© 2012 IBM Corporation IBM Institute for Business Value 1 Security Intelligence and Compliance Analytics 2012 Global CEO Study Capability Alignment.

Slides:



Advertisements
Similar presentations
Managing Risk and Enabling Business Transformation
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
Solutions & Services to ‘Multiply your Business Performance’ 2013.
NASA/IBM Partnership Milestones IBM Helps design and build the Automatic Sequence Controlled Calculator for Harvard University.
Viewpoint Consulting – Committed to your success.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Private Cloud: Application Transformation Business Priorities Presentation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Getting Smarter with Information An Information Agenda Approach
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Financial Advisory & Litigation Consulting Services Risk Management 2006 September 14-15, 2006 The Metropolitan Club, New York, NY Workshop B: Information.
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Dell Connected Security Solutions Simplify & unify.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
© 2014 IBM Corporation Smarter Workforce Services Business Process Innovation.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Private Cloud: Manage Data Center Services Business Priorities Presentation.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Grow with Cisco’s Made-for-Midmarket Portfolio Inspire Growth, Productivity,
The Impact of Privacy on HP’s Customer Relationship Management Solution Mike Overly Vice President, Marketing © 2003 Hewlett-Packard Development Company,
© 2012 IBM Corporation IBM Security Services smarter security for a smarter planet.
Security Management Press Conference, April 14 th 2003 Russ Artzt, Executive Vice President, Computer Associates International, Inc. Joe Grillo, President.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Identity Assurance Emory University Security Conference March 26, 2008.
2015 Security Conference Dave Gill Intel Security.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
Microsoft and Symantec
Robert Mahowald August 26, 2015 VP, Cloud Software, IDC
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
Sam Chughtai IBM Security Solutions Executive The Challenging State of Cyber Security September 20 th, 2012.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Why SIEM – Why Security Intelligence??
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Unifying Talent Management. Harnessing the Power of Workforce Intelligence in Talent Planning to Drive Business Performance.
- Company Confidential - Corporate Overview March 2015.
1© Copyright 2016 EMC Corporation. All rights reserved. VIEWTRUST SOFTWARE OVERVIEW RISK MANAGEMENT AND COMPLIANCE MONITORING.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Understanding DATA LOSS PREVENTION
Information Security Program
CIM Modeling for E&U - (Short Version)
Hybrid Management and Security
Transforming IT Management
Making Information Security Manageable with GRC
Securing Your Digital Transformation
Securing the Threats of Tomorrow, Today.
DATA LOSS PREVENTION Mr. Collins Oduor.
DATS International Portfolio.
Strategic threat assessment
MAZARS’ CONSULTING PRACTICE
Managing IT Risk in a digital Transformation AGE
GRC - A Strategic Approach
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Session 8: Innovative Uses of Captives: Cyber and Beyond
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Microsoft Data Insights Summit
IT Management Services Infrastructure Services
GTS Mobility Services introduction – who are we?
Presentation transcript:

© 2012 IBM Corporation IBM Institute for Business Value 1 Security Intelligence and Compliance Analytics 2012 Global CEO Study Capability Alignment

© 2012 IBM Corporation IBM Institute for Business Value 2 CIOs will play a critical role in supporting their CEOs’ drive to create value through employees, customers and partners  Enabling social business with enhanced employee collaboration tools  Supporting the mobile workforce with secure anywhere, anytime, any device access  Improving communications efficiency with unified communications  Partnering with the CMO by providing analytics tools to improve customer insight and understanding and automating essential marketing processes  Building the information infrastructure to support analytics and the ability to manage Big Data  Expanding the digital footprint with mobile applications and access so customers can engage from any device and place at any time  Enabling cloud-based business models with the right cloud implementation (private, public, hybrid)  Supporting broader collaboration and real-time communications with partners  Linking outsourced business processes to in-house systems and delivery

© 2012 IBM Corporation IBM Institute for Business Value 3 CIOs will support the broad CEO agenda with enabling IT solutions delivered efficiently and securely Supporting the CEO Agenda with enabling IT solutions  Delivering IT services efficiently and effectively by optimizing IT including cloud delivery models  Supporting advanced analytics to deliver insights and manage “Big Data” with storage and information management optimization  Establishing enhanced security to protect vital enterprise information as the mobile access expands the security perimeter expands beyond the data center

© 2012 IBM Corporation IBM Institute for Business Value 4 The world is becoming more digitized and interconnected, opening the door to emerging threats and leaks… Organizations continue to move to new platforms including cloud, virtualization, mobile, social business and more EVERYTHING IS EVERYWHERE With the advent of Enterprise 2.0 and social business, the line between personal and professional hours, devices and data has disappeared CONSUMERIZATION OF IT The age of Big Data – the explosion of digital information – has arrived and is facilitated by the pervasiveness of applications accessed from everywhere DATA EXPLOSION The speed and dexterity of attacks has increased coupled with new motivations from cyber crime to state sponsored to terror inspired ATTACK SOPHISTICATION …making security a top concern, from the boardroom down

© 2012 IBM Corporation IBM Institute for Business Value 5 Cyber impacts have been increasing in size, scope

© 2012 IBM Corporation IBM Institute for Business Value 6 Security challenges are impacting innovation  Cyber attacks  Organized crime  Corporate espionage  State-sponsored attacks  Social engineering External threats Sharp rise in external attacks from non-traditional sources  Administrative mistakes  Careless inside behavior  Internal breaches  Disgruntled employee actions  Mix of private / corporate data Internal threats Ongoing risk of careless and malicious insider behavior  National regulations  Industry standards  Local mandates Compliance Growing need to address an increasing number of mandates MobilityCloud / VirtualizationSocial Business Impacting innovation Business Intelligence

© 2012 IBM Corporation IBM Institute for Business Value 7 The impact of a breach is no longer contained in IT, but reverberates across the corporation *Source: Discussions with more than 13,000 C-suite executives as part of the IBM C-suite Study Series CxO priority Security risks Potential impact CEO Maintain competitive differentiation Misappropriation of intellectual property Misappropriation of business sensitive data Loss of market share and reputation Legal exposure CFO/COO Comply with regulations Failure to address regulatory requirements Audit failure Fines and criminal charges Financial loss CIO Expand use of mobile devices Data proliferation Unsecured endpoints and inappropriate access Loss of data confidentiality, integrity and/or availability CHRO Enable global labor flexibility Release of sensitive data Careless insider behavior Violation of employee privacy CMO Enhance the brand Stolen personal information from customers or employees Loss of customer trust Loss of brand reputation Increasingly, companies are appointing CROs and CISOs with a direct line to the Audit Committee

© 2012 IBM Corporation IBM Institute for Business Value 8 In this “new normal”, organizations need an intelligent view of their security posture Security Intelligence Proficient Proactive Automated Manual Reactive Proficient Basic Optimized Optimized Organizations use predictive and automated security analytics to drive toward security intelligence Proficient Security is layered into the IT fabric and business operations Basic Organizations employ perimeter protection, which regulates access and feeds manual reporting

© 2012 IBM Corporation IBM Institute for Business Value 9 IBM Security delivers intelligence, integration and expertise across a comprehensive framework Intelligence ● Integration ● Expertise  Only vendor in the market with end-to- end coverage of the security foundation  6K+ security engineers and consultants  Award-winning X-Force ® research  Largest vulnerability database in the industry IBM Security Solutions

© 2012 IBM Corporation IBM Institute for Business Value 10 Increased Awareness and Accuracy  Prevent advanced threats with real-time intelligence correlation across security domains  Increase situational awareness by leveraging real-time feeds of X-Force Research and Global Threat Intelligence across IBM Global Managed Security Operations Centers, IBM security products, such as QRadar SIEM, Network Security appliances, and IBM Managed Security Services  Conduct complete incident investigations with unified identity, database, network and endpoint activity monitoring and log management Ease of Management  Simplify risk management and decision-making with IBM Security governance services and products  Enhance auditing and access capabilities by sharing Identity context across multiple IBM security products  Build automated, customized application protection using IBM security products and managed security services Reduced Cost and Complexity  Deliver faster deployment, increased value and lower TCO by working with a single strategic partner Think Integration: Increasing Security, Collapsing Silos, and Reducing Complexity

© 2012 IBM Corporation IBM Institute for Business Value 11 Unmatched Global Coverage & Security Awareness  20,000+ devices under contract  3,700+ MSS clients worldwide  9B+ events managed per day  1,000+ security patents*  133 monitored countries (MSS)  20,000+ devices under contract  3,700+ MSS clients worldwide  9B+ events managed per day  1,000+ security patents*  133 monitored countries (MSS) Worldwide Managed Security Services Coverage Security Operations Centers Security Research Centers Security Solution Development Centers Institute for Advanced Security Branches

© 2012 IBM Corporation IBM Institute for Business Value 12 Getting started: Security Risk Assessment IT GRC People Data Applications Infrastructure Managed Services Business Challenge Need to Identify and mitigate security risks and breaches to protect critical business information Need to reduce costs and complexity of security management initiatives Need to manage compliance with regulatory requirements Our customizable security risk assessment is designed to review your existing security infrastructure and provide a prioritized plan to help strengthen and streamline with security intelligence. Click here to find out more… Click here to find out more… Improves understanding of business risk due to weaknesses of information security controls Helps identify security risks with a comprehensive assessment of your existing security program with actionable recommendations for mitigation Facilitates reduced costs and complexity of security management while supporting new business initiatives Value Delivered

© 2012 IBM Corporation IBM Institute for Business Value 13 For more information Global (SWG) Vice President: Kent BlossomKent Blossom (Services) Vice President Marisa ViverosMarisa Viveros (GBS) S&P Leader: John W LainhartJohn W Lainhart Japan (SWG) Hideo WadaHideo Wada (Sales - Services) Shohichi S HonmaShohichi S Honma (GBS – Sales) Masaharu ItoiMasaharu Itoi NA (Sales -Services) Chris Esemplare Chris Esemplare (SWG – Canada) Michael CoroneosMichael Coroneos (GBS) Partner: Nichola TiesengaNichola Tiesenga (GBS) Partner: Nev ZunicNev Zunic MEA (Sales - Services) Mahmoud El KordyMahmoud El Kordy Sales – SWG) Joe RuthvenJoe Ruthven AP (Sales - Services) Martin BiggsMartin Biggs CEE (Sales - Services) Lukas MulleLukas Mulle LA (Sales - Services) Pablo RebolledoPablo Rebolledo GMU (SWG) Roman TumaRoman Tuma (GBS – India GD) Anish Srivastava Anish Srivastava NE (Sales - Services) Marcus Schmid Marcus Schmid (SWG – UKI) Matthew Middleton-LealMatthew Middleton-Leal (GBS – Europe Sales) Roger GateRoger Gate SW (Sales - Services) Rodrigo NaranjoRodrigo Naranjo (SWG – Italy) Giovanni Todaro Giovanni Todaro (GBS – Germany Sales) Marc AlbrechtMarc Albrecht For Internal Enablement Only Links to additional enablement materials IBM Security – Security IntelligenceIBM Security – Security Intelligence. (SWG) IBM Security ServicesIBM Security Services (GTS) IBM Security: ProductsIBM Security: Products. (SWG) IBM Security Risk Assessment – Offering KitIBM Security Risk Assessment – Offering Kit (GTS) Enterprise IT Security Risk Assessment – Offering KitEnterprise IT Security Risk Assessment – Offering Kit (GBS)

© 2012 IBM Corporation IBM Institute for Business Value 14 Enterprise IT Security Risk Assessment Achieving successful enterprise wide security with an integrated approach Managed Services © 2012 IBM Corporation The IBM Enterprise IT Security Risk Assessment is focused on ensuring that the enterprise’s people, data, applications are adequately and cost effectively protected, fulfilling compliance mandates using analytics based approach and continuous improvement. People & Identity Application & Process Governance, Risk & Compliance Data & Information 1. Assess Understand the current and desired levels of security controls 2. Analyze 3. Plan & Roadmap Identify risk exposure by mapping these levels against business objectives and industry best practices Develop a plan and prioritized roadmap for eliminating risks based on business impact 4. Continuous Improvement Implement risk based predictive cyber threat analytics to optimize security controls & facilitate continuous improvement Manage risks through continuous improvement Client Participation C-Suite, LOB, IT C-Suite, LOB, CIO CIO, IT