The Masters is known for its many timeless traditions. The azaleas of Amen Corner. The Green Jacket. The pimento cheese sandwiches. But there’s also a modern twist with the way the Masters uses data as the foundation of its digital experience, enjoyed by millions around the world through the Masters website and app.

However, as with any high-profile event, it’s not uncommon for the Masters digital platform to see nearly 75 million security-related events throughout the course of the tournament. That’s why IBM and the Masters Digital team use IBM Security QRadar to monitor for potential cyber threats to help protect the digital infrastructure — and reputation — of the Masters.

From data to digital experience

The digital journey begins with every golf shot generating more than 30 distinct data points, from scores and stats to the distances and exact x, y, and z coordinates of every ball. Dozens of cameras, microphones, lasers and volunteers collaborate to collect vast amounts of information, which then moves into the Masters hybrid cloud infrastructure, gets combined with other data, is processed by AI services, and ultimately lands in the Masters app.

The app boasts a number of innovative features, including AI-generated player insights and the My Group playlist, which allows digital patrons to watch every shot, on every hole, from all their favorite players. By combining six years of historical Masters data with AI, the app uses more than 1,600 machine learning models to generate hole-by-hole predictions throughout the rounds. And IBM’s AI highlight solution measures excitement levels of more than 20,000 video clips to build the “Round in 3 Minutes” highlight reels for every player, just minutes after they complete their round.

Security at the Masters

Monitoring cyberthreats

The Masters digital platform has already seen nearly 75 million security-related events. With so many security events happening simultaneously, the ability to use automation to monitor activity in near real-time is critical. Throughout the tournament, QRadar continually monitors data transmissions and user activities for digital fingerprints and suspicious behavior for potential threats. QRadar also uses its hybrid cloud monitoring capabilities to collect data from different sources and analyze it in real time for potential threats. It is essentially doing triage, monitoring all the different touchpoints and devices, and identifying the most serious threats.

QRadar Advisor with Watson then cross-references that data with both internal and external threat intelligence databases, such as IBM’s own X-Force Exchange. It looks for correlations between activity on the Masters platform and security activity elsewhere in the world. It uses natural language processing to read online security information, from blogs to internet chatter, both before and during the event. By examining any online fingerprints from known attackers, Watson looks for indicators of compromise, which help pinpoint vulnerabilities and help predict the likelihood of an attack.

Mitigating threats on and off the green

With an event the size of the Masters, cybersecurity professionals can’t efficiently focus on every single potential security-related event. QRadar provides a cognitive analysis of the events and then prioritizes which events the security team should focus on. Additionally, the analysts receive details about the best way to respond.

After identifying a potential attack, the cybersecurity team can use the suggested mitigation actions to mitigate the threat quickly, to help reduce the risk of the cybersecurity incident disrupting the digital experience. With the QRadar built-in playbooks, the security team is positioned to track what has happened so they can escalate quickly, even when under intense pressure.

The Masters wants patrons to stay focused on the course and the players. And with the help of IBM QRadar, that’s exactly what they can do.

Request a demo of QRadar SIEM

More from Intelligence & Analytics

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Web injections are back on the rise: 40+ banks affected by new malware campaign

8 min read - Web injections, a favored technique employed by various banking trojans, have been a persistent threat in the realm of cyberattacks. These malicious injections enable cyber criminals to manipulate data exchanges between users and web browsers, potentially compromising sensitive information. In March 2023, security researchers at IBM Security Trusteer uncovered a new malware campaign using JavaScript web injections. This new campaign is widespread and particularly evasive, with historical indicators of compromise (IOCs) suggesting a possible connection to DanaBot — although we…

Accelerating security outcomes with a cloud-native SIEM

5 min read - As organizations modernize their IT infrastructure and increase adoption of cloud services, security teams face new challenges in terms of staffing, budgets and technologies. To keep pace, security programs must evolve to secure modern IT environments against fast-evolving threats with constrained resources. This will require rethinking traditional security strategies and focusing investments on capabilities like cloud security, AI-powered defense and skills development. The path forward calls on security teams to be agile, innovative and strategic amidst the changes in technology…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today