Amplifying Security Intelligence

Hello from IBM Insight 2014 in Las Vegas. The event is amazing and has allowed me to meet with our clients and business partners to discuss how security has become an integral part of big data analytics strategies.

When I walk through the casinos, I see people all having fun trying to beat the odds, whether they are playing blackjack or roulette. However, I am also reminded that security is not a game, and it’s an area where you can’t afford to lose. IBM X-Force’s trend and risk research reported that 2012 saw a 40 percent increase in security breaches, while 2013 saw over 500 million records breached. Moreover, a recent Ponemon study states that on average, the odds of having a material data breach involving more than 10,000 records is higher than 22 percent over a two-year period.

In addition to the media coverage a breach could cause, there is also a large amount of money at risk, even by Vegas standards. According to the Ponemon Institute, the average cost of a data beach is $3.5 million. Remember, this is just the average, so think about the cost of some of the large-scale security breaches you have read about in the news recently. The attack chain is real and becomes more sophisticated all the time. New approaches to security are needed, and at IBM Security, we have been working hard to stay ahead of the threat.

I am currently presenting to the Insight attendees on why security intelligence has become a big data challenge. The following are three key components of a successful information technology security strategy:

Intelligence

Intelligence is about using advanced security analytics and big data to gain deep insights into an organization’s security posture. Today, we need to go beyond logs, events and alerts. We need to apply security intelligence and big data analytics to more types of information, including email and social activity, full-packet and Domain Name System captures, business process data, external threat feeds such as IBM X-Force, malwae information, network flows and anomalies. Once we’ve applied these analytics to more data sources, we need new investigative tools such as Incident Forensics that can quickly and easily gather evidence, reconstruct potentially malicious activity, determine root cause and help prevent future recurrences.

Integration

The integration of individual security tools into comprehensive solutions is another approach that can help us stay ahead of the threat. Through the deployment of integrated solutions, we can optimize security investments by correlating and analyzing information that resides in silos, allowing for automated detection and responses to threats. This integration allows the latest information about exploits, vulnerabilities and malware to be accessed by security solutions across domains, providing greater threat protection.

Innovation

Innovation means using new techniques to proactively implement and optimize security for the cloud, big data, social and mobile, allowing them to be deployed more rapidly and securely. Most importantly, these security measures should be embedded on Day 1, allowing mobile devices to be more secure than laptops, the cloud more secure than data centers, social more secure than email and big data more secure than databases.

To learn more on the above, please take the time to view my presentation.

 

 

More from Intelligence & Analytics

The 13 Costliest Cyberattacks of 2022: Looking Back

2022 has shaped up to be a pricey year for victims of cyberattacks. Cyberattacks continue to target critical infrastructures such as health systems, small government agencies and educational institutions. Ransomware remains a popular attack method for large and small targets alike. While organizations may choose not to disclose the costs associated with a cyberattack, the loss of consumer trust will always be a risk after any significant attack. Let’s look at the 13 costliest cyberattacks of the past year and…

What Can We Learn From Recent Cyber History?

The Center for Strategic and International Studies compiled a list of significant cyber incidents dating back to 2003. Compiling attacks on government agencies, defense and high-tech companies or economic crimes with losses of more than a million dollars, this list reveals broader trends in cybersecurity for the past two decades. And, of course, there are the headline breaches and supply chain attacks to consider. Over recent years, what lessons can we learn from our recent history — and what projections…

When Logs Are Out, Enhanced Analytics Stay In

I was talking to an analyst firm the other day. They told me that a lot of organizations purchase a security information and event management (SIEM) solution and then “place it on the shelf.” “Why would they do that?” I asked. I spent the majority of my career in hardware — enterprise hardware, cloud hardware, and just recently made the jump to security software, hence my question. “Because SIEMs are hard to use. A SIEM purchase is just a checked…

4 Most Common Cyberattack Patterns from 2022

As 2022 comes to an end, cybersecurity teams globally are taking the opportunity to reflect on the past 12 months and draw whatever conclusions and insights they can about the threat landscape. It has been a challenging year for security teams. A major conflict in Europe, a persistently remote workforce and a series of large-scale cyberattacks have all but guaranteed that 2022 was far from uneventful. In this article, we’ll round up some of the most common cyberattack patterns we…