• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Cyber Security Market

Cyber Security Technologies & Markets

  • Cyber Security Events 2022-2023
  • Market Reports
  • Sponsored Post
  • Make a Contribution
  • About
  • Contact

IBM Rolls Out Industry’s First Cybersecurity Operations Center on Wheels

October 15, 2018 By CybersecurityMarket.com

– Cyber “Tactical Operation Center” to Travel Globe for Events, Training and Awareness

– Part of IBM Security’s Growing $200M+ investment in Incident Response Capabilities

IBM (NYSE: IBM) Security today announced the industry’s first mobile Security Operations Center, capable of traveling onsite for cybersecurity training, preparedness, and response. The IBM X-Force Command Cyber Tactical Operations Center (C-TOC) will travel around the U.S. and Europe, running incident response drills with clients, providing on-demand cybersecurity support, and building cybersecurity awareness and skills with professionals, students and consumers.

IBM announced the industry's first fully functional Security Operation Center on wheels. The IBM X-Force Command Cyber Tactical Operations Center (C-TOC) will travel onsite for cybersecurity training, education and response, including immersive cyberattack simulations to help organizations improve their incident response efforts.
IBM announced the industry’s first fully functional Security Operation Center on wheels. The IBM X-Force Command Cyber Tactical Operations Center (C-TOC) will travel onsite for cybersecurity training, education and response, including immersive cyberattack simulations to help organizations improve their incident response efforts.

The IBM X-Force C-TOC is a fully operational Security Operations Center on wheels, modeled after Tactical Operations Centers used by the military and incident command posts used by first responders. Housed in a tractor trailer, the mobile facility provides a gesture-controlled cybersecurity “watch floor,” data center and conference facilities that can accommodate two dozen operators, analysts and incident command center staff. The facility can be deployed in a variety of environments, with self-sustaining power, satellite and cellular communications, providing a sterile and resilient network for investigation and response as well as a state-of-the-art platform for cybersecurity training.

Historically, cybersecurity teams have been focused on detection and protection against cybersecurity incidents. However, as the threat landscape has evolved, organizations are now recognizing the need to plan and rehearse their response to security incidents as well. The 2018 Cost of a Data Breach Study1 found that companies that are able to respond to incidents effectively and remediate the event within 30 days can save over $1 million on the total cost of a data breach – yet less than 25% of professionals surveyed say their company has a coordinated incident response plan applied across the organization.

The IBM C-TOC will begin its journey travelling around the U.S. and Europe, with multiple purposes:

Response Training and Preparedness: With an increasing focus on improving incident response in the aftermath of major cybersecurity attacks, the C-TOC can help companies train their teams on techniques (both technical and crisis leadership) to respond to attacks while simulating real-world conditions of how hackers operate and key strategies to protect business brand and resources.
Onsite Cybersecurity Support: IBM designed the C-TOC with the capabilities to deploy the mobile facility as a client-specific, on-demand Security Operation Center. One potential use-case being explored is supporting sporting events or other large gatherings where supplemental cybersecurity resources may be needed.
Education and Awareness: When the C-TOC is in between IBM client engagements, it will travel to immerse people in one of the most realistic cybersecurity experience in the industry – visiting local universities and industry events, and even reaching primary school children with awareness efforts to build interest in cybersecurity careers and help address the growing workforce shortage.
“Experiencing a major cyberattack is one of the worst crisis a company can face, and the leadership, skills and coordination required is not something you want to test out for the first time when you’re facing a real attack,” said Caleb Barlow, Vice President of Threat Intelligence, IBM Security. “Having a mobile facility that allows us to bring realistic cyberattack preparation and rehearsal to a larger, global audience will be a game changer in our mission to improve incident response efforts for organizations around the world.”

Demand for Cybersecurity Preparation and Response Grows
IBM Security has identified incident response and preparedness as an underserved segment of the $114 billion cybersecurity market.2 In 2016, IBM invested $200 million in new incident response facilities, services and software, including the industry’s first Cyber Range for the commercial sector. Since then, IBM has taken more than 2,000 people through its immersive cybersecurity preparedness training in its facility in Cambridge, MA. With the launch of the X-Force C-TOC, this training is being taken directly to clients as well as an expanded mission to provide onsite preparedness and the potential for supplemental cybersecurity services.

To create this Cyber Range experience and the C-TOC, IBM consulted with dozens of experts from different industries, from emergency medical responders to active duty military officers. Along with IBM’s own cybersecurity expertise, the C-TOC experiences train teams on the essentials of leadership in crisis – from moving out of the organizations day to day structure and into an incident command hierarchy to thinking a step ahead to anticipate the next moves of an attacker.

The C-TOC training includes a “Cyber Best Practices Laboratory” with real world examples based on experiences with customers in the Cambridge Cyber Range. It will also enable companies to participate in an immersive, gamified cyberattack which allows teams to test incident response plans under a realistic, high pressure simulation. Some examples of these attack scenarios include:

Ox Response Challenge: This challenge is designed for the executive team to immerse a wide variety of stakeholders in a realistic “fusion team” environment in which players must figure out how to respond to a cyberattack as a team, across dimensions such as technical, legal, public relations and communications.
OpRed Escape: Get into the mind of a cybercriminal and learn to think like a hacker; this exercise puts participants into the “seat” of a real-world attacker, learning the ways bad guys break into networks by watching an expert and getting hands-on experience with a malicious toolset.
Cyber War Game: In this hands-on scenario, participants will uncover a cyber-attack lead by a cybercrime gang targeting a fictitious corporation. Operating on the C-TOC’s simulated corporate network, participants will use technical tools to identify the threats and shut them down, while also building a response plan and developing leadership and crisis management skills.
Supplemental Cybersecurity Operations
IBM also designed the C-TOC to have the potential to supplement onsite support for clients at times when their cybersecurity needs may surge. Cybercriminals are constantly on the lookout for major events and moments in time to help launch their attacks, taking advantage of increased interest, cashflow and internet activities to get higher returns on their malicious activities.

Cybersecurity at large-scale events is increasingly being considered alongside emergency services response and public safety. For these events, IBM can bring the C-TOC onsite to help not only with preparation, but to provide an isolated network, cybersecurity watch floor and incident command infrastructure.

Skills and Awareness
The cybersecurity workforce shortage is a major hurdle plaguing the industry, with an anticipated shortfall of nearly 2 million cybersecurity professionals by 2022.3 Building awareness about security careers among younger generations, as well as helping upskill current professionals in cybersecurity, are two ways IBM Security hopes to help address the skills shortage.

When not working with clients, the C-TOC will travel to academic institutions, industry and community events for training and awareness activities. For instance, the C-TOC will travel to the National Collegiate Pentesting Competition hosted at Rochester Institute of Technology November 2 – 4, and it will also be available for events that IBM hosts to drive interest in cybersecurity and STEM careers, such as IBM Cyber Day for Girls. The C-TOC can also help improve and expand skillsets within the current cybersecurity workforce, through onsite training and hands on skills development with cybersecurity teams on critical skillsets to help them keep up with the latest cyberthreats.

C-TOC to Tour U.S. and Europe
The C-TOC will begin its tour in the U.S., travelling to client sites, schools and government facilities.

On October 18, the C-TOC will be based at the National Mall in Washington, D.C. providing cybersecurity awareness training to congressional staff and other public officials. The C-TOC will travel to Europe in January, visiting clients and events in multiple countries throughout 2019.

IBM will evaluate opportunities for additional mobile security operation centers and use-cases based on feedback and demand.

To learn more about IBM’s C-TOC and Cyber Range, go to http://ibm.com/xforcectoc.

About IBM Security
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force® research, enables organizations to effectively manage risk and defend against emerging treats. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 60 billion security events per day in more than 130 countries, and has been granted more than 8,000 security patents worldwide. For more information, please check www.ibm.com/security, follow IBMSecurity on Twitter or visit the IBM Security Intelligence blog.

Related

Filed Under: Cybersecurity Market

Primary Sidebar

Market Analysis

Immersive Virtual
CryptoSupercycles.com: 2021, Year of Crypto
What economic trends will define 2022?
Global Wealth Grew by Double Digits to $530 Trillion in 2021, Despite Continued Crises
When will international tourism return to pre-pandemic levels?

Tech Events

Forrester Announces Full Conference Agenda For Technology & Innovation North America 2021 Live Virtual Experience, November 2–3, 2021
Data+AI Summit, June 27-30, 2022
The RISC-V Summit will be held at Moscone West in San Francisco from December 6-8, 2021
DesignCon, the premier event in high-speed communications and system design, August 16-18 2021, San Jose McEnery Convention Center
Photonics Industry Summit, September 21, 2022, Washington, DC

Market Research

SyntheticMetadata.com (Synthetic Metadata): Synthetic data will reduce personal customer data collection
QuasiQuantumCloud.com (Quasi Quantum Cloud): Accessibility to quantum simulation in the cloud is the game changer
Blockchaining.ai: What is Blockchain Technology and Why is it Popular
Russian oil production succumbing to the impact of Western sanctions
Web3.ag: Web3 Crash Course

Secondary Sidebar

Technologies

Datadog Launches Audit Trail to Help Businesses Achieve Their Compliance and Governance Objectives
VivaTech, Europe’s number one startup and tech event, makes its big comeback with more than 91,000 participants in Paris
Trends in data and analytics
MulticoreWare Inc.’s VVC Consortium Gains Momentum
Technologies Remaking the World
Samsung Electronics and Red Hat Announce Collaboration in the Field of Next-Generation Memory Software
Samsung Brings Advanced Ultra-Fine Pixel Technologies to New Mobile Image Sensors
10 Technology Trends with Momentum
Intel has suspended all shipments to customers in both Russia and Belarus
Alphabet’s Project Taara laser tech beamed 700TB of data across nearly 5km

Footer

Recent Posts

  • CyberArk Announces Impact 2022: The Identity Security Event, July 12-14 2022, Boston
  • The first hybrid Security Congress will take place at Caesars Palace in Las Vegas and online from October 10-12, 2022
  • FIC 2022, Forum International de la Cybersécurité, June 7-9 2022, Lille Grand Palais, Lille, France
  • Behavioral cybersecurity platform CybSafe raises $28M
  • Forum Internacional de la Cybersécurité – FIC 2022, 7 to 9 June 2022, Lille Grand Palais, Lille, France
  • IBM Tackles Growing Attack Surface Risks with Plans to Acquire Randori
  • Talon Cyber Security Announces Integration with CrowdStrike to Extend Endpoint Protection to Unmanaged Devices
  • Secure Cloud Architecture with Policy as Code
  • Cybersecurity talent gap
  • JFrog Ushers in New Era of Open-Source Software Security, Launching Project Pyrsia to Help Prevent Software Supply Chain Attacks

Media Partners

  • Opinion
  • Press Media Release
  • Briefly
  • OPINT
  • VPNW
  • S3H
  • Domain Aftermarkets
  • App Coding
  • API Coding
  • Blockchaining

Media Partners

  • Technology Conferences
  • Event Sharing Network
  • Defense Conferences
  • OSINT
  • Event Calendar
  • Calendarial
  • Domain Market Research

Copyright © 2015 CyberSecurityMarket.com

Technologies, Market Analysis & Market Research Reports

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT