SlideShare une entreprise Scribd logo
1  sur  15
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
Welcome to the new era of cognitive security
Sonya Gordon, Market Development, Senior Advisor - IBM Security
Bill Chamberlin, Distinguished Market Intelligence Professional, MD&I HorizonWatch
February 15, 2017
Security Trend Report, 2017
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
About This Trend Report
15Feb2017
 Purpose: The slides provide an overview on the I.T. Security trend
 Content: Summary information about the I.T. Security marketplace, including
trends drivers, spending trends, industry business cases, and adoption
challenges. Also included are links to additional resources.
 How To Use This Report: This report is best read/studied and used as a
learning document. You may want to view the slides in slideshow mode so you
can easily follow the links
 Available on Slideshare: This presentation (and other Trend Reports for
2017) will be available publically on Slideshare at
http://www.slideshare.net/horizonwatching
 Please Note: This report is based on internal IBM analysis and is not meant to
be a statement of direction by IBM nor is IBM committing to any particular
technology or solution.
2 Security Trend Report, 2017 (External Version)
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
An overview of the IT Security trend
Drivers Security Spending
 Growth in endpoints from mobile to wearables to IoT
devices
 Increased threats from malware, cybercrime, Phishing,
& bots
 High profile security breaches are damaging brands
 Rise of virtualization & cloud which separates data user
and data owner
 Mobile employees want access anytime, anywhere
 Increased focus on Corporate risk management,
governance, compliance.
 Increased focus on identity services - trusted, privacy-
enabling, shared and easy-to-use identities
Inhibitors/Challenges
 Security is a barrier to cloud adoption, mobile, and IoT
 ROI is still not a true value of measurement of security
investment
 Keeping up with BYO-everything
 Increasing complexity of security environment
 Skill gaps
Key Insights
15Feb20173
Implications
 Increased pressure on the CISO role to
manage risk end-to-end across entire
organization and every endpoint, every
network connection
 Increased need for skilled security
professionals and service providers
 Compliance requires continued investment
 IT must understand implications of key
trends such as cloud, mobility, social, big
data, IoT, etc.
 Encryption behind the firewall becomes a
necessity
 Biometrics continues to be an emerging
technology that can be embedded into
mobile solutions to enhance information
security
 Cognitive computing applied to security is
an increasingly attractive solution
In today’s data-driven, highly distributed world, there are serious threats that must be addressed head-on.
New complexities and challenges are arising every day. Companies are looking for an integrated system of
analytics, real-time defenses and expert resources to defend networks, systems and data.
Security Trend Report, 2017 (External Version)
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
Trends to watch within Security for 2017
“Worldwide revenues for security-related
hardware, software, and services will grow from
$73.7 billion in 2016 to $101.6 billion in 2020.
The largest category of investment will be
security-related services, which will account for
nearly 45% of all security spending worldwide ”
IDC
Market Trends
15Feb20174
Other views on 2017 Trends
• Fortune: Here's How Much Businesses
Worldwide Will Spend on Cybersecurity by 2020
• eWeek: 8 Predictions About How the Security
Industry Will Fare in 2017
• INC: How Cyber Criminals Will Weaponize the
Internet of Things in 2017
• NetworkWorld: 5 cybersecurity trends to watch
for 2017
• Information Age: 10 cyber security trends to look
out for in 2017
• O'Reilly: 4 trends in security data science for
2017
1. Increased Pressure on CISOs. IT security programs
are under more pressure than ever before. Corporate
Boards want to know that security risks are being
minimized and that programs are legally defensible.
2. Services in demand. Security services, especially
professional services, contribute the most revenue in
the market. Network security is a large segment and
Mobile enterprise management will generate the
strongest growth.
3. Focus turns to “Response and Remediation”. It’s
very difficult to prevent attacks so more focus is being
shifted towards post-attack analytic-powered solutions
that identify the attacks as they happen and minimize
the resulting damage.
4. Growth in SIEM, IAM, mobile security and
services. Expect increased demand for security
identity and event management (SIEM), Identity and
Access Management (IAM) as a Service and mobile
payment security in 2017.
“60% of enterprise information security budgets
will be allocated to rapid detection and response
approaches by 2020.” Gartner
Security Trend Report, 2017 (External Version)
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
Trends to watch within Security for 2017 (continued)
“The intelligent digital mesh and related digital
technology platforms and application
architectures create an ever-more-complex
world for security. The IoT edge is a new
frontier for many IT security professionals
creating new vulnerability areas and often
requiring new remediation tools and processes
that must be factored into IoT platform efforts.”
Gartner
Market Trends
15Feb20175
5. Edge of IoT devices and apps create new
security revenue opportunities. The increased
security risk of IoT over pure IT systems remains
a key challenge for IoT implementations.
Enterprise look to consultants for help.
6. Enter cognitive security. Intelligent cognitive
solutions generate recommendations for
improved security in real time. As a result,
cognitive security will help address the current
skills gap, accelerate responses and help reduce
the cost and complexity of dealing with
cybercrime. Due to the increasing scale and
complexity of threats, cognitive research is
quickly intersecting with cybersecurity
7. Demand increases for SECaaS. Customers are
choosing cloud-based security services for
improved flexibility and scalability of security
functions. Expect interest in incident response
services (e.g., detection and remediation) and
SIEM as a Service in 2017.
IBM: Security Immune System (Infographic)
Security Trend Report, 2017 (External Version)
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
Trends to watch within Security for 2017 (continued)
Market Trends
15Feb20176
8. Security Intelligence Event Management (SIEM):
Demand for SIEMs in 2017 will go beyond simple log
collection/correlation to include more advanced
analytics, such as behavioral analytics.
9. Identity Access Management (IAM). The
transformation to digital has accelerated the
requirement for IAM capabilities, including both
employee and consumer identity management as
well as an increased focus on identity management
for all devices and endpoints in the Internet of Things
(IoT)..
10. Mobile security: As mobility security services begin
to mature, more demand for blended managed and
hosted security mobility services. Success depends
on a combination of people, process, and technology
11. Managed Services. Enterprises increasingly expect
a flexible blend of managed and hosted security
services as well as varying levels of monitoring and
management for different areas of their business.
“The 2017 threats predictions run the
gamut, including threats around
ransomware, sophisticated hardware
and firmware attacks, attacks on “smart
home” IoT devices, the use of machine
learning to enhance social engineering
attacks, and an increase in cooperation
between industry and law enforcement.”-
Security Magazine
451 Research: 2017 Trends
in Information Security
CIO: 2017 Security Predictions
Security Trend Report, 2017 (External Version)
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
Six emerging security solution trends to watch
1. Remote Browser: Isolates the browser from the rest of the
endpoint and from the corporate network, reducing the
potential damage of malware
2. Deception: The use of deceit and/or feints designed to throw
off an attacker and disrupt their automation tools, delay their
activities or disrupt breach progression.
3. Breach Simulation Tools: Use threat actors and a
understanding of the network to continuously assess
infrastructure and apps for potential to be breached
4. Hunting Techniques: Advanced analytics, machine learning
and technologies that allow data analysis and pivoting to seek
out incidents
5. Intelligent Security Operations Center (ISOC): Go beyond
events-based monitoring and traditional defenses. It has an
adaptive architecture and includes context-aware components
6. Cognitive Computing Security Technologies: Due to the
increasing scale and complexity of threats, cognitive research
is quickly intersecting with cybersecurity. Companies will look
to deploy analytics-driven, machine learning-based security
decision support systems and technologies.
“Built upon security intelligence, cognitive
solutions generate not just answers, but
hypotheses, evidence-based reasoning
and recommendations for improved
decision making in real time. As a result,
cognitive security will help address the
current skills gap, accelerate responses
and help reduce the cost and complexity
of dealing with cybercrime.” IBM
Market Trends
15Feb20177
IBM: The IBM Security Immune System (brief)
“When choosing the appropriate platform
for threat hunting, look at specific
elements of automation, how they
incorporate various data sources, and
their ability to identify and correlate
patterns and to fully investigate and
uncover adversary activity.” SANS
Security Trend Report, 2017 (External Version)
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
Trends to watch within selected vertical industries
Market Trends
15Feb20178
• Retail. The significant and widely publicized breaches at large
retailers continue to raise awareness and demand for security
spending. Retailers put pressure on their OEM partners, including
point of sale (POS) manufacturers, and suppliers to invest in
security controls. In 2017, look also for an increased focus on
fraud solutions and PCI compliance activities.
• Healthcare. Healthcare is the #1 industry for records
compromised. Because medical records cannot be cancelled like
credit cards, they have a high value to cybercriminals. Breaches
against healthcare providers are frequently attributed to highly
organized, well-funded criminal organizations, compelling
healthcare companies to expand their advanced threat detection
projects. The focus in 2017 will be on data security and
compliance.
• Banking. The biggest security challenge for banking customers
is assessing the security capabilities of their third-party business
partners. Privacy, security and compliance when it comes to data
are the top concerns. To decrease risk of attacks that originate in
third parties’ infrastructures, banks will increase spending on
products and services that help them monitor the security
postures of third parties.
• Telco. Telecommunications operators are increasingly targeted
by hackers and hacktivists that aim to disrupt phone and Internet
service for millions of consumers and businesses. While most
operators have established strong security controls, they still face
significant risks in their supply chains, including partners’ security
infrastructure sourced from manufacturers in different countries.
“As the intersection of personalization,
privacy and security grows ever more
complex, the challenge for retailers to
protect their consumers’ sensitive
information from the standpoints of
both privacy and security intensifies.”-
IBM
Healthcare IT News: Top 10
cybersecurity must-haves for 2017
IBM: Security Trends in the Retail
Industry
Security Trend Report, 2017 (External Version)
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
Staffing shortages, lack of analytics capability and
international security laws inhibit adoption
 Security staffing shortages. Nearly two-thirds of
organizations worldwide report challenges hiring
skilled IT security professionals. Security staffing
shortages are especially pronounced in the U.S.,
where demand for security professionals will grow by
53% through 2018.
 Lack of Analytics Capabilities. Many firms just are
not collecting and managing the data that would
allow them to perform the analytics that can help
them identify threats and then reduce the average
incident response and resolution time.
 International privacy and data location
regulations. There are hundreds of different laws
around data collection, processing and transfer as
well as breach notification in different countries,
making it difficult for organizations to execute a
security strategy that will be acceptable in all
regions.
“Detection must be able to identify changing use
patterns; to execute complex analysis rapidly,
close to real time; to perform complex
correlations across a variety of data sources
ranging from server and application logs to
network events and user activities.” BI-Survey Big
Data Security Analytics: Infographic
Adoption Challenges
15Feb20179
TrustWave: 57% of IT Security Professionals
Struggle to Find Talent
CIO: 4 critical security challenges facing IoT
Security Trend Report, 2017 (External Version)
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
Selected Analyst Information and Resources
Featured Links
15Feb201710
 451 Research: Security
 Forrester: Security Research
 Frost & Sullivan: Cyber Security
 Gartner: Digital Risk and Security
 TBR: Security
 IDC:
 Security Products and Services
 Security Research
 Search for IDC Security
Gartner: Top Security Trends for 2016-2017
Forrester: WEBINAR: Dive Deeper Into The
Forrester Wave™: Digital Risk Monitoring, Q3 2016
Security Trend Report, 2017 (External Version)
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
Selected Media Websites and Other Resources
 CIO.com: Security
 ComputerWorld: Security
 eWeek: Security
 IDG Enterprise: Security
 InformationWeek: Dark Reading
 InfoWorld: Security
 Network World: Security Research Center
 VentureBeat: Security
 Wired: Security
15Feb201711
Reuters: CIA unveils new rules for collecting
information on Americans
Featured Links
InfoWorld: Security
“According to Forrester, 58 percent of breaches
are caused from internal incidents or with a
business partner’s organization. And 55 percent of
attacks are originated by an insider as cited in the
2015 IBM Cyber Security Intelligence Index.” CIO
How to eliminate insider threats
Security Trend Report, 2017 (External Version)
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
Selected IT Vendor Websites & Resources
 Accenture: Security Services
 Amazon Web Services: Security and Compliance Center
 Booz Allen: Cyber Solutions
 Cisco: Security
 Deloitte: Cyber Security Services
 Google: Application Security
 HP: Security
 IBM: Security and Security Software and Chief
Information Security Officer
 Microsoft: Security
 Oracle: Security
 PWC: Cybersecurity
 RSA: Security
 SAP: Security
 Tata Consultancy Services: Security Services
 VMware: Security
 Wipro: Security
IBM: Security Redbooks
15Feb201712
“In a world where privacy has become
a competitive differentiator for multi-
national organizations, businesses
must increasingly work with their
general counsels and chief privacy
officers to understand global data
privacy requirements, implementing
controls that protect personal data
accordingly.”- Christopher Sherman,
Forrester Analyst
Featured Links
Security Trend Report, 2017 (External Version)
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
Selected Social Media Sites and Searches
 Facebook Security page
 Google Blog Search: Cybersecurity
 Google+ Communities Search: Security
 LinkedIn Group Search: Security
 IBM IBM Security Intelligence
 Pinterest Search: Information Security and
Cybersecurity
 Slideshare: IT Security and Information Security
and Cybersecurity
 Twitter: Search on hashtags: #security /
#cybersecurity / #infosec
 YouTube:
 Information Security Playlists / Channels
 CyberSecurity Playlists / Channels
 Wikipedia: Information Security and
CyberSecurity
Information Security playlists YouTube
15Feb201713
Featured Links
Security Trend Report, 2017 (External Version)
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
IBM Resources and Links
ibm.com links
• IBM Security: www.ibm.com/security/
• Cognitive Security
• Cloud Security
• Mobile Security
• Solutions
• Products
• Services
• News
• developerWorks: Security
• x-Force: X-Force
• IBM Redbooks: Security
IBM Social Media Platforms
• Social Aggregator: Security
• Community: IBM Security Intelligence
• Twitter: @ibmsecurity and @ibmxforce -
hashtags: #ibmsecurity and #infosec
• Blogs: Security Intelligence Blog / X-Force / CISO
Corner
• YouTube: IBM Security
• LinkedIn Group: IBM Security
15Feb201714
IBM: Step up to the Cognitive Era with
Watson for Cyber Security
“Cybersecurity is more than an IT concern,
it requires engagement from across the
business. However, many executives are
either unclear on the risks or not
sufficiently engaged in threat
management.” IBM: Cybersecurity perspectives
from the boardroom and C-suite
Featured Links
Security Trend Report, 2017 (External Version)
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
More Insights on Technology Trends are Available
15
Other slide decks in this 2017 Trend Report series have been posted to Slideshare
You are also invited to check out the following IBM websites and resources
– IBM Academy of Technology
– IBM Institute for Business Value
– IBM Research and Research News and 5 in 5
– IBM’s THINK blog
– IBM Think Academy on YouTube
15Feb2017 Security Trend Report, 2017 (External Version)

Contenu connexe

Tendances

Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraKnowledge Group
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsIBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityMastel Indonesia
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsUlf Mattsson
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them SrikanthRaju7
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
Top 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionIBM Security
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceIBM Security
 
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?NetEnrich, Inc.
 

Tendances (20)

Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
 
Cyber security
Cyber securityCyber security
Cyber security
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Top 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS Solution
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat Intelligence
 
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
 

En vedette

Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity PredictionsPaloAltoNetworks
 
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend BriefBill Chamberlin
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapFireEye, Inc.
 
Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017Wallarm
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentationixiademandgen
 
Magic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesMagic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesJorge Gil Peña
 

En vedette (11)

Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 
Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
 
Magic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesMagic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suites
 
Cyber risk fheili.mohammad
Cyber risk fheili.mohammadCyber risk fheili.mohammad
Cyber risk fheili.mohammad
 

Similaire à IBM Security Trend Report Insights

The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Csa summit la transformación digital y el nuevo rol del ciso
Csa summit   la transformación digital y el nuevo rol del cisoCsa summit   la transformación digital y el nuevo rol del ciso
Csa summit la transformación digital y el nuevo rol del cisoCSA Argentina
 
SaaS-based IT Security Market 2022 Analysis Key Trends, Growth Opportunities,...
SaaS-based IT Security Market 2022 Analysis Key Trends, Growth Opportunities,...SaaS-based IT Security Market 2022 Analysis Key Trends, Growth Opportunities,...
SaaS-based IT Security Market 2022 Analysis Key Trends, Growth Opportunities,...stringentdatalytics
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftIntellias
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
 
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation AcceleratorsNuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation AcceleratorsIDC Italy
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internetsuperintendingengine17
 
The Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdfThe Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdfsphinx Worldbiz
 
Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCHarry Gunns
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOlivier Busolini
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 
Security analytics market
Security analytics marketSecurity analytics market
Security analytics marketpallavi_1234
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmPriyanka Aash
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroPrime Infoserv
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions OverviewJohn D. Haden
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCapgemini
 

Similaire à IBM Security Trend Report Insights (20)

The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Csa summit la transformación digital y el nuevo rol del ciso
Csa summit   la transformación digital y el nuevo rol del cisoCsa summit   la transformación digital y el nuevo rol del ciso
Csa summit la transformación digital y el nuevo rol del ciso
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
SaaS-based IT Security Market 2022 Analysis Key Trends, Growth Opportunities,...
SaaS-based IT Security Market 2022 Analysis Key Trends, Growth Opportunities,...SaaS-based IT Security Market 2022 Analysis Key Trends, Growth Opportunities,...
SaaS-based IT Security Market 2022 Analysis Key Trends, Growth Opportunities,...
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation AcceleratorsNuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
The Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdfThe Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdf
 
Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Security analytics market
Security analytics marketSecurity analytics market
Security analytics market
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
 

Plus de Bill Chamberlin

Intelligent Autonomous Transportation: IBM HorizonWatch 2016 Trend Brief
Intelligent Autonomous Transportation:  IBM HorizonWatch 2016 Trend Brief Intelligent Autonomous Transportation:  IBM HorizonWatch 2016 Trend Brief
Intelligent Autonomous Transportation: IBM HorizonWatch 2016 Trend Brief Bill Chamberlin
 
The Data Economy: 2016 Horizonwatch Trend Brief
The Data Economy:  2016 Horizonwatch Trend BriefThe Data Economy:  2016 Horizonwatch Trend Brief
The Data Economy: 2016 Horizonwatch Trend BriefBill Chamberlin
 
Digital Marketing and Personalization of CX: 2016 Horizonwatch Trend Brief
Digital Marketing and Personalization of CX:  2016 Horizonwatch Trend BriefDigital Marketing and Personalization of CX:  2016 Horizonwatch Trend Brief
Digital Marketing and Personalization of CX: 2016 Horizonwatch Trend BriefBill Chamberlin
 
API Economy: 2016 Horizonwatch Trend Brief
API Economy:  2016 Horizonwatch Trend BriefAPI Economy:  2016 Horizonwatch Trend Brief
API Economy: 2016 Horizonwatch Trend BriefBill Chamberlin
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016Bill Chamberlin
 
Internet of Things : Trends to Watch in 2016
Internet of Things:  Trends to Watch in 2016Internet of Things:  Trends to Watch in 2016
Internet of Things : Trends to Watch in 2016Bill Chamberlin
 
Data Visualization - HorizonWatch 2015 Trend Report
Data Visualization - HorizonWatch 2015 Trend Report Data Visualization - HorizonWatch 2015 Trend Report
Data Visualization - HorizonWatch 2015 Trend Report Bill Chamberlin
 
3D Printing - A 2014 Horizonwatching Trend Summary Report
3D Printing - A 2014 Horizonwatching Trend Summary Report3D Printing - A 2014 Horizonwatching Trend Summary Report
3D Printing - A 2014 Horizonwatching Trend Summary ReportBill Chamberlin
 
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
Wearable Computing:  A 2014 HorizonWatching Trend Summary ReportWearable Computing:  A 2014 HorizonWatching Trend Summary Report
Wearable Computing: A 2014 HorizonWatching Trend Summary ReportBill Chamberlin
 
HorizonWatching: How IBM Develops Views of the Potential Futures
HorizonWatching:  How IBM Develops Views of the Potential FuturesHorizonWatching:  How IBM Develops Views of the Potential Futures
HorizonWatching: How IBM Develops Views of the Potential FuturesBill Chamberlin
 
Blogging 101 - Research-Plan-Engage-Measure
Blogging 101 - Research-Plan-Engage-MeasureBlogging 101 - Research-Plan-Engage-Measure
Blogging 101 - Research-Plan-Engage-MeasureBill Chamberlin
 
HorizonWatching: Leveraging Social Media and Communities for Foresight
HorizonWatching: Leveraging Social Media and Communities for ForesightHorizonWatching: Leveraging Social Media and Communities for Foresight
HorizonWatching: Leveraging Social Media and Communities for ForesightBill Chamberlin
 
Social media 101: Social Media Disasters
Social media 101:   Social Media DisastersSocial media 101:   Social Media Disasters
Social media 101: Social Media DisastersBill Chamberlin
 

Plus de Bill Chamberlin (13)

Intelligent Autonomous Transportation: IBM HorizonWatch 2016 Trend Brief
Intelligent Autonomous Transportation:  IBM HorizonWatch 2016 Trend Brief Intelligent Autonomous Transportation:  IBM HorizonWatch 2016 Trend Brief
Intelligent Autonomous Transportation: IBM HorizonWatch 2016 Trend Brief
 
The Data Economy: 2016 Horizonwatch Trend Brief
The Data Economy:  2016 Horizonwatch Trend BriefThe Data Economy:  2016 Horizonwatch Trend Brief
The Data Economy: 2016 Horizonwatch Trend Brief
 
Digital Marketing and Personalization of CX: 2016 Horizonwatch Trend Brief
Digital Marketing and Personalization of CX:  2016 Horizonwatch Trend BriefDigital Marketing and Personalization of CX:  2016 Horizonwatch Trend Brief
Digital Marketing and Personalization of CX: 2016 Horizonwatch Trend Brief
 
API Economy: 2016 Horizonwatch Trend Brief
API Economy:  2016 Horizonwatch Trend BriefAPI Economy:  2016 Horizonwatch Trend Brief
API Economy: 2016 Horizonwatch Trend Brief
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016
 
Internet of Things : Trends to Watch in 2016
Internet of Things:  Trends to Watch in 2016Internet of Things:  Trends to Watch in 2016
Internet of Things : Trends to Watch in 2016
 
Data Visualization - HorizonWatch 2015 Trend Report
Data Visualization - HorizonWatch 2015 Trend Report Data Visualization - HorizonWatch 2015 Trend Report
Data Visualization - HorizonWatch 2015 Trend Report
 
3D Printing - A 2014 Horizonwatching Trend Summary Report
3D Printing - A 2014 Horizonwatching Trend Summary Report3D Printing - A 2014 Horizonwatching Trend Summary Report
3D Printing - A 2014 Horizonwatching Trend Summary Report
 
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
Wearable Computing:  A 2014 HorizonWatching Trend Summary ReportWearable Computing:  A 2014 HorizonWatching Trend Summary Report
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
 
HorizonWatching: How IBM Develops Views of the Potential Futures
HorizonWatching:  How IBM Develops Views of the Potential FuturesHorizonWatching:  How IBM Develops Views of the Potential Futures
HorizonWatching: How IBM Develops Views of the Potential Futures
 
Blogging 101 - Research-Plan-Engage-Measure
Blogging 101 - Research-Plan-Engage-MeasureBlogging 101 - Research-Plan-Engage-Measure
Blogging 101 - Research-Plan-Engage-Measure
 
HorizonWatching: Leveraging Social Media and Communities for Foresight
HorizonWatching: Leveraging Social Media and Communities for ForesightHorizonWatching: Leveraging Social Media and Communities for Foresight
HorizonWatching: Leveraging Social Media and Communities for Foresight
 
Social media 101: Social Media Disasters
Social media 101:   Social Media DisastersSocial media 101:   Social Media Disasters
Social media 101: Social Media Disasters
 

Dernier

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Dernier (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

IBM Security Trend Report Insights

  • 1. Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Welcome to the new era of cognitive security Sonya Gordon, Market Development, Senior Advisor - IBM Security Bill Chamberlin, Distinguished Market Intelligence Professional, MD&I HorizonWatch February 15, 2017 Security Trend Report, 2017
  • 2. Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. About This Trend Report 15Feb2017  Purpose: The slides provide an overview on the I.T. Security trend  Content: Summary information about the I.T. Security marketplace, including trends drivers, spending trends, industry business cases, and adoption challenges. Also included are links to additional resources.  How To Use This Report: This report is best read/studied and used as a learning document. You may want to view the slides in slideshow mode so you can easily follow the links  Available on Slideshare: This presentation (and other Trend Reports for 2017) will be available publically on Slideshare at http://www.slideshare.net/horizonwatching  Please Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. 2 Security Trend Report, 2017 (External Version)
  • 3. Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. An overview of the IT Security trend Drivers Security Spending  Growth in endpoints from mobile to wearables to IoT devices  Increased threats from malware, cybercrime, Phishing, & bots  High profile security breaches are damaging brands  Rise of virtualization & cloud which separates data user and data owner  Mobile employees want access anytime, anywhere  Increased focus on Corporate risk management, governance, compliance.  Increased focus on identity services - trusted, privacy- enabling, shared and easy-to-use identities Inhibitors/Challenges  Security is a barrier to cloud adoption, mobile, and IoT  ROI is still not a true value of measurement of security investment  Keeping up with BYO-everything  Increasing complexity of security environment  Skill gaps Key Insights 15Feb20173 Implications  Increased pressure on the CISO role to manage risk end-to-end across entire organization and every endpoint, every network connection  Increased need for skilled security professionals and service providers  Compliance requires continued investment  IT must understand implications of key trends such as cloud, mobility, social, big data, IoT, etc.  Encryption behind the firewall becomes a necessity  Biometrics continues to be an emerging technology that can be embedded into mobile solutions to enhance information security  Cognitive computing applied to security is an increasingly attractive solution In today’s data-driven, highly distributed world, there are serious threats that must be addressed head-on. New complexities and challenges are arising every day. Companies are looking for an integrated system of analytics, real-time defenses and expert resources to defend networks, systems and data. Security Trend Report, 2017 (External Version)
  • 4. Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Trends to watch within Security for 2017 “Worldwide revenues for security-related hardware, software, and services will grow from $73.7 billion in 2016 to $101.6 billion in 2020. The largest category of investment will be security-related services, which will account for nearly 45% of all security spending worldwide ” IDC Market Trends 15Feb20174 Other views on 2017 Trends • Fortune: Here's How Much Businesses Worldwide Will Spend on Cybersecurity by 2020 • eWeek: 8 Predictions About How the Security Industry Will Fare in 2017 • INC: How Cyber Criminals Will Weaponize the Internet of Things in 2017 • NetworkWorld: 5 cybersecurity trends to watch for 2017 • Information Age: 10 cyber security trends to look out for in 2017 • O'Reilly: 4 trends in security data science for 2017 1. Increased Pressure on CISOs. IT security programs are under more pressure than ever before. Corporate Boards want to know that security risks are being minimized and that programs are legally defensible. 2. Services in demand. Security services, especially professional services, contribute the most revenue in the market. Network security is a large segment and Mobile enterprise management will generate the strongest growth. 3. Focus turns to “Response and Remediation”. It’s very difficult to prevent attacks so more focus is being shifted towards post-attack analytic-powered solutions that identify the attacks as they happen and minimize the resulting damage. 4. Growth in SIEM, IAM, mobile security and services. Expect increased demand for security identity and event management (SIEM), Identity and Access Management (IAM) as a Service and mobile payment security in 2017. “60% of enterprise information security budgets will be allocated to rapid detection and response approaches by 2020.” Gartner Security Trend Report, 2017 (External Version)
  • 5. Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Trends to watch within Security for 2017 (continued) “The intelligent digital mesh and related digital technology platforms and application architectures create an ever-more-complex world for security. The IoT edge is a new frontier for many IT security professionals creating new vulnerability areas and often requiring new remediation tools and processes that must be factored into IoT platform efforts.” Gartner Market Trends 15Feb20175 5. Edge of IoT devices and apps create new security revenue opportunities. The increased security risk of IoT over pure IT systems remains a key challenge for IoT implementations. Enterprise look to consultants for help. 6. Enter cognitive security. Intelligent cognitive solutions generate recommendations for improved security in real time. As a result, cognitive security will help address the current skills gap, accelerate responses and help reduce the cost and complexity of dealing with cybercrime. Due to the increasing scale and complexity of threats, cognitive research is quickly intersecting with cybersecurity 7. Demand increases for SECaaS. Customers are choosing cloud-based security services for improved flexibility and scalability of security functions. Expect interest in incident response services (e.g., detection and remediation) and SIEM as a Service in 2017. IBM: Security Immune System (Infographic) Security Trend Report, 2017 (External Version)
  • 6. Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Trends to watch within Security for 2017 (continued) Market Trends 15Feb20176 8. Security Intelligence Event Management (SIEM): Demand for SIEMs in 2017 will go beyond simple log collection/correlation to include more advanced analytics, such as behavioral analytics. 9. Identity Access Management (IAM). The transformation to digital has accelerated the requirement for IAM capabilities, including both employee and consumer identity management as well as an increased focus on identity management for all devices and endpoints in the Internet of Things (IoT).. 10. Mobile security: As mobility security services begin to mature, more demand for blended managed and hosted security mobility services. Success depends on a combination of people, process, and technology 11. Managed Services. Enterprises increasingly expect a flexible blend of managed and hosted security services as well as varying levels of monitoring and management for different areas of their business. “The 2017 threats predictions run the gamut, including threats around ransomware, sophisticated hardware and firmware attacks, attacks on “smart home” IoT devices, the use of machine learning to enhance social engineering attacks, and an increase in cooperation between industry and law enforcement.”- Security Magazine 451 Research: 2017 Trends in Information Security CIO: 2017 Security Predictions Security Trend Report, 2017 (External Version)
  • 7. Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Six emerging security solution trends to watch 1. Remote Browser: Isolates the browser from the rest of the endpoint and from the corporate network, reducing the potential damage of malware 2. Deception: The use of deceit and/or feints designed to throw off an attacker and disrupt their automation tools, delay their activities or disrupt breach progression. 3. Breach Simulation Tools: Use threat actors and a understanding of the network to continuously assess infrastructure and apps for potential to be breached 4. Hunting Techniques: Advanced analytics, machine learning and technologies that allow data analysis and pivoting to seek out incidents 5. Intelligent Security Operations Center (ISOC): Go beyond events-based monitoring and traditional defenses. It has an adaptive architecture and includes context-aware components 6. Cognitive Computing Security Technologies: Due to the increasing scale and complexity of threats, cognitive research is quickly intersecting with cybersecurity. Companies will look to deploy analytics-driven, machine learning-based security decision support systems and technologies. “Built upon security intelligence, cognitive solutions generate not just answers, but hypotheses, evidence-based reasoning and recommendations for improved decision making in real time. As a result, cognitive security will help address the current skills gap, accelerate responses and help reduce the cost and complexity of dealing with cybercrime.” IBM Market Trends 15Feb20177 IBM: The IBM Security Immune System (brief) “When choosing the appropriate platform for threat hunting, look at specific elements of automation, how they incorporate various data sources, and their ability to identify and correlate patterns and to fully investigate and uncover adversary activity.” SANS Security Trend Report, 2017 (External Version)
  • 8. Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Trends to watch within selected vertical industries Market Trends 15Feb20178 • Retail. The significant and widely publicized breaches at large retailers continue to raise awareness and demand for security spending. Retailers put pressure on their OEM partners, including point of sale (POS) manufacturers, and suppliers to invest in security controls. In 2017, look also for an increased focus on fraud solutions and PCI compliance activities. • Healthcare. Healthcare is the #1 industry for records compromised. Because medical records cannot be cancelled like credit cards, they have a high value to cybercriminals. Breaches against healthcare providers are frequently attributed to highly organized, well-funded criminal organizations, compelling healthcare companies to expand their advanced threat detection projects. The focus in 2017 will be on data security and compliance. • Banking. The biggest security challenge for banking customers is assessing the security capabilities of their third-party business partners. Privacy, security and compliance when it comes to data are the top concerns. To decrease risk of attacks that originate in third parties’ infrastructures, banks will increase spending on products and services that help them monitor the security postures of third parties. • Telco. Telecommunications operators are increasingly targeted by hackers and hacktivists that aim to disrupt phone and Internet service for millions of consumers and businesses. While most operators have established strong security controls, they still face significant risks in their supply chains, including partners’ security infrastructure sourced from manufacturers in different countries. “As the intersection of personalization, privacy and security grows ever more complex, the challenge for retailers to protect their consumers’ sensitive information from the standpoints of both privacy and security intensifies.”- IBM Healthcare IT News: Top 10 cybersecurity must-haves for 2017 IBM: Security Trends in the Retail Industry Security Trend Report, 2017 (External Version)
  • 9. Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Staffing shortages, lack of analytics capability and international security laws inhibit adoption  Security staffing shortages. Nearly two-thirds of organizations worldwide report challenges hiring skilled IT security professionals. Security staffing shortages are especially pronounced in the U.S., where demand for security professionals will grow by 53% through 2018.  Lack of Analytics Capabilities. Many firms just are not collecting and managing the data that would allow them to perform the analytics that can help them identify threats and then reduce the average incident response and resolution time.  International privacy and data location regulations. There are hundreds of different laws around data collection, processing and transfer as well as breach notification in different countries, making it difficult for organizations to execute a security strategy that will be acceptable in all regions. “Detection must be able to identify changing use patterns; to execute complex analysis rapidly, close to real time; to perform complex correlations across a variety of data sources ranging from server and application logs to network events and user activities.” BI-Survey Big Data Security Analytics: Infographic Adoption Challenges 15Feb20179 TrustWave: 57% of IT Security Professionals Struggle to Find Talent CIO: 4 critical security challenges facing IoT Security Trend Report, 2017 (External Version)
  • 10. Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Selected Analyst Information and Resources Featured Links 15Feb201710  451 Research: Security  Forrester: Security Research  Frost & Sullivan: Cyber Security  Gartner: Digital Risk and Security  TBR: Security  IDC:  Security Products and Services  Security Research  Search for IDC Security Gartner: Top Security Trends for 2016-2017 Forrester: WEBINAR: Dive Deeper Into The Forrester Wave™: Digital Risk Monitoring, Q3 2016 Security Trend Report, 2017 (External Version)
  • 11. Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Selected Media Websites and Other Resources  CIO.com: Security  ComputerWorld: Security  eWeek: Security  IDG Enterprise: Security  InformationWeek: Dark Reading  InfoWorld: Security  Network World: Security Research Center  VentureBeat: Security  Wired: Security 15Feb201711 Reuters: CIA unveils new rules for collecting information on Americans Featured Links InfoWorld: Security “According to Forrester, 58 percent of breaches are caused from internal incidents or with a business partner’s organization. And 55 percent of attacks are originated by an insider as cited in the 2015 IBM Cyber Security Intelligence Index.” CIO How to eliminate insider threats Security Trend Report, 2017 (External Version)
  • 12. Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Selected IT Vendor Websites & Resources  Accenture: Security Services  Amazon Web Services: Security and Compliance Center  Booz Allen: Cyber Solutions  Cisco: Security  Deloitte: Cyber Security Services  Google: Application Security  HP: Security  IBM: Security and Security Software and Chief Information Security Officer  Microsoft: Security  Oracle: Security  PWC: Cybersecurity  RSA: Security  SAP: Security  Tata Consultancy Services: Security Services  VMware: Security  Wipro: Security IBM: Security Redbooks 15Feb201712 “In a world where privacy has become a competitive differentiator for multi- national organizations, businesses must increasingly work with their general counsels and chief privacy officers to understand global data privacy requirements, implementing controls that protect personal data accordingly.”- Christopher Sherman, Forrester Analyst Featured Links Security Trend Report, 2017 (External Version)
  • 13. Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Selected Social Media Sites and Searches  Facebook Security page  Google Blog Search: Cybersecurity  Google+ Communities Search: Security  LinkedIn Group Search: Security  IBM IBM Security Intelligence  Pinterest Search: Information Security and Cybersecurity  Slideshare: IT Security and Information Security and Cybersecurity  Twitter: Search on hashtags: #security / #cybersecurity / #infosec  YouTube:  Information Security Playlists / Channels  CyberSecurity Playlists / Channels  Wikipedia: Information Security and CyberSecurity Information Security playlists YouTube 15Feb201713 Featured Links Security Trend Report, 2017 (External Version)
  • 14. Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. IBM Resources and Links ibm.com links • IBM Security: www.ibm.com/security/ • Cognitive Security • Cloud Security • Mobile Security • Solutions • Products • Services • News • developerWorks: Security • x-Force: X-Force • IBM Redbooks: Security IBM Social Media Platforms • Social Aggregator: Security • Community: IBM Security Intelligence • Twitter: @ibmsecurity and @ibmxforce - hashtags: #ibmsecurity and #infosec • Blogs: Security Intelligence Blog / X-Force / CISO Corner • YouTube: IBM Security • LinkedIn Group: IBM Security 15Feb201714 IBM: Step up to the Cognitive Era with Watson for Cyber Security “Cybersecurity is more than an IT concern, it requires engagement from across the business. However, many executives are either unclear on the risks or not sufficiently engaged in threat management.” IBM: Cybersecurity perspectives from the boardroom and C-suite Featured Links Security Trend Report, 2017 (External Version)
  • 15. Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. More Insights on Technology Trends are Available 15 Other slide decks in this 2017 Trend Report series have been posted to Slideshare You are also invited to check out the following IBM websites and resources – IBM Academy of Technology – IBM Institute for Business Value – IBM Research and Research News and 5 in 5 – IBM’s THINK blog – IBM Think Academy on YouTube 15Feb2017 Security Trend Report, 2017 (External Version)