Mary O’Brien, VP of Development at IBM Security, shares how IBM Watson learned the syntax and jargon for cybersecurity, and is poised to become a trusted advisor for security professionals.
Cognitive computing is about augmenting our traditional computing systems with an understanding of formerly opaque data such as natural human language, imagery, etc. In this video Jeb Linton, Chief Security Architect at IBM Watson Group, describes how marrying the worlds of structured and semi-structured machine data to the world of natural language provides a more complete picture of the security landscape.
To learn more, please visit: http://ibm.co/2eWAbfX
IBM Security has launched a new team of global experts - IBM X-Force IRIS, to help clients prepare for and rapidly respond to security threats. Our seasoned experts and consultants deliver threat intelligence services, incident preparedness planning and onsite response services to help organizations stay ahead of the threat.
IBM X-Force Command Centers represent a quantum leap in IBM Security’s core capabilities and are built upon the latest era of cognitive security solutions and the industries top talent. By combining leading technology, industry proven processes, and the support of skilled security experts, IBM X-Force Command Centers help clients stay ahead of the most advanced threats.
With our move to X-Force Command Center we expand traditional security operation center (SOC) functions and to include threat management, threat hunting, SIEM services, cognitive and even cyber range functionality.
IBM X-Force Command Center introduces the first commercial cyber range built in a state-of-the-art facility that immerses clients/potential clients in a simulated SOC using tactics and protocols designed to anticipate and defend against current and future cyber threats. It will provide critical cyber security-related crisis leadership skills in a safe “live fire” environment where participants can experience the effects of live malware, DDoS, and other traditional and more advanced attacks. The participants will operate real tools, investigate active infections, and respond to internal and external cyber security events.
This cyber simulator provides clients with unique hands-on experience to understand the dynamics of a cyber attack. Not only does our cyber range emulate a training environment but also explores actual IP addresses of sites to uncover malware and mimics any industry to identify specific malware prone to attack so our centers can help defend against it. It empowers organizations to understand potential security tools and services needed, improves an organization’s skills regarding incident response and crisis management, and enhances collaboration and communication when responding to an attack.
X-Force Command Center, IBM Security's global array of Security Operations Centers, protect 4,500 clients across 133 countries.
X-Force Command Centers serve as IBM Security’s global threat monitoring and intelligence centers, built with cognitive in mind. Acting as a single global entity, the command centers provide 24/7/365 security monitoring for IBM’s Managed Security Services clients. X-Force Command Centers currently handle over 20 billion security events per day, with the capability to scale to over 35 billion+ security events daily (or 1 TRILLION events each month.)
The 24x7 “watch floor” within the SOC incorporates state-of-the-art technology, programs, processes and facilities that increase collaboration and capacity to help our analysts work smarter.
Our analysts have access to tools like Watson for Cyber Security arming them with the ability to quickly synthesize large amounts of data and come to evidenced based recommendations and conclusions quickly for our clients.
Using the IBM X-Force Intelligence, the SOCs bring in 200 thousand new pieces of threat intelligence daily by leveraging insights from analysis of over 100 million web pages and images, collect data from 270 million endpoints, and pull in the expansive library of threat research from IBM’s X-Force Threat Intelligence team.
Are you taking the right steps to protect your organization from insider threats? IBM X-Force data shows that 60% of all attacks involved insiders in 2015, and 44.5% involved malicious, trusted users. Keeping your organization safe starts with your people – knowing who they are, and being able to predict or spot malicious behaviors.