SlideShare a Scribd company logo
1 of 6
Download to read offline
Machine learning.
Literally. Göran Sandahl
Co-founder, CTO
@gsandahl
goran@unomaly.com
“Less than
1% of data
is
analysed”
(idc)
Stuxnet
attack
graph


Black Box
The foundational issue
IT systems are black
boxes
?
?
? ? ?
3
Breaches
CrashesFailures
Changes
20% 

of IT time spent on
troubleshooting
IT Process Institute
69% 

of security incidents
discovered by 3rd
parties
Verizon Breach Report, 2013
Growing
pressure from
legislation, compliance
etc
Every system produces data. 

Every incident creates new.
Systems
Continually learns
what’s normal
D
B
Events
Profiles
§
Relevance

Algorithm
Universally
uncovers new data
in
u
Memory Controller Read Error on Ch
S
y
s
S
y
s
S
y
s
S
y
s
S
y
s
Send any data
from any system
STREAMING
DATA
Legacy
Cloud
Custom
Emerging
100%
coverage
100%
automation
99.999%
data reduction
4
One focal point and ground truth
for all stakeholders
sup
sec
net
dev
ops
app
What’s different?
Faster mean
time to detect,
repair and
recover
Reduced risk,
guesswork and
troubleshooting
Improved
communication
and
collaboration
Enhanced
organisational
learning
"Even the most advanced hacker will leave traces in log
data" Gartner, Anton Chuvakin
Thank you.

More Related Content

What's hot

Machine Learning + AI for Accelerated Threat-Hunting
Machine Learning + AI for Accelerated Threat-HuntingMachine Learning + AI for Accelerated Threat-Hunting
Machine Learning + AI for Accelerated Threat-HuntingInterset
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities IDG
 
Most expensive IT Security Incidents
Most expensive IT Security IncidentsMost expensive IT Security Incidents
Most expensive IT Security IncidentsARP
 
Imperva ppt
Imperva pptImperva ppt
Imperva pptImperva
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec
 
Infographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into FocusInfographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into FocusFortinet
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016FitCEO, Inc. (FCI)
 
"Towards Value-Centric Big Data" e-SIDES Workshop - “You’re monitoring my wh...
 "Towards Value-Centric Big Data" e-SIDES Workshop - “You’re monitoring my wh... "Towards Value-Centric Big Data" e-SIDES Workshop - “You’re monitoring my wh...
"Towards Value-Centric Big Data" e-SIDES Workshop - “You’re monitoring my wh...e-SIDES.eu
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsInterset
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security SurveyIDG
 
The Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning CybersecurityThe Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning CybersecurityInterset
 
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Interset
 
Managed Security Services On The Rise
Managed Security Services On The RiseManaged Security Services On The Rise
Managed Security Services On The RiseSecureData Europe
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRImperva
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
 
3 steps to gain control of cloud security
3 steps to gain control of cloud security 3 steps to gain control of cloud security
3 steps to gain control of cloud security SBWebinars
 

What's hot (19)

Machine Learning + AI for Accelerated Threat-Hunting
Machine Learning + AI for Accelerated Threat-HuntingMachine Learning + AI for Accelerated Threat-Hunting
Machine Learning + AI for Accelerated Threat-Hunting
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities
 
Most expensive IT Security Incidents
Most expensive IT Security IncidentsMost expensive IT Security Incidents
Most expensive IT Security Incidents
 
SC Magazine eSymposium: SIEM
SC Magazine eSymposium: SIEMSC Magazine eSymposium: SIEM
SC Magazine eSymposium: SIEM
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global Results
 
Infographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into FocusInfographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into Focus
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
 
"Towards Value-Centric Big Data" e-SIDES Workshop - “You’re monitoring my wh...
 "Towards Value-Centric Big Data" e-SIDES Workshop - “You’re monitoring my wh... "Towards Value-Centric Big Data" e-SIDES Workshop - “You’re monitoring my wh...
"Towards Value-Centric Big Data" e-SIDES Workshop - “You’re monitoring my wh...
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security Survey
 
The Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning CybersecurityThe Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning Cybersecurity
 
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
 
Managed Security Services On The Rise
Managed Security Services On The RiseManaged Security Services On The Rise
Managed Security Services On The Rise
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
3 steps to gain control of cloud security
3 steps to gain control of cloud security 3 steps to gain control of cloud security
3 steps to gain control of cloud security
 

Viewers also liked

James McQuivey - The Inevitability of Autonomous Machines
James McQuivey - The Inevitability of Autonomous MachinesJames McQuivey - The Inevitability of Autonomous Machines
James McQuivey - The Inevitability of Autonomous MachinesSogetiLabs
 
Gregory Ericson - Machine Intelligence
Gregory Ericson - Machine IntelligenceGregory Ericson - Machine Intelligence
Gregory Ericson - Machine IntelligenceSogetiLabs
 
Mike Hearn - Beyond Tradenet
Mike Hearn - Beyond TradenetMike Hearn - Beyond Tradenet
Mike Hearn - Beyond TradenetSogetiLabs
 
Steve Mills - Your Cognitive Future
Steve Mills - Your Cognitive FutureSteve Mills - Your Cognitive Future
Steve Mills - Your Cognitive FutureSogetiLabs
 
Menno van Doorn - Computer Says No
Menno van Doorn - Computer Says NoMenno van Doorn - Computer Says No
Menno van Doorn - Computer Says NoSogetiLabs
 
Luciano Floridi - Intelligence from Machines
Luciano Floridi - Intelligence from MachinesLuciano Floridi - Intelligence from Machines
Luciano Floridi - Intelligence from MachinesSogetiLabs
 
Marcel Krom - When Are You @Home
Marcel Krom - When Are You @HomeMarcel Krom - When Are You @Home
Marcel Krom - When Are You @HomeSogetiLabs
 
John Bronskill - Machine Learning Is Everywhere
John Bronskill - Machine Learning Is EverywhereJohn Bronskill - Machine Learning Is Everywhere
John Bronskill - Machine Learning Is EverywhereSogetiLabs
 
Paul Mason - Post Capitalism
Paul Mason - Post CapitalismPaul Mason - Post Capitalism
Paul Mason - Post CapitalismSogetiLabs
 
Design2Disrupt: Patrick Kalaher (Frog) - A Dirty New World
Design2Disrupt: Patrick Kalaher (Frog) - A Dirty New WorldDesign2Disrupt: Patrick Kalaher (Frog) - A Dirty New World
Design2Disrupt: Patrick Kalaher (Frog) - A Dirty New WorldVINTlabs | The Sogeti Trendlab
 
Design2Disrupt Summit: Ted Schadler - The Mobile Mind Shift
Design2Disrupt Summit: Ted Schadler - The Mobile Mind ShiftDesign2Disrupt Summit: Ted Schadler - The Mobile Mind Shift
Design2Disrupt Summit: Ted Schadler - The Mobile Mind ShiftVINTlabs | The Sogeti Trendlab
 
Design2Disrupt Summit: Tim O'brien - The New Rule of IT
Design2Disrupt Summit: Tim O'brien -  The New Rule of ITDesign2Disrupt Summit: Tim O'brien -  The New Rule of IT
Design2Disrupt Summit: Tim O'brien - The New Rule of ITVINTlabs | The Sogeti Trendlab
 
Design2Disrupt: Mark Plakias (Orange Institute) - Unicorns, Startups & Giants
Design2Disrupt: Mark Plakias (Orange Institute) -   Unicorns, Startups & GiantsDesign2Disrupt: Mark Plakias (Orange Institute) -   Unicorns, Startups & Giants
Design2Disrupt: Mark Plakias (Orange Institute) - Unicorns, Startups & GiantsVINTlabs | The Sogeti Trendlab
 
Design2Disrupt Summit: Joseph Pine - Destructive Recreation
Design2Disrupt Summit: Joseph Pine  - Destructive RecreationDesign2Disrupt Summit: Joseph Pine  - Destructive Recreation
Design2Disrupt Summit: Joseph Pine - Destructive RecreationVINTlabs | The Sogeti Trendlab
 
Design2Disrupt: Hannu Kauppinen - The Programmable World
Design2Disrupt: Hannu Kauppinen - The Programmable WorldDesign2Disrupt: Hannu Kauppinen - The Programmable World
Design2Disrupt: Hannu Kauppinen - The Programmable WorldVINTlabs | The Sogeti Trendlab
 
Design2Disrupt: Patrick Naef (Emirates) - A 30 year old start up
Design2Disrupt: Patrick Naef (Emirates) -  A 30 year old start upDesign2Disrupt: Patrick Naef (Emirates) -  A 30 year old start up
Design2Disrupt: Patrick Naef (Emirates) - A 30 year old start upVINTlabs | The Sogeti Trendlab
 
Design2Disrupt Summit: John Hogan - The New Epoch of Computing
Design2Disrupt Summit: John Hogan - The New Epoch of ComputingDesign2Disrupt Summit: John Hogan - The New Epoch of Computing
Design2Disrupt Summit: John Hogan - The New Epoch of ComputingVINTlabs | The Sogeti Trendlab
 
SogetiLabs Webinar - 3D Printing
SogetiLabs Webinar - 3D PrintingSogetiLabs Webinar - 3D Printing
SogetiLabs Webinar - 3D PrintingSogetiLabs
 

Viewers also liked (20)

James McQuivey - The Inevitability of Autonomous Machines
James McQuivey - The Inevitability of Autonomous MachinesJames McQuivey - The Inevitability of Autonomous Machines
James McQuivey - The Inevitability of Autonomous Machines
 
Gregory Ericson - Machine Intelligence
Gregory Ericson - Machine IntelligenceGregory Ericson - Machine Intelligence
Gregory Ericson - Machine Intelligence
 
Mike Hearn - Beyond Tradenet
Mike Hearn - Beyond TradenetMike Hearn - Beyond Tradenet
Mike Hearn - Beyond Tradenet
 
Steve Mills - Your Cognitive Future
Steve Mills - Your Cognitive FutureSteve Mills - Your Cognitive Future
Steve Mills - Your Cognitive Future
 
Menno van Doorn - Computer Says No
Menno van Doorn - Computer Says NoMenno van Doorn - Computer Says No
Menno van Doorn - Computer Says No
 
Luciano Floridi - Intelligence from Machines
Luciano Floridi - Intelligence from MachinesLuciano Floridi - Intelligence from Machines
Luciano Floridi - Intelligence from Machines
 
Marcel Krom - When Are You @Home
Marcel Krom - When Are You @HomeMarcel Krom - When Are You @Home
Marcel Krom - When Are You @Home
 
John Bronskill - Machine Learning Is Everywhere
John Bronskill - Machine Learning Is EverywhereJohn Bronskill - Machine Learning Is Everywhere
John Bronskill - Machine Learning Is Everywhere
 
Paul Mason - Post Capitalism
Paul Mason - Post CapitalismPaul Mason - Post Capitalism
Paul Mason - Post Capitalism
 
Design2Disrupt: Patrick Kalaher (Frog) - A Dirty New World
Design2Disrupt: Patrick Kalaher (Frog) - A Dirty New WorldDesign2Disrupt: Patrick Kalaher (Frog) - A Dirty New World
Design2Disrupt: Patrick Kalaher (Frog) - A Dirty New World
 
Design2Disrupt: Menno van Doorn - Setting the Stage
Design2Disrupt: Menno van Doorn - Setting the StageDesign2Disrupt: Menno van Doorn - Setting the Stage
Design2Disrupt: Menno van Doorn - Setting the Stage
 
Design2Disrupt Summit: Ted Schadler - The Mobile Mind Shift
Design2Disrupt Summit: Ted Schadler - The Mobile Mind ShiftDesign2Disrupt Summit: Ted Schadler - The Mobile Mind Shift
Design2Disrupt Summit: Ted Schadler - The Mobile Mind Shift
 
Design2Disrupt Summit: Tim O'brien - The New Rule of IT
Design2Disrupt Summit: Tim O'brien -  The New Rule of ITDesign2Disrupt Summit: Tim O'brien -  The New Rule of IT
Design2Disrupt Summit: Tim O'brien - The New Rule of IT
 
Design2Disrupt: Mark Plakias (Orange Institute) - Unicorns, Startups & Giants
Design2Disrupt: Mark Plakias (Orange Institute) -   Unicorns, Startups & GiantsDesign2Disrupt: Mark Plakias (Orange Institute) -   Unicorns, Startups & Giants
Design2Disrupt: Mark Plakias (Orange Institute) - Unicorns, Startups & Giants
 
Design2Disrupt Summit: Joseph Pine - Destructive Recreation
Design2Disrupt Summit: Joseph Pine  - Destructive RecreationDesign2Disrupt Summit: Joseph Pine  - Destructive Recreation
Design2Disrupt Summit: Joseph Pine - Destructive Recreation
 
Design2Disrupt: Hannu Kauppinen - The Programmable World
Design2Disrupt: Hannu Kauppinen - The Programmable WorldDesign2Disrupt: Hannu Kauppinen - The Programmable World
Design2Disrupt: Hannu Kauppinen - The Programmable World
 
Design2Disrupt: Patrick Naef (Emirates) - A 30 year old start up
Design2Disrupt: Patrick Naef (Emirates) -  A 30 year old start upDesign2Disrupt: Patrick Naef (Emirates) -  A 30 year old start up
Design2Disrupt: Patrick Naef (Emirates) - A 30 year old start up
 
Design2Disrupt Summit: John Hogan - The New Epoch of Computing
Design2Disrupt Summit: John Hogan - The New Epoch of ComputingDesign2Disrupt Summit: John Hogan - The New Epoch of Computing
Design2Disrupt Summit: John Hogan - The New Epoch of Computing
 
MSc Thesis 2011
MSc Thesis 2011MSc Thesis 2011
MSc Thesis 2011
 
SogetiLabs Webinar - 3D Printing
SogetiLabs Webinar - 3D PrintingSogetiLabs Webinar - 3D Printing
SogetiLabs Webinar - 3D Printing
 

Similar to Goran Sandahl - Machine Learning. Literally.

Using Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsUsing Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsZivaro Inc
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security firesKristin Helgeson
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2Shane Kite
 
Top Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White PaperTop Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White PaperNetIQ
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Splunk Discovery Day Hamburg - Security Session
Splunk Discovery Day Hamburg - Security SessionSplunk Discovery Day Hamburg - Security Session
Splunk Discovery Day Hamburg - Security SessionSplunk
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsPhil Huggins FBCS CITP
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
Mass declassification sept 23 2010v2.1
Mass declassification sept 23 2010v2.1Mass declassification sept 23 2010v2.1
Mass declassification sept 23 2010v2.1Jeff Jonas
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threatillustro
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyougUlf Mattsson
 
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...Mark Underwood
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricMark Underwood
 
Information Security Do's and Dont's (2015)
Information Security Do's and Dont's (2015)Information Security Do's and Dont's (2015)
Information Security Do's and Dont's (2015)Alexey Kachalin
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 

Similar to Goran Sandahl - Machine Learning. Literally. (20)

Using Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsUsing Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced Threats
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security fires
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2
 
Top Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White PaperTop Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White Paper
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Splunk Discovery Day Hamburg - Security Session
Splunk Discovery Day Hamburg - Security SessionSplunk Discovery Day Hamburg - Security Session
Splunk Discovery Day Hamburg - Security Session
 
Forensics
ForensicsForensics
Forensics
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Mass declassification sept 23 2010v2.1
Mass declassification sept 23 2010v2.1Mass declassification sept 23 2010v2.1
Mass declassification sept 23 2010v2.1
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
Information Security Do's and Dont's (2015)
Information Security Do's and Dont's (2015)Information Security Do's and Dont's (2015)
Information Security Do's and Dont's (2015)
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 

More from SogetiLabs

Data Driven Decisions for Healthcare presentation
Data Driven Decisions for Healthcare presentationData Driven Decisions for Healthcare presentation
Data Driven Decisions for Healthcare presentationSogetiLabs
 
Talk different roe-20150615-v2-0 (3)
Talk different roe-20150615-v2-0 (3)Talk different roe-20150615-v2-0 (3)
Talk different roe-20150615-v2-0 (3)SogetiLabs
 
The Cybersecurity Kill Chan - myth or threat
The Cybersecurity Kill Chan - myth or threatThe Cybersecurity Kill Chan - myth or threat
The Cybersecurity Kill Chan - myth or threatSogetiLabs
 
Cyber security the cybersecurity kill chan - myth or threat
Cyber security   the cybersecurity kill chan - myth or threatCyber security   the cybersecurity kill chan - myth or threat
Cyber security the cybersecurity kill chan - myth or threatSogetiLabs
 
Cloud migration strategies
Cloud migration strategiesCloud migration strategies
Cloud migration strategiesSogetiLabs
 
Digitecture pop150316
Digitecture pop150316Digitecture pop150316
Digitecture pop150316SogetiLabs
 
SogetiLabs Webinar: The Experience of Things
SogetiLabs Webinar: The Experience of Things SogetiLabs Webinar: The Experience of Things
SogetiLabs Webinar: The Experience of Things SogetiLabs
 
Sogetilabs webinar: Uniting Robotics and IT Testing
Sogetilabs webinar: Uniting Robotics and IT TestingSogetilabs webinar: Uniting Robotics and IT Testing
Sogetilabs webinar: Uniting Robotics and IT TestingSogetiLabs
 

More from SogetiLabs (8)

Data Driven Decisions for Healthcare presentation
Data Driven Decisions for Healthcare presentationData Driven Decisions for Healthcare presentation
Data Driven Decisions for Healthcare presentation
 
Talk different roe-20150615-v2-0 (3)
Talk different roe-20150615-v2-0 (3)Talk different roe-20150615-v2-0 (3)
Talk different roe-20150615-v2-0 (3)
 
The Cybersecurity Kill Chan - myth or threat
The Cybersecurity Kill Chan - myth or threatThe Cybersecurity Kill Chan - myth or threat
The Cybersecurity Kill Chan - myth or threat
 
Cyber security the cybersecurity kill chan - myth or threat
Cyber security   the cybersecurity kill chan - myth or threatCyber security   the cybersecurity kill chan - myth or threat
Cyber security the cybersecurity kill chan - myth or threat
 
Cloud migration strategies
Cloud migration strategiesCloud migration strategies
Cloud migration strategies
 
Digitecture pop150316
Digitecture pop150316Digitecture pop150316
Digitecture pop150316
 
SogetiLabs Webinar: The Experience of Things
SogetiLabs Webinar: The Experience of Things SogetiLabs Webinar: The Experience of Things
SogetiLabs Webinar: The Experience of Things
 
Sogetilabs webinar: Uniting Robotics and IT Testing
Sogetilabs webinar: Uniting Robotics and IT TestingSogetilabs webinar: Uniting Robotics and IT Testing
Sogetilabs webinar: Uniting Robotics and IT Testing
 

Recently uploaded

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 

Recently uploaded (20)

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 

Goran Sandahl - Machine Learning. Literally.

  • 1. Machine learning. Literally. Göran Sandahl Co-founder, CTO @gsandahl goran@unomaly.com
  • 2. “Less than 1% of data is analysed” (idc) Stuxnet attack graph
  • 3. 
 Black Box The foundational issue IT systems are black boxes ? ? ? ? ? 3 Breaches CrashesFailures Changes 20% 
 of IT time spent on troubleshooting IT Process Institute 69% 
 of security incidents discovered by 3rd parties Verizon Breach Report, 2013 Growing pressure from legislation, compliance etc
  • 4. Every system produces data. 
 Every incident creates new. Systems Continually learns what’s normal D B Events Profiles § Relevance
 Algorithm Universally uncovers new data in u Memory Controller Read Error on Ch S y s S y s S y s S y s S y s Send any data from any system STREAMING DATA Legacy Cloud Custom Emerging 100% coverage 100% automation 99.999% data reduction 4
  • 5. One focal point and ground truth for all stakeholders sup sec net dev ops app What’s different? Faster mean time to detect, repair and recover Reduced risk, guesswork and troubleshooting Improved communication and collaboration Enhanced organisational learning
  • 6. "Even the most advanced hacker will leave traces in log data" Gartner, Anton Chuvakin Thank you.