IBM Security Services TIE Event Innovation in Securing the Enterprise GTS Security Services Carmina Lees – Security Director Greg Davis – Associate Partner 1 2014 IBM Corporation © © 2013 IBM Corporation IBM Security Services Security challenges clients are facing Organisations of all sizes are facing a security storm. “How do I grow my business while protecting my data, assets and reputation from the impact of security attacks while allowing me to safely innovate and modernise through cloud, mobility and other technology innovations”. Cloud and virtualization 1 billion mobile workers Bring your own IT Social business models IBM Smarter Security Protecting the worlds most sensitive data for over 100 years Trusted by the worlds largest companies and governments Targeted Threat © 2014 IBM Corporation IBM Security Services Clients demand an End-to-End Security capability We help our clients Intelligence Recover rapidly following a security incident Design, build, run secure solutions to protect their Mobile / BYOD business Integration Prepare their business to be more secure Make better decisions using security intelligence Expertise © 2014 IBM Corporation IBM Security Services PPC3 The mission of X-Force is to: is to… The mission of X-Force the rapidly changing Monitor Monitorand and evaluate evaluate the rapidly changing threatlandscape landscape threat attacktechniques techniques develop protection Research Researchnew new attack and and develop protection fortomorrow’s tomorrow’s security challenges for security challenges customers general Educate Educateour our customers andand the the general publicpublic distribute Threat Intelligence throughtoIBM and Integrate Integrateand and distribute Threat Protection and Intelligence makeSolutions IBM solutions directly to our customers smarter © 2014 IBM Corporation Slide 4 PPC3 This slide may be adjusted to incorporate information about the Trusteer malware research team. Pamela Cobb, 17/03/2014 IBM Security Services We are in an era of continuous breaches Attackers are relentless, victims are targeted, and the damage toll is rising Near Daily Leaks of Sensitive Data Relentless Use of Multiple Methods 40% increase 500,000,000+ records in reported data breaches and incidents were leaked, while the future shows no sign of change 2012 2013 2011 Attack types SQL injection Spear phishing DDoS Third-party software Physical access Source: IBM X-Force Threat Intelligence Quarterly – 1Q 2014 IBM internal and Business Partner use only – Please do not share with customers until May 5, 2014 Malware XSS Watering hole Undisclosed Note: Size of circle estimates relative impact of incident in terms of cost to business. © 2014 IBM Corporation IBM Security Services Computer services, government and financial markets were the most attacked industries as attackers focused on central strategic targets. © 2014 IBM Corporation IBM Security Services Aside from hard dollar value losses in fines and capital, breached companies will also suffer from a loss of intellectual property and customer trust. © 2014 IBM Corporation IBM Security Services More than half a billion records of personally identifiable information (PII) were leaked in 2013. © 2014 IBM Corporation IBM Security Services The top intended consequence for exploits was gaining additional or unauthorized access. © 2014 IBM Corporation IBM Security Services Cyber security attacks on major corporations are making daily headlines, company reputations are at stake. Sony reported that the hack of its PlayStation network and the consequent loss of its network availability will cost the business $171 million. White House been bombed and US President Barack Obama injured. The Dow Jones Industrial Average plummeted . Elderwood Group launches Operation Aurora www.alixpartners.com Syrian Electronic Army hack Twitter to post CEO – Steve Balmer’s contact details Morrison, Britain's No. 4 grocer, suffered a major theft of data from its staff payroll system, including bank account details. Barclays is speaking with regulators, customers and British authorities about a possible criminal leak of client account information. Both newspapers reported in January 2013 that hackers from China were able to infiltrate the company’s computer systems, with the aim of gaining access to information from the reporters covering China and other issues. 10 © 2014 IBM Corporation Innovation in securing the Enterprise 11 © 2014 IBM Corporation IBM Security Services IBM’s 10 Essential Practices represent a practical way to approach security across the enterprise Program Lifecycle 1. Build a risk aware culture and management system 6. Control network access and assure resilience im pt O 2. Manage security incidents with greater intelligence ed is t etn ciein ffiic roo PPr 3. Defend the mobile and social workplace c si Ba 4. Security-rich services, by design 5. Automate security “hygiene” 12 In Sec te u lli rit ge y nc e 7. Address new complexities of cloud and virtualization 8. Manage third-party security compliance 9. Secure data and protect privacy 10. Manage the identity lifecycle © 2014 IBM Corporation IBM Security Services Security Operations 2.0 Technology Charter Technology or service only Strategy Budget based, 12 month planning cycle Optimised Model Build a dedicated security operations capability Cross-functional Governance Self governed (IT Security) (IT, Business, Audit, etc) Operations Management Ad Hoc Detect & react to threats. Mission & Strategy Legacy Model 3+ year cycle, priorities set by enterprise Tools SIEM tool only Use Cases Standard rules Minimal customisation SIEM, ticketing, portal/ dashboard, Big Data Tailored rules based on risk & compliance drivers Referential Data Minimal importance, Secondary priority Required data, used to prioritise work Measures Silos, ticket/technology driven Reporting Proactive. Visible. Anticipate threats. Mitigate risks. Cross-functional, efficiency, quality, KPI/SLO/SLA Metrics, analytics, Ticket/technology driven scorecards, & dashboards © 2014 IBM Corporation IBM Security Services IBM Security Operations Operating Model Cyber-Security Cyber-Security Command Command Center Center (CSCC) (CSCC) SOC SOC Service Service Delivery Delivery Management Management SOC Operations Emergency Emergency Response Response Team Team Security Security Intelligence Intelligence Admin Admin Support Support Services Services Threat Threat Monitoring Monitoring Threat Threat Triage Triage Threat Threat Response Response CSIRT CSIRT Management Management IT IT Operations Operations SOC SOC Platform Platform Components Components SOC Platform SIEM Tool Ticket Tool (e.g. Remedy) Portal Integration Tools (e.g. Web Srvcs) Reporting / Dashboard Big Data (e.g. Hadoop) Legend SOC/SIEM Data Sources Structured Structured (Transactional), (Transactional), Unstructured Unstructured (Big (Big Data), Data), Reference Data Sources Reference Data Sources IT © 2014 IBM Corporation IBM Security Services Our differentiators.. World Class Expertise Broadest Solutions Unique Intelligence Research & Development at Scale +6000 Security Experts Clients in 133 countries Trusted by 3,700 Managed Clients 35 Security Labs globally 11 Integrated SOC’s Fully Integrated Security Solutions 20,000 Security Devices under contract Monitor 15 Billion Events / Day 14 Billion Web Pages monitored 20 Billion entries in IP reputation DB $6.3 Billion in 2013 +1000 Security Patents +$3 Billion security acquisitions We understand our clients security issues and know what to do We have integrated solution to fix the security problems We are the best informed to track and mitigate the threats We continue to invest at scale to be the best We help our clients business grow by securing them in a digital age. Our world class skilled people, integrated solutions and applied intelligence allows clients to prioritise investments and move their business security decisions from not knowing to monitoring to advanced understanding. 15 © 2014 IBM Corporation IBM Security Services Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. ibm.com/security © Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United 16 States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. © 2014 IBM Corporation
© Copyright 2025 Paperzz