IE11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Safer citizens, stronger communities

Los Angeles partners with IBM Security to create first-of-its-kind cyberthreat sharing group


Simplify threat intelligence sharing and protecting the community from online crime

The concept of information sharing to combat physical crime has existed for decades, long before the birth of the internet. As the virtual world evolved, it brought along an unwelcome guest: the cybercriminal. The same threat-sharing mindset that can provide an edge against crime in the real world was brought to life in the cyber world, as well, with multiple organizations springing up to better protect companies (and their customers) from online criminal activity.

Now that philosophy has leaped even further with the development of the Los Angeles Cyber Lab—an online community that combines the power of shared threat intelligence from private industry, government organizations, and everyday citizens. The result: a first-of-its-kind powerful arsenal that better protects business, public sector agencies and Los Angeles residents from increasingly sophisticated cybercrime.

Facelessness of cybercriminals - securing the Internet of Things is a challenge

When a physical crime occurs in city streets, law enforcement can quickly respond with myriad physical forces to help protect citizens and businesses. Crime investigators often have insight and physical evidence about a criminal’s tactics and motives, allowing law enforcement to use that information for future crime prevention. In contrast, cybercrime often has no obvious or immediate indications of how an attacker breached a system and what data was stolen or destroyed.

As cybercrime continues to evolve, attackers have a never-ending supply of vulnerabilities to exploit or potential victims to target in social engineering attacks. Threat actors are an opportunistic group and have a catalog of thousands of vulnerabilities available for potential exploitation. However, scan and exploit attacks only accounted for roughly one third of the top access vectors for cyberattacks in 2019, according to the 2020 X-Force Threat Intelligence Index.2 Other cyber criminals prefer stealing legitimate credentials through phishing attacks to gain access. The use of legitimate credentials enables attackers to hide in plain sight and makes detection even more challenging.

Without valid or trustworthy information, local businesses, communities and concerned citizens can be overwhelmed by an attack and look to state, local and federal government agencies to mitigate or investigate cybercrime.

“Ransomware attacks have reached the point where governments need to place an importance on them and develop response plans, similar to how they handle states of emergency.”

— Wendi Whitmore, Vice President X-Force Threat Intelligence, IBM Security


Learn more at: or contact your IBM representative

IBM discovers, designs, and develops advanced information technology, and translates that into value for our clients. The essentials of government transformation are rooted in hybrid cloud, data and AI, automation, and cybersecurity. IBM embraces an open way of working by bringing a diverse set of voices and technologies together. With a dedicated focus toward accelerating outcomes, we collaborate closely, ideate freely and swiftly, and apply breakthrough innovations that can drive exponential impact on how the business of government gets done.