29
IBM Cybersecurity Securing IBM with Innovation Shamla Naidoo VP Managing Partner, IBM Security Former Global CISO, IBM [email protected]

Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

  • Upload
    others

  • View
    18

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM CybersecurityIBM Cybersecurity

Securing IBM with Innovation

Shamla NaidooVP Managing Partner, IBM SecurityFormer Global CISO, [email protected]

Page 2: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

Risk is Existential and Multi-dimensional

@ 2017 IBM Corporation

TechnologyEnvironment

Demographics

Legal/Regulatory

Political

Economy

Geographical

RISK

Page 3: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM CybersecurityIBM SecurityIBM CybersecurityIBM CybersecurityIBM Cybersecurity3

Security Challengesin a hyper connected world

Disappearing boundaries between enterprise and rest of the world

Technology Evolution, specifically Cloud, IoT, and Artificial Intelligence

Data, the most important asset to protect

Criminal Hackers, smart and well funded

Page 4: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

Risk Management is a board room discussion, and business leaders are more accountable than ever before

Page 5: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM Cybersecurity

80% of the worlds data has been invisible. Until now.”

Page 6: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

How Artificial Intelligence (AI) can help Cybersecurity?

Page 7: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM CybersecurityIBM Cybersecurity7

AI – The History

Page 8: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM CybersecurityIBM Cybersecurity8

AI – The Present & Future

Page 9: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

How AI Works

Page 10: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM CybersecurityIBM Cybersecurity10

Machine Learning

Page 11: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM CybersecurityIBM Cybersecurity11

Machine Learning

Page 12: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM CybersecurityIBM Cybersecurity12

Machine Learning

Page 13: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM CybersecurityIBM Cybersecurity13

What is this object?

Page 14: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM CybersecurityIBM Cybersecurity14

Page 15: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM CybersecurityIBM Cybersecurity15

How AI Works

Learn Reason Augment

Page 16: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

© 2018 IBM Corporation16

Page 17: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

Why is AI important to me in my role?

Page 18: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM CybersecurityIBM SecurityIBM CybersecurityIBM CybersecurityIBM Cybersecurity18

Security ChallengesWhy it’s important to a CISO

Disappearing boundaries

Technology Evolution

Data

Criminal Hackers

Page 19: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity19

“The number of unfilled information security positions around the world is

estimated at 208,000 and is expected to grow to 3-4 Million in next few years.”

Page 20: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

© 2018 IBM Corporation20

IBM Watson

AI & Cybersecuritya perfect marriage

Page 21: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity21

Page 22: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

How?

Page 23: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM CybersecurityIBM SecurityIBM CybersecurityIBM CybersecurityIBM Cybersecurity23

THREAT INTELLIGENCE

DATA

IDENTITY & ACCESS

MOBILEADVANCEDFRAUD DETECTION

APPS

ENDPOINT NETWORK

SECURITYORCHESTRATION

& ANALYTICS

Security Governancebuild a robust immune system

Page 24: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM CybersecurityIBM SecurityIBM CybersecurityIBM CybersecurityIBM Cybersecurity24

Detect & Respond Faster

Log Events

Potential attacks

Confirmed attacks

Incidents

Noteworthy Incidents

IBM

To

ols

(Q

rad

ar,

Wat

son

)M

anu

al

valid

atio

n

x trillion

xxxx

yyy

zz

a

x trillion

xxxx

yyy

zz

a4Q18 1Q19

Security Operations Center (SOC)▪ 24x7 monitoring enables us to proactively detect the attacks▪ SOC data informs our ability to take preventative actions in future

Observation▪ IBM Watson for cyber is helping to reduce the time it takes to detect issues and respond

Page 25: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity25

Page 26: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

5 Ways AI Can Improve Cybersecurity

Page 27: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity27

5 Ways AI Can Improve Cybersecurity

Page 28: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

AI Risks & Criticisms

Page 29: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY

IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity29

Be Aware that