![Page 1: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/1.jpg)
IBM CybersecurityIBM Cybersecurity
Securing IBM with Innovation
Shamla NaidooVP Managing Partner, IBM SecurityFormer Global CISO, [email protected]
![Page 2: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/2.jpg)
Risk is Existential and Multi-dimensional
@ 2017 IBM Corporation
TechnologyEnvironment
Demographics
Legal/Regulatory
Political
Economy
Geographical
RISK
![Page 3: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/3.jpg)
IBM CybersecurityIBM SecurityIBM CybersecurityIBM CybersecurityIBM Cybersecurity3
Security Challengesin a hyper connected world
Disappearing boundaries between enterprise and rest of the world
Technology Evolution, specifically Cloud, IoT, and Artificial Intelligence
Data, the most important asset to protect
Criminal Hackers, smart and well funded
![Page 4: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/4.jpg)
Risk Management is a board room discussion, and business leaders are more accountable than ever before
![Page 5: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/5.jpg)
IBM Cybersecurity
80% of the worlds data has been invisible. Until now.”
![Page 6: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/6.jpg)
How Artificial Intelligence (AI) can help Cybersecurity?
![Page 7: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/7.jpg)
IBM CybersecurityIBM Cybersecurity7
AI – The History
![Page 8: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/8.jpg)
IBM CybersecurityIBM Cybersecurity8
AI – The Present & Future
![Page 9: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/9.jpg)
How AI Works
![Page 10: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/10.jpg)
IBM CybersecurityIBM Cybersecurity10
Machine Learning
![Page 11: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/11.jpg)
IBM CybersecurityIBM Cybersecurity11
Machine Learning
![Page 12: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/12.jpg)
IBM CybersecurityIBM Cybersecurity12
Machine Learning
![Page 13: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/13.jpg)
IBM CybersecurityIBM Cybersecurity13
What is this object?
![Page 14: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/14.jpg)
IBM CybersecurityIBM Cybersecurity14
![Page 15: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/15.jpg)
IBM CybersecurityIBM Cybersecurity15
How AI Works
Learn Reason Augment
![Page 16: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/16.jpg)
© 2018 IBM Corporation16
![Page 17: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/17.jpg)
Why is AI important to me in my role?
![Page 18: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/18.jpg)
IBM CybersecurityIBM SecurityIBM CybersecurityIBM CybersecurityIBM Cybersecurity18
Security ChallengesWhy it’s important to a CISO
Disappearing boundaries
Technology Evolution
Data
Criminal Hackers
![Page 19: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/19.jpg)
IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity19
“The number of unfilled information security positions around the world is
estimated at 208,000 and is expected to grow to 3-4 Million in next few years.”
![Page 20: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/20.jpg)
© 2018 IBM Corporation20
IBM Watson
AI & Cybersecuritya perfect marriage
![Page 21: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/21.jpg)
IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity21
![Page 22: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/22.jpg)
How?
![Page 23: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/23.jpg)
IBM CybersecurityIBM SecurityIBM CybersecurityIBM CybersecurityIBM Cybersecurity23
THREAT INTELLIGENCE
DATA
IDENTITY & ACCESS
MOBILEADVANCEDFRAUD DETECTION
APPS
ENDPOINT NETWORK
SECURITYORCHESTRATION
& ANALYTICS
Security Governancebuild a robust immune system
![Page 24: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/24.jpg)
IBM CybersecurityIBM SecurityIBM CybersecurityIBM CybersecurityIBM Cybersecurity24
Detect & Respond Faster
Log Events
Potential attacks
Confirmed attacks
Incidents
Noteworthy Incidents
IBM
To
ols
(Q
rad
ar,
Wat
son
)M
anu
al
valid
atio
n
x trillion
xxxx
yyy
zz
a
x trillion
xxxx
yyy
zz
a4Q18 1Q19
Security Operations Center (SOC)▪ 24x7 monitoring enables us to proactively detect the attacks▪ SOC data informs our ability to take preventative actions in future
Observation▪ IBM Watson for cyber is helping to reduce the time it takes to detect issues and respond
![Page 25: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/25.jpg)
IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity25
![Page 26: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/26.jpg)
5 Ways AI Can Improve Cybersecurity
![Page 27: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/27.jpg)
IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity27
5 Ways AI Can Improve Cybersecurity
![Page 28: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/28.jpg)
AI Risks & Criticisms
![Page 29: Securing IBM with Innovation - CDM Media · 23 IBM CybersecurityIBM Security THREAT INTELLIGENCE DATA IDENTITY & ACCESS MOBILE ADVANCED FRAUD DETECTION APPS ENDPOINT NETWORK SECURITY](https://reader033.vdocuments.mx/reader033/viewer/2022050122/5f52ac1981b8395eec3d29a5/html5/thumbnails/29.jpg)
IBM CybersecurityIBM SecurityIBM CybersecurityIBM Cybersecurity29
Be Aware that