Professional Documents
Culture Documents
An Imperative in The Cognitive Era - Robert Dyson
An Imperative in The Cognitive Era - Robert Dyson
Average business impact Attacks created by well Attacks are complex and Security programs are not
of a typical security financed organized crime use internal and external agile and adaptable to
breach = or nation state operations techniques to exploit today’s evolving threats
vulnerabilities
$Millions + 12,000 security
Loss of Trust events per second! Often Undetected!
Result: Information security is a top priority for most companies and governments
Cognitive
Harmonization of all data - non biased deterministic
Prescriptive
How can everyone Operationalizing best outcome
Descriptive
What has happened?
• Enhance regulatory
compliance governance • Eliminate false positives • Establish an enhanced data
processes faster and with more taxonomy
• Align security control precision • Maintain alignment with the
requirements with corporate • Enhance relevance of log data taxonomy
IT control framework monitoring rules
• Align policies with control • Enhance incident analysis
requirements
1 2 3 4 5 6
Watson
….utilizing its cognitive learning process and the growing body of defined
obligations to help understand obligations from new documents being ingested
© 2016 IBM Corporation 10
10
Security Solutions leveraging cognitive computing is a smarter risk
management approach
Focused on building trust and value amidst uncertainty
Govern, manage and protect Cognitive Computing is just now being leveraged
your data to solve complex security problems
Ensure you have the right data for
value-added results and the governance The computer will be able to generate questions or
processes to ensure compliance and
protect ion answers to questions that humans could never do
The value will be significant!
THANK YOU
www.ibm.com/security
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be
responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or
licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in
which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future
product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or
service names may be trademarks or service marks of others.