We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJesse Hudson
Modified over 3 years ago
Managing Risk and Enabling Business Transformation Glen Gooding– Director, Institute for Advanced Security Asia Pacific August 2012
© 2009 IBM Corporation Building a smarter planet The Journey Toward a Smarter Planet Continues Smart Supply Chains Smart Countries Smart Retail Smart Water Management Smart Weather Smart Energy Grids Smart Oil Field Technologies Smart Regions Smart Healthcare Smart Traffic Systems Smart Cities Smart Food Systems INSTRUMENTED INTERCONNECTED INTELLIGENT 2
© 2009 IBM Corporation Building a smarter planet ATTACK SOPHISTICATION The speed and dexterity of attacks has increased coupled with new motivations from cyber crime to terrorism to state-sponsored intrusions ATTACK SOPHISTICATION The speed and dexterity of attacks has increased coupled with new motivations from cyber crime to terrorism to state-sponsored intrusions 3
© 2009 IBM Corporation Building a smarter planet CLOUD Organizations continue to move to new platforms including cloud, virtualization, mobile, social business and more CLOUD Organizations continue to move to new platforms including cloud, virtualization, mobile, social business and more 4
© 2009 IBM Corporation Building a smarter planet CONSUMERIZATION OF IT With the advent of Enterprise 2.0 and social business, the line between personal and professional hours, devices and data has disappeared CONSUMERIZATION OF IT With the advent of Enterprise 2.0 and social business, the line between personal and professional hours, devices and data has disappeared 5
© 2009 IBM Corporation Building a smarter planet DATA EXPLOSION The age of Big Data – the explosion of digital information – has arrived and is facilitated by the pervasiveness of applications accessed from everywhere DATA EXPLOSION The age of Big Data – the explosion of digital information – has arrived and is facilitated by the pervasiveness of applications accessed from everywhere 6
© 2009 IBM Corporation Building a smarter planet Security Threats Are Accelerating 7
© 2009 IBM Corporation Building a smarter planet 8 JK Targeted attacks shake businesses and governments Source: IBM X-Force® 2011 Trend and Risk Report
© 2009 IBM Corporation Building a smarter planet Business Results Sony estimates potential $1B long term impact – $171M / 100 customers Supply Chain Epsilon breach impacts 100 national brands Legal Exposure TJX estimates $150M class action settlement in release of credit / debit card info Impact of Hacktivism Lulzsec 50-day hack-at-will spree impacts Nintendo, CIA, PBS, UK NHS, UK SOCA, Sony … Audit Risk Zurich Insurance PLc fined £2.275M ($3.8M) for the loss and exposure of 46K customer records BrandImage HSBC data breach discloses 24K private banking customers IT Security Is a Board Room Discussion 9
© 2009 IBM Corporation Building a smarter planet 10
© 2009 IBM Corporation Building a smarter planet IBMs Security Strategy 11
© 2009 IBM Corporation Building a smarter planet 12 Solving a Security Issue Is a Complex, four-dimensional Puzzle People Data Applications Infrastructure EmployeesHackersOutsourcersSuppliers Systems applications Web applicationsWeb 2.0Mobile apps StructuredUnstructuredAt restIn motion Attempting to protect the perimeter is not enough – siloed point products cannot adequately secure the enterprise ConsultantsTerroristsCustomers
© 2009 IBM Corporation Building a smarter planet 13 Delivering intelligence, integration and expertise across a comprehensive framework End-to-end coverage of the security foundation 6K+ security engineers and consultants Award-winning X-Force ® research One of the largest vulnerability databases in the world IBM Security Systems Intelligence Integration Expertise
© 2009 IBM Corporation Building a smarter planet 14 Intelligence: A comprehensive portfolio of products and services across security domains
© 2009 IBM Corporation Building a smarter planet 15 Consolidate and correlate siloed information Detect, notify and respond to threats Automate compliance tasks and assess risks Detect the latest exploits, vulnerabilities, and malware Automatically update SW Add security intelligence to non-intelligent systems Block specific vulnerabilities using scan results Converge access mgmt with web service gateways Link identity information with database security Integration: Increased security, collapsed silos, reduced complexity
© 2009 IBM Corporation Building a smarter planet Expertise: Global coverage and security awareness 20K+ devices under contract 3,700+ MSS clients worldwide 13B+ events managed per day 1,000+ security patents 133 monitored countries (MSS) 20K+ devices under contract 3,700+ MSS clients worldwide 13B+ events managed per day 1,000+ security patents 133 monitored countries (MSS) World Wide Managed Security Services Coverage 9 Security Operations Centers 9 Security Research Centers 14 Security Solution Development Centers 3 Institute for Advanced Security Branches IBM Research 14B analyzed Web pages & images 40M spam & phishing attacks 54K documented vulnerabilities Billions of intrusion attempts daily Millions of unique malware samples
© 2009 IBM Corporation Building a smarter planet The Path to Security Intelligence 17
© 2009 IBM Corporation Building a smarter planet 18 Cloud Computing Regulation and Compliance Advanced Threats Mobile Computing Advanced Persistent Threats. Designer Malware. Stealth Bots. Zero-days. Targeted Attacks. Enterprise Customers GLBA IBM is investing in solutions to key trends driving the next wave of security innovation
© 2009 IBM Corporation Building a smarter planet 19 Security Intelligence is enabling progress to optimized security
© 2009 IBM Corporation Building a smarter planet Helping define the new role of the information security leader and tracking security trends 20 /content-library/m/files/97.aspx https://www14.software.ibm.com/webapp/iwm/web/signup.do? source=swg-Tivoli_Organic&S_PKG=xforce-trend-risk-report
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Sam Chughtai IBM Security Solutions Executive The Challenging State of Cyber Security September 20 th, 2012.
© 2011 IBM Corporation Building a Smarter Planet Smarter Approach to Stop Threats Before They Impact Your Business Hong Kong 22 Sep 2011 Venkatesh Sadayappan.
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
Dell Connected Security Solutions Simplify & unify.
服务管理 - 实现云计算的引擎 Service Management – A Engine for Delivering Optimized Cloud Service Tung Diep ( 葉滋松 ) Technical Executive, IBM Tivoli Software Asia Pacific.
| © 2013 Axway | All rights reserved. 1 Govern the Flow of Data: Moving from Chaos to Control Steve Jordan Director, Industry Marketing.
© 2012 IBM Corporation IBM Institute for Business Value 1 Security Intelligence and Compliance Analytics 2012 Global CEO Study Capability Alignment.
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
© 2012 IBM Corporation IBM Security Services smarter security for a smarter planet.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
© 2009 IBM Corporation Building a Smarter Planet: The Challenge for Next-Gen Leaders Linda Sanford, Senior Vice President | Enterprise Transformation University.
The Changing World of Endpoint Protection Hashem El Telawi October 2015.
2 Industry trends and challenges Windows Server 2012: Modern workstyle, enabled Access from virtually anywhere, any device Full Windows experience.
© 2010 IBM Corporation Smarter Systems for a Smarter Planet Presenter Name – Presenter Title MM/DD/Year.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
Copyright 2008 IDC. Reproduction is forbidden unless authorized. All rights reserved. Global Business Optimization Trends Alan Tsao Research Manager IDC.
Network security Product Group 2 McAfee Network Security Platform.
The Changing Communications Security Landscape Prem Iyer | VP of North America Channel Programs | 07/11/12.
© 2012 IBM Corporation IBM Israel Software Lab (ILSL( Daniel Yellin, Director March 2013.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
1 IBM Smarter Content Summit Ulrich Leuthner Director Marketing ECM Leverage Content to drive new Insights and differentiated Value.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
© 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
IMF Conference, Washington, 1 June 2005 Financial Conglomerates Koos Timmermans General Manager, Market Risk Management.
© 2009 IBM Corporation Getting Smarter with Information An Information Agenda Approach Damiaan Zwietering Information Architect
Akamai Technologies - Overview RSA ® Conference 2013.
IBM (International Business Machines) Brielle Luft, Karli Mathis, Taylor Aitchison, Kara Keigan Cody Soeder.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
SECURITY AND INFORMATION SYSTEMS THE EVOLUTION OF SECURITY SYSTEMS Created By: Jamere Hill Instructor: Kyhia Bostic Section University of Houston.
Sapient Global Markets – Commodities Team Analytics, Advisory and Project Management.
About Honeywell HONEYWELL BUILDING SOLUTIONS. Honeywell Proprietary Honeywell.com 2 Document control number Energy, Safety & Security Chemicals, Specialty.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Zahier Madhar – Pre sales Engineer Worry-Free Business Security 7.
© 2017 SlidePlayer.com Inc. All rights reserved.