IBM X-Force Command Cyber Tactical Operations Center Hits the Road

By Jen Trang Nguyen, MDS

Welcome to our series of blog posts dedicated to Cybersecurity Awareness Month! This month, we will update you with the latest security news, share some tips and tricks as well as a special announcement about our very own Cybersecurity Techxpo on October 23, 2018 here in NYC. Stay tuned!

IBM Security announced on October 15, 2018 that they are rolling out the industry’s first mobile Security Operations Center, capable of traveling onsite for cybersecurity training, preparedness, and response.

The IBM X-Force Command Cyber Tactical Operations Center (C-TOC) will travel around the U.S. and Europe, running incident response drills with clients, providing on-demand cybersecurity support, and building cybersecurity awareness and skills with professionals, students and consumers.

 

The IBM X-Force C-TOC is a fully operational Security Operations Center on wheels, modeled after Tactical Operations Centers used by the military and incident command posts used by first responders. Housed in a tractor trailer, the mobile facility provides a gesture-controlled cybersecurity “watch floor,” data center and conference facilities that can accommodate two dozen operators, analysts, and incident command center staff. The facility can be deployed in a variety of environments, with self-sustaining power, satellite, and cellular communications, providing a sterile and resilient network for investigation and response as well as a state-of-the-art platform for cybersecurity training.

The IBM C-TOC will begin its journey travelling around the U.S. and Europe, with multiple purposes:

  • Response Training and Preparedness: With an increasing focus on improving incident response in the aftermath of major cybersecurity attacks, the C-TOC can help companies train their teams on techniques (both technical and crisis leadership) to respond to attacks while simulating real-world conditions of how hackers operate and key strategies to protect business brand and resources.
  • Onsite Cybersecurity Support: IBM designed the C-TOC with the capabilities to deploy the mobile facility as a client-specific, on-demand Security Operation Center. One potential use-case being explored is supporting sporting events or other large gatherings where supplemental cybersecurity resources may be needed.
  • Education and Awareness: When the C-TOC is in between IBM client engagements, it will travel to immerse people in one of the most realistic cybersecurity experience in the industry – visiting local universities and industry events, and even reaching primary school children with awareness efforts to build interest in cybersecurity careers and help address the growing workforce shortage.

“Experiencing a major cyberattack is one of the worst crisis a company can face, and the leadership, skills and coordination required is not something you want to test out for the first time when you’re facing a real attack,” said Caleb Barlow, Vice President of Threat Intelligence, IBM Security. “Having a mobile facility that allows us to bring realistic cyberattack preparation and rehearsal to a larger, global audience will be a game changer in our mission to improve incident response efforts for organizations around the world.”

C-TOC to Tour U.S. and Europe

The C-TOC will begin its tour in the U.S., travelling to client sites, schools and government facilities.

On October 18, the C-TOC will be based at the National Mall in Washington, D.C. providing cybersecurity awareness training to congressional staff and other public officials. The C-TOC will travel to Europe in January, visiting clients and events in multiple countries throughout 2019.

IBM will evaluate opportunities for additional mobile security operation centers and use-cases based on feedback and demand.

To learn more about IBM’s C-TOC and Cyber Range, go to http://ibm.com/xforcectoc.

Don’t wait until sensitive data is already in the sticky hands of hackers to react to a breach. Stay proactive with MDS and work with us to build out a custom, company-wide security protocol that is effective and easy to maintain.

 

Pulling the plug doesn't have to be your only security solution.

Don’t become part of a rising statistic — ensure your company is armed against a security hack.
Share This