The Masters is known for its many timeless traditions. The azaleas of Amen Corner. The Green Jacket. The pimento cheese sandwiches. But there’s also a modern twist with the way the Masters uses data as the foundation of its digital experience, enjoyed by millions around the world through the Masters website and app.

However, as with any high-profile event, it’s not uncommon for the Masters digital platform to see nearly 75 million security-related events throughout the course of the tournament. That’s why IBM and the Masters Digital team use IBM Security QRadar to monitor for potential cyber threats to help protect the digital infrastructure — and reputation — of the Masters.

From data to digital experience

The digital journey begins with every golf shot generating more than 30 distinct data points, from scores and stats to the distances and exact x, y, and z coordinates of every ball. Dozens of cameras, microphones, lasers and volunteers collaborate to collect vast amounts of information, which then moves into the Masters hybrid cloud infrastructure, gets combined with other data, is processed by AI services, and ultimately lands in the Masters app.

The app boasts a number of innovative features, including AI-generated player insights and the My Group playlist, which allows digital patrons to watch every shot, on every hole, from all their favorite players. By combining six years of historical Masters data with AI, the app uses more than 1,600 machine learning models to generate hole-by-hole predictions throughout the rounds. And IBM’s AI highlight solution measures excitement levels of more than 20,000 video clips to build the “Round in 3 Minutes” highlight reels for every player, just minutes after they complete their round.

Security at the Masters

Monitoring cyberthreats

The Masters digital platform has already seen nearly 75 million security-related events. With so many security events happening simultaneously, the ability to use automation to monitor activity in near real-time is critical. Throughout the tournament, QRadar continually monitors data transmissions and user activities for digital fingerprints and suspicious behavior for potential threats. QRadar also uses its hybrid cloud monitoring capabilities to collect data from different sources and analyze it in real time for potential threats. It is essentially doing triage, monitoring all the different touchpoints and devices, and identifying the most serious threats.

QRadar Advisor with Watson then cross-references that data with both internal and external threat intelligence databases, such as IBM’s own X-Force Exchange. It looks for correlations between activity on the Masters platform and security activity elsewhere in the world. It uses natural language processing to read online security information, from blogs to internet chatter, both before and during the event. By examining any online fingerprints from known attackers, Watson looks for indicators of compromise, which help pinpoint vulnerabilities and help predict the likelihood of an attack.

Mitigating threats on and off the green

With an event the size of the Masters, cybersecurity professionals can’t efficiently focus on every single potential security-related event. QRadar provides a cognitive analysis of the events and then prioritizes which events the security team should focus on. Additionally, the analysts receive details about the best way to respond.

After identifying a potential attack, the cybersecurity team can use the suggested mitigation actions to mitigate the threat quickly, to help reduce the risk of the cybersecurity incident disrupting the digital experience. With the QRadar built-in playbooks, the security team is positioned to track what has happened so they can escalate quickly, even when under intense pressure.

The Masters wants patrons to stay focused on the course and the players. And with the help of IBM QRadar, that’s exactly what they can do.

Request a demo of QRadar SIEM

More from Intelligence & Analytics

What makes a trailblazer? Inspired by John Mulaney’s Dreamforce roast

4 min read - When you bring a comedian to offer a keynote address, you need to expect the unexpected.But it is a good bet that no one in the crowd at Salesforce’s Dreamforce conference expected John Mulaney to tell a crowd of thousands of tech trailblazers that they were, in fact, not trailblazers at all.“The fact that there are 45,000 ‘trailblazers’ here couldn’t devalue the title anymore,” Mulaney told the audience.Maybe it was meant as nothing more than a punch line, but Mulaney’s…

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Protecting your data and environment from unknown external risks

3 min read - Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today