1
“When you put people together with bits and bytes, you have to have something that is collectively smarter than any individual to help defend against cyber crime.” Morgan Wright Principal and Owner, Morgan Wright LLC “Convenience is the reason most cyber security breaches occur. There’s no such thing as secure single factor login.” Shahid Shah CEO of Netspective Communications “What is changing security? Collaboration, cloud and cognitive.” Marc van Zadelhoff General Manager, IBM Security “With cognitive security, we teach Watson the language of security, which enables us to marry unstructured data with human understanding.” Jeb Linton Watson Chief Security Architect, STSM, IBM Watson “Ethical hackers need to do more knowledge sharing.” Shahid Shah CEO of Netspective Communications “The way IBM looks at security is the same as our bodies—it needs to work like an immune system of coordinated abilities.” Patrick Vandenberg Program Director, IBM Security Segment Marketing “Multisource intelligence needs to be a key part of our protection strategy.” Mike Kehoe WW Commercial Sales Lead i2 Enterprise Insight Analysis “Advanced threats are a human-led threat. We need to enable humans on the defender’s side to better understand and detect these threats.” Bob Stasio World Wide Senior Product Manager, i2 Enterprise Insight Analysis “Cyber criminals lead the way with collaboration. They share just about everything.” Christopher Meenan Director, QRadar Product Management and Strategy “We don’t want it to be that every time there is a little bit of rain there is a massive problem. We need to do the basics: patch things appropriately, passwords, two factor and so on.” Tyler Carbone COO of Terbium Labs Quotes about humans’ role in data breaches from threat to defender The Human Side of Cyber Security Maximize human collaboration Minimize human threat Augment human intelligence ibm.co/cyberthreatanalysis From human error to criminal ingenuity, the human element increases the complexity of cyberthreats. Learn how you can leverage advanced analytics and cognitive computing to help mitigate threats.

The Human Side of Cyber Security · 2/3/2017  · Watson Chief Security Architect, STSM, IBM Watson “Ethical hackers need to do more knowledge sharing.” Shahid Shah CEO of Netspective

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Human Side of Cyber Security · 2/3/2017  · Watson Chief Security Architect, STSM, IBM Watson “Ethical hackers need to do more knowledge sharing.” Shahid Shah CEO of Netspective

“When you put people together with bits and bytes, you have to have something that is collectively smarter than any individual to help defend against cyber crime.”

Morgan WrightPrincipal and Owner, Morgan Wright LLC

“Convenience is the reason most cyber security breaches occur. There’s no such thing as secure single factor login.”

Shahid ShahCEO of Netspective Communications

“What is changing security? Collaboration, cloud and cognitive.”

Marc van Zadelhoff General Manager, IBM Security

“With cognitive security, we teach Watson the language of security, which enables us to marry unstructured data with human understanding.”

Jeb Linton Watson Chief Security Architect,STSM, IBM Watson

“Ethical hackers need to do more knowledge sharing.”

Shahid ShahCEO of Netspective Communications

“The way IBM looks at security is the same as our bodies—it needs to work like an immune system of coordinated abilities.”

Patrick VandenbergProgram Director, IBM Security Segment Marketing

“Multisource intelligence needs to be a key part of our protection strategy.”

Mike KehoeWW Commercial Sales Leadi2 Enterprise Insight Analysis

“Advanced threats are a human-led threat. We need to enable humans on the defender’s side to better understand and detect these threats.”

Bob StasioWorld Wide Senior Product Manager, i2 Enterprise Insight Analysis

“Cyber criminals lead the way with collaboration. They sharejust about everything.”

Christopher MeenanDirector, QRadar Product Management and Strategy

“We don’t want it to be that every time there is a little bit of rain there is a massive problem. We need to do the basics : patch things appropriately, passwords, two factor and so on.”

Tyler CarboneCOO of Terbium Labs

Quotes about humans’role in data breachesfrom threat to defender

The Human Side of Cyber Security

Maximizehuman

collaboration

Minimize human threat

Augmenthuman intelligence

ibm.co/cyberthreatanalysis

From human error to criminal ingenuity, the human element increases the complexity of cyberthreats. Learn how you can leverage advanced

analytics and cognitive computing to help mitigate threats.