event correlation
• Real-time analytics
• Offense prioritization
Big Data Platform
Custom AnalyticsAdvanced Threat Detection
Traditional data sources
IBM InfoSphere BigInsights
Non-traditional
Security Intelligence Platform
Integrated Approach
© 2015 IBM Corporation
Section Summary
29
1. Containment is possible with correct approach
2. Need for a business / mission based (not technology) viewpoint
3. Holistic, balanced, risk centric approach
© 2015 IBM Corporation
Agenda
30
Systems of
Engagement
Cyber Security
Implications
Cyber Security Risk
Mitigation
Future Perspective
© 2015 IBM Corporation
Systems of Insight
31
© 2015 IBM Corporation
Generation 3 Cloud Challenges . . .
32
Static,
Perimeter
Controls
Cloud 1.0 Cloud 2.0
Cloud 3.0
Static
Perimeter
controls
Reactive,
Defence
in Depth
Adaptive,
Contextual
Security
Attackers
exploit platform
shifts to launch
new attacks on
high value
workloads and
data
Challenge 1 Challenge 2 Challenge 3
Fragmented and
complex security
controls
Sophisticated
threats and
attackers
Increased attack
surface due to agile
and composable
systems
© 2015 IBM Corporation
Contextual, Adaptive Security
33
Monitor
and Distill
Correlate
and Predict
Adapt and
Pre-empt
Security
3.0
Risk Prediction and
Defence Planning
Encompassing event
correlation, risk prediction,
business impact
assessment and defensive
strategy formulation
Multi-level monitoring &
big data analytics
Ranging from Active, in
device to passive monitoring
Adaptive and
optimized response
Adapt network architecture, access
protocols / privileges to maximize attacker
workload
© 2014 IBM Corporation
Cyber Security – Fitness for Purpose?
1. Are you ready to respond to a security incident and
quickly remediate?
2. Do you have the visibility and analytics needed to
monitor threats?
3. Do you know where your corporate crown jewels are
and are they adequately protected?
4. Can you manage your endpoints from servers to
mobile devices and control network access?
5. Do you build security in and continuously test all
critical web/mobile applications?
6. Can you automatically manage and limit the
identities and access of your employees, partners
and vendors to your enterprise?
7. Do you have a risk aware culture and management
system that can ensure compliance?
34
Maturity-based approach
Proactive
AutomatedManual
Reactive
© 2014 IBM Corporation
Section Summary
35
1. Systems of Insight further extend business / mission value
2. Delivered on (secure) “generation 3” Cloud
3. Cyber Security must be designed in, evolving
© 2014 IBM Corporation
Summary
36
1. Systems of Engagement (& Insight) help organisations transform,
maintain information advantage
2. Social Business & Mobile drive much value, but new vulnerabilities
need to be understood to be mitigated
3. Cyber security approach needs to be balanced, risk management
based and “designed in”.
© 2014 IBM Corporation
Thanks!
John Palfreyman
2dsegma@uk.ibm.com

Más contenido relacionado

La actualidad más candente

Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
IBM Security
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
Sonny Hashmi
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions Roadmap
IBM Security
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
IBM Security
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
IBM Security
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
IBM Sverige
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
Information Security Awareness Group
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
IBM Security
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
IBM Security
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
infra-si
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
Murray Security Services
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
IBM Security
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
Iqra khalil
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
AGILLY
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
IBM Security
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and Reputation
IBM Security
 
Hp It Performance Suite Customer Presentation
Hp It Performance Suite Customer PresentationHp It Performance Suite Customer Presentation
Hp It Performance Suite Customer Presentation
esbosman
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
Chris Pepin
 

La actualidad más candente (20)

Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions Roadmap
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and Reputation
 
Hp It Performance Suite Customer Presentation
Hp It Performance Suite Customer PresentationHp It Performance Suite Customer Presentation
Hp It Performance Suite Customer Presentation
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 

Destacado

Are you putting your organization at risk?
Are you putting your organization at risk?Are you putting your organization at risk?
Are you putting your organization at risk?
Panaya
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
aletarw
 
Clearance barriers to Cyber Security Profession
Clearance barriers to Cyber Security ProfessionClearance barriers to Cyber Security Profession
Clearance barriers to Cyber Security Profession
aletarw
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Kyle Lai
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
Dr. Amitabha Yadav
 
NIST Cybersecurity Framework Background and Review | Jack Whitsitt
NIST Cybersecurity Framework Background and Review | Jack WhitsittNIST Cybersecurity Framework Background and Review | Jack Whitsitt
NIST Cybersecurity Framework Background and Review | Jack Whitsitt
Jack Whitsitt
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
Rainer Mueller
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
WAJAHAT IQBAL
 
SANT ENGINEERING COMPANY
SANT ENGINEERING COMPANYSANT ENGINEERING COMPANY
SANT ENGINEERING COMPANY
Sant Engineering Company
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Tsenn13
 
Maria Grazia Maffucci - relazione di basi di dati
Maria Grazia Maffucci - relazione di basi di datiMaria Grazia Maffucci - relazione di basi di dati
Maria Grazia Maffucci - relazione di basi di datiMaria Grazia Maffucci
 
SITE-rminology
SITE-rminologySITE-rminology
SITE-rminology
Keanna Rae Mejia
 
Quartz component
Quartz componentQuartz component
Quartz component
Durga Prasad Kakarla
 
Slideshare TP
Slideshare TPSlideshare TP
Slideshare TP
DanishaAmrina
 
Idea presentation for economics
Idea presentation for economics Idea presentation for economics
Idea presentation for economics
BritneyBondin
 
Jf bton-sm
Jf bton-smJf bton-sm
Jf bton-sm
Krystian Szastok
 
Internet Then and Now
Internet Then and NowInternet Then and Now
Internet Then and Now
Keanna Rae Mejia
 
Health Total
Health TotalHealth Total
Health Total
AlisiaG
 
In fowmashon william shakespear and romeo and juleyet
In fowmashon william shakespear and romeo and juleyetIn fowmashon william shakespear and romeo and juleyet
In fowmashon william shakespear and romeo and juleyet
James D'Arcy
 
オールフェスタ Git勉強会資料 (public)
オールフェスタ Git勉強会資料 (public)オールフェスタ Git勉強会資料 (public)
オールフェスタ Git勉強会資料 (public)
Shunsuke Tadokoro
 

Destacado (20)

Are you putting your organization at risk?
Are you putting your organization at risk?Are you putting your organization at risk?
Are you putting your organization at risk?
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
Clearance barriers to Cyber Security Profession
Clearance barriers to Cyber Security ProfessionClearance barriers to Cyber Security Profession
Clearance barriers to Cyber Security Profession
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
NIST Cybersecurity Framework Background and Review | Jack Whitsitt
NIST Cybersecurity Framework Background and Review | Jack WhitsittNIST Cybersecurity Framework Background and Review | Jack Whitsitt
NIST Cybersecurity Framework Background and Review | Jack Whitsitt
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 
SANT ENGINEERING COMPANY
SANT ENGINEERING COMPANYSANT ENGINEERING COMPANY
SANT ENGINEERING COMPANY
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Maria Grazia Maffucci - relazione di basi di dati
Maria Grazia Maffucci - relazione di basi di datiMaria Grazia Maffucci - relazione di basi di dati
Maria Grazia Maffucci - relazione di basi di dati
 
SITE-rminology
SITE-rminologySITE-rminology
SITE-rminology
 
Quartz component
Quartz componentQuartz component
Quartz component
 
Slideshare TP
Slideshare TPSlideshare TP
Slideshare TP
 
Idea presentation for economics
Idea presentation for economics Idea presentation for economics
Idea presentation for economics
 
Jf bton-sm
Jf bton-smJf bton-sm
Jf bton-sm
 
Internet Then and Now
Internet Then and NowInternet Then and Now
Internet Then and Now
 
Health Total
Health TotalHealth Total
Health Total
 
In fowmashon william shakespear and romeo and juleyet
In fowmashon william shakespear and romeo and juleyetIn fowmashon william shakespear and romeo and juleyet
In fowmashon william shakespear and romeo and juleyet
 
オールフェスタ Git勉強会資料 (public)
オールフェスタ Git勉強会資料 (public)オールフェスタ Git勉強会資料 (public)
オールフェスタ Git勉強会資料 (public)
 

Similar a Smarter cyber security v8

Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of Engagement
John Palfreyman
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
John Palfreyman
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
IBM Sverige
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
John Palfreyman
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
IBM Sverige
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
IBM Security
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
Sarah Freemantle
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
IBM Security
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
Chris Pepin
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM Security
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
IBM Security
 
20150702 - Strategy and Business Value for connected appliances public version
20150702 - Strategy and Business Value for connected appliances public version20150702 - Strategy and Business Value for connected appliances public version
20150702 - Strategy and Business Value for connected appliances public version
Thorsten Schroeer
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
IBM Security
 
Smarter Cyber Security
Smarter Cyber SecuritySmarter Cyber Security
Smarter Cyber Security
John Palfreyman
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
AGILLY
 
01 big dataoverview
01 big dataoverview01 big dataoverview
The nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsThe nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data Analytics
E-Government Center Moldova
 

Similar a Smarter cyber security v8 (20)

Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of Engagement
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
20150702 - Strategy and Business Value for connected appliances public version
20150702 - Strategy and Business Value for connected appliances public version20150702 - Strategy and Business Value for connected appliances public version
20150702 - Strategy and Business Value for connected appliances public version
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
 
Smarter Cyber Security
Smarter Cyber SecuritySmarter Cyber Security
Smarter Cyber Security
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
 
01 big dataoverview
01 big dataoverview01 big dataoverview
01 big dataoverview
 
The nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsThe nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data Analytics
 

Último

WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 

Último (20)

WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 

Smarter cyber security v8

  • 1. © 2015 IBM Corporation Smarter Cyber Security V8; 5 Jan 15 John Palfreyman, IBM
  • 2. © 2015 IBM Corporation Agenda 2 Systems of Engagement Cyber Security Implications Cyber Security Risk Mitigation Future Perspective
  • 3. © 2015 IBM Corporation Smarter Planet 3 Instrumented – Interconnected - Intelligent
  • 4. © 2015 IBM Corporation Cloud Drivers  Mission speed and agility  New business models – alternatives to escalating CAPEX Sample Use Cases  Back office functions (HR, CRM, SCM) as a service  Predictive and analytics functions (e.g. for smart procurement) as a service 4
  • 5. © 2015 IBM Corporation Mobile Drivers  Inherently mobile operations  Business agility and flexibility  Rate of change of technology Sample Use Cases  Mobile information capture, with workflow management  Education where & when needed  Case advice to social workers 5
  • 6. © 2015 IBM Corporation Big Data / Analytics Drivers  Masses of sensor data available  Need for intelligence to help make government / industry “smarter”  Increasing proportion of “unreliable” data Sample Use Cases  Analysis of citizen group sentiment & need based on their Social Media usage  Sensor data processing for traffic & utility prediction  Predictive policing operations based on historical mission data analysis & sensor data 6
  • 7. © 2015 IBM Corporation Social Business Drivers  Use of Social Channels by clients / citizens / bad guys  New recruitment approach – drive to attract “the best!”  Personnel rotation & retirement Sample Use Cases  Citizen (/consumer) sentiment analysis  Terrorism detection, investigation & prevention  Knowledge capture and dissemination  Recruitment, rapid onboarding & retention of key staff 7
  • 8. © 2015 IBM Corporation Systems of Engagement 8  Collaborative  Interaction oriented  User centric  Unpredictable  Dynamic Social Business Mobile Big Data / Analytics Cloud
  • 9. © 2015 IBM Corporation Case Study – Major European Air Force Business Challenge • Support Organisational Transformation • HQ Task Distribution • Senior Staff demanding Mobile Access IBM Solution • IBM Connections (including Mobile App) • MS Sharepoint Integration (Doc Management) • MaaS 360 based Tablet Security Benefits • Improved work efficiency • Consistent & timely information access • Secure MODERN tablet 9
  • 10. © 2015 IBM Corporation Section Summary 10 1. Cloud, Big Data / Analytics, Social Business & Mobile are all relevant to, and increasingly used by Industry & Government 2. Most value accrues at the points of intersection = Systems of Engagement 3. Systems of Engagement can underpin organisational transformation, enhancing intelligence-led business
  • 11. © 2015 IBM Corporation Agenda 11 Systems of Engagement Cyber Security Implications Cyber Security Risk Mitigation Future Perspective
  • 12. © 2015 IBM Corporation IBM’s Definition . . . Cyber Security /–n 1. the protection of an organisation and its assets from electronic attack to minimise the risk of business disruption. 12
  • 13. © 2015 IBM Corporation The Millennial Generation . . . 13 Expect:  to embrace technology for improved productivity and simplicity in their personal lives  tools that seem made for and by them  freedom of choice, embracing change and innovation Innovate in a new way:  Actively involve a large user population  Work at Internet Scale and Speed  Discover the points of value via iteration  Engage the Millennial generation
  • 14. © 2015 IBM Corporation Smart Phones (& Tablets) . . . 14  Used in the same way as a personal computer  Ever increasing functionality (app store culture) . . .  . . . and more accessible architectures  Offer “anywhere” banking, social media, e-mail . . .  Include non-PC (!) features Context, MMS, TXT  Emergence of authentication devices
  • 15. © 2015 IBM Corporation . . . are harder to defend . . . 15  Anti-virus software missing, or inadequate  Encryption / decryption drains the battery  Battery life is always a challenge  Most users disable security features  Stolen or “found” devices information – and very easy to loose  Malware, mobile spyware, account impersonation  Need to extend password, encryption policies  Extends set of attack vectors
  • 16. © 2015 IBM Corporation . . . and now mainstream. 16  Bring-your-own device expected  Securing corporate data  Additional complexities  Purpose-specific endpoints  Device Management
  • 17. © 2015 IBM Corporation Social Media – Lifestyle Centric Computing 17 www.theconversationprism.com Different Channels Web centric Conversational Personal Open Explosive growth
  • 18. © 2015 IBM Corporation Social Business – Relevance for (e.g) Defence 18 Driver How social business can help . . . Coalition operations the norm Find and connect with experts other coalition members Demonstrate clear coalition value to stakeholders Budgetary pressures Improved efficiencies through use of social media platform Develop critical skills by virtual training Ever more complex missions Tap into mission expertise and lessons learnt Use jams, blogs & wikis to solve problems Cyber security threat Secure hosted social media platform Analysis of threat social media activity Technology driven change Promote technology usage through blogs, jams Information & education on mission value of technology Unknown asymmetric threat Supplement intelligence on threat by monitoring social media usage Collaborate cross department on specific threats
  • 19. © 2015 IBM Corporation Internal Amnesia, External Ignorance – Case Study 19 Client’s Challenges • Silo’d Organisation • Lack of Consistent Methodology • External Ignorance • Internal Amnesia Monitor bad guys • Early Warning of events / incident • Information to Commander Alternatives to • Workflow Centric Analysis • Traditional Intelligence Sources IBM Solution • IBM Connections • Analysis Software • GBS Integration & Configuration
  • 20. © 2015 IBM Corporation Social Media - Special Security Challenges  Too much information  Online impersonation  Trust / Social Engineering / PSYOP  Targeting 20 Source: Digital Shadows, Sophos, Facebook
  • 21. © 2015 IBM Corporation Section Summary 21 1. Social Business and Mobile are underpinning organisational transformation 2. Millennial Generation expect technologies in the workplace 3. Introduce new vulnerabilities – understand to contain
  • 22. © 2015 IBM Corporation Agenda 22 Systems of Engagement Cyber Security Implications Cyber Security Risk Mitigation Future Perspective
  • 23. © 2015 IBM Corporation Balance Technical Mitigation  Better firewalls  Improved anti-virus  Advanced Crypto 23 People Mitigation  Leadership  Education  Culture  Process
  • 24. © 2015 IBM Corporation Risk Management Approach 24  Monitor threats  Understand (your) systems  Assess Impact & Probability  Design containment mechanisms  Don’t expect perfect defences  Containment & quarantine planning  Learn & improve Maturity-based approach Proactive AutomatedManual Reactive
  • 25. © 2015 IBM Corporation Securing a Mobile Device Device Security • Enrolment & access control • Security Policy enforcement • Secure data container • Remote wipe Transaction Security • Allow transactions on individual basis • Device monitoring & event detection • Sever based risk engine – allow, restrict, flag for review Software & Application • Endpoint management – software • Application: secure by design • Application scanning for vulnerabilities Access Control • Enforce access policies • Approved devices and users • Context aware authorisation 25
  • 26. © 2015 IBM Corporation Secure, Social Business 26 Leadership • More senior, most impact • Important to leader, important to all • Setting “tone” for culture Culture • Everyone knows importance AND risk • Full but SAFEusage • Mentoring Process • What’s allowed, what’s not • Internal & external usage • Smart, real time black listing Education • Online education (benefits, risks) • Annual recertification • For all, at all levels
  • 27. © 2015 IBM Corporation Security Intelligence > Smart Analysis of too much data! * Truthfulness, accuracy or precision, correctness Volume Velocity Veracity*Variety Data at Rest Terabytes to exabytes of existing data to process Data in Motion Streaming data, milliseconds to seconds to respond Data in Many Forms Structured, unstructured, text, multimedia Data in Doubt Uncertainty due to data inconsistency & incompleteness, ambiguities, latency, deception, model approximations
  • 28. © 2015 IBM Corporation Data ingest Insights IBM Security QRadar • Hadoop-based • Enterprise-grade • Any data / volume • Data mining • Ad hoc analytics • Data collection and enrichment • Event correlation • Real-time analytics • Offense prioritization Big Data Platform Custom AnalyticsAdvanced Threat Detection Traditional data sources IBM InfoSphere BigInsights Non-traditional Security Intelligence Platform Integrated Approach
  • 29. © 2015 IBM Corporation Section Summary 29 1. Containment is possible with correct approach 2. Need for a business / mission based (not technology) viewpoint 3. Holistic, balanced, risk centric approach
  • 30. © 2015 IBM Corporation Agenda 30 Systems of Engagement Cyber Security Implications Cyber Security Risk Mitigation Future Perspective
  • 31. © 2015 IBM Corporation Systems of Insight 31
  • 32. © 2015 IBM Corporation Generation 3 Cloud Challenges . . . 32 Static, Perimeter Controls Cloud 1.0 Cloud 2.0 Cloud 3.0 Static Perimeter controls Reactive, Defence in Depth Adaptive, Contextual Security Attackers exploit platform shifts to launch new attacks on high value workloads and data Challenge 1 Challenge 2 Challenge 3 Fragmented and complex security controls Sophisticated threats and attackers Increased attack surface due to agile and composable systems
  • 33. © 2015 IBM Corporation Contextual, Adaptive Security 33 Monitor and Distill Correlate and Predict Adapt and Pre-empt Security 3.0 Risk Prediction and Defence Planning Encompassing event correlation, risk prediction, business impact assessment and defensive strategy formulation Multi-level monitoring & big data analytics Ranging from Active, in device to passive monitoring Adaptive and optimized response Adapt network architecture, access protocols / privileges to maximize attacker workload
  • 34. © 2014 IBM Corporation Cyber Security – Fitness for Purpose? 1. Are you ready to respond to a security incident and quickly remediate? 2. Do you have the visibility and analytics needed to monitor threats? 3. Do you know where your corporate crown jewels are and are they adequately protected? 4. Can you manage your endpoints from servers to mobile devices and control network access? 5. Do you build security in and continuously test all critical web/mobile applications? 6. Can you automatically manage and limit the identities and access of your employees, partners and vendors to your enterprise? 7. Do you have a risk aware culture and management system that can ensure compliance? 34 Maturity-based approach Proactive AutomatedManual Reactive
  • 35. © 2014 IBM Corporation Section Summary 35 1. Systems of Insight further extend business / mission value 2. Delivered on (secure) “generation 3” Cloud 3. Cyber Security must be designed in, evolving
  • 36. © 2014 IBM Corporation Summary 36 1. Systems of Engagement (& Insight) help organisations transform, maintain information advantage 2. Social Business & Mobile drive much value, but new vulnerabilities need to be understood to be mitigated 3. Cyber security approach needs to be balanced, risk management based and “designed in”.
  • 37. © 2014 IBM Corporation Thanks! John Palfreyman 2dsegma@uk.ibm.com

Notas del editor

  1. Cyber Security = lack of clarity : hence definition BUSINESS RISK centric definition MINIMISE key (never assume perfect) Open for debate!