This weekend, Sergio Garcia won his first Major at the Masters, finally earning himself the coveted Green Jacket after 74 starts at a major. But while Sergio was making strides on the course, IBM’s Watson was hard at work behind the scenes, helping the Masters digital team defend against cybersecurity threats.

During the 20 years that IBM has been helping the Masters manage its digital platforms, the cybersecurity landscape has changed dramatically. Attacks have become more sophisticated as hackers collaborate across geographies and use increasingly advanced infrastructure and techniques. So it goes without saying that the tools that we use to defend against them must also adapt to keep pace. Enter Watson for Cyber Security.

A team of IBM analysts monitor the Masters digital platforms around the clock and are faced with the daunting task of analyzing tens of thousands of potential security threats per day. As with most high-profile events, the prominence of the Masters makes it a target for hackers seeking fame or fortune. Nearly every year, is threatened by outside forces, and it’s up to our team to ensure that remains up and running for the millions of fans who use it to view the latest scores on the leader board, watch live video, view highlights, and read articles.

What goes on behind the scenes to protect Using their unique skills and experience, our team of analysts must comb through vast amounts of security data to prioritize and respond to the most pressing threats, separating them from a sea of potential incidents. During the week of the Masters, that volume of data increases significantly.

This year, for the first time ever, our analysts had a new teammate in their corner: Watson for Cyber Security. Watson is a cognitive technology that has been trained to understand the language of security by reading and interpreting over a million cybersecurity-related documents. This not only allows Watson to stay up to date on the latest security research that is being published every day, but also to make unique correlations between current threat research and security events happening within the Masters cloud environment.

For example, during the Masters, our team was analyzing a denial-of-service (DoS) attempt where the attacker was using an outdated method of attack that is, in most cases, no longer relevant. So why would a criminal even bother attempting this type of outdated attack? Our lead security analyst, Johnathan Van Houten, explained it best, saying, “The denial-of-service attempt was a cover for the malware, spam and minimal port scanning that they were also doing in secret. The idea is misdirection — by attempting to distract our team with a noisy DoS attempt, they’re hoping we don’t look to find the man behind the curtain.”

Now, even with Johnathan’s 20+ years of experience in IT security, it would have been difficult and time-consuming for him to see beyond that initial attack attempt. In this case, it was the insights generated by Watson that expanded on the initial attack with the click of the button, bringing to light the man behind the curtain.

This is just one of many examples throughout the event where Watson gave us the power of cognitive insights to see beyond what our analysts would see, and in a much shorter amount of time. In events such as these, speed is our most critical resource — even a few minutes of downtime can mean a negative experience for users. Our team used Watson for Cyber Security to investigate these incidents in a matter of minutes.

Essentially, Watson helps bring the power of man and machine together to prioritize the most critical threats and investigate them more quickly, allowing our team of specialists to focus on what matters most — the user experience. With the help of Watson for Cyber Security, we rounded off yet another successful year for the Masters, keeping all IT assets running smoothly so that fans around the world could focus on what matters most to them: the golf.

More from

Who Carries the Weight of a Cyberattack?

Almost immediately after a company discovers a data breach, the finger-pointing begins. Who is to blame? Most often, it is the chief information security officer (CISO) or chief security officer (CSO) because protecting the network infrastructure is their job. Heck, it is even in their job title: they are the security officer. Security is their responsibility. But is that fair – or even right? After all, the most common sources of data breaches and other cyber incidents are situations caused…

Transitioning to Quantum-Safe Encryption

With their vast increase in computing power, quantum computers promise to revolutionize many fields. Artificial intelligence, medicine and space exploration all benefit from this technological leap — but that power is also a double-edged sword. The risk is that threat actors could abuse quantum computers to break the key cryptographic algorithms we depend upon for the safety of our digital world. This poses a threat to a wide range of critical areas. Fortunately, alternate cryptographic algorithms that are safe against…

Abuse of Privilege Enabled Long-Term DIB Organization Hack

From November 2021 through January 2022, the Cybersecurity and Infrastructure Security Agency (CISA) responded to an advanced cyberattack on a Defense Industrial Base (DIB) organization’s enterprise network. During that time frame, advanced persistent threat (APT) adversaries used an open-source toolkit called Impacket to breach the environment and further penetrate the organization’s network. Even worse, CISA reported that multiple APT groups may have hacked into the organization’s network. Data breaches such as these are almost always the result of compromised endpoints…

How Do You Plan to Celebrate National Computer Security Day?

In October 2022, the world marked the 19th Cybersecurity Awareness Month. October might be over, but employers can still talk about awareness of digital threats. We all have another chance before then: National Computer Security Day. The History of National Computer Security Day The origins of National Computer Security Day trace back to 1988 and the Washington, D.C. chapter of the Association for Computing Machinery’s Special Interest Group on Security, Audit and Control. As noted by National Today, those in…