December 9, 2016 By Kevin Albano 2 min read

With recent announcement of IBM’s $200 million commitment to expanding its security leadership position in the incident response (IR) market, IBM is working to help clients address the challenges in adopting a more proactive approach to IR.

As part of the initiative, IBM established a new global incident response team. The mandate for IBM X-Force Incident Response and Intelligence Services (IRIS) is to deliver the next evolution in incident response management.

Organizations face an ever-changing threat landscape, which sometimes forces security operation analysts and incident handlers to make rushed decisions. IBM X-Force IRIS uses an agile approach designed to concurrently contain threats and obtain threat attack evidence.

The old detect-and-fix methodology may miscalculate the resolve of threat actors, inadvertently placing increased pressure on security operations teams. IBM X-Force IRIS prefers to implement situational preparedness and sound decision-making based on practiced response procedures.

Incident Response, Remediation and Intelligence

These tenets denote the team’s disciplines. Security intelligence, or cyberthreat intelligence (CTI), provides threat insight to IRIS’ response and remediation services. IBM X-Force IRIS consultants rely on threat knowledge produced by CTI analysts to accurately identify threats and understand the threat’s logical attack progression.

IBM X-Force Intelligence Services gets privileged access to IBM Security’s global presence, threat research diversity and X-Force Command Center’s security operations experience. In turn, IBM Security clients benefit from IBM X-Force IRIS-developed threat indications, vulnerability advisories and improved signature context.

Getting Ahead of the Threat

Attackers remain undeterred as organizations improve their compromise detection capabilities. Attributed persistent threat campaigns may have subsided against planned targets, but the skilled computer network attackers behind those campaigns often remain undetected. Their activities may not be as organized or regimented as they once were, but the techniques they employ have become the standard.

The amount of structured and unstructured threat data increases as the security industry works to increase the visibility of these evolving attacks. CTI analysts confront increasing threat information with little to no growth in the capacity to validate the latest security research.

Organizations with expert CTI teams to hunt threats in their environment may now find these teams are comprised of all-source generalists who manage threat information. The skills gap represents not only a shortage of people, but also the right skills to hunt for evolving threats.

Applying Cognitive Security

The next step forward is the application of cognitive tools for cyberthreat intelligence. Cognitive technology provides the means to stay current with the mass amounts of structured and unstructured data and assign context to known threats. Organization-run CTI teams may collect information about past threats and incidents and apply it to current findings.

Beyond this descriptive analysis, cognitive security provides the analytic capacity to be prescriptive and identify emerging threats based on threat identification models. This gives CTI analysts the time to become technical or subject-matter experts, define new threats and customize threat intelligence for decision-makers. Integrating the CTI analyst’s threat identification model within Watson presents a real possibility for decision-makers to take proactive steps toward disrupting or deterring the next threat activity.

More from

Evolving red teaming for AI environments

2 min read - As AI becomes more ingrained in businesses and daily life, the importance of security grows more paramount. In fact, according to the IBM Institute for Business Value, 96% of executives say adopting generative AI (GenAI) makes a security breach likely in their organization in the next three years. Whether it’s a model performing unintended actions, generating misleading or harmful responses or revealing sensitive information, in the AI era security can no longer be an afterthought to innovation.AI red teaming is emerging…

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today