Customer Webinar: Integrated
Response with v32 of Resilient
January 16th, 2019
2 IBM Security
Agenda
• The Updated In-Product Email in v32
• Updated UI in Resilient
• Privacy Updates and Upcoming Regulations
• New Integrations Available
• Upcoming Customer Events
3 IBM Security
Our Speakers
Monica Dubeau, Privacy Program Manager, CIPP/US
IBM Resilient
Martin Feeney, Product Manager
IBM Resilient
v32 In-Product Email
5 IBM Security
Objectives of In-Product Email
• We want to simplify email setup, maintenance, and processing by bringing all aspects of it into
the main product UI.
• Reduce the time and effort involved in creating and maintaining the existing email product
extension.
• Emails connections will be defined and tested within the UI. Emails will now be directly
referenceable within UI contexts such as rules and scripting.
• Make emails an integrated part of Resilient, visible on the incidents as objects in their own
right.
• Allow operators to collaborate via email with whomever they require within the context of the
incident, with all such emails recorded on the incident.
• Triage inbox to highlight emails that require manual intervention, whether to define new rules to
automatically process them, or to modify existing rules and/or scripts to update processing
logic.
• First release focuses on inbound emails and triage inbox, subsequent releases will enhance
initial capabilities as well as adding support for outbound emails.
Updated Resilient UI
7 IBM Security
• IBM Design Studio’s Carbon
̶ Developed and supported by a dedicated team in Austin, TX
̶ Carbon Library: reusable HTML and SCSS enables consistent markup, styles, and behavior
̶ Well documented
• Full-screen width
• Layout changes
̶ e.g. Incident Details sidebar moved to the right
• First phase in ongoing UI refresh, there’s more to come.
UI Refresh
8 IBM Security
Incident Details Example
Privacy Updates in Resilient
10 IBM Security
The following new regulators were
added to the Privacy Module:
• Alberta Health
• Bermuda
• Canada (PIPEDA)
• Vermont (Data Brokers)
Significant Additions and Updates
The following regulators were
updated in the Privacy Module:
• Belgium
• Colorado
• Connecticut
• Gibraltar
• Iowa
• Nebraska
• NYDFS
• Vermont
11 IBM Security
Text box to document
conclusion
Important Features for PIPEDA (Canada)
12 IBM Security
Guidance that helps
user assess risk
Important Features for PIPEDA (Canada) continued
13 IBM Security
14 IBM Security
Upcoming Privacy Additions
China (Financial PBOC) Hong Kong (Monetary Authority)
Integration Update
16 IBM Security
73 Apps Available: IBM and Business Partner Supported and Community Supported
New Integrations Available on the IBM Security App Exchange
17 IBM Security
New and Notable Apps
Slack
Transfer information between Resilient and
Slack with this functions-based integration
A full list of newly released apps and a description of their features is available in the
Resilient Community: ibm.biz/CommunityDiscussion
IBM and Business Partner Supported Community Supported
Microsoft Exchange
This package can be used to access Microsoft
Exchange email and meeting capabilities from
Resilient
• Google Cloud Functions to Sandbox
• IPinfo IP Address Enrichment
• MxToolbox
• Pastebin
• Pipl
• Search Twitter
• URL to DNS
• Wiki Lookup
X-Force Collections
Enrich incidents in Resilient with context from
IBM X-Force Exchange, a threat intelligence
sharing platform.
18 IBM Security
ibm.biz/resilientcommunity
19 IBM Security
Join the Resilient team at THINK
2019 in San Francisco
• Meet with key Resilient
technology and business
executives
• Attend the Resilient User Group
meeting (Monday 1-3PM, Feb 11)
• Network with other Resilient
customers
More information and registration
details at:
https://www.ibm.com/events/think/
20 IBM Security
Engage 2019 – Regional and Global Customer Forums
• Regional Engage Customer Forums
̶ Europe:
• Zurich, Switzerland - March 19 - 20
• London, England - March 21 - 22
̶ United States:
• San Francisco, CA - April 9 - 10
• Atlanta, GA - April 11 - 12
• Resilient Cyber Range Experience -
Cambridge, MA:
̶ May 7
̶ July 11
̶ October 14
• Engage Global Customer Forum
̶ Cambridge, MA – September 17 - 19
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2018. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOU
ibm.com/security/community

Integrated Response with v32 of IBM Resilient

  • 1.
    Customer Webinar: Integrated Responsewith v32 of Resilient January 16th, 2019
  • 2.
    2 IBM Security Agenda •The Updated In-Product Email in v32 • Updated UI in Resilient • Privacy Updates and Upcoming Regulations • New Integrations Available • Upcoming Customer Events
  • 3.
    3 IBM Security OurSpeakers Monica Dubeau, Privacy Program Manager, CIPP/US IBM Resilient Martin Feeney, Product Manager IBM Resilient
  • 4.
  • 5.
    5 IBM Security Objectivesof In-Product Email • We want to simplify email setup, maintenance, and processing by bringing all aspects of it into the main product UI. • Reduce the time and effort involved in creating and maintaining the existing email product extension. • Emails connections will be defined and tested within the UI. Emails will now be directly referenceable within UI contexts such as rules and scripting. • Make emails an integrated part of Resilient, visible on the incidents as objects in their own right. • Allow operators to collaborate via email with whomever they require within the context of the incident, with all such emails recorded on the incident. • Triage inbox to highlight emails that require manual intervention, whether to define new rules to automatically process them, or to modify existing rules and/or scripts to update processing logic. • First release focuses on inbound emails and triage inbox, subsequent releases will enhance initial capabilities as well as adding support for outbound emails.
  • 6.
  • 7.
    7 IBM Security •IBM Design Studio’s Carbon ̶ Developed and supported by a dedicated team in Austin, TX ̶ Carbon Library: reusable HTML and SCSS enables consistent markup, styles, and behavior ̶ Well documented • Full-screen width • Layout changes ̶ e.g. Incident Details sidebar moved to the right • First phase in ongoing UI refresh, there’s more to come. UI Refresh
  • 8.
    8 IBM Security IncidentDetails Example
  • 9.
  • 10.
    10 IBM Security Thefollowing new regulators were added to the Privacy Module: • Alberta Health • Bermuda • Canada (PIPEDA) • Vermont (Data Brokers) Significant Additions and Updates The following regulators were updated in the Privacy Module: • Belgium • Colorado • Connecticut • Gibraltar • Iowa • Nebraska • NYDFS • Vermont
  • 11.
    11 IBM Security Textbox to document conclusion Important Features for PIPEDA (Canada)
  • 12.
    12 IBM Security Guidancethat helps user assess risk Important Features for PIPEDA (Canada) continued
  • 13.
  • 14.
    14 IBM Security UpcomingPrivacy Additions China (Financial PBOC) Hong Kong (Monetary Authority)
  • 15.
  • 16.
    16 IBM Security 73Apps Available: IBM and Business Partner Supported and Community Supported New Integrations Available on the IBM Security App Exchange
  • 17.
    17 IBM Security Newand Notable Apps Slack Transfer information between Resilient and Slack with this functions-based integration A full list of newly released apps and a description of their features is available in the Resilient Community: ibm.biz/CommunityDiscussion IBM and Business Partner Supported Community Supported Microsoft Exchange This package can be used to access Microsoft Exchange email and meeting capabilities from Resilient • Google Cloud Functions to Sandbox • IPinfo IP Address Enrichment • MxToolbox • Pastebin • Pipl • Search Twitter • URL to DNS • Wiki Lookup X-Force Collections Enrich incidents in Resilient with context from IBM X-Force Exchange, a threat intelligence sharing platform.
  • 18.
  • 19.
    19 IBM Security Jointhe Resilient team at THINK 2019 in San Francisco • Meet with key Resilient technology and business executives • Attend the Resilient User Group meeting (Monday 1-3PM, Feb 11) • Network with other Resilient customers More information and registration details at: https://www.ibm.com/events/think/
  • 20.
    20 IBM Security Engage2019 – Regional and Global Customer Forums • Regional Engage Customer Forums ̶ Europe: • Zurich, Switzerland - March 19 - 20 • London, England - March 21 - 22 ̶ United States: • San Francisco, CA - April 9 - 10 • Atlanta, GA - April 11 - 12 • Resilient Cyber Range Experience - Cambridge, MA: ̶ May 7 ̶ July 11 ̶ October 14 • Engage Global Customer Forum ̶ Cambridge, MA – September 17 - 19
  • 21.
    ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBMCorporation 2018. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: THANK YOU ibm.com/security/community