Presentation is loading. Please wait.

Presentation is loading. Please wait.

Sam Chughtai IBM Security Solutions Executive The Challenging State of Cyber Security September 20 th, 2012.

Similar presentations


Presentation on theme: "Sam Chughtai IBM Security Solutions Executive The Challenging State of Cyber Security September 20 th, 2012."— Presentation transcript:

1 Sam Chughtai IBM Security Solutions Executive The Challenging State of Cyber Security September 20 th, 2012

2 Organizations continue to move to new platforms including cloud, virtualization, mobile, social business and more EVERYTHING IS EVERYWHERE The speed and dexterity of attacks has increased. New motivations include cyber crime to terrorism to state-sponsored intrusions ATTACK SOPHISTICATION Paradigm Shift The Challenging State of Cyber Security DATA EXPLOSION The age of Big Data – the explosion of digital information – has arrived and is facilitated by the pervasiveness of applications accessed from everywhere CONSUMERIZATION OF IT With the advent of Enterprise 2.0 and social business, the line between personal and professional hours, devices and data has disappeared

3 Attack Type SQL Injection URL Tampering Spear Phishing 3 rd Party SW DDoS Secure ID Unknown Sony Epsilon L3 Communications Sony BMG Greece US Senate NATO AZ Police TurkishGovernment SKCommunicationsKorea Monsanto RSA HB Gary Nintendo BrazilGov. Lockheed Martin Vanguard Defense Booz Allen Hamilton PBS PBS SOCA Malaysian Gov. Site Peru Special Police Gmail Accounts Spanish Nat. Police Citigroup Sega Fox News X-Factor Italy PM Site IMF Northrop Grumman Bethesda Software Size of circle estimates relative impact of breach 2011 Sampling of Security Breaches

4 Paradigm Shift Why Do People Hack?

5 Paradigm Shift Active security events managed daily 7 Billion IBM Security Services

6 Down Time IBM Security Services Loss of Revenue Reputational Impact Trade Secret What You Can’t Afford

7 At this point, it’s probably too late IBM Security Services What You Can’t Afford

8 Solutions Staying One Step Ahead in Cyber Security IBM Security Sevices IBM applications portfolio IBM security consulting services IBM X-Force® research & development center

9 Solutions IBM 3rd Party Independent Security Advisor IBM Security Services Staying One Step Ahead in Cyber Security Independent Perspective Transparent Delivery Objective Analysis provides you with:

10 Solutions IBM X-Force® research and development center IBM Security Services Predictive analytics Insight to emerging & critical threats Proactive deployment of security measures : benefits: Staying One Step Ahead in Cyber Security

11 Solutions IBM Applications Suite for Security Management IBM Security Services Support heterogeneous environment Trusted partner of global 1000s Global leader in security solution management : benefits: Staying One Step Ahead in Cyber Security

12 IBM Staying One Step Ahead in Cyber Security IBM Security Sevices

13 IBM IBM Security Services Staying One Step Ahead in Cyber Security 48,000+ vulnerabilities tracked in the IBM X-Force® research and development database 15,000 researchers, developers and subject matter experts on security initiatives 4,000+ customers managed in security operations centers around the world 3,000+ security & risk management patents 9 security operation centers 9 security research centers 133 monitored countries

14 IBM Security Services Q & A achught@us.ibm.com 425-614-8414 An electronic copy of this deck & IBM 2011 XForce Security Trends & Intelligence Report will be sent out

15 IBM security collaboration IBM Security represents several brands that provide a broad spectrum of security competency. While the X-Force® research and development teams are busy at work analyzing the latest trends and methods used by attackers, other groups within IBM work to use that rich data to develop protection techniques for our customers. While the X-Force® research and development teams are busy at work analyzing the latest trends and methods used by attackers, other groups within IBM work to use that rich data to develop protection techniques for our customers. The IBM X-Force research and development team discovers, analyzes, monitors, and records a broad range of computer security threats and vulnerabilities. The IBM X-Force research and development team discovers, analyzes, monitors, and records a broad range of computer security threats and vulnerabilities. IBM Managed Security Services (MSS) is responsible for monitoring exploits related to endpoints, servers (including Web servers), and general network infrastructure. MSS tracks exploits delivered over the Web as well as other vectors such as email and instant messaging. IBM Managed Security Services (MSS) is responsible for monitoring exploits related to endpoints, servers (including Web servers), and general network infrastructure. MSS tracks exploits delivered over the Web as well as other vectors such as email and instant messaging. IBM Professional Security Services (PSS) delivers comprehensive, enterprise-wide security assessment, design, and deployment services to help build effective information security solutions. IBM Professional Security Services (PSS) delivers comprehensive, enterprise-wide security assessment, design, and deployment services to help build effective information security solutions. Our content security team independently scours and categorizes the Web through crawling, independent discoveries, and through the feeds provided by MSS. Our content security team independently scours and categorizes the Web through crawling, independent discoveries, and through the feeds provided by MSS. IBM has collated real-world vulnerability data from security tests conducted over the past several years from the IBM Rational Services team. This data is a combination of application security assessment results obtained from IBM Rational AppScan® with manual security testing and verification. From requirements, through design, code, and production, IBM Rational AppScan provides comprehensive application vulnerability management across the application lifecycle. IBM has collated real-world vulnerability data from security tests conducted over the past several years from the IBM Rational Services team. This data is a combination of application security assessment results obtained from IBM Rational AppScan® with manual security testing and verification. From requirements, through design, code, and production, IBM Rational AppScan provides comprehensive application vulnerability management across the application lifecycle. IBM Cloud Security Services allows clients to consume security software features through a hosted subscription model that helps reduce costs, improve service delivery, and improve security. IBM Cloud Security Services allows clients to consume security software features through a hosted subscription model that helps reduce costs, improve service delivery, and improve security. Identity and access management solutions provide identity management, access management, and user compliance auditing. These solutions centralize and automate the management of users, authentication, access, audit policy, and the provisioning of user services. Identity and access management solutions provide identity management, access management, and user compliance auditing. These solutions centralize and automate the management of users, authentication, access, audit policy, and the provisioning of user services. IBM data and information security solutions deliver capabilities for data protection and access management that can be integrated to help address information lifecycle security across the enterprise. IBM data and information security solutions deliver capabilities for data protection and access management that can be integrated to help address information lifecycle security across the enterprise. IBM endpoint management solutions combine endpoint and security management into a single offering that enables customers to see and manage physical and virtual endpoints—servers, desktops, roaming laptops, and specialized equipment such as point-of-sale devices, ATMs and self-service kiosks. IBM endpoint management solutions combine endpoint and security management into a single offering that enables customers to see and manage physical and virtual endpoints—servers, desktops, roaming laptops, and specialized equipment such as point-of-sale devices, ATMs and self-service kiosks. IBM InfoSphere® Guardium® provides a scalable enterprise solution for database security and compliance that can be rapidly deployed and managed with minimal resources. IBM InfoSphere® Guardium® provides a scalable enterprise solution for database security and compliance that can be rapidly deployed and managed with minimal resources.


Download ppt "Sam Chughtai IBM Security Solutions Executive The Challenging State of Cyber Security September 20 th, 2012."

Similar presentations


Ads by Google