This weekend, Sergio Garcia won his first Major at the Masters, finally earning himself the coveted Green Jacket after 74 starts at a major. But while Sergio was making strides on the course, IBM’s Watson was hard at work behind the scenes, helping the Masters digital team defend against cybersecurity threats.

During the 20 years that IBM has been helping the Masters manage its digital platforms, the cybersecurity landscape has changed dramatically. Attacks have become more sophisticated as hackers collaborate across geographies and use increasingly advanced infrastructure and techniques. So it goes without saying that the tools that we use to defend against them must also adapt to keep pace. Enter Watson for Cyber Security.

A team of IBM analysts monitor the Masters digital platforms around the clock and are faced with the daunting task of analyzing tens of thousands of potential security threats per day. As with most high-profile events, the prominence of the Masters makes it a target for hackers seeking fame or fortune. Nearly every year, is threatened by outside forces, and it’s up to our team to ensure that remains up and running for the millions of fans who use it to view the latest scores on the leader board, watch live video, view highlights, and read articles.

What goes on behind the scenes to protect Using their unique skills and experience, our team of analysts must comb through vast amounts of security data to prioritize and respond to the most pressing threats, separating them from a sea of potential incidents. During the week of the Masters, that volume of data increases significantly.

This year, for the first time ever, our analysts had a new teammate in their corner: Watson for Cyber Security. Watson is a cognitive technology that has been trained to understand the language of security by reading and interpreting over a million cybersecurity-related documents. This not only allows Watson to stay up to date on the latest security research that is being published every day, but also to make unique correlations between current threat research and security events happening within the Masters cloud environment.

For example, during the Masters, our team was analyzing a denial-of-service (DoS) attempt where the attacker was using an outdated method of attack that is, in most cases, no longer relevant. So why would a criminal even bother attempting this type of outdated attack? Our lead security analyst, Johnathan Van Houten, explained it best, saying, “The denial-of-service attempt was a cover for the malware, spam and minimal port scanning that they were also doing in secret. The idea is misdirection — by attempting to distract our team with a noisy DoS attempt, they’re hoping we don’t look to find the man behind the curtain.”

Now, even with Johnathan’s 20+ years of experience in IT security, it would have been difficult and time-consuming for him to see beyond that initial attack attempt. In this case, it was the insights generated by Watson that expanded on the initial attack with the click of the button, bringing to light the man behind the curtain.

This is just one of many examples throughout the event where Watson gave us the power of cognitive insights to see beyond what our analysts would see, and in a much shorter amount of time. In events such as these, speed is our most critical resource — even a few minutes of downtime can mean a negative experience for users. Our team used Watson for Cyber Security to investigate these incidents in a matter of minutes.

Essentially, Watson helps bring the power of man and machine together to prioritize the most critical threats and investigate them more quickly, allowing our team of specialists to focus on what matters most — the user experience. With the help of Watson for Cyber Security, we rounded off yet another successful year for the Masters, keeping all IT assets running smoothly so that fans around the world could focus on what matters most to them: the golf.

More from

Cost of a data breach 2023: Geographical breakdowns

4 min read - Data breaches can occur anywhere in the world, but they are historically more common in specific countries. Typically, countries with high internet usage and digital services are more prone to data breaches. To that end, IBM’s Cost of a Data Breach Report 2023 looked at 553 organizations of various sizes across 16 countries and geographic regions, and 17 industries. In the report, the top five costs of a data breach by country or region (measured in USD millions) for 2023…

The Growing Risks of Shadow IT and SaaS Sprawl

4 min read - In today's fast-paced digital landscape, there is no shortage of apps and Software-as-a-Service (SaaS) solutions tailored to meet the diverse needs of businesses across different industries. This incredible array of options has revolutionized how we work, providing cost-effective and user-friendly tools that streamline tasks and boost productivity. However, this ever-expanding application ecosystem comes with its challenges: namely, shadow IT and SaaS sprawl. According to a recent study by Entrust, 77% of IT professionals are concerned about shadow IT becoming a…

Are you ready to build your organization’s digital trust?

4 min read - As organizations continue their digital transformation journey, they need to be able to trust that their digital assets are secure. That’s not easy in today’s environment, as the numbers and sophistication of cyberattacks increase and organizations face challenges from remote work and insider behavior. Digital trust can make your organization’s digital transformation stronger. A lack of digital trust can do irreparable harm. However, according to ISACA’s State of Digital Trust 2023 report, too many organizations struggle to define and implement…

Most organizations want security vendor consolidation

4 min read - Cybersecurity is complicated, to say the least. Maintaining a strong security posture goes far beyond knowing about attack groups and their devious TTPs. Merely understanding, coordinating and unifying security tools can be challenging. We quickly passed through the “not if, but when” stage of cyberattacks. Now, it’s commonplace for companies to have experienced multiple breaches. Today, cybersecurity has taken a seat in core business strategy discussions as the risks and costs have risen dramatically. For this reason, 75% of organizations…