December 9, 2016 By Kevin Albano 2 min read

With recent announcement of IBM’s $200 million commitment to expanding its security leadership position in the incident response (IR) market, IBM is working to help clients address the challenges in adopting a more proactive approach to IR.

As part of the initiative, IBM established a new global incident response team. The mandate for IBM X-Force Incident Response and Intelligence Services (IRIS) is to deliver the next evolution in incident response management.

Organizations face an ever-changing threat landscape, which sometimes forces security operation analysts and incident handlers to make rushed decisions. IBM X-Force IRIS uses an agile approach designed to concurrently contain threats and obtain threat attack evidence.

The old detect-and-fix methodology may miscalculate the resolve of threat actors, inadvertently placing increased pressure on security operations teams. IBM X-Force IRIS prefers to implement situational preparedness and sound decision-making based on practiced response procedures.

Incident Response, Remediation and Intelligence

These tenets denote the team’s disciplines. Security intelligence, or cyberthreat intelligence (CTI), provides threat insight to IRIS’ response and remediation services. IBM X-Force IRIS consultants rely on threat knowledge produced by CTI analysts to accurately identify threats and understand the threat’s logical attack progression.

IBM X-Force Intelligence Services gets privileged access to IBM Security’s global presence, threat research diversity and X-Force Command Center’s security operations experience. In turn, IBM Security clients benefit from IBM X-Force IRIS-developed threat indications, vulnerability advisories and improved signature context.

Getting Ahead of the Threat

Attackers remain undeterred as organizations improve their compromise detection capabilities. Attributed persistent threat campaigns may have subsided against planned targets, but the skilled computer network attackers behind those campaigns often remain undetected. Their activities may not be as organized or regimented as they once were, but the techniques they employ have become the standard.

The amount of structured and unstructured threat data increases as the security industry works to increase the visibility of these evolving attacks. CTI analysts confront increasing threat information with little to no growth in the capacity to validate the latest security research.

Organizations with expert CTI teams to hunt threats in their environment may now find these teams are comprised of all-source generalists who manage threat information. The skills gap represents not only a shortage of people, but also the right skills to hunt for evolving threats.

Applying Cognitive Security

The next step forward is the application of cognitive tools for cyberthreat intelligence. Cognitive technology provides the means to stay current with the mass amounts of structured and unstructured data and assign context to known threats. Organization-run CTI teams may collect information about past threats and incidents and apply it to current findings.

Beyond this descriptive analysis, cognitive security provides the analytic capacity to be prescriptive and identify emerging threats based on threat identification models. This gives CTI analysts the time to become technical or subject-matter experts, define new threats and customize threat intelligence for decision-makers. Integrating the CTI analyst’s threat identification model within Watson presents a real possibility for decision-makers to take proactive steps toward disrupting or deterring the next threat activity.

More from

AI decision-making: Where do businesses draw the line?

4 min read - "A computer can never be held accountable, therefore a computer must never make a management decision."- IBM Training Manual, 1979Artificial intelligence (AI) adoption is on the rise. According to the IBM Global AI Adoption Index 2023, 42% of enterprises have actively deployed AI, and 40% are experimenting with the technology. Of those using or exploring AI, 59% have accelerated their investments and rollouts over the past two years. The result is an uptick in AI decision-making that leverages intelligent tools…

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today