Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE...

Preview:

Citation preview

IBM CybersecurityIBM Cybersecurity

Securing IBM with Innovation

Shamla NaidooVP Managing Partner, IBM SecurityFormer Global CISO, IBMShamla@us.ibm.com

Risk is Existential and Multi-dimensional

@ 2017 IBM Corporation

TechnologyEnvironment

Demographics

Legal/Regulatory

Political

Economy

Geographical

RISK

IBM CybersecurityIBM SecurityIBM CybersecurityIBM CybersecurityIBM Cybersecurity3

Security Challengesin a hyper connected world

Disappearing boundaries between enterprise and rest of the world

Technology Evolution, specifically Cloud, IoT, and Artificial Intelligence

Data, the most important asset to protect

Criminal Hackers, smart and well funded

Risk Management is a board room discussion, and business leaders are more accountable than ever before

IBM Cybersecurity

80% of the worlds data has been invisible. Until now.”

How Artificial Intelligence (AI) can help Cybersecurity?

IBM CybersecurityIBM Cybersecurity7

AI – The History

IBM CybersecurityIBM Cybersecurity8

AI – The Present & Future

How AI Works

IBM CybersecurityIBM Cybersecurity10

Machine Learning

IBM CybersecurityIBM Cybersecurity11

Machine Learning

IBM CybersecurityIBM Cybersecurity12

Machine Learning

IBM CybersecurityIBM Cybersecurity13

What is this object?

IBM CybersecurityIBM Cybersecurity14

IBM CybersecurityIBM Cybersecurity15

How AI Works

Learn Reason Augment

© 2018 IBM Corporation16

Why is AI important to me in my role?

IBM CybersecurityIBM SecurityIBM CybersecurityIBM CybersecurityIBM Cybersecurity18

Security ChallengesWhy it’s important to a CISO

Disappearing boundaries

Technology Evolution

Data

Criminal Hackers

IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity19

“The number of unfilled information security positions around the world is

estimated at 208,000 and is expected to grow to 3-4 Million in next few years.”

© 2018 IBM Corporation20

IBM Watson

AI & Cybersecuritya perfect marriage

IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity21

How?

IBM CybersecurityIBM SecurityIBM CybersecurityIBM CybersecurityIBM Cybersecurity23

THREAT INTELLIGENCE

DATA

IDENTITY & ACCESS

MOBILEADVANCEDFRAUD DETECTION

APPS

ENDPOINT NETWORK

SECURITYORCHESTRATION

& ANALYTICS

Security Governancebuild a robust immune system

IBM CybersecurityIBM SecurityIBM CybersecurityIBM CybersecurityIBM Cybersecurity24

Detect & Respond Faster

Log Events

Potential attacks

Confirmed attacks

Incidents

Noteworthy Incidents

IBM

To

ols

(Q

rad

ar,

Wat

son

)M

anu

al

valid

atio

n

x trillion

xxxx

yyy

zz

a

x trillion

xxxx

yyy

zz

a4Q18 1Q19

Security Operations Center (SOC)▪ 24x7 monitoring enables us to proactively detect the attacks▪ SOC data informs our ability to take preventative actions in future

Observation▪ IBM Watson for cyber is helping to reduce the time it takes to detect issues and respond

IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity25

5 Ways AI Can Improve Cybersecurity

IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity27

5 Ways AI Can Improve Cybersecurity

AI Risks & Criticisms

IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity29

Be Aware that

Recommended