IBM introduced new agentic and automation capabilities to its managed detection and response service offerings to help enable autonomous security operations and predictive threat intelligence for clients. 1) Autonomous Threat Operations Machine (ATOM), an agentic AI system providing autonomous threat triage, investigation, and remediation with minimal human intervention. Powering IBM’s Threat Detection and Response (TDR) services, ATOM’s AI agentic framework and orchestration engine leverages multiple individual agents to augment an organization’s existing security analytics solution and help accelerate threat detection, analyze alerts with enrichment and contextualization, perform risk analysis, create and execute investigation plans, and perform remediation actions which enhance the security analyst experience. This orchestration allows security teams to focus on high priority threats, rather than spending valuable time on false positives or lower-priority risks. Within the TDR platform, ATOM acts as a vendor-agnostic digital operator and provides AI capabilities that integrate with existing solutions from IBM and partners. 2) IBM is also introducing the new X-Force Predictive Threat Intelligence (PTI) agent for ATOM, which leverages industry vertical-specific AI foundation models to generate predictive threat insights on potential adversarial activity and minimize manual threat hunting efforts. IBM X-Force PTI integrates AI with expert human analysis to help curate proactive threat intelligence. Built on proprietary AI foundational models and trained on cybersecurity data, PTI provides a tailored, contextualized threat intelligence feed and predicts potential threats based on adversary behavior. To extract early indicators of behavior and compromise, PTI gathers data from more than 100 sources including X-Force Threat Intelligence, open-source RSS feeds, APIs and other automated sources, as well as user-supplied organizational context. PTI synthesizes that information into collective intelligence reports that include recommended threat hunt queries tailored to the organization’s specific needs. By focusing on indicators of behaviors, instead of just indicators of compromise, businesses can get ahead of threats.