September 25, 2017 By Mark Samuels 3 min read

IT decision-makers must develop a strong cybersecurity strategy that uses analytics and innovation to create an integrated approach to data protection.

That was the key message from a keynote speech by Marc Van Zadelhoff, general manager at IBM Security, who spoke at the recent Privacy & Security 2017 event organized by Forrester Research in Washington, D.C. Van Zadelhoff said that too many firms still fail to get the basics right when it comes to data protection.

Security leaders must move beyond the traditional perimeter-based approach to cybersecurity. As a first stage, they should place analytics at the heart of their cybersecurity strategy. As a further stage of evolution, IT managers should use cloud, collaboration and cognitive capabilities to boost data protection.

https://www.youtube.com/watch?v=NMQpd1nK2nE&feature=youtu.be

Why Is It Still Hard for Companies to Get the Basics Right?

Van Zadelhoff, who runs IBM’s 8,000-strong security business, suggested three key reasons why firms struggle with information security. He pointed, first, to data overload in the security community, stating that it still takes 201 days on average to find and isolate a security breach.

Second, Van Zadelhoff referred to the skills gap, referencing an (ISC)2 study that suggested there will be 1.5 million IT security vacancies globally by 2020. Finally, he mentioned the complexity of tooling — while the industry tends to focus on advanced technology, basic security elements are still ignored. He said the average customer uses 85 security tools from 45 vendors.

Van Zadelhoff added that, as a security specialist with 20 years of experience, he still sees common mistakes across patch management and application security. He pointed to regular news stories about vulnerabilities in applications. “Finding key data, and protecting that data, should be basic stuff,” he said.

Taking an Informed Approach to Data Protection

Van Zadelhoff proposed an alternative security model based around an immune system of capabilities. Rather than attempting to create a defendable perimeter, IT decision-makers should place analytics at the core of an integrated approach to data protection.

This analytical insight can then be used to inform key areas of data protection, such as mobile devices, applications and identifiers. “When this immune system is done well, it can provide a boost in terms of both security and privacy,” said Van Zadelhoff.

Deep analytics can also help identify user concerns, both in terms of the behavior of internal employees and external customers. “When you know how your users are behaving, you can start to act and put data access privileges in place,” he said.

Evolve Security Programs for the Future

According to Van Zadelhoff, the good news is that increasing numbers of businesses are moving to an immune-system approach to security. He hoped that more firms will begin to advance security to a third strategic stage, where security leaders use a combination of cloud, collaboration and cognitive capabilities to create even higher levels of data protection.

Van Zadelhoff said that companies can use cloud to deploy new security elements quickly as-a-service, potentially creating 30 percent cost savings when compared to traditional on-premises approaches. Stronger collaboration, meanwhile, can allow organizations and vendors to share best practice knowledge on incident management.

When it comes to cognitive capabilities, Van Zadelhoff referred to the artificial intelligence-based system known as Watson for Cyber Security, which draws on the detailed analysis of 2 million security documents. Clients can use this system to find potential explanations for incidents 60 times faster than through complex manual analysis.

Some organizations have already benefited from Watson for Cyber Security. IBM analysts working on-site at Wimbledon used the technology to analyze potential threats quickly, and security firm Sogeti has used the system to boost a security operations center at an insurance company.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today