Insights to make your Business Cyber Resilient

Cyber resilience: A state of unreadiness

Majority of enterprises do not have an effective strategy to handle cybersecurity incidents, leaving them exposed to risk and compliance issues with the Australian Notifiable Data Breaches (NDB) scheme and General Data Protection Regulation (GDPR) requirements.

IBM X-Force Threat Intelligence Index 2019

The IBM X-Force Threat Intelligence Index 2019 report outlines the most prominent threats and provides key insights into various industries, attack tactics, and major vulnerabilities that emerged during the year 2018.

Managing data breaches got a lot more expensive in 2019

The 2019 Cost of a Data Breach Report explores financial impacts and security measures that can help your organization mitigate costs.

Find out about whaling: a new front in cyber crime

Criminals are now using Augumented Intelligence to automate cyberattacks known as 'whaling'.

The Forrester Wave: Cybersecurity Incident Response Services, Q1 2019

Preparation is the key to timely Incident Response and this report shows the 15 most significant cybersecurity incident response services providers based on an 11-criterion that was applied.

Get to know the five stages of the Cyber Resilience Lifecycle

Identify

To improve cyber resilience, you need to assess your readiness, process and posture, and then define an action plan.

Based on the leading NIST Cyber Security Framework. 

Protect

The best way to safeguard against attacks is to discover your vulnerabilities before they are exploited and put the right protection solutions in place.

Based on the leading NIST Cyber Security Framework. 

Detect

Use advanced analytics to detect attacks coming from outside your enterprise and investigate active threats hiding inside.

Based on the leading NIST Cyber Security Framework.

Respond

Remediate attack damage by responding effectively with the smartest cyber incident responders and threat intelligence.

Based on the leading NIST Cyber Security Framework.

Recover

Get your enterprise back online and operating optimally by recovering access to mission-critical data and applications.

Based on the leading NIST Cyber Security Framework.

Talk to the IBM Cyber Elite today

Find out everything you need to know in a one-on-one consultation.  There's no sales pitch, no obligation and no cost – just a brief chat to give you the answers you need.

Meet the IBM Cyber Elite Experts

Chris Hockings

CTO for IBM Security A/NZ

Chris is an expert in designing solutions that treat security and privacy as a priority concern.

He has over 20 years’ experience working as an innovative client facing thought leader, helping clients stay ahead of the cyber security threat whilst delivering user centric security across digital transformation programs

Pelin Nancarrow

Asia Pacific Lead – X-Force Incident Response and Intelligence Services (IRIS)

Pelin leads a team of information security professionals who deliver forensic, incident response and proactive security services across the Asia Pacific region.

She is experienced in helping clients establish guidelines for initiating, implementing, maintaining and improving information security management.

 

Kaustubh Vazalwar

Resiliency Services Leader IBM A/NZ

Kaustubh is a seasoned and certified technology risk and resilience professional with extensive experience in strategic and technological aspects of business.

He is a respected thought leader who has published multiple whitepapers and journal articles on cyber resilience.

Stephen Burmester

Industry Security Leader A/NZ, Business Development Executive

With 25 years in information security, Stephen can assist you in every stage of the cyber resilience cycle.

He's a subject matter expert who's worked with both government bodies and the private sector to improve their security strategies and help them navigate the threat landscape.

Fiona Byrnes

Global Infrastructure and Endpoint Security Delivery Executive

Fiona is a Senior IT manager with 25 years of experience across a diverse range of areas including enterprise security operations and incident management, risk and regulatory compliance, network and infrastructure protection services for all Endpoints, on premise, mobile or Hybrid Cloud.

James Darwin

Executive IT Specialist – WW Security Architect, Product Professional Services

James is a respected thought leader in the Identity and Access (IAM) and Cloud Security space and is highly experienced across all areas of cyber security.

Vic Cross

IBM Z Systems Engineer

Vic is skilled in IBM Z Networking, as well as installing and managing Linux systems.

He has extensive experience in managing and securing Linux networks and regularly provides design and consulting services to new implementations.

Holly Wright

Software Engineer - IBM QRadar

Holly specialises in threat hunting and network anomaly detection with IBM QRadar. She helps fast-track your network analysis and incident investigation.

Leo Farrell

Software Engineer - IBM Security Access Manager

Leo is a senior software engineer within the IBM Security division. Leo has deep skills in software engineering and is the worldwide subject matter expert for the OAuth, OIDC and OpenBanking standards.

 

Talk to the IBM Cyber Elite today

Find out everything you need to know in a one-on-one consultation.  There's no sales pitch, no obligation and no cost – just a brief chat to give you the answers you need.