December 9, 2016 By Kevin Albano 2 min read

With recent announcement of IBM’s $200 million commitment to expanding its security leadership position in the incident response (IR) market, IBM is working to help clients address the challenges in adopting a more proactive approach to IR.

As part of the initiative, IBM established a new global incident response team. The mandate for IBM X-Force Incident Response and Intelligence Services (IRIS) is to deliver the next evolution in incident response management.

Organizations face an ever-changing threat landscape, which sometimes forces security operation analysts and incident handlers to make rushed decisions. IBM X-Force IRIS uses an agile approach designed to concurrently contain threats and obtain threat attack evidence.

The old detect-and-fix methodology may miscalculate the resolve of threat actors, inadvertently placing increased pressure on security operations teams. IBM X-Force IRIS prefers to implement situational preparedness and sound decision-making based on practiced response procedures.

Incident Response, Remediation and Intelligence

These tenets denote the team’s disciplines. Security intelligence, or cyberthreat intelligence (CTI), provides threat insight to IRIS’ response and remediation services. IBM X-Force IRIS consultants rely on threat knowledge produced by CTI analysts to accurately identify threats and understand the threat’s logical attack progression.

IBM X-Force Intelligence Services gets privileged access to IBM Security’s global presence, threat research diversity and X-Force Command Center’s security operations experience. In turn, IBM Security clients benefit from IBM X-Force IRIS-developed threat indications, vulnerability advisories and improved signature context.

Getting Ahead of the Threat

Attackers remain undeterred as organizations improve their compromise detection capabilities. Attributed persistent threat campaigns may have subsided against planned targets, but the skilled computer network attackers behind those campaigns often remain undetected. Their activities may not be as organized or regimented as they once were, but the techniques they employ have become the standard.

The amount of structured and unstructured threat data increases as the security industry works to increase the visibility of these evolving attacks. CTI analysts confront increasing threat information with little to no growth in the capacity to validate the latest security research.

Organizations with expert CTI teams to hunt threats in their environment may now find these teams are comprised of all-source generalists who manage threat information. The skills gap represents not only a shortage of people, but also the right skills to hunt for evolving threats.

Applying Cognitive Security

The next step forward is the application of cognitive tools for cyberthreat intelligence. Cognitive technology provides the means to stay current with the mass amounts of structured and unstructured data and assign context to known threats. Organization-run CTI teams may collect information about past threats and incidents and apply it to current findings.

Beyond this descriptive analysis, cognitive security provides the analytic capacity to be prescriptive and identify emerging threats based on threat identification models. This gives CTI analysts the time to become technical or subject-matter experts, define new threats and customize threat intelligence for decision-makers. Integrating the CTI analyst’s threat identification model within Watson presents a real possibility for decision-makers to take proactive steps toward disrupting or deterring the next threat activity.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today