Outthink threats The next era of security. Marc van Zadelhoff General Manager, IBM Security.

Slides:



Advertisements
Similar presentations
© 2008 Oracle Corporation – Proprietary and Confidential.
Advertisements

© 2009 IBM Corporation iEA16 Defining and Aligning Requirements using System Architect and DOORs Paul W. Johnson CEO / President Pragmatica Innovations.
© 2013 Sri U-Thong Limited. All rights reserved. This presentation has been prepared by Sri U-Thong Limited and its holding company (collectively, “Sri.
© 2014 Microsoft Corporation. All rights reserved.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
RTC Agile Planning Component
© 2014 IBM Corporation IBM Security Services 1 © 2014 IBM Corporation IBM Security Intelligence, Integration and Expertise Kawther Haciane Client Solution.
Innovations in Structured Products October 25, 2010 An Innovator’s Dilemma?
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM X-Force Threat Intelligence Quarterly 2Q 2014 Diana Kelley Executive Security.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM X-Force: The Emerging Threat Landscape Michael P. Hamelin Lead X-Force Security.
® IBM Software Group © 2012 IBM Corporation OPTIM Data Studio – Jon Sayles, IBM/Rational November, 2012.
End User License Agreement Permission to use and redistribute this Document is granted, provided that (1) the below copyright notice appears in all copies.
IBM Software Group ® Jazz Storage Service Thomas.
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
International Telecommunication Union New Delhi, India, December 2011 ITU Workshop on Standards and Intellectual Property Rights (IPR) Issues Philip.
IBM Software Group ® Process Sequence to call ProcessAdminService from browser Thomas.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage Receipts.
IBM Software Group AIM Enterprise Platform Software IBM z/Transaction Processing Facility Enterprise Edition © IBM Corporation 2005 TPF Users Group.
© 2015 IBM Corporation Big Data Journey. © 2015 IBM Corporation 2.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage Supplier Returns.
Click to add text © 2012 IBM Corporation 1 InfoSphere Streams Streams Console Applications InfoSphere Streams Version 3.0 Warren Acker InfoSphere Streams.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage and Disposition Inventory Returns.
® IBM Software Group © 2011 IBM Corporation Innovation for a smarter planet IBM SOA Overview for MITRE “Driving SOA Program Success and Efficiency” April.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Brad Adams IBM Software, Rational 05/13/14
Regulatory approval times between submission and marketing authorization approval APRIL 2007 SOURCE: CMR INTERNATIONAL PERFORMANCE METRICS PROGRAM.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
End User License Agreement Permission to use and redistribute this Document is granted, provided that (1) the below copyright notice appears in all copies.
-1- For Oracle employees and authorized partners only. Do not distribute to third parties. © 2009 Oracle Corporation – Proprietary and Confidential Oracle.
© 2013 IBM Corporation IBM UrbanCode Deploy v6.0.1 Support Enablement Training Source Configuration and Database Upgrades Michael Malinowski
IBM Software Group ® Jazz Team Build – Part 1 Overview Jonathan.
1 © 2016 IBM Corporation Mobile Device Management Manage smartphones, tablets & laptops featuring iOS, Android, Windows Phone, BlackBerry, Windows PC &
© 2013 IBM Corporation IBM Security Systems © 2012 IBM Corporation Offense Magnitude.
IBM Innovate 2012 Title Presenter’s Name Presenter’s Title, Organization Presenter’s Address Session Track Number (if applicable)
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Oracle Proprietary and Confidential. 1.
IDC Says, "Don't Move To The Cloud" Richard Whitehead Director, Intelligent Workload Management August, 2010 Ben Goodman Principal.
Article 4 [Obligations of Applicant] 4.1. As a sole and exclusive owner of the Application, Applicant warrants that.
European Mobility & Endpoint Security User Group.
Forrester and Novell Novell ® Identity Manager 4 Webcast I Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Work smarter, keep connected with Lotus Software Jon Crouch | Senior Technical Specialist, Lotus Software Matt Newton | Senior Technical Specialist, Lotus.
Connectivity to bank and sample account structure
RaboDirect Financial Health Barometer 2016
The time to address enterprise mobility is now
Deployment Planning Services
Using Parallelspace TEAM Models to Design and Create Custom Profiles
BigFix Patch for Linux Overview of the RHSM Download Plug-in and the Multiple-Package Baseline Installation feature Chuxin Zhao.
Understanding EU GDPR from an Office 365 perspective
Securing the Future of Payments
BIOLOGY / CHEMISTRY CITATIONS GROWTH
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 1.1
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 2.0
Integrating Data With Cognos
Prevent Costly Data Leaks from Microsoft Office 365
Go Off Grid ➔ Go Graph! Jason October 24, 2016
Automation in an XML Authoring Environment
IBM Blockchain An Enterprise Deployment of a Distributed Consensus-based Transaction Log Ben Smith & Kostantinos Christidis 1 ©2016 IBM Corporation.
Securing the Threats of Tomorrow, Today.
IBM Global Technology Services
Motivation for 36OU Open Rack
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Put Treatment Cost Calculator to work for you and your employees
IBM OpenPages Developer WYNTK
Microsoft Data Insights Summit
© 2013 Sri U-Thong Limited. All rights reserved
Emotional Intelligence: The Core of Family Offices
Presentation transcript:

outthink threats The next era of security

Marc van Zadelhoff General Manager, IBM Security

 ADVANCED THREATS  INSIDER THREATS  CLOUD AND MOBILE  COMPLIANCE  SKILLS GAP

3  Adding another tool  Hoping it’s not me  Building more barricades  Skipping the basics  Ignoring privileges  Blocking the cloud  Betting on BYOS

4 Intelligence, Integration

5 Application security management Application scanning Incident and threat management Device management Transaction protection Log, flow and data analysis Vulnerability assessment Security research Sandboxing Firewalls Anomaly detection Antivirus Fraud protection Criminal detection Network visibility Virtual patching Data access control Data monitoring Identity management Access management Entitlements and roles Privileged identity management Endpoint patching and management Malware protection Content security Establish security as an immune system

6 Global Threat Intelligence Consulting Services | Managed Services Cloud Data Mobile Identity and Access Applications Network Endpoint Advanced Fraud Security Intelligence Establish security as an immune system Log, flow and data analysis Vulnerability assessment Anomaly detection Firewalls Incident and threat management Virtual patching Sandboxing Network visibility Data access control Data monitoring Malware protection Antivirus Endpoint patching and management Criminal detection Fraud protection Security Research Access management Entitlements and roles Identity management Privileged identity management Application security management Application scanning Transaction protection Device management Content security

7 Cloud Identity and Access Applications Mobile Network Advanced Fraud Security Intelligence Security research Endpoint Data Stop advanced threats

8 Prevent insider breaches Cloud Applications Mobile Network Advanced Fraud Security Intelligence Endpoint Data Security research Identity and Access

9 Support mobile transformation Cloud Identity and Access Applications Mobile Network Advanced Fraud Security Intelligence Endpoint Data Security research

THE NEXT ERA OF SECURITY 10 Cloud, Collaboration, Cognitive Moats, Castles Intelligence, Integration

CLOUD 11 IBM Cloud Security Enforcer BYOD RISKY APPS APPROVED APPS ON PREM MOBILE EMPLOYEES

COLLABORATION 12 IBM X-Force Exchange

COLLABORATION 13 IBM App Exchange

Evolving to COGNITIVE 14 Watson Security Advisor SECURITY THAT… Understands Reasons Learns

outthink threats

Stacy Lee Security Operations Specialist IT Security, Stanford University

Adrian Asher Chief Information Security Officer HSBC

Get Social! Stay informed! Attend one of our 200+ security sessions Visit IBM Security in the Expo Center Booth #314 Continue the SECURITY conversation! at 18

© Copyright IBM Corporation All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOU

Legal notices and disclaimers Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third- party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. Other company, product, or service names may be trademarks or service marks of others. A current list of IBM trademarks is available at “Copyright and trademark information” Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS document is distributed "AS IS" without any warranty, either express or implied. In no event shall IBM be liable for any damage arising from the use of this information, including but not limited to, loss of data, business interruption, loss of profit or loss of opportunity. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM’s future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law.