SlideShare a Scribd company logo
1 of 25
Download to read offline
© 2015 IBM Corporation
2015 IBM Cyber Security
Intelligence Index
July 2015
2© 2015 IBM Corporation
Today’s panelists
Nick Bradley
Practice Lead Threat
Research Group
IBM Security
nwbradley@us.ibm.com
@bradleyv20
Nick Coleman
Global Head Cyber
Security Intelligence
IBM Security
coleman@uk.ibm.com
@colemansec
Adam Trunkey
Global Marketing
Security Services
IBM Security
atrunkey@us.ibm.com
@atrunkey
3© 2015 IBM Corporation
Agenda – about this session
Our goal is to help you better understand the current
threat landscape:
1. Looking at the volume of attacks, the industries most
affected, the most prevalent types of attacks, using
the newly released Cyber Security Intelligence Index
2. Sharing some deeper insights into the Cyber Security
threat landscape – what it means to companies and
how can you, as a Security leader, better equip your
organization for success against the evolving global
threat landscape
3. Provide some example use cases that are meaningful
to customers that can help better understand key
threats that are occurring and how to use threat
intelligence to help you minimize risks in your
organization
4© 2015 IBM Corporation
What is happening in the threat landscape - The challenges of
keeping up with a perpetually evolving cyber security environment.
61%
data theft and cybercrime
are the greatest threats
to their reputation
of organizations say
Average data
breach in the
US cost
$6.5million
2015 Cost of Data Breach Study: Global Analysis
Ponemon Institute
2012 IBM Global Reputational Risk & IT Study
80%
of enterprises
have difficulty finding the
security skills they need
tools from
vendors
85
45 IBM client example
2013 Forrester Consulting, “Surviving the
Technical Security Skills Crisis”
70%
11.6M
2013 IBM CISO Survey
IBM X-Force® Threat Intelligence Quarterly 1Q 2015
Mobile malware is affecting
of security execs
are concerned about cloud
and mobile security
mobile devices
5© 2015 IBM Corporation
How we see the threat landscape
6© 2015 IBM Corporation
2014 was the year the Internet fell apart, with data breaches making
regular front-page headlines. And has continued into 2015…
2014
January August September
Large U.S. arts and
crafts retailer reveals
long-running
malware-related
breach affecting
several million
payment cards
In one of the largest
healthcare data
breaches in the U.S.,
the Social Security
numbers and other
data for millions of
patients was
compromised
A major U.S. home
goods retailer fell
victim to a point-of-
sale attack that
affected thousands of
stores, exposed
millions of payment
card data records and
resulted in theft of
millions of email
addresses
7© 2015 IBM Corporation
The IBM 2015 Cyber Security Intelligence Index is a key way IBM
sheds light on what is happening across the threat landscape.
Source of data for the Index
 Cyber security event data collected in the
course of monitoring client security
devices
 Data derived from responding to and
performing forensics on client cyber
security incidents
 Date range for this report:
1 January 2014 – 31 December 2014
Key questions addressed
 What’s happening across the threat
landscape?
 What kinds of attacks are being launched?
 How many of those attacks result in
incidents requiring investigation?
Billions of security events every year
A sample of over 1,000 clients
133 monitored countries
Worldwide IBM Cyber Security
Intelligence Index based upon:
Between 1,000 and 5,000 employees
Approximately 500 security devices
deployed within the network
“Average” client described in this
report:
Designed to complement the
IBM X-Force® Quarterly Report
8© 2015 IBM Corporation
Two industries were targeted in over 50 percent of all incidents
observed by IBM.
2013
2014
20.80%
25.33%
21.70%
19.08%
18.60%
17.79%
6.20%
9.37%
5.80%
5.08%
Finance and
insurance
Finance and
insurance
Manufacturing Information and
communication
Information and
communication
Manufacturing
Retail and
wholesale
Health and
social
services
Retail and
wholesale
Electric and
utilities
Incident rates across monitored industries
9© 2015 IBM Corporation
For the average client, IBM filters 81,342,747 security events to
identify the 109 security incidents that can potentially do harm.
Annual security events, attacks and incidents
2013 2014
109
Incidents
18,856
Attacks
91,765,453
Events
109
Incidents
12,017
Attacks
81,342,747
Events
.91%
incident-
to-attack
ratio
.65%
incident-
to-attack
ratio
Incident Attack serious enough
to warrant deeper
investigation
Attack Malicious activity attempting to
collect, disrupt or destroy
information or system resources
Event Activity on a system or network
detected by a security device or
application
10© 2015 IBM Corporation
Unauthorized access, malicious code and sustained probes or
scans dominate the threat landscape.
Categories of security incidents among the top five industries
38% Malicious
code
37% Unauthorized
access
20% Sustained
probe/scan
19% Unauthorized
access
12% Suspicious
activity
9% Access or
credentials abuse
2% Denial of
service
20% Malicious
code
20% Sustained
probe/scan
11% Suspicious
activity
8% Access or
credentials abuse
4% Denial of
service
2013 2014
11© 2015 IBM Corporation
Three “malware-less” threats emerged that exploit existing but
unknown vulnerabilities.
ShellShock Heartbleed Unicorn
 Attackers targeted
existing vulnerabilities
in the UNIX shell
 Rapid response by
cyber criminals
following news of
vulnerabilities
 Example of “malware-
less” attack—more
difficult to detect
 Exploits vulnerability in
OpenSSL protocol
 Allows attackers to
access and read
memory of systems
thought to be protected
 IBM has tracked over
1.8M Heartbleed
attacks against
customers
 Discovered by IBM,
Unicorn is a complex
vulnerability in
Microsoft Internet
Explorer
 Allows remote code to
gain control access to
programs via a data-
only attack
12© 2015 IBM Corporation
Who are the bad guys?
Outsiders
Malicious
insiders Inadvertent
actors
38%
31.5%
23.5%
55% of attacks came from people
who had insider access to an
organization’s systems
13© 2015 IBM Corporation
Where are these attackers located, and what are the threat levels by
country?
14© 2015 IBM Corporation
And from the IBM sponsored work of the Ponemon Institute,
we can see the cost of a data breach is on the rise.
NEW DATA from the
2015 Cost of Data Breach Study: Global Analysis
Independently conducted by Ponemon Institute,
Sponsored by IBM
$154
Average global cost
per record
compromised
$1.57 million
up 12%
over 2
years
Average cost of lost
business per data breach
up 23%
over 2
years
$3.8 million
Average global total
cost per data breach
15© 2015 IBM Corporation
Global and country-specific averages show key data breach costs.
Cost per record*
Cost per incident*
*Currencies converted to US dollars
$136
$154
Highest countries
Lowest countries
$217
$211
$78
$56
in Brazil
in India
in the U.S.
in Germany
$136
$3.8M $6.5M
$4.9M
$1.8M
$1.5M
in Brazil
in India
in the U.S.
in Germany23%
Global average
12%
Global average
increase over two years
Highest countries
Lowest countries
increase over two years
16© 2015 IBM Corporation
Per-record data breach costs vary widely, with a significant year-to-
year increase in several industries.
Healthcare Financial
Consumer Energy
Retail
Technology
$363 $215
$136 $132
$165
$127
* Currencies converted to US dollars
Industrial
$155
Public
$68
17© 2015 IBM Corporation
With threats and costs of a breach increasing, optimizing threat
prevention and response can be a challenge for any organization.
Firewall
logs
Proxy
logs
IDS/IPS1
logs
Web
logs
Application
logs
Authent-
ication
logs
Malware
detection
logs
Email logs
Network
security
logs
Building
access
logs
Fraud
payment
logs
CSIRT3
incidents
Vulner-
ability
patch
mgmt
DNS/
DHCP4
logs
Call/
IVR5
logs
Endpoint
security
logs
Employee
directory
SSO/
LDAP2
context
Application
inventory
Website
marketing
analytics
1Intrusion detection system / intrusion prevention system (IDS/IPS); Single sign-on (SSO) / lightweight directory access protocol (LDAP); 3Computer security
incident response team (CSIRT); 4Domain name system (DNS) / dynamic host configuration protocol (DHCP); 5Interactive voice response (IVR); 5Information
sharing and analysis center; (ISAC) 6Intellectual property; (IP) 7Open source intelligence (OSI); Malware detection or defense system (MDS)8
Ever-increasing
proliferation of
data sources
Malware
Hashes /
MD58
Brand
abuse
phishing
indicators
Malware
campaigns/
indicators
Fraud
payment
logs
Top tier
phishing
indicators
Customer asset
/ credentials
Threat
landscap
e intel
Intel as a
service
(IaaS)
Staff asset
/
credentials
Industry
threat
intel
sharing
Public
sector
threat
intel
ISAC5
threat
intel
Law
enforcemt
threat
intel
Passive
DNS4
intel
OSINT7
sentiment
analysis
Undergd/dar
k Web intel
6IP
reputation
intel
Human
Intel
Technical
Intel
Actor
intel/indic
ators
Human
Intel
(HUMINT)
Technical
Intel
(TECHINT)
• Threats and exposures
that affect a specific
organization
• Third party insight
• Industry- and geography-
specific threats and trends
Internal External
18© 2015 IBM Corporation
Operationalizing intelligence enables organizations to answer the
most critical questions about today’s threats.
Who are the
adversaries I
should be most
concerned about?
What campaigns are
targeting organizations
like mine?
Who is vulnerable to their
kinds of attacks? Have
others already been
attacked? How is attacker
behavior trending?How can I better adapt my
defense posture to
counter these adversaries?
How have other victims
reacted?
What is the nature of
my adversary?
Criminal? Industrialized
or highly focused?
What kinds of tools,
techniques & practices
are adversaries using &
how serious are they?
19© 2015 IBM Corporation
But many organizations still lack a comprehensive approach to put
their security intelligence strategy into action.
• What tradecraft are others seeing?
• What findings are most relevant?
• How can I utilize this intel?
• What is the fastest route to
containment and controlled loss?
• Are my people in the right place,
doing the right things?
• How should incidents and
response shape strategy?
• How can I expand my strategy to
address cloud-based risk?
• How can I optimize visibility with
intelligence and SIEM?
• How can I better plan, allocate and
respond with expertise?
• How can I learn from and apply
experience with real-world threats?
PLANNING AND BUILDING
CAPABILITY
LEVERAGING INTELLIGENCE
MANAGING RESPONSE
How can I strengthen and
extend my current
investment in security
operations?
Security Intelligence
Platform
How do I address phases
of an attack lifecycle?
20© 2015 IBM Corporation
Security intelligence underpins the overall security challenge.
It is core to IBM’s approach with clients.
Buyers
CISO, CIO, and Line-of-Business
Deliver a broad portfolio of solutions differentiated
through their integration and innovation to address the latest trends
Key Security Trends
Advanced
Threats
Skills
Shortage
Cloud Mobile and
Internet of Things
Compliance
Mandates
IBM Security Portfolio
Strategy, Risk and Compliance Cybersecurity Assessment and Response
Security Intelligence and Operations
Advanced
Fraud
Protection
Identity
and Access
Management
Data
Security
Application
Security
Network, Mobile
and Endpoint
Protection
Advanced Threat and Security Research
Support the
CISO agenda1
Innovate around
megatrends2
Lead in selected
segments3
21© 2015 IBM Corporation
What makes IBM Security different – global view of threat.
monitored countries (MSS)
service delivery experts
devices under contract
+
endpoints protected
+
events managed per day
+
IBM Security by the Numbers
+
+
22© 2015 IBM Corporation
How can the Index help you? Key questions to ask about your
organization’s exposure.
What level of events, attacks,
incidents are you seeing?
• Events – what is the tuning and how efficient is your
SOC / SIEM working for you?
• Are you getting the right use cases and data to allow
you to manage and see the threats?
• Do you have the right intelligence processing and
insight you need today to see?
Are you prepared and able to
respond to the incidents?
• Do you have the intelligence to be able to see what
is happening out there?
• How many incidents are you facing a year, do you
have the support and preparation you need?
23© 2015 IBM Corporation
Cybersecurity Awareness Executive Briefing – Security Services
Behind the scenes illustration
of modern cyber attacks
 Cyber attacks happen on a daily basis – we see
them on the news but how do they happen and why?
 A 2 hour briefing that goes behind the scenes, using
real-world scenarios, illustrative examples, and
interactive demonstrations to examine the anatomy
of modern cyber attacks:
 The 5-stage chain attackers typically follow
 Common methods and attack surfaces
 The role of social media
 Technological advancement and operational
sophistication
 Generate executive level awareness on current
threat level, cyber risk profile, global trends, potential
attack impact and essential practices
 Discuss key actions that can be taken today to
better protect yourself and your organization
Data
Infrastructure
People
24© 2015 IBM Corporation
IBM can help you chart the course to a more secure organization.
Learn more! Download the
2015 Cyber Security Intelligence Index
Contact your IBM sales representative for a discussion on:
Cyber Security Assessment and Response Services
Advanced Threat Intelligence or other IBM Security offerings
Download the
2015 Cost of Data Breach Study
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks
on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.
IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOUwww.ibm.com/security

More Related Content

What's hot

Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in indiaGyan Research And Analytics
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017NRC
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017IBM Security
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Bloxx
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
 

What's hot (20)

Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in india
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 

Viewers also liked

Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityIT Governance Ltd
 
State of the CSO 2015
State of the CSO 2015State of the CSO 2015
State of the CSO 2015IDG
 
China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...
China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...
China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...APNIC
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Grant Barker
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Waqas Amir
 
Improving IT Skills the Right Way
Improving IT Skills the Right WayImproving IT Skills the Right Way
Improving IT Skills the Right WayBMC Software
 
Seminario "Be social e on-line: strategie web di successo" intervento di Fran...
Seminario "Be social e on-line: strategie web di successo" intervento di Fran...Seminario "Be social e on-line: strategie web di successo" intervento di Fran...
Seminario "Be social e on-line: strategie web di successo" intervento di Fran...Progetto Imprenderò
 
Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015Scalar Decisions
 
How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?David Hunt
 
How to choose the right penetration testing company
How to choose the right penetration testing companyHow to choose the right penetration testing company
How to choose the right penetration testing companyPenetration_Testing
 
Visual Analytics and Security Intelligence
Visual Analytics and Security IntelligenceVisual Analytics and Security Intelligence
Visual Analytics and Security IntelligenceRaffael Marty
 
Web 2.0 Research Tools: A Quick Guide
Web 2.0 Research Tools: A Quick GuideWeb 2.0 Research Tools: A Quick Guide
Web 2.0 Research Tools: A Quick GuideMohamed Amin Embi
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Andris Soroka
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationPriyanka Aash
 
Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016Martin Tom-Petersen
 
Understanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityUnderstanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityNeil Parker
 
Security Trends in the Retail Industry
Security Trends in the Retail IndustrySecurity Trends in the Retail Industry
Security Trends in the Retail IndustryIBM Security
 
Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...IPPAI
 

Viewers also liked (20)

Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 
State of the CSO 2015
State of the CSO 2015State of the CSO 2015
State of the CSO 2015
 
China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...
China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...
China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015
 
Improving IT Skills the Right Way
Improving IT Skills the Right WayImproving IT Skills the Right Way
Improving IT Skills the Right Way
 
Seminario "Be social e on-line: strategie web di successo" intervento di Fran...
Seminario "Be social e on-line: strategie web di successo" intervento di Fran...Seminario "Be social e on-line: strategie web di successo" intervento di Fran...
Seminario "Be social e on-line: strategie web di successo" intervento di Fran...
 
Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015
 
How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?
 
How to choose the right penetration testing company
How to choose the right penetration testing companyHow to choose the right penetration testing company
How to choose the right penetration testing company
 
Visual Analytics and Security Intelligence
Visual Analytics and Security IntelligenceVisual Analytics and Security Intelligence
Visual Analytics and Security Intelligence
 
Web 2.0 Research Tools: A Quick Guide
Web 2.0 Research Tools: A Quick GuideWeb 2.0 Research Tools: A Quick Guide
Web 2.0 Research Tools: A Quick Guide
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
 
Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016
 
Understanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityUnderstanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber Security
 
Security Trends in the Retail Industry
Security Trends in the Retail IndustrySecurity Trends in the Retail Industry
Security Trends in the Retail Industry
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...
 

Similar to Key Findings from the 2015 IBM Cyber Security Intelligence Index

IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM Security
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...IBM Security
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareSarah Freemantle
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldJohn Palfreyman
 
IBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexIBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexAndreanne Clarke
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of EngagementJohn Palfreyman
 
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM Security
 
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...IBM Security
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Government
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
IBM security systems overview v1.0 - rohit nagarajan
IBM security systems overview v1.0 -  rohit nagarajanIBM security systems overview v1.0 -  rohit nagarajan
IBM security systems overview v1.0 - rohit nagarajanShwetank Jayaswal
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016Francisco González Jiménez
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineRapidSSLOnline.com
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 

Similar to Key Findings from the 2015 IBM Cyber Security Intelligence Index (20)

IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
IBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexIBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence Index
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of Engagement
 
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
IBM security systems overview v1.0 - rohit nagarajan
IBM security systems overview v1.0 -  rohit nagarajanIBM security systems overview v1.0 -  rohit nagarajan
IBM security systems overview v1.0 - rohit nagarajan
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 

More from IBM Security

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 

More from IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Key Findings from the 2015 IBM Cyber Security Intelligence Index

  • 1. © 2015 IBM Corporation 2015 IBM Cyber Security Intelligence Index July 2015
  • 2. 2© 2015 IBM Corporation Today’s panelists Nick Bradley Practice Lead Threat Research Group IBM Security nwbradley@us.ibm.com @bradleyv20 Nick Coleman Global Head Cyber Security Intelligence IBM Security coleman@uk.ibm.com @colemansec Adam Trunkey Global Marketing Security Services IBM Security atrunkey@us.ibm.com @atrunkey
  • 3. 3© 2015 IBM Corporation Agenda – about this session Our goal is to help you better understand the current threat landscape: 1. Looking at the volume of attacks, the industries most affected, the most prevalent types of attacks, using the newly released Cyber Security Intelligence Index 2. Sharing some deeper insights into the Cyber Security threat landscape – what it means to companies and how can you, as a Security leader, better equip your organization for success against the evolving global threat landscape 3. Provide some example use cases that are meaningful to customers that can help better understand key threats that are occurring and how to use threat intelligence to help you minimize risks in your organization
  • 4. 4© 2015 IBM Corporation What is happening in the threat landscape - The challenges of keeping up with a perpetually evolving cyber security environment. 61% data theft and cybercrime are the greatest threats to their reputation of organizations say Average data breach in the US cost $6.5million 2015 Cost of Data Breach Study: Global Analysis Ponemon Institute 2012 IBM Global Reputational Risk & IT Study 80% of enterprises have difficulty finding the security skills they need tools from vendors 85 45 IBM client example 2013 Forrester Consulting, “Surviving the Technical Security Skills Crisis” 70% 11.6M 2013 IBM CISO Survey IBM X-Force® Threat Intelligence Quarterly 1Q 2015 Mobile malware is affecting of security execs are concerned about cloud and mobile security mobile devices
  • 5. 5© 2015 IBM Corporation How we see the threat landscape
  • 6. 6© 2015 IBM Corporation 2014 was the year the Internet fell apart, with data breaches making regular front-page headlines. And has continued into 2015… 2014 January August September Large U.S. arts and crafts retailer reveals long-running malware-related breach affecting several million payment cards In one of the largest healthcare data breaches in the U.S., the Social Security numbers and other data for millions of patients was compromised A major U.S. home goods retailer fell victim to a point-of- sale attack that affected thousands of stores, exposed millions of payment card data records and resulted in theft of millions of email addresses
  • 7. 7© 2015 IBM Corporation The IBM 2015 Cyber Security Intelligence Index is a key way IBM sheds light on what is happening across the threat landscape. Source of data for the Index  Cyber security event data collected in the course of monitoring client security devices  Data derived from responding to and performing forensics on client cyber security incidents  Date range for this report: 1 January 2014 – 31 December 2014 Key questions addressed  What’s happening across the threat landscape?  What kinds of attacks are being launched?  How many of those attacks result in incidents requiring investigation? Billions of security events every year A sample of over 1,000 clients 133 monitored countries Worldwide IBM Cyber Security Intelligence Index based upon: Between 1,000 and 5,000 employees Approximately 500 security devices deployed within the network “Average” client described in this report: Designed to complement the IBM X-Force® Quarterly Report
  • 8. 8© 2015 IBM Corporation Two industries were targeted in over 50 percent of all incidents observed by IBM. 2013 2014 20.80% 25.33% 21.70% 19.08% 18.60% 17.79% 6.20% 9.37% 5.80% 5.08% Finance and insurance Finance and insurance Manufacturing Information and communication Information and communication Manufacturing Retail and wholesale Health and social services Retail and wholesale Electric and utilities Incident rates across monitored industries
  • 9. 9© 2015 IBM Corporation For the average client, IBM filters 81,342,747 security events to identify the 109 security incidents that can potentially do harm. Annual security events, attacks and incidents 2013 2014 109 Incidents 18,856 Attacks 91,765,453 Events 109 Incidents 12,017 Attacks 81,342,747 Events .91% incident- to-attack ratio .65% incident- to-attack ratio Incident Attack serious enough to warrant deeper investigation Attack Malicious activity attempting to collect, disrupt or destroy information or system resources Event Activity on a system or network detected by a security device or application
  • 10. 10© 2015 IBM Corporation Unauthorized access, malicious code and sustained probes or scans dominate the threat landscape. Categories of security incidents among the top five industries 38% Malicious code 37% Unauthorized access 20% Sustained probe/scan 19% Unauthorized access 12% Suspicious activity 9% Access or credentials abuse 2% Denial of service 20% Malicious code 20% Sustained probe/scan 11% Suspicious activity 8% Access or credentials abuse 4% Denial of service 2013 2014
  • 11. 11© 2015 IBM Corporation Three “malware-less” threats emerged that exploit existing but unknown vulnerabilities. ShellShock Heartbleed Unicorn  Attackers targeted existing vulnerabilities in the UNIX shell  Rapid response by cyber criminals following news of vulnerabilities  Example of “malware- less” attack—more difficult to detect  Exploits vulnerability in OpenSSL protocol  Allows attackers to access and read memory of systems thought to be protected  IBM has tracked over 1.8M Heartbleed attacks against customers  Discovered by IBM, Unicorn is a complex vulnerability in Microsoft Internet Explorer  Allows remote code to gain control access to programs via a data- only attack
  • 12. 12© 2015 IBM Corporation Who are the bad guys? Outsiders Malicious insiders Inadvertent actors 38% 31.5% 23.5% 55% of attacks came from people who had insider access to an organization’s systems
  • 13. 13© 2015 IBM Corporation Where are these attackers located, and what are the threat levels by country?
  • 14. 14© 2015 IBM Corporation And from the IBM sponsored work of the Ponemon Institute, we can see the cost of a data breach is on the rise. NEW DATA from the 2015 Cost of Data Breach Study: Global Analysis Independently conducted by Ponemon Institute, Sponsored by IBM $154 Average global cost per record compromised $1.57 million up 12% over 2 years Average cost of lost business per data breach up 23% over 2 years $3.8 million Average global total cost per data breach
  • 15. 15© 2015 IBM Corporation Global and country-specific averages show key data breach costs. Cost per record* Cost per incident* *Currencies converted to US dollars $136 $154 Highest countries Lowest countries $217 $211 $78 $56 in Brazil in India in the U.S. in Germany $136 $3.8M $6.5M $4.9M $1.8M $1.5M in Brazil in India in the U.S. in Germany23% Global average 12% Global average increase over two years Highest countries Lowest countries increase over two years
  • 16. 16© 2015 IBM Corporation Per-record data breach costs vary widely, with a significant year-to- year increase in several industries. Healthcare Financial Consumer Energy Retail Technology $363 $215 $136 $132 $165 $127 * Currencies converted to US dollars Industrial $155 Public $68
  • 17. 17© 2015 IBM Corporation With threats and costs of a breach increasing, optimizing threat prevention and response can be a challenge for any organization. Firewall logs Proxy logs IDS/IPS1 logs Web logs Application logs Authent- ication logs Malware detection logs Email logs Network security logs Building access logs Fraud payment logs CSIRT3 incidents Vulner- ability patch mgmt DNS/ DHCP4 logs Call/ IVR5 logs Endpoint security logs Employee directory SSO/ LDAP2 context Application inventory Website marketing analytics 1Intrusion detection system / intrusion prevention system (IDS/IPS); Single sign-on (SSO) / lightweight directory access protocol (LDAP); 3Computer security incident response team (CSIRT); 4Domain name system (DNS) / dynamic host configuration protocol (DHCP); 5Interactive voice response (IVR); 5Information sharing and analysis center; (ISAC) 6Intellectual property; (IP) 7Open source intelligence (OSI); Malware detection or defense system (MDS)8 Ever-increasing proliferation of data sources Malware Hashes / MD58 Brand abuse phishing indicators Malware campaigns/ indicators Fraud payment logs Top tier phishing indicators Customer asset / credentials Threat landscap e intel Intel as a service (IaaS) Staff asset / credentials Industry threat intel sharing Public sector threat intel ISAC5 threat intel Law enforcemt threat intel Passive DNS4 intel OSINT7 sentiment analysis Undergd/dar k Web intel 6IP reputation intel Human Intel Technical Intel Actor intel/indic ators Human Intel (HUMINT) Technical Intel (TECHINT) • Threats and exposures that affect a specific organization • Third party insight • Industry- and geography- specific threats and trends Internal External
  • 18. 18© 2015 IBM Corporation Operationalizing intelligence enables organizations to answer the most critical questions about today’s threats. Who are the adversaries I should be most concerned about? What campaigns are targeting organizations like mine? Who is vulnerable to their kinds of attacks? Have others already been attacked? How is attacker behavior trending?How can I better adapt my defense posture to counter these adversaries? How have other victims reacted? What is the nature of my adversary? Criminal? Industrialized or highly focused? What kinds of tools, techniques & practices are adversaries using & how serious are they?
  • 19. 19© 2015 IBM Corporation But many organizations still lack a comprehensive approach to put their security intelligence strategy into action. • What tradecraft are others seeing? • What findings are most relevant? • How can I utilize this intel? • What is the fastest route to containment and controlled loss? • Are my people in the right place, doing the right things? • How should incidents and response shape strategy? • How can I expand my strategy to address cloud-based risk? • How can I optimize visibility with intelligence and SIEM? • How can I better plan, allocate and respond with expertise? • How can I learn from and apply experience with real-world threats? PLANNING AND BUILDING CAPABILITY LEVERAGING INTELLIGENCE MANAGING RESPONSE How can I strengthen and extend my current investment in security operations? Security Intelligence Platform How do I address phases of an attack lifecycle?
  • 20. 20© 2015 IBM Corporation Security intelligence underpins the overall security challenge. It is core to IBM’s approach with clients. Buyers CISO, CIO, and Line-of-Business Deliver a broad portfolio of solutions differentiated through their integration and innovation to address the latest trends Key Security Trends Advanced Threats Skills Shortage Cloud Mobile and Internet of Things Compliance Mandates IBM Security Portfolio Strategy, Risk and Compliance Cybersecurity Assessment and Response Security Intelligence and Operations Advanced Fraud Protection Identity and Access Management Data Security Application Security Network, Mobile and Endpoint Protection Advanced Threat and Security Research Support the CISO agenda1 Innovate around megatrends2 Lead in selected segments3
  • 21. 21© 2015 IBM Corporation What makes IBM Security different – global view of threat. monitored countries (MSS) service delivery experts devices under contract + endpoints protected + events managed per day + IBM Security by the Numbers + +
  • 22. 22© 2015 IBM Corporation How can the Index help you? Key questions to ask about your organization’s exposure. What level of events, attacks, incidents are you seeing? • Events – what is the tuning and how efficient is your SOC / SIEM working for you? • Are you getting the right use cases and data to allow you to manage and see the threats? • Do you have the right intelligence processing and insight you need today to see? Are you prepared and able to respond to the incidents? • Do you have the intelligence to be able to see what is happening out there? • How many incidents are you facing a year, do you have the support and preparation you need?
  • 23. 23© 2015 IBM Corporation Cybersecurity Awareness Executive Briefing – Security Services Behind the scenes illustration of modern cyber attacks  Cyber attacks happen on a daily basis – we see them on the news but how do they happen and why?  A 2 hour briefing that goes behind the scenes, using real-world scenarios, illustrative examples, and interactive demonstrations to examine the anatomy of modern cyber attacks:  The 5-stage chain attackers typically follow  Common methods and attack surfaces  The role of social media  Technological advancement and operational sophistication  Generate executive level awareness on current threat level, cyber risk profile, global trends, potential attack impact and essential practices  Discuss key actions that can be taken today to better protect yourself and your organization Data Infrastructure People
  • 24. 24© 2015 IBM Corporation IBM can help you chart the course to a more secure organization. Learn more! Download the 2015 Cyber Security Intelligence Index Contact your IBM sales representative for a discussion on: Cyber Security Assessment and Response Services Advanced Threat Intelligence or other IBM Security offerings Download the 2015 Cost of Data Breach Study
  • 25. © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOUwww.ibm.com/security