Infosecurity Europe 2013: Day 2 Thoughts
Marcel Santilli 270002FABM email@example.com | | Tags:  infosecurity security infosec ibm_security tom-kendall mobile-security security-intelligence infosec13 europe ibm-security qradar ibmsecurity
0 Comments | 1,497 Visits
IBM Security Systems had another great day at Infosecurity Europe, with good attendance at our stand for the hourly interactive graffiti whiteboarding sessions, which covered all the hottest security topics.
In our workshops we had four successful sessions, allowing attendees insights into Security Intelligence, Mobile and Future thinking. Here are my thoughts on the key points raised in these sessions.
We kicked off with Simon McDowell and Chris Payne from business partner, Satisnet, presenting "Total Intelligence and Visibility for Today’s Security Ecosystems".
To show this in practice the team from Satisnet went through a number of different security scenarios and showed how IBM Security QRadar SIEM provides real-time visibility for threat detection and prioritization. This included identifying data leakage where they highlighted when a suspect malware was come into the network.
Manage and secure your mobile enterprise: Delivering visibility and confidence
A late change in presenters meant Neil Warburton was next up to present “Manage and secure your mobile enterprise: Delivering visibility and confidence”. Neil started by analysing the unique management and security challenges that organizations face with mobile devices. This included how mobile devices are shared more often, how they have multiple personas (used as a work tools, as well as personal) and also that they are used in many more locations (anywhere, anytime).
He then went into detail on having clear process/policies in place and that managing and securing access in a mobile environment is a lot more than locking down the smartphones and tablets. For example, are you officially going to support BYOD throughout and outside your enterprise? Are there any limitations on who can access what application or resource and, from where, on what device/OS? Are you prepared to support access to more than just email and calendar on mobile devices? How will your mobile strategy impact employees, customers, and business partners?
Neil finished his presentation by talking through how IBM Security have approached the issues that organizations have faced with mobile security and went through some use cases, including an electrical provider and a bank, to show how these policies have been implemented.
Thinking like an attacker to make your defences better
In the first afternoon session we had Neil Warburton back again to present “Thinking like an attacker to make your defences better”. The audience this time nodded in approval with the slide presented on how organisations fail in terms of protecting themselves from a breach. With broader issues such as end users not thinking before they clicked on a suspect link or weak passwords, to the IT/Security team leaving hardware/software unpatched, Neil highlighted how easy it was for a breach to happen.
He then went into detail on how security teams need to move from a reactive model to a proactive model, where situational awareness is required. This meant monitoring everything, all the time and related this to the IBM Security Systems framework of "Intelligence, Integration, Expertise." Neil finished by talking about how IBM Security Systems will continue to focus on solving the big problems: Advanced Threats, Cloud Computing, Mobile Computing and Regulation & Compliance and how our integrated portfolio can help to keep the attackers at bay.
How to defend your network and keep attackers out with Security Intelligence
We finished the day with Rob Whitters, Senior Security Engineer for IBM Security Systems, who provided a great analysis of how to defend your network and most importantly keeping attackers out with Security Intelligence.
Rob set the scene of what Security Intelligence is and why it is important by showing how complex the challenge for security teams is to identify what a true breach is. He highlighted how the workplace has developed with the use of Smartphones/tablets and increased social media profiling has made it even more of a headache for the security teams to track and react to issues before damage to their networks occur.
Rob then went into details to talk about the IBM QRadar Security Intelligence Platform, showing how the scalable, intelligent and integrated it is. He went through a number of use cases and supporting case studies to show the range of security problems that IBM QRadar Security Intelligence Platform can help to combat.
With a snapshot of how the user interface looks, this provided some good discussion with the audience, especially with the use case of how the platform uses Application Layer 7 flow analysis to detect threats other miss.
Stop by the IBM Security stand at Infosec Europe
If you were unable to come to one of our workshops but are interested in what was discussed above, we will be posting all the presentations on http://ibm.co/1106Bdy. I look forward to bringing to you my thoughts tomorrow from day 3 of Infosecurity Europe 2013!
Tom joined the IBM Security Systems marketing team through the acquisition of Q1 Labs team. He was the EMEA Marketing Team Lead for Q1 Labs and worked on the demand generation and channel partner marketing programmes. Tom moved into the WW Marketing team for IBM Security Systems and has been the lead for Demand Generation in Threat and Security Intelligence, and has taken on the role of the IMT first role for Europe. Before joining IBM, Tom worked for 8 years in the advertising industry in London, working on media strategies for large enterprise clients.