“To function effectively in this knowledge economy, you need to read through trillions of data points. You basically need to go back to school every day to answer the questions that hit your desk. That is the challenge of the knowledge economy. And that is where I believe we can do something different in security with AI and cognitive.” — Marc van Zadelhoff

At IBM InterConnect 2017, Marc van Zadelhoff, general manager of IBM Security, delivered a thought-provoking keynote titled “Watson & Cybersecurity: Bringing AI to the Battle.” With multiple demos and a client panel, the keynote exemplified how IBM is addressing today’s biggest challenges in cybersecurity with innovative cognitive technology.

Addressing Challenges With Cognitive Security

Opening with anecdotes across health care, financial services and law enforcement, Marc painted a picture of the global challenges practitioners face every day around data, insight and skill. His point hit home with the security crowd. When it comes to security analysts, these challenges are not too different, and they are often overlooked.

In a given day, an enterprise might see 200,000 security events. One security analyst might have to investigate as many as 40 incidents, each of which can take hours or days to complete. When you couple this with the industrywide skills gap and the amount of time and money wasted chasing false positives, you begin to see just how difficult the life of a security analyst is. It’s high stakes and high stress — and when a threat hits, people want answers fast.

Thinking Differently About Cybersecurity

As Marc stated, “It’s time to think differently.” During his keynote, he introduced Sandy Bird, chief technology officer (CTO) of IBM Security, and Mike Spisak, IBM master inventor, to show how IBM is thinking differently with Watson for Cyber Security.

Sandy and Mike showcased Watson’s corpus of knowledge, built on the IBM Cloud, ingesting millions of security documents and forming billions of security data elements — always learning and never forgetting. While Sandy played the role of a security analyst investigating a threat actor with IBM QRadar Advisor with Watson, Mike communicated with Project Hayvn, the second-screen application that performs research and generates reports on demand.

In minutes, Sandy and Mike were able to leverage Watson’s massive collection of security knowledge to identify the threat actor’s activity. They also added real-time insight from IBM X-Force Exchange through Hayvn’s natural language application program interfaces (APIs). With artificial intelligence at top of mind, it served as a literal illustration of human and machine working together to deliver unprecedented speed, accuracy and intelligence.

Watson Driving the Future of Cybersecurity

After seeing the art of the possible, the audience listened as three clients discussed with Marc how Watson was delivering real results in the security operations center (SOC). It was a multilayered conversation with clients from Russia, the U.K. and the U.S. covering today’s security challenges, innovations and the importance of minding security basics.

The primary focus was on the next era of cybersecurity and the role of cognitive technology. As Stanislav Kuznetsov, deputy chairman of the executive board at Sberbank, summarized, “I’m sure that cognitive technology like Watson is the new future for every cybersecurity system.”

An Ongoing Journey

With the IBM Security Immune System fully draped behind him, Marc wrapped up the keynote with a final message that the journey to cognitive is just beginning. IBM Security is committed to cognitive innovation, infusing artificial intelligence (AI) capabilities into the world’s largest and broadest security portfolio.

Marc subsequently announced that IBM MaaS360 with Watson, IBM’s unified endpoint management solution, now features cognitive insights. A livestreamed question-and-answer panel was recorded shortly after.

Learn More About Cognitive Security Analytics

More from Intelligence & Analytics

Hive0051’s large scale malicious operations enabled by synchronized multi-channel DNS fluxing

12 min read - For the last year and a half, IBM X-Force has actively monitored the evolution of Hive0051’s malware capabilities. This Russian threat actor has accelerated its development efforts to support expanding operations since the onset of the Ukraine conflict. Recent analysis identified three key changes to capabilities: an improved multi-channel approach to DNS fluxing, obfuscated multi-stage scripts, and the use of fileless PowerShell variants of the Gamma malware. As of October 2023, IBM X-Force has also observed a significant increase in…

Email campaigns leverage updated DBatLoader to deliver RATs, stealers

11 min read - IBM X-Force has identified new capabilities in DBatLoader malware samples delivered in recent email campaigns, signaling a heightened risk of infection from commodity malware families associated with DBatLoader activity. X-Force has observed nearly two dozen email campaigns since late June leveraging the updated DBatLoader loader to deliver payloads such as Remcos, Warzone, Formbook, and AgentTesla. DBatLoader malware has been used since 2020 by cybercriminals to install commodity malware remote access Trojans (RATs) and infostealers, primarily via malicious spam (malspam). DBatLoader…

New Hive0117 phishing campaign imitates conscription summons to deliver DarkWatchman malware

8 min read - IBM X-Force uncovered a new phishing campaign likely conducted by Hive0117 delivering the fileless malware DarkWatchman, directed at individuals associated with major energy, finance, transport, and software security industries based in Russia, Kazakhstan, Latvia, and Estonia. DarkWatchman malware is capable of keylogging, collecting system information, and deploying secondary payloads. Imitating official correspondence from the Russian government in phishing emails aligns with previous Hive0117 campaigns delivering DarkWatchman malware, and shows a possible significant effort to induce a sense of urgency as…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today