More Related Content Similar to IBM Security - Successful digital transformation (20) IBM Security - Successful digital transformation2. 2
IBM Security/ © 2020IBM Corporation
In recent years, cyber attacks have intensified
3. 3
IBM Security/ © 2020IBM Corporation
Cyber criminality is a universal challenge
In 2020, there will be…
5 billion5 billion5 billion5 billion
personal data records stolen
20.8 billion20.8 billion20.8 billion20.8 billion
“things” to secure“things” to secure“things” to secure“things” to secure
€ 700 billion€ 700 billion€ 700 billion€ 700 billion
lost to cybercrime
21st November 2019 at 11:02
Hacktivists | Hackers | Cyber mercenariesHacktivists | Hackers | Cyber mercenariesHacktivists | Hackers | Cyber mercenariesHacktivists | Hackers | Cyber mercenaries
4. 4
IBM Security/ © 2020IBM Corporation
Most of the attacks are financially motivated
Monetizabledata
Financial Services, Retail, Transportation, Medias,
Professional Services, Government, Education,
Manufacturing, Energy, Healthcare
Monetizableactions
Financial Services, Retail, Transportation, Medias,
Professional Services, Government, Education,
Manufacturing, Energy, Healthcare
Influence&Destabilization
Medias, Governement
ProbabilityProbabilityProbabilityProbabilityofoccurrenceofoccurrenceofoccurrenceofoccurrence
SystemicSystemicSystemicSystemicimpactimpactimpactimpact
++++
++++----
----
5. To cope, technical solutions exist at IBM Security…
Healthcare
14 out of 1514 out of 1514 out of 1514 out of 15 of the
world’s largest healthcare
companies
Automotive
19 out of 2019 out of 2019 out of 2019 out of 20 of the world’s
largest motor vehicle and
parts companies
Airline
8 out of 108 out of 108 out of 108 out of 10 of the world’s
largest airline companies
Telecom
The 10 largestThe 10 largestThe 10 largestThe 10 largest telecom
companies
Finance
49 out of 5049 out of 5049 out of 5049 out of 50 of the world’s
largest financial services
and banking companies
Tech
13 out of 1513 out of 1513 out of 1513 out of 15 of the world’s
largest technology companies
IBM Security secures
95%
of the Global Fortune 500
100%
of the US Fortune 100
Worldwide leader, 8 000 experts, 10 000 Security patents, 17 000 clients
5
IBM Security/ © 2020IBM Corporation
Build Leadership and Culture
• X-Force Cyber Range & C-TOC
• SOC Exchange
• Security Summit
• Users Groups
• Conferences
Detect and Stop Advanced Threats
• QRadar Platform
• X-Force Threat Intelligence
Orchestrate Incident Response
• Resilient
• Cloud Pak for Security
Master Threat Hunting
• i2 Intelligence Analysis
• QRadar Advisor with Watson
Protect Critical Assets
• Guardium Data Protection
• Data Risk Manager
• Multi-cloud Encryption
• Key Lifecycle Manager
Govern Users and Identities
• Identity Governance
• Cloud Identity
• Access Manager
• Secret Server
Secure Hybrid Cloud
• QRadar Cloud Analytics
• Cloud Identity
• Guardium for Cloud
Unify EndpointManagement
• MaaS360
Deliver Digital IdentityTrust
• Trusteer
• Cloud Identity
6. IBM Security / © 2020 IBM Corporation 6
Incidents responsible is not only a matter of security
IBM Cyber Tactical Operations Center
7. IBM Security / © 2020 IBM Corporation 7
… and that cybersecurity is becoming obvious
In France, manufacturers have had to provide anchorages since 1970In France, manufacturers have had to provide anchorages since 1970In France, manufacturers have had to provide anchorages since 1970In France, manufacturers have had to provide anchorages since 1970
The wearing of seat belts became mandatory at the front in 1979The wearing of seat belts became mandatory at the front in 1979The wearing of seat belts became mandatory at the front in 1979The wearing of seat belts became mandatory at the front in 1979
The wearing of seat belts became mandatory at the rear in 1990The wearing of seat belts became mandatory at the rear in 1990The wearing of seat belts became mandatory at the rear in 1990The wearing of seat belts became mandatory at the rear in 1990
50%
Reduced risk of death
World Health Organization
1million
Lives saved since 1960
European Union
$50B
Saved per year
USA
€4M
Average cost of data breach
Ponemom Institute, 2019
#1
Cyber risk ranking
Allianz Risk Barometer, 2020
92%
Affected companies
CLUSIF, 2019
72%in5years
Rising cost of cyber attacks
Accenture, 2019
25%/year
Rise of cyber attacks
Accenture, 2019
10%
More resistant by training
X-Force, 2020
8. 8
IBM Security/ © 2020IBM Corporation
Cybersecurity is a business challenge
2020202020202020
20182018201820182017201720172017
9. ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2020. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's
current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both.
Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being
altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can
be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
Thank you
ibm.com/security/community
IBM Security