SlideShare a Scribd company logo
1 of 37
© 2014 IBM Corporation 
Smarter Security for Systems of 
Engagement 
V5; 4 Sep 14 
John Palfreyman, IBM
© 2014 IBM Corporation 
Agenda 
2 
Systems of 
Engagement 
Cyber Security 
Implications 
Cyber Security Risk 
Mitigation 
Future Perspective
© 2014 IBM Corporation 
Smarter Defence 
3 
 Ever increasing range of sensors 
 Volume, velocity, variety 
 Military collectors & open source 
 Agility & mobility 
 Highly connected systems – blurred edges 
 Collaboration across coalitions 
 From data to actionable intelligence 
 From reactive to proactive 
 Whole lifecycle system optimisation 
Instrumented 
Interconnected 
Intelligent 
Information Superiority through Leveraging Technology
© 2014 IBM Corporation 
Cloud 
Drivers 
 Mission speed and agility 
 New business models – alternatives to escalating CAPEX 
Sample Use Cases 
 Back office functions (HR, CRM, SCM) as a service 
 Predictive and analytics functions (e.g. for smart procurement) as a service 
4
© 2014 IBM Corporation 
Mobile 
Drivers 
 Inherently mobile deployments 
 Mission agility and flexibility 
 Rate of change of commercial 
technology 
Sample Use Cases 
 Mobile Intelligence capture, with 
workflow management 
 Education in theatre 
 Improved logistics operations 
5
© 2014 IBM Corporation 
Big Data / Analytics 
Drivers 
 Masses of sensor data available 
to modern military 
 Need for intelligence to help 
make operations “smarter” 
 Increasing proportion of 
“unreliable” data 
Sample Use Cases 
 Analysis of enemy networks 
based on their Social Media 
usage 
 Adaptive sensor data processing 
at speed 
 Predictive operations based on 
historical mission data analysis & 
sensor data 
6
© 2014 IBM Corporation 
Social Business 
Drivers 
 Use of Social Channels by 
adversary 
 New recruitment approach / 
increased reservist numbers 
 Personnel rotation 
Sample Use Cases 
 Terrorism detection, 
investigation & prevention 
 Knowledge capture and 
dissemination 
 Recruitment, rapid onboarding 
& retention of key staff 
7
© 2014 IBM Corporation 
Systems of Engagement 
8 
 Collaborative 
 Interaction oriented 
 User centric 
 Unpredictable 
 Dynamic 
Mobile 
Social 
Business 
Big Data / 
Analytics 
Cloud
© 2014 IBM Corporation 
Case Study – Major European Air Force 
Business Challenge 
• Support Organisational Transformation 
• HQ Task Distribution 
• Senior Staff demanding Mobile Access 
IBM Solution 
• IBM Connections (including Mobile App) 
• MS Sharepoint Integration (Doc 
Management) 
• MaaS 360 based Tablet Security 
Benefits 
• Improved work efficiency 
• Consistent & timely information access 
• Secure MODERN tablet 
9
1. Cloud, Big Data / Analytics, Social Business & Mobile are all relevant 
© 2014 IBM Corporation 
Section Summary 
10 
to, and increasingly used by the military 
2. Most value accrues at the points of intersection – Systems of 
Engagement 
3. Systems of Engagement can underpin military transformation, 
enhancing information superiority
© 2014 IBM Corporation 
Agenda 
11 
Systems of 
Engagement 
Cyber Security 
Implications 
Cyber Security Risk 
Mitigation 
Future Perspective
© 2014 IBM Corporation 
IBM’s Definition . . . 
Cyber Security /–n 1. the protection of an 
organisation and its assets from electronic attack 
to minimise the risk of business disruption. 
12
© 2014 IBM Corporation 
The Millennial Generation . . . 
Expect: 
 to embrace technology for 
13 
improved productivity and 
simplicity in their personal lives 
 tools that seem 
made for and by them 
 freedom of choice, embracing 
change and innovation 
Innovate in a new way: 
 Actively involve a large user 
population 
 Work at Internet Scale and Speed 
 Discover the points of value via 
iteration 
 Engage the Millennial generation
© 2014 IBM Corporation 
Smart Phones (& Tablets) . . . 
 Used in the same way as a personal computer 
 Ever increasing functionality (app store culture) . . . 
 . . . and more accessible architectures 
 Offer “anywhere” banking, social media, e-mail . . . 
 Include non-PC (!) features Context, MMS, TXT 
 Emergence of authentication devices 
14
© 2014 IBM Corporation 
. . . are harder to defend . . . 
 Anti-virus software missing, or 
15 
inadequate 
 Encryption / decryption drains the 
battery 
 Battery life is always a challenge 
 Most users disable security features 
 Stolen or “found” devices information 
– and very easy to loose 
 Malware, mobile spyware, account 
impersonation 
 Need to extend password, encryption 
policies 
 Extends set of attack vectors
© 2014 IBM Corporation 
. . . and now mainstream. 
16 
 Bring-your-own device 
expected 
 Securing corporate data 
 Additional complexities 
 Purpose-specific endpoints 
 Device Management
© 2014 IBM Corporation 
Social Media – Lifestyle Centric Computing 
Different Channels 
Web centric 
Conversational 
Personal 
Open 
Explosive growth 
17 www.theconversationprism.com
© 2014 IBM Corporation 
Social Business – Relevance for Defence 
18 
Driver How social business can help . . . 
Coalition operations the 
norm 
Find and connect with experts other coalition members 
Demonstrate clear coalition value to stakeholders 
Budgetary pressures Improved efficiencies through use of social media 
platform 
Develop critical skills by virtual training 
Ever more complex 
missions 
Tap into mission expertise and lessons learnt 
Use jams, blogs & wikis to solve problems 
Cyber security threat Secure hosted social media platform 
Analysis of threat social media activity 
Technology driven 
change 
Promote technology usage through blogs, jams 
Information & education on mission value of technology 
Unknown asymmetric 
threat 
Supplement intelligence on threat by monitoring social 
media usage 
Collaborate cross department on specific threats
© 2014 IBM Corporation 
Internal Amnesia, External Ignorance – Case Study 
Client’s Challenges 
• Silo’d Organisation 
• Lack of Consistent Methodology 
• External Ignorance 
• Internal Amnesia 
Monitor bad guys 
• Early Warning of events / incident 
• Information to Commander 
Alternatives to 
• Workflow Centric Analysis 
• Traditional Intelligence Sources 
IBM Solution 
• IBM Connections 
• Analysis Software 
• GBS Integration & Configuration 
19
© 2014 IBM Corporation 
Social Media - Special Security Challenges 
 Too much information 
 Online impersonation 
 Trust / Social 
Engineering / PSYOP 
 Targeting 
20 
Source: Digital Shadows, Sophos, Facebook
© 2014 IBM Corporation 
Section Summary 
1. Social Business and Mobile are underpinning organisational 
21 
transformation 
2. Millennial Generation expect technologies in the workplace 
3. Introduce new vulnerabilities – understand to contain
© 2014 IBM Corporation 
Agenda 
22 
Systems of 
Engagement 
Cyber Security 
Implications 
Cyber Security Risk 
Mitigation 
Future Perspective
© 2014 IBM Corporation 
Balance 
Technical Mitigation 
 Better firewalls 
 Improved anti-virus 
 Advanced Crypto 
23 
People Mitigation 
 Leadership 
 Education 
 Culture 
 Process
© 2014 IBM Corporation 
Risk Management Approach 
 Monitor threats 
 Understand (your) systems 
 Assess Impact & Probability 
 Design containment mechanisms 
 Don’t expect perfect defences 
 Containment & quarantine planning 
 Learn & improve 
24 
Maturity-based approach 
Proactive 
Manual Automated 
Reactive
© 2014 IBM Corporation 
Securing a Mobile Device 
Device Security 
• Enrolment & access control 
• Security Policy enforcement 
• Secure data container 
• Remote wipe 
Transaction Security 
• Allow transactions on individual basis 
• Device monitoring & event detection 
• Sever based risk engine – allow, 
restrict, flag for review 
Software & Application 
• Endpoint management – software 
• Application: secure by design 
• Application scanning for vulnerabilities 
Access Control 
• Enforce access policies 
• Approved devices and users 
• Context aware authorisation 
25
© 2014 IBM Corporation 
Secure, Social Business 
26 
Leadership 
• More senior, most impact 
• Important to leader, important to all 
• Setting “tone” for culture 
Culture 
• Everyone knows importance AND risk 
• Full but SAFEusage 
• Mentoring 
Process 
• What’s allowed, what’s not 
• Internal & external usage 
• Smart, real time black listing 
Education 
• Online education (benefits, risks) 
• Annual recertification 
• For all, at all levels
Volume Velocity Variety Veracity* 
© 2014 IBM Corporation 
Security Intelligence & Big Data / Analytics 
* Truthfulness, accuracy or precision, correctness 
Data at Rest 
Terabytes to 
exabytes of 
existing data to 
process 
Data in Motion 
Streaming data, 
milliseconds to 
seconds to 
respond 
Data in Many 
Forms 
Structured, 
unstructured, text, 
multimedia 
Data in Doubt 
Uncertainty due to 
data inconsistency 
& incompleteness, 
ambiguities, latency, 
deception, model 
approximations
© 2014 IBM Corporation 
Data ingest 
Insights 
Integrated Approach 
IBM Security QRadar 
• Hadoop-based 
• Enterprise-grade 
• Any data / volume 
• Data mining 
• Ad hoc analytics 
• Data collection and 
enrichment 
• Event correlation 
• Real-time analytics 
• Offense prioritization 
Big Data Platform 
Advanced Threat Detection Custom Analytics 
Traditional data sources 
IBM InfoSphere BigInsights 
Non-traditional 
Security Intelligence Platform
1. Containment is possible with correct approach 
2. Need for a business / mission based (not technology) viewpoint 
3. Holistic, balanced, risk centric approach 
© 2014 IBM Corporation 
Section Summary 
29
© 2014 IBM Corporation 
Agenda 
30 
Systems of 
Engagement 
Cyber Security 
Implications 
Cyber Security Risk 
Mitigation 
Future Perspective
© 2014 IBM Corporation 
Systems of Insight 
31
© 2014 IBM Corporation 
Generation 3 Cloud Challenges . . . 
32 
Cloud 1.0 Cloud 2.0 
Static, 
Perimeter 
Controls 
Cloud 3.0 
Static 
Perimeter 
controls 
Reactive, 
Defence 
in Depth 
Adaptive, 
Contextual 
Security 
Attackers 
exploit platform 
shifts to launch 
new attacks on 
high value 
workloads and 
data 
Challenge 1 Challenge 2 Challenge 3 
Fragmented and 
complex security 
controls 
Sophisticated 
threats and 
attackers 
Increased attack 
surface due to agile 
and composable 
systems
© 2014 IBM Corporation 
Contextual, Adaptive Security 
33 
Monitor 
and Distill 
Correlate 
and Predict 
Security 
3.0 
Adapt and 
Pre-empt 
Risk Prediction and 
Defence Planning 
Encompassing event 
correlation, risk prediction, 
business impact 
assessment and defensive 
strategy formulation 
Multi-level monitoring & 
big data analytics 
Ranging from Active, in 
device to passive monitoring 
Adaptive and 
optimized response 
Adapt network architecture, access 
protocols / privileges to maximize attacker 
workload
© 2014 IBM Corporation 
Cyber Security – Fitness for Purpose? 
1. Are you ready to respond to a security incident and 
quickly remediate? 
2. Do you have the visibility and analytics needed to 
monitor threats? 
3. Do you know where your corporate crown jewels are 
and are they adequately protected? 
4. Can you manage your endpoints from servers to 
mobile devices and control network access? 
5. Do you build security in and continuously test all 
critical web/mobile applications? 
6. Can you automatically manage and limit the 
identities and access of your employees, partners 
and vendors to your enterprise? 
7. Do you have a risk aware culture and management 
system that can ensure compliance? 
34 
Maturity-based approach 
Proactive 
Manual Automated 
Reactive
© 2014 IBM Corporation 
Section Summary 
1. Systems of Insight further extend business / mission value 
2. Delivered on (secure) “generation 3” Cloud 
3. Cyber Security must be designed in, evolving 
35
1. Systems of Engagement (& Insight) help military transform, maintain 
© 2014 IBM Corporation 
Summary 
36 
information advantage 
2. Social Business & Mobile drive much value, but new vulnerabilities 
need to be understood to be mitigated 
3. Cyber security approach needs to be balanced, risk management 
based and “designed in”.
© 2014 IBM Corporation 
Thanks! 
John Palfreyman 
2dsegma@uk.ibm.com

More Related Content

What's hot

IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODCamilo Fandiño Gómez
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016IBM Security
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM Security
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks
 
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM Security
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesNeil Kemp
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0wendyking63
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of EngagementJohn Palfreyman
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentIBM Security
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseIBM Security
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...IBM Security
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 

What's hot (20)

IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of Engagement
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile Enterprise
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
IT Position of Trust Designation
IT Position of Trust DesignationIT Position of Trust Designation
IT Position of Trust Designation
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 

Viewers also liked

Юрій Антонюк: “Modern trend in software services – product development servic...
Юрій Антонюк: “Modern trend in software services – product development servic...Юрій Антонюк: “Modern trend in software services – product development servic...
Юрій Антонюк: “Modern trend in software services – product development servic...Lviv Startup Club
 
Photizo & IBM Viewpoint on B2B Transformation
Photizo & IBM Viewpoint on B2B TransformationPhotizo & IBM Viewpoint on B2B Transformation
Photizo & IBM Viewpoint on B2B TransformationPaul Brody
 
Maria Grazia Maffucci - analisi libri
Maria Grazia Maffucci - analisi libriMaria Grazia Maffucci - analisi libri
Maria Grazia Maffucci - analisi libriMaria Grazia Maffucci
 
Maria Grazia Maffucci - Analisi di una prova di valutazione
Maria Grazia Maffucci - Analisi di una prova di valutazioneMaria Grazia Maffucci - Analisi di una prova di valutazione
Maria Grazia Maffucci - Analisi di una prova di valutazioneMaria Grazia Maffucci
 
Maria Grazia Maffucci - relazione reti: progettazione per obiettivi
Maria Grazia Maffucci - relazione reti: progettazione per obiettiviMaria Grazia Maffucci - relazione reti: progettazione per obiettivi
Maria Grazia Maffucci - relazione reti: progettazione per obiettiviMaria Grazia Maffucci
 
Bob’s retirement model planning model prepared by idriss achour1
Bob’s retirement model planning model prepared by idriss achour1Bob’s retirement model planning model prepared by idriss achour1
Bob’s retirement model planning model prepared by idriss achour1achouri11
 
I viaggi di passione avventura
I viaggi di passione avventuraI viaggi di passione avventura
I viaggi di passione avventuraFabio Bonfante
 
オールフェスタ Git勉強会資料 (public)
オールフェスタ Git勉強会資料 (public)オールフェスタ Git勉強会資料 (public)
オールフェスタ Git勉強会資料 (public)Shunsuke Tadokoro
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyTsenn13
 

Viewers also liked (17)

Юрій Антонюк: “Modern trend in software services – product development servic...
Юрій Антонюк: “Modern trend in software services – product development servic...Юрій Антонюк: “Modern trend in software services – product development servic...
Юрій Антонюк: “Modern trend in software services – product development servic...
 
Photizo & IBM Viewpoint on B2B Transformation
Photizo & IBM Viewpoint on B2B TransformationPhotizo & IBM Viewpoint on B2B Transformation
Photizo & IBM Viewpoint on B2B Transformation
 
Maria Grazia Maffucci - analisi libri
Maria Grazia Maffucci - analisi libriMaria Grazia Maffucci - analisi libri
Maria Grazia Maffucci - analisi libri
 
Maria Grazia Maffucci - Analisi di una prova di valutazione
Maria Grazia Maffucci - Analisi di una prova di valutazioneMaria Grazia Maffucci - Analisi di una prova di valutazione
Maria Grazia Maffucci - Analisi di una prova di valutazione
 
SANT ENGINEERING COMPANY
SANT ENGINEERING COMPANYSANT ENGINEERING COMPANY
SANT ENGINEERING COMPANY
 
Disoluciones
DisolucionesDisoluciones
Disoluciones
 
Until Successful Component
Until Successful ComponentUntil Successful Component
Until Successful Component
 
Internet Then and Now
Internet Then and NowInternet Then and Now
Internet Then and Now
 
Maria Grazia Maffucci - relazione reti: progettazione per obiettivi
Maria Grazia Maffucci - relazione reti: progettazione per obiettiviMaria Grazia Maffucci - relazione reti: progettazione per obiettivi
Maria Grazia Maffucci - relazione reti: progettazione per obiettivi
 
Bob’s retirement model planning model prepared by idriss achour1
Bob’s retirement model planning model prepared by idriss achour1Bob’s retirement model planning model prepared by idriss achour1
Bob’s retirement model planning model prepared by idriss achour1
 
Jf bton-sm
Jf bton-smJf bton-sm
Jf bton-sm
 
Slideshare TP
Slideshare TPSlideshare TP
Slideshare TP
 
Vm Component
Vm ComponentVm Component
Vm Component
 
I viaggi di passione avventura
I viaggi di passione avventuraI viaggi di passione avventura
I viaggi di passione avventura
 
オールフェスタ Git勉強会資料 (public)
オールフェスタ Git勉強会資料 (public)オールフェスタ Git勉強会資料 (public)
オールフェスタ Git勉強会資料 (public)
 
Museos y rrss etpm 2016
Museos y rrss etpm 2016Museos y rrss etpm 2016
Museos y rrss etpm 2016
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Similar to Smarter Security for Systems of Engagement

Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldJohn Palfreyman
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet IBM Sverige
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
The nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsThe nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsE-Government Center Moldova
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protectionxband
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Servicesxband
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilientPrime Infoserv
 
CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19IBM Sverige
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Huntsman Security
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
Service2Media: Webinar Security & Management (17 March 2014) by Derk Tegeler
Service2Media: Webinar Security & Management  (17 March 2014) by Derk Tegeler Service2Media: Webinar Security & Management  (17 March 2014) by Derk Tegeler
Service2Media: Webinar Security & Management (17 March 2014) by Derk Tegeler Service2Media
 

Similar to Smarter Security for Systems of Engagement (20)

Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
The nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsThe nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data Analytics
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Service2Media: Webinar Security & Management (17 March 2014) by Derk Tegeler
Service2Media: Webinar Security & Management  (17 March 2014) by Derk Tegeler Service2Media: Webinar Security & Management  (17 March 2014) by Derk Tegeler
Service2Media: Webinar Security & Management (17 March 2014) by Derk Tegeler
 

Recently uploaded

Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...narwatsonia7
 
2024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 252024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 25JSchaus & Associates
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationEnergy for One World
 
Yellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdfYellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdfAmir Saranga
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhellokittymaearciaga
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...ResolutionFoundation
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.Christina Parmionova
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26JSchaus & Associates
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersCongressional Budget Office
 
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 
Disciplines-and-Ideas-in-the-Applied-Social-Sciences-DLP-.pdf
Disciplines-and-Ideas-in-the-Applied-Social-Sciences-DLP-.pdfDisciplines-and-Ideas-in-the-Applied-Social-Sciences-DLP-.pdf
Disciplines-and-Ideas-in-the-Applied-Social-Sciences-DLP-.pdfDeLeon9
 
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfCharlynTorres1
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
productionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxproductionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxHenryBriggs2
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Start Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleStart Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleSERUDS INDIA
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Christina Parmionova
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 

Recently uploaded (20)

Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
 
2024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 252024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 25
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological Civilization
 
Yellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdfYellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdf
 
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptx
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists Lawmakers
 
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 
Disciplines-and-Ideas-in-the-Applied-Social-Sciences-DLP-.pdf
Disciplines-and-Ideas-in-the-Applied-Social-Sciences-DLP-.pdfDisciplines-and-Ideas-in-the-Applied-Social-Sciences-DLP-.pdf
Disciplines-and-Ideas-in-the-Applied-Social-Sciences-DLP-.pdf
 
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
productionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxproductionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptx
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Start Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleStart Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor People
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 

Smarter Security for Systems of Engagement

  • 1. © 2014 IBM Corporation Smarter Security for Systems of Engagement V5; 4 Sep 14 John Palfreyman, IBM
  • 2. © 2014 IBM Corporation Agenda 2 Systems of Engagement Cyber Security Implications Cyber Security Risk Mitigation Future Perspective
  • 3. © 2014 IBM Corporation Smarter Defence 3  Ever increasing range of sensors  Volume, velocity, variety  Military collectors & open source  Agility & mobility  Highly connected systems – blurred edges  Collaboration across coalitions  From data to actionable intelligence  From reactive to proactive  Whole lifecycle system optimisation Instrumented Interconnected Intelligent Information Superiority through Leveraging Technology
  • 4. © 2014 IBM Corporation Cloud Drivers  Mission speed and agility  New business models – alternatives to escalating CAPEX Sample Use Cases  Back office functions (HR, CRM, SCM) as a service  Predictive and analytics functions (e.g. for smart procurement) as a service 4
  • 5. © 2014 IBM Corporation Mobile Drivers  Inherently mobile deployments  Mission agility and flexibility  Rate of change of commercial technology Sample Use Cases  Mobile Intelligence capture, with workflow management  Education in theatre  Improved logistics operations 5
  • 6. © 2014 IBM Corporation Big Data / Analytics Drivers  Masses of sensor data available to modern military  Need for intelligence to help make operations “smarter”  Increasing proportion of “unreliable” data Sample Use Cases  Analysis of enemy networks based on their Social Media usage  Adaptive sensor data processing at speed  Predictive operations based on historical mission data analysis & sensor data 6
  • 7. © 2014 IBM Corporation Social Business Drivers  Use of Social Channels by adversary  New recruitment approach / increased reservist numbers  Personnel rotation Sample Use Cases  Terrorism detection, investigation & prevention  Knowledge capture and dissemination  Recruitment, rapid onboarding & retention of key staff 7
  • 8. © 2014 IBM Corporation Systems of Engagement 8  Collaborative  Interaction oriented  User centric  Unpredictable  Dynamic Mobile Social Business Big Data / Analytics Cloud
  • 9. © 2014 IBM Corporation Case Study – Major European Air Force Business Challenge • Support Organisational Transformation • HQ Task Distribution • Senior Staff demanding Mobile Access IBM Solution • IBM Connections (including Mobile App) • MS Sharepoint Integration (Doc Management) • MaaS 360 based Tablet Security Benefits • Improved work efficiency • Consistent & timely information access • Secure MODERN tablet 9
  • 10. 1. Cloud, Big Data / Analytics, Social Business & Mobile are all relevant © 2014 IBM Corporation Section Summary 10 to, and increasingly used by the military 2. Most value accrues at the points of intersection – Systems of Engagement 3. Systems of Engagement can underpin military transformation, enhancing information superiority
  • 11. © 2014 IBM Corporation Agenda 11 Systems of Engagement Cyber Security Implications Cyber Security Risk Mitigation Future Perspective
  • 12. © 2014 IBM Corporation IBM’s Definition . . . Cyber Security /–n 1. the protection of an organisation and its assets from electronic attack to minimise the risk of business disruption. 12
  • 13. © 2014 IBM Corporation The Millennial Generation . . . Expect:  to embrace technology for 13 improved productivity and simplicity in their personal lives  tools that seem made for and by them  freedom of choice, embracing change and innovation Innovate in a new way:  Actively involve a large user population  Work at Internet Scale and Speed  Discover the points of value via iteration  Engage the Millennial generation
  • 14. © 2014 IBM Corporation Smart Phones (& Tablets) . . .  Used in the same way as a personal computer  Ever increasing functionality (app store culture) . . .  . . . and more accessible architectures  Offer “anywhere” banking, social media, e-mail . . .  Include non-PC (!) features Context, MMS, TXT  Emergence of authentication devices 14
  • 15. © 2014 IBM Corporation . . . are harder to defend . . .  Anti-virus software missing, or 15 inadequate  Encryption / decryption drains the battery  Battery life is always a challenge  Most users disable security features  Stolen or “found” devices information – and very easy to loose  Malware, mobile spyware, account impersonation  Need to extend password, encryption policies  Extends set of attack vectors
  • 16. © 2014 IBM Corporation . . . and now mainstream. 16  Bring-your-own device expected  Securing corporate data  Additional complexities  Purpose-specific endpoints  Device Management
  • 17. © 2014 IBM Corporation Social Media – Lifestyle Centric Computing Different Channels Web centric Conversational Personal Open Explosive growth 17 www.theconversationprism.com
  • 18. © 2014 IBM Corporation Social Business – Relevance for Defence 18 Driver How social business can help . . . Coalition operations the norm Find and connect with experts other coalition members Demonstrate clear coalition value to stakeholders Budgetary pressures Improved efficiencies through use of social media platform Develop critical skills by virtual training Ever more complex missions Tap into mission expertise and lessons learnt Use jams, blogs & wikis to solve problems Cyber security threat Secure hosted social media platform Analysis of threat social media activity Technology driven change Promote technology usage through blogs, jams Information & education on mission value of technology Unknown asymmetric threat Supplement intelligence on threat by monitoring social media usage Collaborate cross department on specific threats
  • 19. © 2014 IBM Corporation Internal Amnesia, External Ignorance – Case Study Client’s Challenges • Silo’d Organisation • Lack of Consistent Methodology • External Ignorance • Internal Amnesia Monitor bad guys • Early Warning of events / incident • Information to Commander Alternatives to • Workflow Centric Analysis • Traditional Intelligence Sources IBM Solution • IBM Connections • Analysis Software • GBS Integration & Configuration 19
  • 20. © 2014 IBM Corporation Social Media - Special Security Challenges  Too much information  Online impersonation  Trust / Social Engineering / PSYOP  Targeting 20 Source: Digital Shadows, Sophos, Facebook
  • 21. © 2014 IBM Corporation Section Summary 1. Social Business and Mobile are underpinning organisational 21 transformation 2. Millennial Generation expect technologies in the workplace 3. Introduce new vulnerabilities – understand to contain
  • 22. © 2014 IBM Corporation Agenda 22 Systems of Engagement Cyber Security Implications Cyber Security Risk Mitigation Future Perspective
  • 23. © 2014 IBM Corporation Balance Technical Mitigation  Better firewalls  Improved anti-virus  Advanced Crypto 23 People Mitigation  Leadership  Education  Culture  Process
  • 24. © 2014 IBM Corporation Risk Management Approach  Monitor threats  Understand (your) systems  Assess Impact & Probability  Design containment mechanisms  Don’t expect perfect defences  Containment & quarantine planning  Learn & improve 24 Maturity-based approach Proactive Manual Automated Reactive
  • 25. © 2014 IBM Corporation Securing a Mobile Device Device Security • Enrolment & access control • Security Policy enforcement • Secure data container • Remote wipe Transaction Security • Allow transactions on individual basis • Device monitoring & event detection • Sever based risk engine – allow, restrict, flag for review Software & Application • Endpoint management – software • Application: secure by design • Application scanning for vulnerabilities Access Control • Enforce access policies • Approved devices and users • Context aware authorisation 25
  • 26. © 2014 IBM Corporation Secure, Social Business 26 Leadership • More senior, most impact • Important to leader, important to all • Setting “tone” for culture Culture • Everyone knows importance AND risk • Full but SAFEusage • Mentoring Process • What’s allowed, what’s not • Internal & external usage • Smart, real time black listing Education • Online education (benefits, risks) • Annual recertification • For all, at all levels
  • 27. Volume Velocity Variety Veracity* © 2014 IBM Corporation Security Intelligence & Big Data / Analytics * Truthfulness, accuracy or precision, correctness Data at Rest Terabytes to exabytes of existing data to process Data in Motion Streaming data, milliseconds to seconds to respond Data in Many Forms Structured, unstructured, text, multimedia Data in Doubt Uncertainty due to data inconsistency & incompleteness, ambiguities, latency, deception, model approximations
  • 28. © 2014 IBM Corporation Data ingest Insights Integrated Approach IBM Security QRadar • Hadoop-based • Enterprise-grade • Any data / volume • Data mining • Ad hoc analytics • Data collection and enrichment • Event correlation • Real-time analytics • Offense prioritization Big Data Platform Advanced Threat Detection Custom Analytics Traditional data sources IBM InfoSphere BigInsights Non-traditional Security Intelligence Platform
  • 29. 1. Containment is possible with correct approach 2. Need for a business / mission based (not technology) viewpoint 3. Holistic, balanced, risk centric approach © 2014 IBM Corporation Section Summary 29
  • 30. © 2014 IBM Corporation Agenda 30 Systems of Engagement Cyber Security Implications Cyber Security Risk Mitigation Future Perspective
  • 31. © 2014 IBM Corporation Systems of Insight 31
  • 32. © 2014 IBM Corporation Generation 3 Cloud Challenges . . . 32 Cloud 1.0 Cloud 2.0 Static, Perimeter Controls Cloud 3.0 Static Perimeter controls Reactive, Defence in Depth Adaptive, Contextual Security Attackers exploit platform shifts to launch new attacks on high value workloads and data Challenge 1 Challenge 2 Challenge 3 Fragmented and complex security controls Sophisticated threats and attackers Increased attack surface due to agile and composable systems
  • 33. © 2014 IBM Corporation Contextual, Adaptive Security 33 Monitor and Distill Correlate and Predict Security 3.0 Adapt and Pre-empt Risk Prediction and Defence Planning Encompassing event correlation, risk prediction, business impact assessment and defensive strategy formulation Multi-level monitoring & big data analytics Ranging from Active, in device to passive monitoring Adaptive and optimized response Adapt network architecture, access protocols / privileges to maximize attacker workload
  • 34. © 2014 IBM Corporation Cyber Security – Fitness for Purpose? 1. Are you ready to respond to a security incident and quickly remediate? 2. Do you have the visibility and analytics needed to monitor threats? 3. Do you know where your corporate crown jewels are and are they adequately protected? 4. Can you manage your endpoints from servers to mobile devices and control network access? 5. Do you build security in and continuously test all critical web/mobile applications? 6. Can you automatically manage and limit the identities and access of your employees, partners and vendors to your enterprise? 7. Do you have a risk aware culture and management system that can ensure compliance? 34 Maturity-based approach Proactive Manual Automated Reactive
  • 35. © 2014 IBM Corporation Section Summary 1. Systems of Insight further extend business / mission value 2. Delivered on (secure) “generation 3” Cloud 3. Cyber Security must be designed in, evolving 35
  • 36. 1. Systems of Engagement (& Insight) help military transform, maintain © 2014 IBM Corporation Summary 36 information advantage 2. Social Business & Mobile drive much value, but new vulnerabilities need to be understood to be mitigated 3. Cyber security approach needs to be balanced, risk management based and “designed in”.
  • 37. © 2014 IBM Corporation Thanks! John Palfreyman 2dsegma@uk.ibm.com

Editor's Notes

  1. Cyber Security = lack of clarity : hence definition BUSINESS RISK centric definition MINIMISE key (never assume perfect) Open for debate!