Integrating Incident Response
IBM RESILIENT INCIDENT RESPONSE PLATFORM
2018-10-31
Product Manager
Hugh Pyle
2 IBM Security
About our Speakers
Hugh Pyle, Product Manager
IBM Resilient
Jamie Cowper, Security Marketing Leader,
Resilient
IBM Resilient
3 IBM Security
Today’s Agenda
• What’s new in Resilient v31
• Integrating IBM Resilient with the rest of your security operations tools
̶ Threat Intelligence
̶ Workflows and Functions
̶ IBM Security App Exchange
• Integrations in practice: demonstrations
4 IBM Security
Resilient v31
• Local language versions: jp, kr, zh, zh-TW, it, fr,
de, es, pt-BR, ru, en
• Dashboard improvements: filters & aggregations
• Privacy regulation updates
• Disaster Recovery (DR) deployment tools
• Audit & Logging improvements
• Activity Fields in workflows
• Many usability improvements to Python scripting
5 IBM Security
Resilient v31.0
6 IBM Security
6
IBM Resilient: Leading With Intelligent Orchestration
7 IBM Security
IBM Resilient Intelligent Orchestration Ecosystem
IBM-Validated
and Supported
Applications
Community
Applications
Escalation
• SIEM
• Ticketing
• IPS/IDS
• UBA
• DLP
Communication and
Coordination
• Enterprise communications
• Ticketing
• Crisis management
Containment, Response, Recovery
• Endpoint
• Ticketing
• Next-generation firewall
• Cloud Access Security Broker
Identification and Enrichment
• Endpoint
• Sandbox
• Threat Intelligence
• CMDB
Unlocks power of existing
tools and technologies and
increases security ROI and
time to value.
Enables faster and smarter
response through
shared IR knowledge,
expertise, and resources.
Code Examples
Community-built scripts
and automations
Developer Tools and SDKs
IBM Resilient-provided
resources and documentation
for building Resilient apps
Playbooks and
Workflows
Incident response tasks
lists and expertise from
the Resilient community
Integrations
Applications that leverage
your existing IT and security
tools for IR
Best Practices
Community knowledge
sharing, metrics, and reports
11
8 IBM Security
https://developer.ibm.com/resilient
9 IBM Security
https://exchange.xforce.ibmcloud.com/hub/Resilient
10 IBM Security
https://exchange.xforce.ibmcloud.com/hub/Resilient
11 IBM Security
IBM Security App Exchange & Community
App Exchange Community App Exchange
IBM Validated playbooks and
integrations from IBM and
technology partners
Community-supplied playbooks
and integrations
Contributors can be… Technology Partners
IBM engineers
Customers
IBM review activities… Functionality validation
Security review
Functional testing of use cases
Functionality review
Basic security review
Support… Support is available from app
vendor (by email or forum)
Support may be available from
app author
NEW
Integrations in practice
13 IBM Security
Automatic Threat Lookup
Demo: QRadar Functions
Demo: Utility Functions
16 IBM Security
17 IBM Security
ibm.biz/resilientcommunity
Engage with other
Resilient users
Download the latest
technical content
Access insights into
new releases
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM
products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks
or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on
others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM
systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal
conduct of any party.
FOLLOW US ON:
THANK YOU

More Related Content

PDF
Accelerating SOC Transformation with IBM Resilient and Carbon Black
PDF
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
PPTX
Integrated Response with v32 of IBM Resilient
PPTX
Are You Ready to Move Your IAM to the Cloud?
PPTX
Automation: Embracing the Future of SecOps
PDF
Orchestrate Your Security Defenses; Protect Against Insider Threats
PDF
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
PDF
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Integrated Response with v32 of IBM Resilient
Are You Ready to Move Your IAM to the Cloud?
Automation: Embracing the Future of SecOps
Orchestrate Your Security Defenses; Protect Against Insider Threats
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration

What's hot (20)

PDF
10 Security Essentials Every CxO Should Know
PPTX
4 Ways to Build your Immunity to Cyberthreats
PDF
Ibm security products portfolio
PPTX
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
PPTX
IBM Security Strategy
PPTX
QRadar & XGS: Stopping Attacks with a Click of the Mouse
PDF
IBM Security Software Solutions - Powerpoint
PDF
Are Cloud Apps the Invisible Man?
PPTX
IBM QRadar UBA
PDF
Avoiding the Data Compliance "Hot Seat"
PDF
Compliance is a pit stop – your destination lies ahead
PPTX
Compete To Win: Don’t Just Be Compliant – Be Secure!
PDF
IBM Security Software Solutions
PDF
IBM Security Immune System
PDF
Cutting Through the Software License Jungle: Stay Safe and Control Costs
PDF
IBM Security Services Overview
PDF
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
PPTX
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PDF
IBM Security Software Solutions - One Pager
PPTX
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
10 Security Essentials Every CxO Should Know
4 Ways to Build your Immunity to Cyberthreats
Ibm security products portfolio
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
IBM Security Strategy
QRadar & XGS: Stopping Attacks with a Click of the Mouse
IBM Security Software Solutions - Powerpoint
Are Cloud Apps the Invisible Man?
IBM QRadar UBA
Avoiding the Data Compliance "Hot Seat"
Compliance is a pit stop – your destination lies ahead
Compete To Win: Don’t Just Be Compliant – Be Secure!
IBM Security Software Solutions
IBM Security Immune System
Cutting Through the Software License Jungle: Stay Safe and Control Costs
IBM Security Services Overview
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
IBM Security Software Solutions - One Pager
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Ad

Similar to Leveraging Validated and Community Apps to Build a Versatile and Orchestrated Response Plan (20)

PDF
IBM Qradar & resilient
PDF
Security Operations and Response
PDF
A New Remedy for the Cyber Storm Approaching
PPTX
QRadar Security Intelligence Overview.pptx
PDF
An Integrated, Intelligent Approach to Security
PPTX
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
PPSX
IBM: Cognitive Security Transformation for the Enrgy Sector
PDF
Cyber Security 4.0 conference 30 November 2016
PPT
IBM Security Strategy Intelligence,
PPTX
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
PDF
IBM Security Strategy Overview
PDF
IBM Immune System
PDF
WannaCry Ransomware Attack: What to Do Now
PPTX
Introduction to Cybersecurity Fundamentals
PPTX
IBM Security QRadar
PDF
What’s the State of Your Endpoint Security?
PPT
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
PPTX
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
PPTX
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
PPT
Five critical conditions to maximizing security intelligence investments
IBM Qradar & resilient
Security Operations and Response
A New Remedy for the Cyber Storm Approaching
QRadar Security Intelligence Overview.pptx
An Integrated, Intelligent Approach to Security
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM: Cognitive Security Transformation for the Enrgy Sector
Cyber Security 4.0 conference 30 November 2016
IBM Security Strategy Intelligence,
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
IBM Security Strategy Overview
IBM Immune System
WannaCry Ransomware Attack: What to Do Now
Introduction to Cybersecurity Fundamentals
IBM Security QRadar
What’s the State of Your Endpoint Security?
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
Five critical conditions to maximizing security intelligence investments
Ad

More from IBM Security (18)

PDF
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
PDF
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
PPTX
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
PPTX
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
PPTX
How to Improve Threat Detection & Simplify Security Operations
PDF
Mobile Vision 2020
PDF
Retail Mobility, Productivity and Security
PDF
Close the Loop on Incident Response
PPTX
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
PPTX
See How You Measure Up With MaaS360 Mobile Metrics
PPTX
Valuing Data in the Age of Ransomware
PPTX
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
PDF
Top 12 Cybersecurity Predictions for 2017
PPTX
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
PPTX
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
PPTX
Top 5 Things to Look for in an IPS Solution
PPTX
Detect and Respond to Threats Better with IBM Security App Exchange Partners
PPTX
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
How to Improve Threat Detection & Simplify Security Operations
Mobile Vision 2020
Retail Mobility, Productivity and Security
Close the Loop on Incident Response
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
See How You Measure Up With MaaS360 Mobile Metrics
Valuing Data in the Age of Ransomware
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Top 12 Cybersecurity Predictions for 2017
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Top 5 Things to Look for in an IPS Solution
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System

Recently uploaded (20)

PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Decision Optimization - From Theory to Practice
PDF
Examining Bias in AI Generated News Content.pdf
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PPTX
Module 1 Introduction to Web Programming .pptx
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
LMS bot: enhanced learning management systems for improved student learning e...
Co-training pseudo-labeling for text classification with support vector machi...
Data Virtualization in Action: Scaling APIs and Apps with FME
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
SGT Report The Beast Plan and Cyberphysical Systems of Control
Auditboard EB SOX Playbook 2023 edition.
A symptom-driven medical diagnosis support model based on machine learning te...
4 layer Arch & Reference Arch of IoT.pdf
Decision Optimization - From Theory to Practice
Examining Bias in AI Generated News Content.pdf
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Advancing precision in air quality forecasting through machine learning integ...
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
Module 1 Introduction to Web Programming .pptx
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Connector Corner: Transform Unstructured Documents with Agentic Automation
LMS bot: enhanced learning management systems for improved student learning e...

Leveraging Validated and Community Apps to Build a Versatile and Orchestrated Response Plan

  • 1. Integrating Incident Response IBM RESILIENT INCIDENT RESPONSE PLATFORM 2018-10-31 Product Manager Hugh Pyle
  • 2. 2 IBM Security About our Speakers Hugh Pyle, Product Manager IBM Resilient Jamie Cowper, Security Marketing Leader, Resilient IBM Resilient
  • 3. 3 IBM Security Today’s Agenda • What’s new in Resilient v31 • Integrating IBM Resilient with the rest of your security operations tools ̶ Threat Intelligence ̶ Workflows and Functions ̶ IBM Security App Exchange • Integrations in practice: demonstrations
  • 4. 4 IBM Security Resilient v31 • Local language versions: jp, kr, zh, zh-TW, it, fr, de, es, pt-BR, ru, en • Dashboard improvements: filters & aggregations • Privacy regulation updates • Disaster Recovery (DR) deployment tools • Audit & Logging improvements • Activity Fields in workflows • Many usability improvements to Python scripting
  • 6. 6 IBM Security 6 IBM Resilient: Leading With Intelligent Orchestration
  • 7. 7 IBM Security IBM Resilient Intelligent Orchestration Ecosystem IBM-Validated and Supported Applications Community Applications Escalation • SIEM • Ticketing • IPS/IDS • UBA • DLP Communication and Coordination • Enterprise communications • Ticketing • Crisis management Containment, Response, Recovery • Endpoint • Ticketing • Next-generation firewall • Cloud Access Security Broker Identification and Enrichment • Endpoint • Sandbox • Threat Intelligence • CMDB Unlocks power of existing tools and technologies and increases security ROI and time to value. Enables faster and smarter response through shared IR knowledge, expertise, and resources. Code Examples Community-built scripts and automations Developer Tools and SDKs IBM Resilient-provided resources and documentation for building Resilient apps Playbooks and Workflows Incident response tasks lists and expertise from the Resilient community Integrations Applications that leverage your existing IT and security tools for IR Best Practices Community knowledge sharing, metrics, and reports 11
  • 11. 11 IBM Security IBM Security App Exchange & Community App Exchange Community App Exchange IBM Validated playbooks and integrations from IBM and technology partners Community-supplied playbooks and integrations Contributors can be… Technology Partners IBM engineers Customers IBM review activities… Functionality validation Security review Functional testing of use cases Functionality review Basic security review Support… Support is available from app vendor (by email or forum) Support may be available from app author NEW
  • 13. 13 IBM Security Automatic Threat Lookup
  • 17. 17 IBM Security ibm.biz/resilientcommunity Engage with other Resilient users Download the latest technical content Access insights into new releases
  • 18. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: THANK YOU