© 2013 IBM Corporation IBM Security Systems © 2012 IBM Corporation Offense Magnitude.

Slides:



Advertisements
Similar presentations
IBM Industry Security Electric Sector Security Awareness Rising
Advertisements

IBM Rational Team Concert
© 2009 IBM Corporation iEA16 Defining and Aligning Requirements using System Architect and DOORs Paul W. Johnson CEO / President Pragmatica Innovations.
® IBM Software Group © 2010 IBM Corporation Rational Publishing Engine and Rational Change configuration Francisco López Minaya Rational Technical Solution.
© 2013 IBM Corporation Green Hat Technology Demo Certification Program.
RTC Agile Planning Component
© 2014 IBM Corporation IBM Security Services 1 © 2014 IBM Corporation IBM Security Intelligence, Integration and Expertise Kawther Haciane Client Solution.
MIX 09 4/15/ :14 PM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
® IBM Software Group © 2007 IBM Corporation Modeling Software Engineering Processes using Eclipse Process Framework Composer (EPFC) / Rational Method Composer.
® IBM Software Group © 2007 IBM Corporation Achieving Harmony IBM's Platform and Methodology for Systems Engineering and Embedded Software Development.
® IBM Software Group © 2013 IBM Corporation Innovation for a smarter planet Timeboxes in a New Paradigm of Behavior Modeling Barclay Brown, ESEP IBM
Click to add text © 2012 IBM Corporation 1 Streams Toolkit Landscape InfoSphere Streams Version 3.0 Mike Branson Toolkits.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM X-Force Threat Intelligence Quarterly 2Q 2014 Diana Kelley Executive Security.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM X-Force: The Emerging Threat Landscape Michael P. Hamelin Lead X-Force Security.
© 2008 IBM Lotus Quickr Master Class: Lotus Quickr Master Class: Introduction and Roadmap John F. Schumacher, Director Development Lotus Quickr and Collaborative.
® IBM Software Group © 2012 IBM Corporation OPTIM Data Studio – Jon Sayles, IBM/Rational November, 2012.
© 2014 IBM Corporation The insights to transform the business with speed and conviction Kevin Redmond Head of Information Management Central & Eastern.
© 2009 IBM Corporation ® IBM Lotus Notes and Domino Product Roadmap April 2009.
© 2012 IBM Corporation May 2012 Rational Token Licensing: Licensing Adaptable to Changing User Needs.
© 2009 IBM Corporation Select View/Master/Slide Master to add Session Number Here The Enterprise Architecture Workspace: Your Architecture Blueprint Martin.
IBM ISPF Productivity Tool © 2008 IBM Corporation IBM ISPF Productivity Tool for z/OS V 5.10 More Than Just ISPF.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
IBM Software Group ® Jazz Storage Service Thomas.
Feature: Customer Combiner and Modifier © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
© 2008 IBM Corporation IBM Software Group An IBM Proof of Technology Discovering the value of IBM WebSphere Portal V6.1 WebSphere Portal v6.1 開發訓練 Elvin.
June 5–9 Orlando, Florida IBM Innovate 2011 Session Track Template Rainer Ersch Senior Research Scientist Siemens AG ALM-1180.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.

IBM Software Group ® Process Sequence to call ProcessAdminService from browser Thomas.
© 2012 IBM Corporation Introducing IBM Cognos Insight.
© 2015 IBM Corporation Big Data Journey. © 2015 IBM Corporation 2.
Click to add text © 2012 IBM Corporation 1 InfoSphere Streams Streams Console Applications InfoSphere Streams Version 3.0 Warren Acker InfoSphere Streams.
® IBM Software Group © 2011 IBM Corporation Innovation for a smarter planet IBM SOA Overview for MITRE “Driving SOA Program Success and Efficiency” April.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Brad Adams IBM Software, Rational 05/13/14
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
DevOps and UrbanCode Deploy Scott Pecnik. Development and Operations Contraction of Development and Operations Industry History “DevOps Days” in 2009.
Domino iSeries Multi-Versioning © 2002 IBM Corporation | Lotus software © 2002 IBM Corporation Domino Multi-Versioning Mike Gordon – IBM Global Services.

© 2015 IBM Corporation IBM Security 1 © 2015 IBM Corporation Protecting your executives’ cyber DNA Executive protection from IBM an IBM alliance with Social.
Click to add text © 2012 IBM Corporation Session # INV305 Getting beyond “good enough” with Microsoft Sharepoint Louis Richardson Worldwide Social Business.
© 2013 IBM Corporation IBM UrbanCode Deploy v6.0.1 Support Enablement Training Source Configuration and Database Upgrades Michael Malinowski
IBM Software Group ® Jazz Team Build – Part 1 Overview Jonathan.
© 2013 IBM Corporation LDAP Fundamentals & LDAP for CLM Bruce Besch IBM Rational Services.
1 © 2016 IBM Corporation Mobile Device Management Manage smartphones, tablets & laptops featuring iOS, Android, Windows Phone, BlackBerry, Windows PC &
IBM Innovate 2012 Title Presenter’s Name Presenter’s Title, Organization Presenter’s Address Session Track Number (if applicable)
Configuration of subcontracted activities Activity-based subcontracting.
Comparison between EPF Composer and Rational Method Composer
© 2013 IBM Corporation IBM UrbanCode Deploy v6.0 Support Enablement Training Jenkins plug-in 1 November 2013.
IBM Software Group ® Jazz Process Component —Process Template Management Thomas.
European Mobility & Endpoint Security User Group.
Work smarter, keep connected with Lotus Software Jon Crouch | Senior Technical Specialist, Lotus Software Matt Newton | Senior Technical Specialist, Lotus.
Outthink threats The next era of security. Marc van Zadelhoff General Manager, IBM Security.
David Hatten Developer, UrbanCode 17 October 2013
Gavin Arthurs PE Sr. Technical Specialist – IBM Rational
Deploy Plugins Developer 29 October 2013
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 1.1
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 2.0
Integrating Data With Cognos
IBM Blockchain An Enterprise Deployment of a Distributed Consensus-based Transaction Log Ben Smith & Kostantinos Christidis 1 ©2016 IBM Corporation.
Embedded Software (ESW) Engineering Practices Introduction
IBM Global Technology Services
Put Treatment Cost Calculator to work for you and your employees
Presentation transcript:

© 2013 IBM Corporation IBM Security Systems © 2012 IBM Corporation Offense Magnitude

© 2013 IBM Corporation IBM Security Systems Event Magnitude Relevance Credibility Severity Is it relevant to your network/infrastructure? How respected is the device? How potentially malicious is the event? 50 % 20 % 30 % Initially configured from Log Source Default is 5

© 2013 IBM Corporation IBM Security Systems Default Rules Contributing to Event Magnitude

© 2013 IBM Corporation IBM Security Systems Offense Magnitude (Based on Event Rollups) Relevance Credibility Severity 50 % 20 % 30 % 50% Basic 10% Chaining 40% Destination Analysis 30% 70% Basic % of Log Sources & Groups Involved 100% Basic Is the issue Propagating through the network? Analysis of # known assets and event volume.

© 2013 IBM Corporation IBM Security Systems Offense Basic Calculation Rollups Relevance Credibility Severity 50% Max Relevance + 50% Max Credibility + Max Severity + Median Relevance Median Credibility Median Severity

© 2013 IBM Corporation IBM Security Systems ibm.com/security © Copyright IBM Corporation All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.