SlideShare a Scribd company logo
1 of 19
Haystax Advanced Threat Analytics 
Whole Person Risk Modeling 
Presented at Information Risk Management Research 
Board 
November 18, 2014 
Bryan Ware | CTO |
1 
Topics 
Haystax Overview 
The Insider Threat 
From an Analytical Perspective 
Enterprise Threat Management 
Carbon Personnel Risk Management System
2 
About Us 
ADVANCED CYBERSECURITY AND THREAT MANAGEMENT 
FORMED in 2012 on a 20 year legacy 
(Digital Sandbox, FlexPoint, NetCentrics) 
EMPLOYEES: 350, 90% Cleared 
WE OFFER: Cybersecurity & 
enterprise threat management 
solutions that provide real-time 
actionable intelligence for complex, 
high consequence decisions 
We developed the protective intelligence 
methodology used by the Bill & Melinda Gates 
Foundation 
We are used by 15 of the 20 largest urban areas to 
keep their citizens & assets safe 
We architected, manage & defend some of the most 
mission critical networks in the US 
We deployed the CIA’s first private cloud with AWS
3 
Haystax Technology Accelerator 
DEVELOP ADVANCED CONCEPTS AND PRODUCTS 
Focus on solving the “really hard” 
problems 
Advance the state of the art through 
agile, out-of-the-box thinking
4 
Better a diamond with a flaw than… 
“You want a valve that doesn’t leak and you try everything 
possible to develop one. But the real world provides you 
with a leaky valve. You have to determine how much 
leaking you can tolerate.” 
--Arthur Rudolph, manager of the Marshall Space 
Flight Center Saturn V program office
5 
Who do you think you are? 
YOU ARE NOT YOUR DATA 
You are not your account. 
Accounts are not identities. 
Events are not behaviors.
6 
The Signal to Noise Problem 
TEACHING A DETECTION SYSTEM TO FIND THE TARGET SEEMS EASY 
Target 
False Alarm
7 
As noise increases, it gets harder to see the signal 
ALL BRUTE FORCE SYSTEMS WILL SUCCUMB 
Target 
False Alarm 
Miss
8 
The Signal to Noise Problem 
THRESHOLDS & FLAGS WILL IDENTIFY THE OBVIOUS SPIKES…BUT WILL MISS WEAK SIGNALS 
Lowering thresholds will 
increase false alarms. 
How do you strike a balance between false 
alarm Rate and missed detections?
9 
The Signal has Become the Noise 
ANALYTICS ARE NEEDED TO PRIORITIZE SIGNALS
10 
The Haystax Way 
PATENTED ANALYTIC APPROACH 
We model first 
Models represent human judgment 
Disparate information sources are fused 
Causality and uncertainty are measured 
Outputs represent the degree of belief
11 
The Haystax Technology Vision 
ENTERPRISE THREAT MANAGEMENT 
Haystax will provide CROs, CIOs and CISOs with a 
cloud-enabled platform to identify, monitor and 
manage potential threats to the enterprise in an 
integrated analytic system
12 
Enterprise Threat Management 
BROADER VISIBILITY, REDUCED RESPONSE TIMES & PRIORITIZED RESOURCE ALLOCATION 
Profile overall 
enterprise threat and 
risk 
Monitor continuously 
and broadly against 
that profile 
Prioritize and route 
critical information for 
Implement collaborative, 
dynamic situational 
awareness 
action
13 
What is Carbon 
Carbon is a model of the Whole Person, establishing a Pattern of Life that is 
evaluated continuously as data changes or becomes available 
Backgr 
ound 
Check 
Peers & 
Family 
$ Financial 
Records 
Public 
Records 
Web and HR Record 
Social Media 
HUMINT 
Counterintelligence 
Medical 
Criminal Investigators 
Command 
Peers 
Family 
Psych 
Subject 
IT Security
14 
Carbon is a Threat Optimization Solution 
AUTOMATICALLY PRIORITIZES ACTIONS, BASED ON RISK 
Automated continuous evaluation 
and re-prioritization enables 
sustained success 
Installed within legacy software 
environments
15 
How Does the Carbon Software Work 
Installed on premises, and connected to 
enterprise data sources 
Calculates the level of risk of each person in 
the organization 
Provides a dashboard of all personnel 
Maintains information and cases on 
personnel 
Alerts when significant issues or changes are 
detected 
Is updated dynamically and continuously as 
information changes or more information and 
new data sources are identified
16 
Data Processing & Routing 
OPTIMIZES MACHINE AND HUMAN PROCESSING OF DATA 
Enterprise 
Calls for HR Data 
Service 
News & Social Communications Enterprise Data 
Data Collection 
& Pre-Processing 
Physical 
Assets/CIKR 
Archive DB Web 
Analytic 
Processing 
Low Priority Channels 
Mobile 
3rd Party 
Triage Timeline Map 
Alerts Visual Interaction Canvases Reports 
Feeds 
Network Alerts 
Know & Act 
Patent # 8874071
17 
Closing Summary 
YOU ARE NOT YOUR DATA 
Separate signal from noise 
Whole person risk modeling 
Anticipation trumps forensics 
Prioritized response
18 
Thank You 
Bryan Ware 
Chief Technology Officer 
Haystax Technology 
8251 Greensboro Drive 
Suite 1111 
McLean, VA 22102 
(571) 297-3806 
bware@haystax.com 
www.haystax.com

More Related Content

What's hot

Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityEMC
 
Overview of Haystax Technology
Overview of Haystax TechnologyOverview of Haystax Technology
Overview of Haystax TechnologyHaystax Technology
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Tracey Ong
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionCylance
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Coastal Pet Products, Inc.
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analyticsChristian Have
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIsSteven Aiello
 
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive SecurityComputerworld Philippines
 
Strengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringStrengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringBooz Allen Hamilton
 
Haystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium PresentationHaystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium PresentationJaffrey Ali
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligencethinkASG
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in CybersecurityMT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in CybersecurityDell EMC World
 
Lead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkLead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkInterset
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsBrian Rushton-Phillips
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecurityDoug Copley
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
MT29 Panel: Becoming a data-driven enterprise
MT29 Panel: Becoming a data-driven enterpriseMT29 Panel: Becoming a data-driven enterprise
MT29 Panel: Becoming a data-driven enterpriseDell EMC World
 

What's hot (20)

Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven Security
 
Overview of Haystax Technology
Overview of Haystax TechnologyOverview of Haystax Technology
Overview of Haystax Technology
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your Decision
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title)
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
 
Strengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringStrengthening Security with Continuous Monitoring
Strengthening Security with Continuous Monitoring
 
Haystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium PresentationHaystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium Presentation
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security Intelligence
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in CybersecurityMT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
 
Lead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkLead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less Work
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
MT29 Panel: Becoming a data-driven enterprise
MT29 Panel: Becoming a data-driven enterpriseMT29 Panel: Becoming a data-driven enterprise
MT29 Panel: Becoming a data-driven enterprise
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
 

Viewers also liked

Haystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat ManagementHaystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat ManagementHaystax Technology
 
Results presentation q2 2015
Results presentation q2 2015Results presentation q2 2015
Results presentation q2 2015SpondaPlc
 
Importance pdhpe
Importance pdhpeImportance pdhpe
Importance pdhpelolfeg
 
Processing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk AssessmentProcessing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk AssessmentHaystax Technology
 
Sponda Financial Results Q1 2015 presentation 050515
Sponda Financial Results Q1 2015 presentation 050515Sponda Financial Results Q1 2015 presentation 050515
Sponda Financial Results Q1 2015 presentation 050515SpondaPlc
 
Results presentation q3 2016
Results presentation q3 2016Results presentation q3 2016
Results presentation q3 2016SpondaPlc
 
Horror make up
Horror make upHorror make up
Horror make upkiller987
 
StimulusWk13
StimulusWk13StimulusWk13
StimulusWk13Aj Cruz
 
Frac Tech Services interview questions and answers
Frac Tech Services interview questions and answersFrac Tech Services interview questions and answers
Frac Tech Services interview questions and answerstaylorlorr
 
FINAL PR Portfolio Slides
FINAL PR Portfolio Slides FINAL PR Portfolio Slides
FINAL PR Portfolio Slides Jaclyn Freedman
 
Haystax Technology Machine learning white paper
Haystax Technology Machine learning white paperHaystax Technology Machine learning white paper
Haystax Technology Machine learning white paperHaystax Technology
 
презентація опера
презентація операпрезентація опера
презентація операnikysja888
 
Importance of pdhpe
Importance of pdhpeImportance of pdhpe
Importance of pdhpelolfeg
 
Modelo ecologico y_modelo_integral_de_intervencion
Modelo ecologico y_modelo_integral_de_intervencionModelo ecologico y_modelo_integral_de_intervencion
Modelo ecologico y_modelo_integral_de_intervencionJuan Contreras
 
Діагностування електродвигунів
Діагностування електродвигунівДіагностування електродвигунів
Діагностування електродвигунівSvetlana Savostina
 

Viewers also liked (20)

Haystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat ManagementHaystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat Management
 
Results presentation q2 2015
Results presentation q2 2015Results presentation q2 2015
Results presentation q2 2015
 
Critical assets protection
Critical assets protectionCritical assets protection
Critical assets protection
 
Importance pdhpe
Importance pdhpeImportance pdhpe
Importance pdhpe
 
Processing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk AssessmentProcessing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk Assessment
 
Sponda Financial Results Q1 2015 presentation 050515
Sponda Financial Results Q1 2015 presentation 050515Sponda Financial Results Q1 2015 presentation 050515
Sponda Financial Results Q1 2015 presentation 050515
 
Results presentation q3 2016
Results presentation q3 2016Results presentation q3 2016
Results presentation q3 2016
 
Horror make up
Horror make upHorror make up
Horror make up
 
Comparatives and Superlatives
Comparatives and SuperlativesComparatives and Superlatives
Comparatives and Superlatives
 
StimulusWk13
StimulusWk13StimulusWk13
StimulusWk13
 
American mfg
American mfgAmerican mfg
American mfg
 
Drupal commerce
Drupal commerceDrupal commerce
Drupal commerce
 
Frac Tech Services interview questions and answers
Frac Tech Services interview questions and answersFrac Tech Services interview questions and answers
Frac Tech Services interview questions and answers
 
FINAL PR Portfolio Slides
FINAL PR Portfolio Slides FINAL PR Portfolio Slides
FINAL PR Portfolio Slides
 
Haystax Technology Machine learning white paper
Haystax Technology Machine learning white paperHaystax Technology Machine learning white paper
Haystax Technology Machine learning white paper
 
презентація опера
презентація операпрезентація опера
презентація опера
 
Importance of pdhpe
Importance of pdhpeImportance of pdhpe
Importance of pdhpe
 
Modelo ecologico y_modelo_integral_de_intervencion
Modelo ecologico y_modelo_integral_de_intervencionModelo ecologico y_modelo_integral_de_intervencion
Modelo ecologico y_modelo_integral_de_intervencion
 
Haystax bayesian networks
Haystax bayesian networksHaystax bayesian networks
Haystax bayesian networks
 
Діагностування електродвигунів
Діагностування електродвигунівДіагностування електродвигунів
Діагностування електродвигунів
 

Similar to Whole Person Risk Modeling

Haystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax Technology
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 
Analytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookAnalytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookDeloitte Canada
 
COVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comCOVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comPentest-Tools.com
 
Information security trends and concerns
Information security trends and concernsInformation security trends and concerns
Information security trends and concernsJohn Napier
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementMighty Guides, Inc.
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementMighty Guides, Inc.
 
Information security for business majors
Information security for business majorsInformation security for business majors
Information security for business majorsPaul Melson
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2Flaskdata.io
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskJohn Loveland
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsUlf Mattsson
 
Unrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALUnrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALWayne Anderson
 
A handbook of the threat intelligence tools your company needs
A handbook of the threat intelligence tools your company needsA handbook of the threat intelligence tools your company needs
A handbook of the threat intelligence tools your company needsSecuraa
 

Similar to Whole Person Risk Modeling (20)

Haystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network Services
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
Analytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookAnalytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface look
 
COVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comCOVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.com
 
Information security trends and concerns
Information security trends and concernsInformation security trends and concerns
Information security trends and concerns
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat Management
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability Management
 
Information security for small business
Information security for small businessInformation security for small business
Information security for small business
 
Information security for business majors
Information security for business majorsInformation security for business majors
Information security for business majors
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2
 
Data Science for Cyber Risk
Data Science for Cyber RiskData Science for Cyber Risk
Data Science for Cyber Risk
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info Risk
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
Unrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALUnrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINAL
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
A handbook of the threat intelligence tools your company needs
A handbook of the threat intelligence tools your company needsA handbook of the threat intelligence tools your company needs
A handbook of the threat intelligence tools your company needs
 

More from Haystax Technology

The constellation analytics platform
The constellation analytics platformThe constellation analytics platform
The constellation analytics platformHaystax Technology
 
Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...Haystax Technology
 

More from Haystax Technology (6)

The constellation analytics platform
The constellation analytics platformThe constellation analytics platform
The constellation analytics platform
 
School Safety Center
School Safety CenterSchool Safety Center
School Safety Center
 
Major events
Major eventsMajor events
Major events
 
Public safety cloud overview
Public safety cloud overviewPublic safety cloud overview
Public safety cloud overview
 
Pre incident fire
Pre incident firePre incident fire
Pre incident fire
 
Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Whole Person Risk Modeling

  • 1. Haystax Advanced Threat Analytics Whole Person Risk Modeling Presented at Information Risk Management Research Board November 18, 2014 Bryan Ware | CTO |
  • 2. 1 Topics Haystax Overview The Insider Threat From an Analytical Perspective Enterprise Threat Management Carbon Personnel Risk Management System
  • 3. 2 About Us ADVANCED CYBERSECURITY AND THREAT MANAGEMENT FORMED in 2012 on a 20 year legacy (Digital Sandbox, FlexPoint, NetCentrics) EMPLOYEES: 350, 90% Cleared WE OFFER: Cybersecurity & enterprise threat management solutions that provide real-time actionable intelligence for complex, high consequence decisions We developed the protective intelligence methodology used by the Bill & Melinda Gates Foundation We are used by 15 of the 20 largest urban areas to keep their citizens & assets safe We architected, manage & defend some of the most mission critical networks in the US We deployed the CIA’s first private cloud with AWS
  • 4. 3 Haystax Technology Accelerator DEVELOP ADVANCED CONCEPTS AND PRODUCTS Focus on solving the “really hard” problems Advance the state of the art through agile, out-of-the-box thinking
  • 5. 4 Better a diamond with a flaw than… “You want a valve that doesn’t leak and you try everything possible to develop one. But the real world provides you with a leaky valve. You have to determine how much leaking you can tolerate.” --Arthur Rudolph, manager of the Marshall Space Flight Center Saturn V program office
  • 6. 5 Who do you think you are? YOU ARE NOT YOUR DATA You are not your account. Accounts are not identities. Events are not behaviors.
  • 7. 6 The Signal to Noise Problem TEACHING A DETECTION SYSTEM TO FIND THE TARGET SEEMS EASY Target False Alarm
  • 8. 7 As noise increases, it gets harder to see the signal ALL BRUTE FORCE SYSTEMS WILL SUCCUMB Target False Alarm Miss
  • 9. 8 The Signal to Noise Problem THRESHOLDS & FLAGS WILL IDENTIFY THE OBVIOUS SPIKES…BUT WILL MISS WEAK SIGNALS Lowering thresholds will increase false alarms. How do you strike a balance between false alarm Rate and missed detections?
  • 10. 9 The Signal has Become the Noise ANALYTICS ARE NEEDED TO PRIORITIZE SIGNALS
  • 11. 10 The Haystax Way PATENTED ANALYTIC APPROACH We model first Models represent human judgment Disparate information sources are fused Causality and uncertainty are measured Outputs represent the degree of belief
  • 12. 11 The Haystax Technology Vision ENTERPRISE THREAT MANAGEMENT Haystax will provide CROs, CIOs and CISOs with a cloud-enabled platform to identify, monitor and manage potential threats to the enterprise in an integrated analytic system
  • 13. 12 Enterprise Threat Management BROADER VISIBILITY, REDUCED RESPONSE TIMES & PRIORITIZED RESOURCE ALLOCATION Profile overall enterprise threat and risk Monitor continuously and broadly against that profile Prioritize and route critical information for Implement collaborative, dynamic situational awareness action
  • 14. 13 What is Carbon Carbon is a model of the Whole Person, establishing a Pattern of Life that is evaluated continuously as data changes or becomes available Backgr ound Check Peers & Family $ Financial Records Public Records Web and HR Record Social Media HUMINT Counterintelligence Medical Criminal Investigators Command Peers Family Psych Subject IT Security
  • 15. 14 Carbon is a Threat Optimization Solution AUTOMATICALLY PRIORITIZES ACTIONS, BASED ON RISK Automated continuous evaluation and re-prioritization enables sustained success Installed within legacy software environments
  • 16. 15 How Does the Carbon Software Work Installed on premises, and connected to enterprise data sources Calculates the level of risk of each person in the organization Provides a dashboard of all personnel Maintains information and cases on personnel Alerts when significant issues or changes are detected Is updated dynamically and continuously as information changes or more information and new data sources are identified
  • 17. 16 Data Processing & Routing OPTIMIZES MACHINE AND HUMAN PROCESSING OF DATA Enterprise Calls for HR Data Service News & Social Communications Enterprise Data Data Collection & Pre-Processing Physical Assets/CIKR Archive DB Web Analytic Processing Low Priority Channels Mobile 3rd Party Triage Timeline Map Alerts Visual Interaction Canvases Reports Feeds Network Alerts Know & Act Patent # 8874071
  • 18. 17 Closing Summary YOU ARE NOT YOUR DATA Separate signal from noise Whole person risk modeling Anticipation trumps forensics Prioritized response
  • 19. 18 Thank You Bryan Ware Chief Technology Officer Haystax Technology 8251 Greensboro Drive Suite 1111 McLean, VA 22102 (571) 297-3806 bware@haystax.com www.haystax.com

Editor's Notes

  1. Summary…we are going to challenge the status quo….we are in the process of building a strong company and brand.
  2. .
  3. Cloud improves provisioning of secure apps.
  4. SharePoint, Link…
  5. DTaaS should be about improving the user experience. We have worked with MSFT on creating a reference desktop based on familiar collaboration and productivity tools.
  6. It’s not just about analysts, it also about pushing intelligence out to the field in mission critical situations.
  7. It’s not just about analysts, it also about pushing intelligence out to the field in mission critical situations.
  8. It’s not just about analysts, it also about pushing intelligence out to the field in mission critical situations.