IBM CybersecurityIBM Cybersecurity
Securing IBM with Innovation
Shamla NaidooVP Managing Partner, IBM SecurityFormer Global CISO, [email protected]
Risk is Existential and Multi-dimensional
@ 2017 IBM Corporation
TechnologyEnvironment
Demographics
Legal/Regulatory
Political
Economy
Geographical
RISK
IBM CybersecurityIBM SecurityIBM CybersecurityIBM CybersecurityIBM Cybersecurity3
Security Challengesin a hyper connected world
Disappearing boundaries between enterprise and rest of the world
Technology Evolution, specifically Cloud, IoT, and Artificial Intelligence
Data, the most important asset to protect
Criminal Hackers, smart and well funded
Risk Management is a board room discussion, and business leaders are more accountable than ever before
IBM Cybersecurity
80% of the worlds data has been invisible. Until now.”
How Artificial Intelligence (AI) can help Cybersecurity?
IBM CybersecurityIBM Cybersecurity7
AI – The History
IBM CybersecurityIBM Cybersecurity8
AI – The Present & Future
How AI Works
IBM CybersecurityIBM Cybersecurity10
Machine Learning
IBM CybersecurityIBM Cybersecurity11
Machine Learning
IBM CybersecurityIBM Cybersecurity12
Machine Learning
IBM CybersecurityIBM Cybersecurity13
What is this object?
IBM CybersecurityIBM Cybersecurity14
IBM CybersecurityIBM Cybersecurity15
How AI Works
Learn Reason Augment
© 2018 IBM Corporation16
Why is AI important to me in my role?
IBM CybersecurityIBM SecurityIBM CybersecurityIBM CybersecurityIBM Cybersecurity18
Security ChallengesWhy it’s important to a CISO
Disappearing boundaries
Technology Evolution
Data
Criminal Hackers
IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity19
“The number of unfilled information security positions around the world is
estimated at 208,000 and is expected to grow to 3-4 Million in next few years.”
© 2018 IBM Corporation20
IBM Watson
AI & Cybersecuritya perfect marriage
IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity21
How?
IBM CybersecurityIBM SecurityIBM CybersecurityIBM CybersecurityIBM Cybersecurity23
THREAT INTELLIGENCE
DATA
IDENTITY & ACCESS
MOBILEADVANCEDFRAUD DETECTION
APPS
ENDPOINT NETWORK
SECURITYORCHESTRATION
& ANALYTICS
Security Governancebuild a robust immune system
IBM CybersecurityIBM SecurityIBM CybersecurityIBM CybersecurityIBM Cybersecurity24
Detect & Respond Faster
Log Events
Potential attacks
Confirmed attacks
Incidents
Noteworthy Incidents
IBM
To
ols
(Q
rad
ar,
Wat
son
)M
anu
al
valid
atio
n
x trillion
xxxx
yyy
zz
a
x trillion
xxxx
yyy
zz
a4Q18 1Q19
Security Operations Center (SOC)▪ 24x7 monitoring enables us to proactively detect the attacks▪ SOC data informs our ability to take preventative actions in future
Observation▪ IBM Watson for cyber is helping to reduce the time it takes to detect issues and respond
IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity25
5 Ways AI Can Improve Cybersecurity
IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity27
5 Ways AI Can Improve Cybersecurity
AI Risks & Criticisms
IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity29
Be Aware that