transformyoursecurityprogram to addresstomorrow’sriskstoday · ibm’s security immune system...

15
Transform your security program to address tomorrow’s risks today An integrated approach to protecting your organization Niels Trads Pedersen 15 th Of November 2017 Nordic Business Unit Leader IBM Security Transformation Services

Upload: others

Post on 20-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Transformyoursecurityprogram to addresstomorrow’sriskstoday · IBM’s Security Immune system X-Force Exchange QRadar Incident Forensics BigFix Network Protection XGS App Exchange

Transform your security program to address tomorrow’s risks today

An integrated approach to protecting your organization

Niels Trads Pedersen

15th Of November 2017

Nordic Business Unit LeaderIBM Security Transformation Services

Page 2: Transformyoursecurityprogram to addresstomorrow’sriskstoday · IBM’s Security Immune system X-Force Exchange QRadar Incident Forensics BigFix Network Protection XGS App Exchange

2 IBM Security

Contrasting Hierarchical Organizations….

With Amorphous Organizations….

Who are we fighting ?

Page 3: Transformyoursecurityprogram to addresstomorrow’sriskstoday · IBM’s Security Immune system X-Force Exchange QRadar Incident Forensics BigFix Network Protection XGS App Exchange

3 IBM Security

Page 4: Transformyoursecurityprogram to addresstomorrow’sriskstoday · IBM’s Security Immune system X-Force Exchange QRadar Incident Forensics BigFix Network Protection XGS App Exchange

4 IBM Security

ControlStability

HierarchyCentralized

These Are YourStrengths

Page 5: Transformyoursecurityprogram to addresstomorrow’sriskstoday · IBM’s Security Immune system X-Force Exchange QRadar Incident Forensics BigFix Network Protection XGS App Exchange

5 IBM Security

Page 6: Transformyoursecurityprogram to addresstomorrow’sriskstoday · IBM’s Security Immune system X-Force Exchange QRadar Incident Forensics BigFix Network Protection XGS App Exchange

6 IBM Security

AdaptableDecentralized

Narrative Driven

These Are TheirStrengths

Page 7: Transformyoursecurityprogram to addresstomorrow’sriskstoday · IBM’s Security Immune system X-Force Exchange QRadar Incident Forensics BigFix Network Protection XGS App Exchange

7 IBM Security

Cybersecurity Maturity

Page 8: Transformyoursecurityprogram to addresstomorrow’sriskstoday · IBM’s Security Immune system X-Force Exchange QRadar Incident Forensics BigFix Network Protection XGS App Exchange

8 IBM Security

IBM Security Transformation Services assists organizations in their journey towards optimizing their security programs

Page 9: Transformyoursecurityprogram to addresstomorrow’sriskstoday · IBM’s Security Immune system X-Force Exchange QRadar Incident Forensics BigFix Network Protection XGS App Exchange

9 IBM Security

Immune system noun | \i -ˈmyoon ˈsistəm\

1. A network of cells, tissues and organs that work together to defend the body against attacks by “foreign” invaders.

Page 10: Transformyoursecurityprogram to addresstomorrow’sriskstoday · IBM’s Security Immune system X-Force Exchange QRadar Incident Forensics BigFix Network Protection XGS App Exchange

10 IBM Security

A healthy immune system is…

Intelligent

Organized

Instantly recognizes an

invader

Efficient

Takes action to block or destroy the

threat

Page 11: Transformyoursecurityprogram to addresstomorrow’sriskstoday · IBM’s Security Immune system X-Force Exchange QRadar Incident Forensics BigFix Network Protection XGS App Exchange

11 IBM Security

LEADin strategic domains

Security Transformation ServicesManagement Consulting | Systems Integration | Managed Security

Security Research and Threat Intelligence

Security Operations and Response Information Risk and Protection

IBM Security Strategy

Incident Response

Cyber Threat Analysis

Security Intelligence and Analytics

Vulnerability andPatch Management

Endpoint andNetwork Protection

User Behavior Analytics

SUPPORTthe CISO agenda Cloud Mobile and

Internet of ThingsComplianceMandates

SkillsShortage

AdvancedThreats

Cloud CollaborationCognitive

ACCELERATEwith key innovation

Cloud Security Mobile Security

Identity Governance and Access Management

Advanced Fraud Prevention

DataProtection

ApplicationSecurity

Page 12: Transformyoursecurityprogram to addresstomorrow’sriskstoday · IBM’s Security Immune system X-Force Exchange QRadar Incident Forensics BigFix Network Protection XGS App Exchange

12 IBM Security

An integrated and intelligent security immune system

Criminal detectionFraud protection

Workloadprotection

Cloud accesssecurity broker

Access managementEntitlements and rolesPrivileged identity management

Identity management

Data access control

Application security managementApplication scanning

Data monitoring

Device management

Transaction protection

Content security

Malware protection

Endpoint detectionand response

Endpoint patching and management

Virtual patching

FirewallsNetwork forensics and threat management

Sandboxing

Network visibility and segmentation

Indicators of compromiseIP reputation Threat sharing

Vulnerability management Incident response

User behavior analysis

Threat hunting and investigationCognitive security

Threat and anomaly detection

Page 13: Transformyoursecurityprogram to addresstomorrow’sriskstoday · IBM’s Security Immune system X-Force Exchange QRadar Incident Forensics BigFix Network Protection XGS App Exchange

13 IBM Security

SECURITY TRANSFORMATION SERVICESManagement consulting | Systems integration | Managed security

MaaS360 Trusteer Mobile

Trusteer Rapport

Trusteer Pinpoint

INFORMATION RISKAND PROTECTION

AppScan

Guardium

Cloud Security

Privileged Identity ManagerIdentity Governance and Access

Cloud Identity ServiceKey Manager

zSecure

IBM’s Security Immune system

X-Force Exchange

QRadar Incident ForensicsBigFix Network Protection XGS

App Exchange

SECURITY OPERATIONSAND RESPONSE

QRadar Vulnerability / Risk Manager Resilient Incident Response

QRadar User Behavior Analytics

i2 Enterprise Insight Analysis QRadar Advisor with Watson

QRadar SIEM

Page 14: Transformyoursecurityprogram to addresstomorrow’sriskstoday · IBM’s Security Immune system X-Force Exchange QRadar Incident Forensics BigFix Network Protection XGS App Exchange

14 IBM Security

Security Immune system noun | \ si - ˈkyur - ə - te i -ˈmyoon ˈsistəm\

1. An integrated framework of security capabilities that transmits and ingests vital security data to understand and prioritize

threats and coordinate multiple layers of defense.

Page 15: Transformyoursecurityprogram to addresstomorrow’sriskstoday · IBM’s Security Immune system X-Force Exchange QRadar Incident Forensics BigFix Network Protection XGS App Exchange

© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

ibm.com/security

securityintelligence.com

xforce.ibmcloud.com

@ibmsecurity

youtube/user/ibmsecuritysolutions

FOLLOW US ON:

THANK YOUNiels Trads PedersenNordic Business Unit Leader

[email protected]

+45 41200763