the new security frontier
play

The New Security Frontier: Threat Hunting, Augmented Intelligence, - PowerPoint PPT Presentation

The New Security Frontier: Threat Hunting, Augmented Intelligence, and Automated Response Michael Melore, CISSP IBM Cyber Security Advisor @MichaelMelore June 2018 May 2018 May 2018 Threat Hunting Workflow Cognitive Advanced Analytics


  1. The New Security Frontier: Threat Hunting, Augmented Intelligence, and Automated Response Michael Melore, CISSP IBM Cyber Security Advisor @MichaelMelore June 2018

  2. May 2018

  3. May 2018

  4. Threat Hunting Workflow Cognitive Advanced Analytics INVESTIGATE DETECT ENRICH ORCHESTRATE Incident Response

  5. Investigations IBM CONFIDENTIAL until January 2017

  6. Investigations IBM CONFIDENTIAL until January 2017

  7. Investigations IBM CONFIDENTIAL until January 2017

  8. What is an Unknown Unknown Search Offense Offense Property Property b i Offense Offense Offense Property Property Property a h c Offense Offense Offense Property d 1 2 Offense Property f Offense Offense Property Property g e Ask the question: “show me which offenses share the same property” – you don’t know the subset of offenses, not the subset of properties to search

  9. Investigations IBM CONFIDENTIAL until January 2017

  10. Hunting IBM CONFIDENTIAL until January 2017

  11. Incident Response

  12. Gain integrated, real-time threat intelligence IBM X-Force Exchange Find, fix, and secure endpoints Prevent advanced network attacks Use analytics to discover and eliminate threats Coordinate response activity Understand the latest threat actors Crowd-sourced information sharing Get help from security experts based on 700+TB of threat intelligence https://exchange.xforce.ibmcloud.com

  13. Gain integrated, real-time threat intelligence IBM X-Force Exchange – Tailored Dashboards Find, fix, and secure endpoints Prevent advanced network attacks Use analytics to discover and eliminate threats Coordinate response activity Understand the latest threat actors Crowd-sourced information sharing Get help from security experts based on 700+TB of threat intelligence https://exchange.xforce.ibmcloud.com

  14. An integrated and intelligent security immune system Device management Content security Data monitoring Data access control Access management Application scanning Cloud access Workload Application security management Identity management security broker protection

  15. The New Security Frontier: Threat Hunting, Augmented Intelligence, and Automated Response Michael Melore, CISSP IBM Cyber Security Advisor @MichaelMelore June 2018

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend