SlideShare a Scribd company logo
1 of 26
Download to read offline
The Future of Cyber Security
Chris Neely
Technical Sales Director ‐ Resilient
IBM Security Europe
Default encryptionOptional encryption
Least privilege accessFull privilege access
Multi‐factor authenticationWeak passwords
Technical focus Boardroom focus
Compliance driven Intelligence driven 
Shared revenue models
Market‐driven agile development
Lower barriers to entry 
Code and exploit reuse
Criminal 
Innovation is 
Thriving
AI
Attack tools 
get smarter
Cloud
Attack surface 
gets bigger
IoT
Attack targets 
get physical
Automation
Attack campaigns 
get faster
Innovative
Opportunistic
Autonomous
Threat
Actors
Threat 
Responders  
Innovative 
Opportunistic
Autonomous
AI
Attack tools 
get smarter
Cloud
Attack surface 
gets bigger
IoT
Attack targets 
get physical
Automation
Attack campaigns 
get faster
So what do we
NEED TO DO?
FORCE MULTIPLIERS
Get
Smarter
Respond
Faster
Work
Together
AUGMENTED 
INTELLIGENCE
GET SMARTER
WITH AI
Scan
source code
Discover personal 
data
Identify
fraud 
Find
risky users
Predict 
threats
SECURITY 
ORCHESTRATION
Coordination is critical
LDAP
lookup
f(x)
CMDB
Lookup
f(x)
CB IOC
Hunt
f(x)
Match any 
artifacts with 
known bad…
Verify alert 
from source
Evaluate risk 
of threat
to enterprise
Evaluate risk 
of disruptive 
response
Verify if threat 
intelligence 
is known
Carbon 
Black
LDAP
reset
Search estate 
for relevant 
indicators
Create and 
circulate 
status report
Reset user 
credentials
Verify alert 
from alerting 
source
Lookup system 
details from 
asset…
Lookup system 
details in 
active directory
Executives 
involved
Incident 
escalation
f(x)
PEOPLE            PROCESS            TECHNOLOGYf(x)
Security Orchestration and Automation
LDAP
lookup
f(x)
CMDB
Lookup
f(x)
CB IOC
Hunt
f(x)
Match any 
artifacts with 
known bad…
Verify alert 
from source
Escalation path
Evaluate risk 
of threat
to enterprise
Evaluate risk 
of disruptive 
response
Verify if threat 
intelligence 
is known
Carbon 
Black
LDAP
reset
Search estate 
for relevant 
indicators
Create and 
circulate 
status report
Reset user 
credentials
Verify alert 
from alerting 
source
Lookup system 
details from 
asset…
Lookup system 
details in 
active directory
Executives 
involved
Incident 
escalation
f(x)
PEOPLE            PROCESS            TECHNOLOGYf(x)
PRACTICE YOUR
PLAYBOOKS
LESSONS 
LEARNED
Culture counts
Playbooks crack 
under pressure
Leadership
matters
OPEN
COLLABORATION
Vendors Researchers AcademicsCustomers Governments
STRONGER
TOGETHER
WE ARE OPEN,
JOIN US
Pappastergion
FORCE MULTIPLIERS
AI Security 
Orchestration
Open
Collaboration
© 2016 IBM Corporation© 2018 IBM Corporation19
This suburban Melbourne, Australia ,city is
home to more than 180,000 people. Its City
Council provides and manages a wide range of
municipal services, including waste collection,
education, land and environment programs,
leisure facilities, libraries and building
management. The council employs more than
1,500 people.
Solution components
• IBM® Security Services Cyber 
Security Assessment and 
Response 
Business benefits
Identified vulnerabilities
Penetration testing identified IT
weaknesses in its environment
Reduced risk
Developed appropriate mitigation
strategies, strengthening
protection of its IT assets
Met budget objectives
The IBM team provided the right
services at a competitive price
City government
Verifying network, Wi-Fi and
application security controls
Government
Business challenge
The City Council needed to verify the effectiveness of its perimeter network
security controls, web application security controls and controls around Wi-
Fi networks. It sought a reliable provider to provide penetration testing
services.
Transformation
The City Council engaged IBM® Security Services to provide IBM
Cybersecurity Assessment and Response services. The IBM team
performed external network penetration testing, web application testing,
wireless penetration testing and wireless security architecture assessment.
© 2016 IBM Corporation© 2018 IBM Corporation20
This democratic constitutional monarchy
manages and maintains the economical,
agricultural and social well-being of its country
and citizens. It includes approximately 130
departments and agencies.
Solution components
• IBM® Security Services ‐ IBM 
Identity and Access Management 
Services
Business benefits
Established
a centralized platform for
authenticating users of enterprise
applications
Avoided
the burden of dealing with multiple
authentication mechanisms
Improved and standardized
security, privacy and data sharing
across enterprise applications
National government
Centralizing identity and
access management
Government
Business challenge
When this national government initiated a agency-wide identity, credential
and access-management initiative, it needed to define the initiative’s initial
roadmap and the project’s initial phase, which included credential and
requirements definition and high-level design. It also needed help with
writing a request for proposal (RFP).
Transformation
An IBM® Security Services team helped with strategy and design during
the first phase of the project. With IBM’s assistance, the government
determined the scope, requirements and high-level design of the first
phase and wrote an RFP. The IBM team also supports the second phase
of the project, which entails identity management, providing assistance
with credential transformation and identity management initiatives.
© 2016 IBM Corporation© 2018 IBM Corporation21
A small security team for this Canadian
government agency works to protect agency
operations and citizen-facing services from
cybercriminals.
Solution components
• IBM® QRadar® SIEM
• IBM QRadar Vulnerability 
Manager
• IBM Managed Security Services
Business benefits
Eliminated false alerts
100,000 issues and alerts were
reduced to 10 – 20 offenses daily
that are prioritized dynamically
Fast implementation
Seven days to deploy, realizing
time-to-value with the solution and
achieving ROI
Enhanced security overall
10,000 vulnerabilities were
scanned to help find security gaps
and prioritize proactive responses
Government agency
Adopting a cognitive
approach to threat detection
“QRadar offered a great value
proposition in comparison to the
feature set it provided.”
Director, Architecture and Security
Government
Business challenge
With limited resources, a Canadian government agency needed an
advanced security information and event management (SIEM) solution to
help it quickly detect and respond to potential security threats.
Transformation
By moving from manual event correlation processes to an automated
security intelligence and analytics solution from IBM, agency security staff
can quickly identify the security events that require investigation and add
context to help detect threats faster and uncover vulnerabilities that need
to be addressed.
© 2016 IBM Corporation© 2018 IBM Corporation22
Business challenge
This public sector organization was the unknowing victim of an attacker that
was attempting to test stealthy exfiltration of confidential information from a
highly sensitive asset not considered at risk.
Transformation
Using the IBM® QRadar® Sense Analytics engine for advanced threat
detection, along with other QRadar security software products, IBM Business
Partner CarbonHelix was able to quickly determine how the attacker had
gained access to the internal network and the sensitive asset as well as the
tools used to capture and move data.
Operating in the public sector, this organization
found out the hard way that the log-based
security information and event management
(SIEM) solution from its managed security
services provider was incapable of detecting
stealth attacks.
Solution components
• IBM® QRadar® QFlow Collector
• IBM QRadar Sense Analytics
• IBM QRadar Vulnerability 
Manager
• Delivered by IBM Business 
Partner CarbonHelix
Public sector
organization
Detecting and stopping
a stealth attack
“Without fast action by CarbonHelix
and their use of QRadar, we would
have joined the list of data breach
victims.”
IT Security manager
Business benefits
Detected
the stealth attack that was not
caught by log-based SIEM
analysis alone
Prevented
loss of confidential data and
further undiscovered activity by
the attacker
Reduced risk
with new security controls and
a process to identify and patch
vulnerabilities
Public Sector
© 2016 IBM Corporation© 2018 IBM Corporation23
This tax authority in Europe is responsible for
tax collection for companies and private
individuals. To ensure that public services have
the funds they need to operate effectively, the
authority carries out collection, compliance and
enforcement activities to minimize the risk of
tax avoidance and evasion.
Solution components
• IBM® i2® Analyst’s Notebook
• IBM i2 Base
Business benefits
Saves
several person-days per month ,
enabling more investigations over
the course of a year
Reveals
unexpected patterns and
networks that point to criminals
and their accomplices
Provides
evidence of tax fraud required for
prosecution
A tax authority in Europe
Putting fraudsters behind bars
by uncovering hidden criminal
networks
Government
Business challenge
Effective tax collection is a key enabler of well-funded public services. This
tax authority’s efforts to find evidence needed to prosecute tax fraudsters
were dependent on using spreadsheets to collect and analyze complex
transaction data—a time consuming and limited process.
Transformation
With IBM® i2® Analyst’s Notebook intelligence analysis software at the
heart of its economic fraud detection strategy, the authority is succeeding
in bringing more criminals to justice, faster. With lightning-speed big data
analytics, the authority can crunch large data sets in minutes, slashing the
time it needs to conduct in-depth investigations. The software provides
multiple perspectives of data, helping to reveal networks and connections
that can in turn provide evidence that can help build cases for prosecution.
© 2016 IBM Corporation© 2018 IBM Corporation24
Business challenge
Information about human trafficking comes from diverse sources, from
local news and the web to official reports. STOP THE TRAFFIK needed to
turn this information into actionable intelligence.
Transformation
Human trafficking and modern slavery are global problems that take many
forms, exploiting men, women and children in both industrialized and
emerging countries. With the help of IBM® i2® intelligence analysis
software, nonprofit STOP THE TRAFFIK is taking an intelligence-led
approach to disrupting human trafficking networks at their source.
STOP THE TRAFFIK is a pioneer in human trafficking
prevention. Since 2006, this globally oriented non-profit
organization has been helping to prevent trafficking through
building resilient communities that can identify and respond to
trafficking; sharing knowledge; and helping businesses make
their supply chains slavery free. Its Centre for Intelligence-Led
Prevention was developed to collect global stories, connect
them and build a picture of human trafficking hotspots and
trends.
Solution components
• IBM® i2® Analyst’s Notebook
• IBM i2 iBase
STOP THE TRAFFIK
Using intelligence analysis
technology to disrupt and
prevent human trafficking
“We can search for hotspots and trends
using a variety of the functions built
into the i2 Analyst’s Notebook
software.”
Lead Analyst
Public Sector
Business benefits
Uncovers
trafficking hotspots and routes
using a wealth of multidimensional
analyses
Disrupts
trafficking at the source via
awareness campaigns that target
local activity
Boosts
efficiency and simplifies sharing
by replacing spreadsheets with
visual analysis
© 2016 IBM Corporation© 2018 IBM Corporation25
With a population of more than 62,000
residents, this Czech Republic city has a rich
history as a commercial, economic and cultural
center due to its location along key trade
routes. Today the city has become a
commercial and tourist center.
Solution components
• IBM® Security Identity Manager
• IBM Security Services  ‐Identity 
and Access Management
• Solution delivered by IBM 
Business Partner GC System a.s.
Business benefits
Rapid onboarding
Provided 100 percent
improvement in the speed of new
employee activation, from days to
a few hours
Reduced cost
One full-time employee can now
manage all user accounts
Improved system security
Removed orphan accounts and
deactivates employee accounts
upon termination of employment
City government
Freeing up IT resources to
build and expand a network
for a growing city
“Centralization, automation, and a
roles-based identity management
system have simplified our IT access
management significantly.”
IT Security Manager
Government
Business challenge
The city needed an identity management solution that would free up its
limited IT staff to manage and expand its IT environment by automating
many of its time-consuming day-to-day personnel administration processes
while ensuring the security of its IT systems.
Transformation
The city implemented a rules-based identity management system that
automates employee account access based on employee position, role
and department. The system then uses an automated account
reconciliation process to detect and correct (or remove) any accounts that
are not in agreement with the pre-defined rules. Account access is
automatically removed when an individual leaves the city’s employ.
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2019. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied.  Any statement of direction 
represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives.  IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, 
other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information 
being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product  should be considered completely secure and no single product, service or security
measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and 
may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOU
ibm.com/security/community

More Related Content

What's hot

Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsZeshan Sattar
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalArrow ECS UK
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence reportSimon Clements FIRP DipRP
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityPECB
 
How to secure your business on the cloud? practical approach from strategy to...
How to secure your business on the cloud? practical approach from strategy to...How to secure your business on the cloud? practical approach from strategy to...
How to secure your business on the cloud? practical approach from strategy to...Aladdin Dandis
 
Concurrency Security Summit presentation
Concurrency Security Summit presentationConcurrency Security Summit presentation
Concurrency Security Summit presentationTed Wentzel
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?PECB
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions Thierry Matusiak
 
Big Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceBig Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceIBM Danmark
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...IBM Security
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolioPatrick Bouillaud
 

What's hot (20)

Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
Adopting Emerging Technologies
Adopting Emerging TechnologiesAdopting Emerging Technologies
Adopting Emerging Technologies
 
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity Apprenticeships
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
 
How to secure your business on the cloud? practical approach from strategy to...
How to secure your business on the cloud? practical approach from strategy to...How to secure your business on the cloud? practical approach from strategy to...
How to secure your business on the cloud? practical approach from strategy to...
 
Concurrency Security Summit presentation
Concurrency Security Summit presentationConcurrency Security Summit presentation
Concurrency Security Summit presentation
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
 
Big Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceBig Data - Amplifying Security Intelligence
Big Data - Amplifying Security Intelligence
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
 

Similar to The Future of Cyber Security

Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Sirius
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilientPrime Infoserv
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...FinTech Belgium
 
Ibm q radar_blind_references
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_referencesMaarten Werff
 
Cognitive security
Cognitive securityCognitive security
Cognitive securityIqra khalil
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016Francisco González Jiménez
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Government
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...IBM Security
 
SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)Priyanka Aash
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...Criminal IP
 
Zymr Fintech app development
 Zymr Fintech app development Zymr Fintech app development
Zymr Fintech app developmentZymr Inc
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowIBM Security
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewSuzanne Livingston
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationCloudLock
 
Top 15 AI-enabled cybersecurity companies in 2022.pdf
Top 15 AI-enabled cybersecurity companies in 2022.pdfTop 15 AI-enabled cybersecurity companies in 2022.pdf
Top 15 AI-enabled cybersecurity companies in 2022.pdfSonaliG6
 

Similar to The Future of Cyber Security (20)

Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
 
Ibm q radar_blind_references
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_references
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
 
SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
 
Zymr Fintech app development
 Zymr Fintech app development Zymr Fintech app development
Zymr Fintech app development
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services Overview
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
Top 15 AI-enabled cybersecurity companies in 2022.pdf
Top 15 AI-enabled cybersecurity companies in 2022.pdfTop 15 AI-enabled cybersecurity companies in 2022.pdf
Top 15 AI-enabled cybersecurity companies in 2022.pdf
 

More from Redazione InnovaPuglia

Piano triennale 2022-2024 - PRESNTAZIONE
Piano triennale 2022-2024 - PRESNTAZIONEPiano triennale 2022-2024 - PRESNTAZIONE
Piano triennale 2022-2024 - PRESNTAZIONERedazione InnovaPuglia
 
PIANO TRIENNALE 2022-2024 vers.5_03-03_22.pdf
PIANO TRIENNALE  2022-2024 vers.5_03-03_22.pdfPIANO TRIENNALE  2022-2024 vers.5_03-03_22.pdf
PIANO TRIENNALE 2022-2024 vers.5_03-03_22.pdfRedazione InnovaPuglia
 
Presentazione innovapuglia _settembre2016.pptx
Presentazione innovapuglia _settembre2016.pptxPresentazione innovapuglia _settembre2016.pptx
Presentazione innovapuglia _settembre2016.pptxRedazione InnovaPuglia
 
Intervento Francesco Surico, InnovaPuglia, 16-17 dicembre Bari
Intervento Francesco Surico, InnovaPuglia, 16-17 dicembre BariIntervento Francesco Surico, InnovaPuglia, 16-17 dicembre Bari
Intervento Francesco Surico, InnovaPuglia, 16-17 dicembre BariRedazione InnovaPuglia
 
Intervento Crescenzo Marino, Regione Puglia, 16-17 dicembre Bari
Intervento Crescenzo Marino, Regione Puglia, 16-17 dicembre BariIntervento Crescenzo Marino, Regione Puglia, 16-17 dicembre Bari
Intervento Crescenzo Marino, Regione Puglia, 16-17 dicembre BariRedazione InnovaPuglia
 
Cyber risks impatti, valutazioni e ragioni light
Cyber risks impatti, valutazioni e ragioni lightCyber risks impatti, valutazioni e ragioni light
Cyber risks impatti, valutazioni e ragioni lightRedazione InnovaPuglia
 
The new frontiers of it in apulia experiences for global security paul dcruz ...
The new frontiers of it in apulia experiences for global security paul dcruz ...The new frontiers of it in apulia experiences for global security paul dcruz ...
The new frontiers of it in apulia experiences for global security paul dcruz ...Redazione InnovaPuglia
 
Intervento Danilo Caivano a International Business Forum
Intervento Danilo Caivano a International Business Forum Intervento Danilo Caivano a International Business Forum
Intervento Danilo Caivano a International Business Forum Redazione InnovaPuglia
 
Intervento Marco Angelini a International Business Forum
Intervento Marco Angelini a International Business Forum Intervento Marco Angelini a International Business Forum
Intervento Marco Angelini a International Business Forum Redazione InnovaPuglia
 
Intervento Francesco Vestito a International Business Forum
Intervento Francesco Vestito a International Business ForumIntervento Francesco Vestito a International Business Forum
Intervento Francesco Vestito a International Business ForumRedazione InnovaPuglia
 
The Social&Creative Community featured by TALIA project
The Social&Creative Community featured by TALIA projectThe Social&Creative Community featured by TALIA project
The Social&Creative Community featured by TALIA projectRedazione InnovaPuglia
 

More from Redazione InnovaPuglia (20)

Piano triennale 2022-2024 - PRESNTAZIONE
Piano triennale 2022-2024 - PRESNTAZIONEPiano triennale 2022-2024 - PRESNTAZIONE
Piano triennale 2022-2024 - PRESNTAZIONE
 
PIANO TRIENNALE 2022-2024 vers.5_03-03_22.pdf
PIANO TRIENNALE  2022-2024 vers.5_03-03_22.pdfPIANO TRIENNALE  2022-2024 vers.5_03-03_22.pdf
PIANO TRIENNALE 2022-2024 vers.5_03-03_22.pdf
 
Presentazione innovapuglia _settembre2016.pptx
Presentazione innovapuglia _settembre2016.pptxPresentazione innovapuglia _settembre2016.pptx
Presentazione innovapuglia _settembre2016.pptx
 
InnovaPuglia 2014 2018
InnovaPuglia 2014 2018InnovaPuglia 2014 2018
InnovaPuglia 2014 2018
 
InnovaPuglia: I primi due anni
InnovaPuglia: I primi due anniInnovaPuglia: I primi due anni
InnovaPuglia: I primi due anni
 
InnovaPuglia 2015
InnovaPuglia 2015InnovaPuglia 2015
InnovaPuglia 2015
 
Sird imm Presentazione regione puglia
Sird imm  Presentazione regione pugliaSird imm  Presentazione regione puglia
Sird imm Presentazione regione puglia
 
Presentazione InnovaPuglia 2021
Presentazione InnovaPuglia  2021Presentazione InnovaPuglia  2021
Presentazione InnovaPuglia 2021
 
Procedura bando innoprocess
Procedura bando  innoprocessProcedura bando  innoprocess
Procedura bando innoprocess
 
Presentazione innoprocess
Presentazione innoprocessPresentazione innoprocess
Presentazione innoprocess
 
Intervento Francesco Surico, InnovaPuglia, 16-17 dicembre Bari
Intervento Francesco Surico, InnovaPuglia, 16-17 dicembre BariIntervento Francesco Surico, InnovaPuglia, 16-17 dicembre Bari
Intervento Francesco Surico, InnovaPuglia, 16-17 dicembre Bari
 
Intervento Crescenzo Marino, Regione Puglia, 16-17 dicembre Bari
Intervento Crescenzo Marino, Regione Puglia, 16-17 dicembre BariIntervento Crescenzo Marino, Regione Puglia, 16-17 dicembre Bari
Intervento Crescenzo Marino, Regione Puglia, 16-17 dicembre Bari
 
Cyber risks impatti, valutazioni e ragioni light
Cyber risks impatti, valutazioni e ragioni lightCyber risks impatti, valutazioni e ragioni light
Cyber risks impatti, valutazioni e ragioni light
 
The new frontiers of it in apulia experiences for global security paul dcruz ...
The new frontiers of it in apulia experiences for global security paul dcruz ...The new frontiers of it in apulia experiences for global security paul dcruz ...
The new frontiers of it in apulia experiences for global security paul dcruz ...
 
Intervento Danilo Caivano a International Business Forum
Intervento Danilo Caivano a International Business Forum Intervento Danilo Caivano a International Business Forum
Intervento Danilo Caivano a International Business Forum
 
Intervento Marco Angelini a International Business Forum
Intervento Marco Angelini a International Business Forum Intervento Marco Angelini a International Business Forum
Intervento Marco Angelini a International Business Forum
 
Intervento Francesco Vestito a International Business Forum
Intervento Francesco Vestito a International Business ForumIntervento Francesco Vestito a International Business Forum
Intervento Francesco Vestito a International Business Forum
 
The Social&Creative Community featured by TALIA project
The Social&Creative Community featured by TALIA projectThe Social&Creative Community featured by TALIA project
The Social&Creative Community featured by TALIA project
 
Presentazione Marco Curci
Presentazione Marco Curci Presentazione Marco Curci
Presentazione Marco Curci
 
Presentazione Domenico Laforgia
Presentazione Domenico LaforgiaPresentazione Domenico Laforgia
Presentazione Domenico Laforgia
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

The Future of Cyber Security