IBM Security Cognitive
IBM SECURITY INTELLIGENCE & ANALYTICS
Luigi Perrone
IBM SWG – Security Systems
Security & Audit for zSystem & enterprise
Security Intelligence solution
luigi_perrone@it.ibm.com
Marzo, 2017
by
2 IBM Security
Perimeter Controls
Pre 2005
Security Intelligence
2005++
Cognitive, Cloud, and
Collaboration
2015+
Impiego di difese
statiche che controllano
o limitano il flusso dei
dati, come firewalls,
software antivirus, web
gateways, ecc.
Impiego di strumenti analitici
per collezionare ed
interpretare grandi quantità di
flussi di dati in real-time,
creando una priorità degli
eventi evidenziandone il livello
di rischio
Interpretazione e
comprensione ed
elaborazione di dati di
sicurezza eseguiti come una
persona umana ma ad una
velocità non raggiungibile da
un umano
Con l’evoluzione infrastrutturale cresce la complessità ed il volume di informazioni da analizzare
Il percorso evolutivo della security negli ultimi anni
IBM fornisce la tecnologia QRadar concepita come una soluzione che si adatta
continuamente con l’evolversi delle problematiche di sicurezza
3 IBM Security
Perché la sicurezza necessita del cognitive ?
• Pensiamo all’attività ordinaria del team di controllo della sicurezza: analisi, verifiche,
dati, report, relazioni, falsi positivi, origine dell’attacco, anomalie, ecc.
• Pensiamo alla continua evoluzione delle metodologie e delle tipologie di attacco
• Pensiamo al continuo incremento del numero di eventi critici o sospetti da analizzare
4 IBM Security
Cos’è Watson for Cyber Security ?
‘‘…grazie alla sua capacità di calcolo e di apprendimento, l’intelligenza artificiale di
Watson sarà in grado di distinguere più velocemente di qualsiasi esperto
umano la minaccia informatica da anomalie benigne nel comportamento di reti,
operatori e software… ’’
1. Osservazione
2. Interpretazione
3. Valutazione
4. Decisione
Servizio Cloud di tipo SaaS
5 IBM Security
QRadar AdvisorQRadar SIEM
Come può essere utilizzato W4CS ?
W4CS
6 IBM Security
QRadar Advisor
• Manage alerts
• Research security events and anomalies
• Evaluate user activity and vulnerabilities
• Configuration
• Other
• Data correlation
• Pattern identification
• Thresholds
• Policies
• Anomaly detection
• Prioritization
Security Analytics
Security Analysts Watson for Cyber Security
• Security knowledge
• Threat identification
• Reveal additional indicators
• Surface or derive relationships
• Evidence
• Local data mining
• Perform threat research using Watson for Cyber Security
• Qualify and relate threat research to security incidents
• Present findings
QRadar Watson Advisor
SECURITY
ANALYSTS
SECURITY
ANALYTICS
QRadar
Watson
Advisor
Watson
for Cyber
Security
Con QRadar Advisor sfrutto tutte le potenzialità di Watson for Cyber Security
7 IBM Security
Quali requisiti per utilizzare QRadar Advisor ?
Any customer running version 7.2.8 or above can try QRadar Watson Advisor for 30 days.
Trial is initiated through the AppExchange
1. Direct customer to https://exchange.xforce.ibmcloud.com/hub to initiate trial
2. Customer will be instructed to set up a user ID if they don’t have one
already
3. Email will be sent to customer with a link, password and instructions
4. Customer will receive a follow up call within 24 hours
8 IBM Security
Dashboard
Widgets which present
visual/graphical
representations of saved
search results.
Report
Templates for scheduled or
On demand reports which are
built upon saved event or flow
searches.
Saved Searches
Search criteria.
Custom Rules
Tests that are run against
events and/or flow. ‘Fire’ Can
trigger action(offense, new
event, email notice, data
collection, etc.)
Custom Property
Defines a property to be
extracted or derived from an
inbound event or flow.
Regex or Calculation.
Reference Data
Container definition for holding
reference data that can be
used by searches and rules.
Custom Action
Custom response for a rule
when ‘fired’.
Application
Enhancement/extension to
QRadar that can provide new
tabs, API methods, dashboard
items, context menus, config
pages, etc
Log Source Extension
A parsing logic definition used to
synthesize a custom DSM for an
event source for which there is no
existing DSM.
Custom QIDMap
Supplement out-of-the-box
QIDMap QRadar provides, in
order to include QIDMap
entries for events not formally
supported by QRadar.
Historical Correlation
Combination of saved search
and set of rules that allow a
user to test rules by re-running
a set of historical events
"offline"
Custom Function
SQL-like function that can be
used in an Advanced search to
enhance or manipulate data
Come effettuare l’installazione di QRadar Advisor ?
• Direttamente dal Marketplace di QRadar AppExchange
• AppExchange fornisce un sistema di creazione e condivisione
di App
9 IBM Security
Come accedo a QRadar Advisor ?
Dall’apposito Tab posso accedere alla main page di Advisor e visualizzare tutte
le investigazioni eseguite da Watson
10 IBM Security
Da dove inizio per attivare Watson ?
L’aiuto di Watson for Cyber Security può essere sempre innescato tramite
l’analisi di una offense
11 IBM Security
Quali informazioni per l’investigazione di Watson ?
Sulla parte laterale dello schermo vengono visualizzate le informazioni
necessarie per l’investigazione di Watson
12 IBM Security
Gli «observables» utilizzati da Advisor
Gli observables costituiscono un set di dati collezionati dalla offense
relativamente agli eventi analizzati in locale da QRadar Advisor arrichiti da dati
di ricerche esterni (es. feeds). Solo un subset di questi dati sono inviati a
Watson for Cyber Security per l’investigazione di potenziali minacce
Observable
Type
Description Sent to
W4CS
Source IP External Source IPs that appear in an
offense – enforced by respecting the
Network Hierarchy defined in QRadar
Yes
Destination
IP
External Destination IPs that appear in an
offense – enforced by respecting the
Network Hierarchy defined in QRadar
Yes
File Hash Hash value of a file that is deemed
suspicious
Yes
URL External URLs that appear in an offense Yes
Domain External Domains that appear in an
offense
Yes
Destination
Port
Destination Ports belonging to Destination
IPs
No
User Agent The user agent identified by a browser or
HTTP application
No
AV
Signature
Malware signatures identified by antivirus
solutions
No
Email
Address
Email addresses associated with
suspicious emails
No
File Name Names of suspicious files No
Observable
Type
Description Sent to
W4CS
Source Port Source Ports belonging to Source IPs No
Destination
ASN
Autonomous System Number of a
destination IP address (from a DNS)
No
Source ASN Autonomous System Number of a source IP
address (from a DNS)
No
Destination
Country
Name of the destination country of outbound
communications
No
Source
Country
Name of source country of inbound
communications
No
Low Level
Category
Low level QRadar offense category No
High Level
Category
High level QRadar offense category No
Direction Direction of communication No
User name Aliases that may attempt to access critical
internal infrastructure
No
13 IBM Security
Observables: sicurezza, controllo e privacy
Gli observables costituiscono un set di dati collezionati dalla offense relativamente agli
eventi analizzati in locale da QRadar Advisor arrichiti da dati di ricerche esterni (es.
feeds). Solo un subset di questi dati sono inviati a Watson for Cyber Security per
l’investigazione di potenziali minacce
CONTROL
• QRadar Advisor with
Watson references the
Network Hierarchy
defined in QRadar
• QRadar Administrator
can control which
types of observables
are sent in the QRadar
Advisor with Watson
administration page
• QRadar Administrator
can select which
custom properties are
mapped to observable
types
• Only external URLs,
domains, IPs, ports and asn
values are sent to W4CS
• After an investigation, all
observables sent to W4CS
are destroyed, and the
results of the investigation
are also not persisted in the
cloud
• W4CS does not track the
IPs or the specific instance
of QRadar Advisor with
Watson submitting the
investigation requests to
preserve anonymity
PRIVACY
• Observables are sent
via an encrypted
channel to Watson for
Cyber Security
• Watson for Cyber
Security isolates each
customer’s offense
investigation
• Watson for Cyber
Security can only be
accessed by
authorized QRadar
Advisor with Watson
apps
SECURITY
14 IBM Security
Il responso di Watson for Cyber Security
W4CS presenta il “knowledge graph”, una vista delle relazioni tra entità e observables. Dall’ Incident
Overview page, si seleziona l’incidente per entrare nel dettaglio con “Explore Insights”. Il knowledge-
graph utilizza i colori per ogni tipologia di informazione. Se si vogliono eliminare informazioni
secondarie e rendere più facile l’interpretazione del grafico si può operare sul tasto “Key Insights only”
15 IBM Security
Il Cognitive riduce in maniera significativa:“threat-
research” e “response-time”
RemediationInvestigation and Impact AssessmentIncident Triage
Manual threat analysis
Remediation
Investigation and
Impact Assessment
Incident
Triage
IBM W4CS assisted threat analysis
Una veloce ed accurata
analisi delle minacce di
sicurezza risparmiando
tempo e risorse
Days
to
Weeks
Minutes
to
Hours
• Accelera l’indirizzamento dei casi di
incident in maniera automatica
• Allevia preoccupazioni e pressioni
dovute a mancanza di skill
• Incrementa la velocità di analisi del
team di sicurezza
THANK YOU
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
FOLLOW US ON:
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
Domande ?

More Related Content

PDF
IBM QRadar Security Intelligence Overview
PDF
IBM QRadar Security Intelligence Overview
PDF
Qradar ibm partner_enablement_220212_final
PDF
IBM Security Intelligence
PDF
IBM Qradar
PDF
Whitepaper IBM Qradar Security Intelligence
PPTX
IBM Q-radar security intelligence roadmap
PDF
How to Choose the Right Security Information and Event Management (SIEM) Solu...
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
Qradar ibm partner_enablement_220212_final
IBM Security Intelligence
IBM Qradar
Whitepaper IBM Qradar Security Intelligence
IBM Q-radar security intelligence roadmap
How to Choose the Right Security Information and Event Management (SIEM) Solu...

What's hot (20)

PDF
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
PPT
Extend Your Market Reach with IBM Security QRadar for MSPs
PDF
IBM-QRadar-Corporate-Online-Training.
PDF
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
PDF
IBM Security QFlow & Vflow
PPTX
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
PPTX
IBM QRadar Xforce
PPTX
IBM QRadar UBA
PPT
MISTI Infosec 2010- SIEM Implementation
PDF
IBM Security Immune System
PDF
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
PDF
From SIEM to SA: The Path Forward
 
PDF
Top Cybersecurity Threats and How SIEM Protects Against Them
PPTX
QRadar, ArcSight and Splunk
PPTX
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
PPTX
Implementing and Running SIEM: Approaches and Lessons
PDF
SIEM evolution
PDF
SIEM vs Log Management - Data Security Solutions 2011
PPTX
SIEM Primer:
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
Extend Your Market Reach with IBM Security QRadar for MSPs
IBM-QRadar-Corporate-Online-Training.
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
IBM Security QFlow & Vflow
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
IBM QRadar Xforce
IBM QRadar UBA
MISTI Infosec 2010- SIEM Implementation
IBM Security Immune System
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
From SIEM to SA: The Path Forward
 
Top Cybersecurity Threats and How SIEM Protects Against Them
QRadar, ArcSight and Splunk
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Implementing and Running SIEM: Approaches and Lessons
SIEM evolution
SIEM vs Log Management - Data Security Solutions 2011
SIEM Primer:
Ad

Similar to IBM Qradar-Advisor (20)

PPTX
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
PPTX
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
PDF
Presentation data security solutions certified ibm business partner for ibm...
PDF
Introduction to QRadar
PDF
ISACA -Threat Hunting using Native Windows tools .pdf
PPTX
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
PPTX
Sourcefire Webinar - NEW GENERATION IPS
PPTX
Swascan brochure-EN
PPTX
Brochure SWASCAN-ENG On Premise
PPTX
Swascan brochure-eng
PDF
Medical Device Cybersecurity Threat & Risk Scoring
 
PPTX
Swascan Cyber Security Testing Platform
PDF
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
PPTX
IBM - Security Intelligence para PYMES
PPTX
Fernando Imperiale - Security Intelligence para PYMES
PDF
IKare Vulnerability Scanner - Datasheet EN
PPTX
Azure Operation Management Suite - security and compliance
PPTX
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
PDF
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
PDF
Secure Decisions - Cyber Security Sensemaking
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Presentation data security solutions certified ibm business partner for ibm...
Introduction to QRadar
ISACA -Threat Hunting using Native Windows tools .pdf
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
Sourcefire Webinar - NEW GENERATION IPS
Swascan brochure-EN
Brochure SWASCAN-ENG On Premise
Swascan brochure-eng
Medical Device Cybersecurity Threat & Risk Scoring
 
Swascan Cyber Security Testing Platform
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
IBM - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMES
IKare Vulnerability Scanner - Datasheet EN
Azure Operation Management Suite - security and compliance
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Secure Decisions - Cyber Security Sensemaking
Ad

More from Luigi Perrone (12)

PDF
EKMF solution overview
PDF
z/OS Authorized Code Scanner
PDF
Sklm webinar
PDF
Mfa.intro
PDF
Pervasive Encryption for DB2
PDF
Key management
PDF
z/OS Pervasive Encryption
PDF
Come gestire l'encryption dei dati con SKLM
PDF
2017 racf 2.3 news
PDF
Come integrare il mainframe con QRadar
PDF
Fare sicurezza con zSecure
PDF
Racf psw enhancement
EKMF solution overview
z/OS Authorized Code Scanner
Sklm webinar
Mfa.intro
Pervasive Encryption for DB2
Key management
z/OS Pervasive Encryption
Come gestire l'encryption dei dati con SKLM
2017 racf 2.3 news
Come integrare il mainframe con QRadar
Fare sicurezza con zSecure
Racf psw enhancement

Recently uploaded (20)

PDF
Cloud Native Aachen Meetup - Aug 21, 2025
PPTX
Folder Lock 10.1.9 Crack With Serial Key
PDF
Sanket Mhaiskar Resume - Senior Software Engineer (Backend, AI)
PDF
Workplace Software and Skills - OpenStax
PPTX
A Spider Diagram, also known as a Radial Diagram or Mind Map.
PPTX
Plex Media Server 1.28.2.6151 With Crac5 2022 Free .
PPTX
Lesson-3-Operation-System-Support.pptx-I
PPTX
Viber For Windows 25.7.1 Crack + Serial Keygen
PDF
Understanding the Need for Systemic Change in Open Source Through Intersectio...
PPTX
Post-Migration Optimization Playbook: Getting the Most Out of Your New Adobe ...
PPTX
DevOpsDays Halifax 2025 - Building 10x Organizations Using Modern Productivit...
PPTX
Human-Computer Interaction for Lecture 1
PPTX
Bandicam Screen Recorder 8.2.1 Build 2529 Crack
PPTX
HackYourBrain__UtrechtJUG__11092025.pptx
DOCX
Industrial Bio-Lynx: Advanced Biometric Solution for Workforce Management
PDF
Internet Download Manager IDM Crack powerful download accelerator New Version...
PDF
Building an Inclusive Web Accessibility Made Simple with Accessibility Analyzer
PPTX
Chapter 1 - Transaction Processing and Mgt.pptx
PPT
3.Software Design for software engineering
PPTX
Chapter_05_System Modeling for software engineering
Cloud Native Aachen Meetup - Aug 21, 2025
Folder Lock 10.1.9 Crack With Serial Key
Sanket Mhaiskar Resume - Senior Software Engineer (Backend, AI)
Workplace Software and Skills - OpenStax
A Spider Diagram, also known as a Radial Diagram or Mind Map.
Plex Media Server 1.28.2.6151 With Crac5 2022 Free .
Lesson-3-Operation-System-Support.pptx-I
Viber For Windows 25.7.1 Crack + Serial Keygen
Understanding the Need for Systemic Change in Open Source Through Intersectio...
Post-Migration Optimization Playbook: Getting the Most Out of Your New Adobe ...
DevOpsDays Halifax 2025 - Building 10x Organizations Using Modern Productivit...
Human-Computer Interaction for Lecture 1
Bandicam Screen Recorder 8.2.1 Build 2529 Crack
HackYourBrain__UtrechtJUG__11092025.pptx
Industrial Bio-Lynx: Advanced Biometric Solution for Workforce Management
Internet Download Manager IDM Crack powerful download accelerator New Version...
Building an Inclusive Web Accessibility Made Simple with Accessibility Analyzer
Chapter 1 - Transaction Processing and Mgt.pptx
3.Software Design for software engineering
Chapter_05_System Modeling for software engineering

IBM Qradar-Advisor

  • 1. IBM Security Cognitive IBM SECURITY INTELLIGENCE & ANALYTICS Luigi Perrone IBM SWG – Security Systems Security & Audit for zSystem & enterprise Security Intelligence solution [email protected] Marzo, 2017 by
  • 2. 2 IBM Security Perimeter Controls Pre 2005 Security Intelligence 2005++ Cognitive, Cloud, and Collaboration 2015+ Impiego di difese statiche che controllano o limitano il flusso dei dati, come firewalls, software antivirus, web gateways, ecc. Impiego di strumenti analitici per collezionare ed interpretare grandi quantità di flussi di dati in real-time, creando una priorità degli eventi evidenziandone il livello di rischio Interpretazione e comprensione ed elaborazione di dati di sicurezza eseguiti come una persona umana ma ad una velocità non raggiungibile da un umano Con l’evoluzione infrastrutturale cresce la complessità ed il volume di informazioni da analizzare Il percorso evolutivo della security negli ultimi anni IBM fornisce la tecnologia QRadar concepita come una soluzione che si adatta continuamente con l’evolversi delle problematiche di sicurezza
  • 3. 3 IBM Security Perché la sicurezza necessita del cognitive ? • Pensiamo all’attività ordinaria del team di controllo della sicurezza: analisi, verifiche, dati, report, relazioni, falsi positivi, origine dell’attacco, anomalie, ecc. • Pensiamo alla continua evoluzione delle metodologie e delle tipologie di attacco • Pensiamo al continuo incremento del numero di eventi critici o sospetti da analizzare
  • 4. 4 IBM Security Cos’è Watson for Cyber Security ? ‘‘…grazie alla sua capacità di calcolo e di apprendimento, l’intelligenza artificiale di Watson sarà in grado di distinguere più velocemente di qualsiasi esperto umano la minaccia informatica da anomalie benigne nel comportamento di reti, operatori e software… ’’ 1. Osservazione 2. Interpretazione 3. Valutazione 4. Decisione Servizio Cloud di tipo SaaS
  • 5. 5 IBM Security QRadar AdvisorQRadar SIEM Come può essere utilizzato W4CS ? W4CS
  • 6. 6 IBM Security QRadar Advisor • Manage alerts • Research security events and anomalies • Evaluate user activity and vulnerabilities • Configuration • Other • Data correlation • Pattern identification • Thresholds • Policies • Anomaly detection • Prioritization Security Analytics Security Analysts Watson for Cyber Security • Security knowledge • Threat identification • Reveal additional indicators • Surface or derive relationships • Evidence • Local data mining • Perform threat research using Watson for Cyber Security • Qualify and relate threat research to security incidents • Present findings QRadar Watson Advisor SECURITY ANALYSTS SECURITY ANALYTICS QRadar Watson Advisor Watson for Cyber Security Con QRadar Advisor sfrutto tutte le potenzialità di Watson for Cyber Security
  • 7. 7 IBM Security Quali requisiti per utilizzare QRadar Advisor ? Any customer running version 7.2.8 or above can try QRadar Watson Advisor for 30 days. Trial is initiated through the AppExchange 1. Direct customer to https://exchange.xforce.ibmcloud.com/hub to initiate trial 2. Customer will be instructed to set up a user ID if they don’t have one already 3. Email will be sent to customer with a link, password and instructions 4. Customer will receive a follow up call within 24 hours
  • 8. 8 IBM Security Dashboard Widgets which present visual/graphical representations of saved search results. Report Templates for scheduled or On demand reports which are built upon saved event or flow searches. Saved Searches Search criteria. Custom Rules Tests that are run against events and/or flow. ‘Fire’ Can trigger action(offense, new event, email notice, data collection, etc.) Custom Property Defines a property to be extracted or derived from an inbound event or flow. Regex or Calculation. Reference Data Container definition for holding reference data that can be used by searches and rules. Custom Action Custom response for a rule when ‘fired’. Application Enhancement/extension to QRadar that can provide new tabs, API methods, dashboard items, context menus, config pages, etc Log Source Extension A parsing logic definition used to synthesize a custom DSM for an event source for which there is no existing DSM. Custom QIDMap Supplement out-of-the-box QIDMap QRadar provides, in order to include QIDMap entries for events not formally supported by QRadar. Historical Correlation Combination of saved search and set of rules that allow a user to test rules by re-running a set of historical events "offline" Custom Function SQL-like function that can be used in an Advanced search to enhance or manipulate data Come effettuare l’installazione di QRadar Advisor ? • Direttamente dal Marketplace di QRadar AppExchange • AppExchange fornisce un sistema di creazione e condivisione di App
  • 9. 9 IBM Security Come accedo a QRadar Advisor ? Dall’apposito Tab posso accedere alla main page di Advisor e visualizzare tutte le investigazioni eseguite da Watson
  • 10. 10 IBM Security Da dove inizio per attivare Watson ? L’aiuto di Watson for Cyber Security può essere sempre innescato tramite l’analisi di una offense
  • 11. 11 IBM Security Quali informazioni per l’investigazione di Watson ? Sulla parte laterale dello schermo vengono visualizzate le informazioni necessarie per l’investigazione di Watson
  • 12. 12 IBM Security Gli «observables» utilizzati da Advisor Gli observables costituiscono un set di dati collezionati dalla offense relativamente agli eventi analizzati in locale da QRadar Advisor arrichiti da dati di ricerche esterni (es. feeds). Solo un subset di questi dati sono inviati a Watson for Cyber Security per l’investigazione di potenziali minacce Observable Type Description Sent to W4CS Source IP External Source IPs that appear in an offense – enforced by respecting the Network Hierarchy defined in QRadar Yes Destination IP External Destination IPs that appear in an offense – enforced by respecting the Network Hierarchy defined in QRadar Yes File Hash Hash value of a file that is deemed suspicious Yes URL External URLs that appear in an offense Yes Domain External Domains that appear in an offense Yes Destination Port Destination Ports belonging to Destination IPs No User Agent The user agent identified by a browser or HTTP application No AV Signature Malware signatures identified by antivirus solutions No Email Address Email addresses associated with suspicious emails No File Name Names of suspicious files No Observable Type Description Sent to W4CS Source Port Source Ports belonging to Source IPs No Destination ASN Autonomous System Number of a destination IP address (from a DNS) No Source ASN Autonomous System Number of a source IP address (from a DNS) No Destination Country Name of the destination country of outbound communications No Source Country Name of source country of inbound communications No Low Level Category Low level QRadar offense category No High Level Category High level QRadar offense category No Direction Direction of communication No User name Aliases that may attempt to access critical internal infrastructure No
  • 13. 13 IBM Security Observables: sicurezza, controllo e privacy Gli observables costituiscono un set di dati collezionati dalla offense relativamente agli eventi analizzati in locale da QRadar Advisor arrichiti da dati di ricerche esterni (es. feeds). Solo un subset di questi dati sono inviati a Watson for Cyber Security per l’investigazione di potenziali minacce CONTROL • QRadar Advisor with Watson references the Network Hierarchy defined in QRadar • QRadar Administrator can control which types of observables are sent in the QRadar Advisor with Watson administration page • QRadar Administrator can select which custom properties are mapped to observable types • Only external URLs, domains, IPs, ports and asn values are sent to W4CS • After an investigation, all observables sent to W4CS are destroyed, and the results of the investigation are also not persisted in the cloud • W4CS does not track the IPs or the specific instance of QRadar Advisor with Watson submitting the investigation requests to preserve anonymity PRIVACY • Observables are sent via an encrypted channel to Watson for Cyber Security • Watson for Cyber Security isolates each customer’s offense investigation • Watson for Cyber Security can only be accessed by authorized QRadar Advisor with Watson apps SECURITY
  • 14. 14 IBM Security Il responso di Watson for Cyber Security W4CS presenta il “knowledge graph”, una vista delle relazioni tra entità e observables. Dall’ Incident Overview page, si seleziona l’incidente per entrare nel dettaglio con “Explore Insights”. Il knowledge- graph utilizza i colori per ogni tipologia di informazione. Se si vogliono eliminare informazioni secondarie e rendere più facile l’interpretazione del grafico si può operare sul tasto “Key Insights only”
  • 15. 15 IBM Security Il Cognitive riduce in maniera significativa:“threat- research” e “response-time” RemediationInvestigation and Impact AssessmentIncident Triage Manual threat analysis Remediation Investigation and Impact Assessment Incident Triage IBM W4CS assisted threat analysis Una veloce ed accurata analisi delle minacce di sicurezza risparmiando tempo e risorse Days to Weeks Minutes to Hours • Accelera l’indirizzamento dei casi di incident in maniera automatica • Allevia preoccupazioni e pressioni dovute a mancanza di skill • Incrementa la velocità di analisi del team di sicurezza
  • 16. THANK YOU ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions FOLLOW US ON: © Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. Domande ?